Skip to content

Commit f556389

Browse files
authored
[VAULT] Last minute updates for 1.21.x (#1153)
* apply feedback re: snowflake deprecation * Apply fix from #928 * Apply changes from #992 * Apply updates from #840 * fix partial reference * apply more feedback * Fix folder name
1 parent 52d0470 commit f556389

File tree

13 files changed

+83
-18
lines changed

13 files changed

+83
-18
lines changed
Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
### Secrets sync SSRF protection may block private endpoints ((#ssrf-block-endpoint)
2+
3+
<!-- BEGIN: Vault:=v1.18.x -->
4+
5+
| Change | Status | Vault edition | Affected version | Fixed version
6+
| ----------- | -------- | ------------- | ---------------- | -------------
7+
| Known issue | Closed | Enterprise | 1.18.0 | 1.18.5
8+
9+
<!-- END: Vault:=v1.18.x -->
10+
11+
<!-- BEGIN: Vault:=v1.17.x -->
12+
13+
| Change | Status | Vault edition | Affected version | Fixed version
14+
| ----------- | -------- | ------------- | ---------------- | -------------
15+
| Known issue | Closed | Enterprise | 1.17.3 | 1.17.12
16+
17+
<!-- END: Vault:=v1.17.x -->
18+
19+
<!-- BEGIN: Vault:=v1.16.x -->
20+
21+
| Change | Status | Vault edition | Affected version | Fixed version
22+
| ----------- | -------- | ------------- | ---------------- | -------------
23+
| Known issue | Closed | Enterprise | 1.16.7 | 1.16.16
24+
25+
<!-- END: Vault:=v1.16.x -->
26+
27+
The Server-Side Request Forgery (SSRF) protection measures in Vault secrets sync
28+
introduced a new SSRF-safe HTTP client that prevents sync operations to certain
29+
IP ranges. The client specifically blocks requests to private IP ranges
30+
(such as 10.0.0.0/8), including requests that access cloud provider secret
31+
stores through private endpoints.
32+
33+
As a result, Vault blocked secrets sync operations to private IP ranges for all
34+
destinations when accessed through private endpoints.
35+
36+
Example error message:
37+
38+
```text
39+
couldn't sync secret with store: failed to publish event: dial tcp [IP]: prohibited IP address: [IP] is not a permitted destination (denied by: 10.0.0.0/8)
40+
```
41+
42+
#### Recommendation
43+
44+
If you use private endpoints to sync secrets, upgrade to a fixed version or set
45+
the
46+
[`disable_strict_networking`](/vault/api-docs/system/secrets-sync#disable_strict_networking)
47+
secret sync configuration parameter to `true` to disable IP address and port
48+
number restrictions used by the SSRF-safe sync clients.

content/vault/global/partials/important-changes/summary-tables/1_16.mdx

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -45,6 +45,7 @@ Found | Fixed | Workaround | Edition | Issue
4545
1.16.3 | 1.16.6 | **Yes** | All | [JWT auth login requires bound audiences on the role](/vault/docs/v1.16.x/updates/important-changes#jwt-auth-login-requires-bound-audiences-on-the-role)
4646
1.16.3 | 1.16.7 | Upgrade | Enterprise | [Vault standby nodes not deleting removed entity-aliases from in-memory database](/vault/docs/v1.16.x/updates/important-changes#deleting-an-entity-aliases-does-not-remove-it-from-the-in-memory-database-on-standby-nodes)
4747
1.16.7 | 1.16.9 | Upgrade | All | [Client tokens and token accessors audited in plaintext](/vault/docs/v1.16.x/updates/important-changes#client-tokens-and-token-accessors-audited-in-plaintext)
48+
1.16.7 | 1.16.16 | **Yes** | Enterprise | [Secrets sync SSRF protection may block private endpoints](/vault/docs/v1.16.x/updates/important-changes#ssrf-block-endpoint)
4849
1.16.16 | No | No | All | [Authorization failure with Azure federated identity credentials](/vault/docs/v1.16.x/updates/important-changes#authorization-failures-using-azure-federated-identity-credentials)
4950
1.16.16 | 1.16.20 | Upgrade | All | [Unexpected DB static role rotations on upgrade](/vault/docs/v1.16.x/updates/important-changes#database-static-role-rotations-on-upgrade)
5051
1.16.16 | 1.16.20 | Upgrade | All | [Unexpected LDAP static role rotations on upgrade](/vault/docs/v1.16.x/updates/important-changes#ldap-static-role-rotations-on-upgrade)

content/vault/global/partials/important-changes/summary-tables/1_17.mdx

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,7 @@ Found | Fixed | Workaround | Edition | Issue
4444
1.17.0 | 1.17.17 | **Yes** | Enterprise | [External Enterprise plugins cannot run on a standby node when it becomes active](/vault/docs/v1.17.x/updates/important-changes#external-ent-plugins)
4545
1.17.0 | 1.17.14 | Upgrade | All | [Vault log file missing subsystem logs](/vault/docs/v1.17.x/updates/important-changes#vault-log-file-missing-subsystem-logs)
4646
1.17.1 | 1.17.2 | **Yes** | All | [Potential DoS when using the deny_unauthorized proxy protocol behavior for a TCP listener](/vault/docs/v1.17.x/updates/important-changes#potential-dos-when-using-the-deny_unauthorized-proxy-protocol-behavior-for-a-tcp-listener)
47+
1.17.3 | 1.17.12 | **Yes** | Enterprise | [Secrets sync SSRF protection may block private endpoints](/vault/docs/v1.17.x/updates/important-changes#ssrf-block-endpoint)
4748
1.17.12 | No | No | All | [Authorization failure with Azure federated identity credentials](/vault/docs/v1.17.x/updates/important-changes#authorization-failures-using-azure-federated-identity-credentials)
4849
1.17.12 | 1.17.16 | Upgrade | All | [Unexpected DB static role rotations on upgrade](/vault/docs/v1.17.x/updates/important-changes#database-static-role-rotations-on-upgrade)
4950
1.17.12 | 1.17.16 | Upgrade | All | [Unexpected LDAP static role rotations on upgrade](/vault/docs/v1.17.x/updates/important-changes#ldap-static-role-rotations-on-upgrade)

