Back to bug 1300701

Who When What Removed Added
Stefan Kremen 2016-01-22 07:20:18 UTC CC skremen
Jan Synacek 2016-01-22 07:28:14 UTC CC jsynacek
Nathan Kinder 2016-01-27 00:07:41 UTC CC nkinder
Bara Ancincova 2016-02-03 08:40:18 UTC CC bancinco
Patrik Kis 2016-02-15 13:28:16 UTC QA Contact qe-baseos-security pkis
Matus Honek 2016-02-15 14:47:33 UTC Status NEW ASSIGNED
Patrik Kis 2016-03-01 09:02:17 UTC Flags needinfo?(hkario)
Patrik Kis 2016-03-01 09:09:14 UTC Flags needinfo?(hkario) needinfo?(mhonek)
Matus Honek 2016-03-01 09:45:33 UTC Status ASSIGNED POST
Flags needinfo?(mhonek)
Matus Honek 2016-03-08 13:41:43 UTC Status POST MODIFIED
Fixed In Version openldap-2.4.40-11.el6
errata-xmlrpc 2016-03-08 13:44:29 UTC Status MODIFIED ON_QA
errata-xmlrpc 2016-03-10 12:59:10 UTC Status ON_QA VERIFIED
Hubert Kario 2016-03-14 11:21:07 UTC Status VERIFIED ASSIGNED
Patrik Kis 2016-03-15 09:15:18 UTC Flags needinfo?(mhonek)
Tom Lavigne 2016-03-21 15:32:40 UTC CC tlavigne
Matus Honek 2016-03-21 15:56:30 UTC Status ASSIGNED MODIFIED
Flags needinfo?(mhonek)
errata-xmlrpc 2016-03-21 17:24:17 UTC Status MODIFIED ON_QA
errata-xmlrpc 2016-03-23 10:07:25 UTC Status ON_QA VERIFIED
Patrik Kis 2016-04-27 10:49:13 UTC Flags needinfo?(mhonek)
Matus Honek 2016-04-27 12:17:31 UTC Doc Text TLS layer of OpenLDAP has been updated with following changes:
- Added support for TLSv1.2 (selectable with cipher string value `TLSv1.2') along with new ciphers from TLSv1.2 suite. Additionally, new cipher strings `AESGCM', `SHA256', `SHA384' were added.
- Now, cipher string `DEFAULT' selects a subset of NSS defaults in order to keep more secure and up-to-date with current security development. Please note the cipher string `DEFAULT' currently excludes AESGCM ciphers in order to not break the SSF functionality.
Doc Type Bug Fix Release Note
Flags needinfo?(mhonek)
Lenka Špačková 2016-04-27 12:29:05 UTC Docs Contact apetrova
Marc Muehlfeld 2016-04-27 13:18:09 UTC CC apetrova, mmuehlfe
Docs Contact apetrova mmuehlfe
Marc Muehlfeld 2016-04-27 13:54:36 UTC Doc Text TLS layer of OpenLDAP has been updated with following changes:
- Added support for TLSv1.2 (selectable with cipher string value `TLSv1.2') along with new ciphers from TLSv1.2 suite. Additionally, new cipher strings `AESGCM', `SHA256', `SHA384' were added.
- Now, cipher string `DEFAULT' selects a subset of NSS defaults in order to keep more secure and up-to-date with current security development. Please note the cipher string `DEFAULT' currently excludes AESGCM ciphers in order to not break the SSF functionality.
OpenLDAP now supports TLSv1.2

The TLS layer of OpenLDAP has been enhanced to support the cipher string value `TLSv1.2` along with new ciphers from the TLSv1.2 suite. Additionally the new cipher strings `AESGCM`, `SHA256', and SHA384' have been added. With this update, the cipher string `DEFAULT` selects a subset of the Network Security Services (NSS) defaults in order to keep more secure and up-to-date with current security development. Note that the cipher string `DEFAULT` currently excludes `AESGCM` ciphers, in order not to break the Security Strength Factor (SSF) functionality.
Marc Muehlfeld 2016-04-27 15:02:28 UTC Doc Text OpenLDAP now supports TLSv1.2

The TLS layer of OpenLDAP has been enhanced to support the cipher string value `TLSv1.2` along with new ciphers from the TLSv1.2 suite. Additionally the new cipher strings `AESGCM`, `SHA256', and SHA384' have been added. With this update, the cipher string `DEFAULT` selects a subset of the Network Security Services (NSS) defaults in order to keep more secure and up-to-date with current security development. Note that the cipher string `DEFAULT` currently excludes `AESGCM` ciphers, in order not to break the Security Strength Factor (SSF) functionality.
OpenLDAP now supports TLSv1.2

The TLS layer of OpenLDAP has been enhanced to support the cipher string value `TLSv1.2` along with new ciphers from the TLSv1.2 suite. Additionally, the new cipher strings `AESGCM`, `SHA256', and SHA384' have been added. With this update, the cipher string `DEFAULT` selects a subset of the Network Security Services (NSS) defaults in order to be up to date with current security development. Note that the cipher string `DEFAULT` currently excludes `AESGCM` ciphers, in order not to break the Security Strength Factor (SSF) functionality.
Marc Muehlfeld 2016-04-27 15:04:00 UTC Flags needinfo?(mhonek)
Matus Honek 2016-04-27 16:04:35 UTC Flags needinfo?(mhonek)
Marc Muehlfeld 2016-05-09 09:56:35 UTC Doc Text OpenLDAP now supports TLSv1.2

The TLS layer of OpenLDAP has been enhanced to support the cipher string value `TLSv1.2` along with new ciphers from the TLSv1.2 suite. Additionally, the new cipher strings `AESGCM`, `SHA256', and SHA384' have been added. With this update, the cipher string `DEFAULT` selects a subset of the Network Security Services (NSS) defaults in order to be up to date with current security development. Note that the cipher string `DEFAULT` currently excludes `AESGCM` ciphers, in order not to break the Security Strength Factor (SSF) functionality.
OpenLDAP now supports TLSv1.2

The TLS layer of OpenLDAP has been enhanced to support the cipher string value `TLSv1.2` along with new ciphers from the TLSv1.2 suite. Additionally, the new cipher strings `AESGCM`, `SHA256`, and `SHA384` have been added. With this update, the cipher string `DEFAULT` selects a subset of the Network Security Services (NSS) defaults in order to be up to date with current security development. Note that the cipher string `DEFAULT` currently excludes `AESGCM` ciphers, in order not to break the Security Strength Factor (SSF) functionality.
errata-xmlrpc 2016-05-09 17:31:56 UTC Status VERIFIED RELEASE_PENDING
errata-xmlrpc 2016-05-11 00:59:51 UTC Status RELEASE_PENDING CLOSED
Resolution --- ERRATA
Last Closed 2016-05-10 20:59:51 UTC

Back to bug 1300701