Back to bug 1300701
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Stefan Kremen | 2016-01-22 07:20:18 UTC | CC | skremen | |
| Jan Synacek | 2016-01-22 07:28:14 UTC | CC | jsynacek | |
| Nathan Kinder | 2016-01-27 00:07:41 UTC | CC | nkinder | |
| Bara Ancincova | 2016-02-03 08:40:18 UTC | CC | bancinco | |
| Patrik Kis | 2016-02-15 13:28:16 UTC | QA Contact | qe-baseos-security | pkis |
| Matus Honek | 2016-02-15 14:47:33 UTC | Status | NEW | ASSIGNED |
| Patrik Kis | 2016-03-01 09:02:17 UTC | Flags | needinfo?(hkario) | |
| Patrik Kis | 2016-03-01 09:09:14 UTC | Flags | needinfo?(hkario) | needinfo?(mhonek) |
| Matus Honek | 2016-03-01 09:45:33 UTC | Status | ASSIGNED | POST |
| Flags | needinfo?(mhonek) | |||
| Matus Honek | 2016-03-08 13:41:43 UTC | Status | POST | MODIFIED |
| Fixed In Version | openldap-2.4.40-11.el6 | |||
| errata-xmlrpc | 2016-03-08 13:44:29 UTC | Status | MODIFIED | ON_QA |
| errata-xmlrpc | 2016-03-10 12:59:10 UTC | Status | ON_QA | VERIFIED |
| Hubert Kario | 2016-03-14 11:21:07 UTC | Status | VERIFIED | ASSIGNED |
| Patrik Kis | 2016-03-15 09:15:18 UTC | Flags | needinfo?(mhonek) | |
| Tom Lavigne | 2016-03-21 15:32:40 UTC | CC | tlavigne | |
| Matus Honek | 2016-03-21 15:56:30 UTC | Status | ASSIGNED | MODIFIED |
| Flags | needinfo?(mhonek) | |||
| errata-xmlrpc | 2016-03-21 17:24:17 UTC | Status | MODIFIED | ON_QA |
| errata-xmlrpc | 2016-03-23 10:07:25 UTC | Status | ON_QA | VERIFIED |
| Patrik Kis | 2016-04-27 10:49:13 UTC | Flags | needinfo?(mhonek) | |
| Matus Honek | 2016-04-27 12:17:31 UTC | Doc Text | TLS layer of OpenLDAP has been updated with following changes: - Added support for TLSv1.2 (selectable with cipher string value `TLSv1.2') along with new ciphers from TLSv1.2 suite. Additionally, new cipher strings `AESGCM', `SHA256', `SHA384' were added. - Now, cipher string `DEFAULT' selects a subset of NSS defaults in order to keep more secure and up-to-date with current security development. Please note the cipher string `DEFAULT' currently excludes AESGCM ciphers in order to not break the SSF functionality. | |
| Doc Type | Bug Fix | Release Note | ||
| Flags | needinfo?(mhonek) | |||
| Lenka Špačková | 2016-04-27 12:29:05 UTC | Docs Contact | apetrova | |
| Marc Muehlfeld | 2016-04-27 13:18:09 UTC | CC | apetrova, mmuehlfe | |
| Docs Contact | apetrova | mmuehlfe | ||
| Marc Muehlfeld | 2016-04-27 13:54:36 UTC | Doc Text | TLS layer of OpenLDAP has been updated with following changes: - Added support for TLSv1.2 (selectable with cipher string value `TLSv1.2') along with new ciphers from TLSv1.2 suite. Additionally, new cipher strings `AESGCM', `SHA256', `SHA384' were added. - Now, cipher string `DEFAULT' selects a subset of NSS defaults in order to keep more secure and up-to-date with current security development. Please note the cipher string `DEFAULT' currently excludes AESGCM ciphers in order to not break the SSF functionality. | OpenLDAP now supports TLSv1.2 The TLS layer of OpenLDAP has been enhanced to support the cipher string value `TLSv1.2` along with new ciphers from the TLSv1.2 suite. Additionally the new cipher strings `AESGCM`, `SHA256', and SHA384' have been added. With this update, the cipher string `DEFAULT` selects a subset of the Network Security Services (NSS) defaults in order to keep more secure and up-to-date with current security development. Note that the cipher string `DEFAULT` currently excludes `AESGCM` ciphers, in order not to break the Security Strength Factor (SSF) functionality. |
| Marc Muehlfeld | 2016-04-27 15:02:28 UTC | Doc Text | OpenLDAP now supports TLSv1.2 The TLS layer of OpenLDAP has been enhanced to support the cipher string value `TLSv1.2` along with new ciphers from the TLSv1.2 suite. Additionally the new cipher strings `AESGCM`, `SHA256', and SHA384' have been added. With this update, the cipher string `DEFAULT` selects a subset of the Network Security Services (NSS) defaults in order to keep more secure and up-to-date with current security development. Note that the cipher string `DEFAULT` currently excludes `AESGCM` ciphers, in order not to break the Security Strength Factor (SSF) functionality. | OpenLDAP now supports TLSv1.2 The TLS layer of OpenLDAP has been enhanced to support the cipher string value `TLSv1.2` along with new ciphers from the TLSv1.2 suite. Additionally, the new cipher strings `AESGCM`, `SHA256', and SHA384' have been added. With this update, the cipher string `DEFAULT` selects a subset of the Network Security Services (NSS) defaults in order to be up to date with current security development. Note that the cipher string `DEFAULT` currently excludes `AESGCM` ciphers, in order not to break the Security Strength Factor (SSF) functionality. |
| Marc Muehlfeld | 2016-04-27 15:04:00 UTC | Flags | needinfo?(mhonek) | |
| Matus Honek | 2016-04-27 16:04:35 UTC | Flags | needinfo?(mhonek) | |
| Marc Muehlfeld | 2016-05-09 09:56:35 UTC | Doc Text | OpenLDAP now supports TLSv1.2 The TLS layer of OpenLDAP has been enhanced to support the cipher string value `TLSv1.2` along with new ciphers from the TLSv1.2 suite. Additionally, the new cipher strings `AESGCM`, `SHA256', and SHA384' have been added. With this update, the cipher string `DEFAULT` selects a subset of the Network Security Services (NSS) defaults in order to be up to date with current security development. Note that the cipher string `DEFAULT` currently excludes `AESGCM` ciphers, in order not to break the Security Strength Factor (SSF) functionality. | OpenLDAP now supports TLSv1.2 The TLS layer of OpenLDAP has been enhanced to support the cipher string value `TLSv1.2` along with new ciphers from the TLSv1.2 suite. Additionally, the new cipher strings `AESGCM`, `SHA256`, and `SHA384` have been added. With this update, the cipher string `DEFAULT` selects a subset of the Network Security Services (NSS) defaults in order to be up to date with current security development. Note that the cipher string `DEFAULT` currently excludes `AESGCM` ciphers, in order not to break the Security Strength Factor (SSF) functionality. |
| errata-xmlrpc | 2016-05-09 17:31:56 UTC | Status | VERIFIED | RELEASE_PENDING |
| errata-xmlrpc | 2016-05-11 00:59:51 UTC | Status | RELEASE_PENDING | CLOSED |
| Resolution | --- | ERRATA | ||
| Last Closed | 2016-05-10 20:59:51 UTC |
Back to bug 1300701