content/vault/global/partials/important-changes/summary-tables/1_18.mdx

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,7 @@ Found | Fixed | Workaround | Edition | Issue
2929
1.18.0 | No | **Yes** | Enterprise | [Duplicate unseal/seal wrap HSM keys](/vault/docs/v1.18.x/updates/important-changes#seal-seal-wrapped-duplicate-hsm-keys)
3030
1.18.0 | 1.18.9 | **Yes** | All | [Unwanted secret rotation for DB and LDAP roles on restart](/vault/docs/v1.18.x/updates/important-changes#database-and-ldap-secrets-engine-unwanted-secret-rotation-on-backend-restart)
3131
1.18.0 | 1.18.7 | Upgrade | All | [Vault log file missing subsystem logs](/vault/docs/v1.18.x/updates/important-changes#vault-log-file-missing-subsystem-logs)
32+
1.18.0 | 1.18.5 | **Yes** | Enterprise | [Secrets sync SSRF protection may block private endpoints](/vault/docs/v1.18.x/updates/important-changes#ssrf-block-endpoint)
3233
1.18.5 | No | No | All | [Authorization failure with Azure federated identity credentials](/vault/docs/v1.18.x/updates/important-changes#authorization-failures-using-azure-federated-identity-credentials)
3334
1.18.5 | 1.18.9 | Upgrade | All | [Unexpected DB static role rotations on upgrade](/vault/docs/v1.18.x/updates/important-changes#database-static-role-rotations-on-upgrade)
3435
1.18.5 | 1.18.9 | Upgrade | All | [Unexpected LDAP static role rotations on upgrade](/vault/docs/v1.18.x/updates/important-changes#ldap-static-role-rotations-on-upgrade)

content/vault/v1.16.x/content/docs/upgrading/upgrade-to-1.16.x.mdx

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -310,3 +310,5 @@ If you use `file` audit devices, you need to:
310310
@include 'known-issues/enterprise-plugins.mdx'
311311

312312
@include '../../../global/partials/important-changes/known-issue/multi-seal-rewrap.mdx'
313+
314+
@include '../../../global/partials/important-changes/known-issue/ssrf-block-endpoint.mdx'

content/vault/v1.17.x/content/docs/upgrading/upgrade-to-1.17.x.mdx

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -254,3 +254,5 @@ more details, and information about opt-out.
254254
@include 'known-issues/azure-auth-fails-uniform-vmss.mdx'
255255

256256
@include 'known-issues/enterprise-plugins.mdx'
257+
258+
@include '../../../global/partials/important-changes/known-issue/ssrf-block-endpoint.mdx'

content/vault/v1.18.x/content/docs/upgrading/upgrade-to-1.18.x.mdx

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -248,3 +248,5 @@ If you use `file` audit devices, you need to:
248248
@include 'known-issues/enterprise-plugins.mdx'
249249

250250
@include '../../../global/partials/important-changes/known-issue/multi-seal-rewrap.mdx'
251+
252+
@include '../../../global/partials/important-changes/known-issue/ssrf-block-endpoint.mdx'

content/vault/v1.19.x/content/docs/about-vault/what-is-vault.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -124,6 +124,6 @@ or clone the Vault Community repo in GitHub and
124124
[build Vault from source code](/vault/get-vault/build-from-code).
125125

126126
To use Vault Enterprise features, you must have a
127-
[valid license configured](/vault/license).
127+
[valid license configured](/vault/docs/license).
128128

129129
@include 'social-bar.mdx'

content/vault/v1.20.x/content/docs/about-vault/what-is-vault.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -122,6 +122,6 @@ or clone the Vault Community repo in GitHub and
122122
[build Vault from source code](/vault/get-vault/build-from-code).
123123

124124
To use Vault Enterprise features, you must have a
125-
[valid license configured](/vault/license).
125+
[valid license configured](/vault/docs/license).
126126

127127
@include 'social-bar.mdx'

content/vault/v1.21.x (rc)/content/api-docs/system/policies-password.mdx

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,12 @@ generation times.
4040
base64-encoded to avoid string escaping. See [Password Policy Syntax](/vault/docs/concepts/password-policies#password-policy-syntax)
4141
for details on password policy definitions.
4242

43+
`entropy_source` `(string: "")` - Specifies an override to the default source of entropy
44+
(randomness) used to generate the passwords. Must be one of:
45+
- "" - source randomness from the default source.
46+
- `platform` - source randomness from the platform RNG.
47+
- `seal` - source entropy from the entropy augmentation. <EnterpriseAlert inline="true" />
48+
4349
### Sample payload
4450

4551
```json

0 commit comments

Comments
 (0)