Back to bug 1975718

Who When What Removed Added
Red Hat Bugzilla 2021-06-24 09:39:18 UTC Pool ID sst_security_crypto_rhel_9
Beniamino Galvani 2021-06-24 09:49:31 UTC CC bgalvani
Vladimir Benes 2021-06-24 12:18:52 UTC Pool ID sst_security_crypto_rhel_9 sst_networking_rhel_9
CC sukulkar
Component openssl wpa_supplicant
Assignee sahana dcaratti
QA Contact qe-baseos-security kernel-qe-hw
Tomas Pelka 2021-06-24 12:23:35 UTC Keywords TestBlocker
Target Release --- 9.0 Beta
CC tpelka
RHEL Program Management 2021-06-24 12:23:41 UTC CC dcaratti
Flags needinfo?(dcaratti)
Red Hat One Jira (issues.redhat.com) 2021-06-24 23:41:28 UTC Link ID Red Hat Issue Tracker RHELPLAN-86466
Davide Caratti 2021-07-01 07:05:41 UTC Flags needinfo?(dcaratti)
RHEL Program Management 2021-07-01 07:05:48 UTC Keywords Triaged
Víctor R. Ruiz 2021-07-05 15:37:27 UTC CC rvr
QA Contact kernel-qe-hw kbenoit
Davide Caratti 2021-07-07 17:34:06 UTC Status NEW ASSIGNED
Flags needinfo?(vbenes)
Davide Caratti 2021-07-12 13:54:09 UTC Flags needinfo?(vbenes)
Vladimir Benes 2021-07-28 08:24:26 UTC Doc Type If docs needed, set a value Release Note
Prokop Vlasin 2021-07-29 17:44:07 UTC CC pvlasin
Davide Caratti 2021-08-19 14:44:53 UTC Fixed In Version wpa_supplicant-2.9-17.el9
Status ASSIGNED MODIFIED
errata-xmlrpc 2021-08-19 19:31:24 UTC Status MODIFIED ON_QA
Lenka Špačková 2021-08-31 11:08:59 UTC Docs Contact mmuehlfe
CC lkuprova
Marc Muehlfeld 2021-08-31 12:36:59 UTC Flags needinfo?(dcaratti)
Davide Caratti 2021-08-31 13:30:03 UTC Flags needinfo?(mmuehlfe)
Ken Benoit 2021-09-01 17:19:07 UTC Status ON_QA VERIFIED
Marc Muehlfeld 2021-09-08 06:53:01 UTC Flags needinfo?(mmuehlfe) needinfo?(dcaratti)
Marc Muehlfeld 2021-09-08 18:02:32 UTC Doc Type Release Note Bug Fix
Davide Caratti 2021-09-09 08:48:18 UTC Flags needinfo?(dcaratti) needinfo?(dcaratti)
Doc Text Cause:

RHEL9 applications were migrated to use OpenSSL-3.0.0

Consequence:

many wifi and 802.1x wired connections profiles were no more able to connect

Fix:

wpa_supplicant's OpenSSL backend was fixed

Result:

All the profiles that were failing are now connecting properly. Profiles using legacy cryptographic algorithms, namely those who need DES (like MS-CHAPv2) or RC4 (like TKIP), are still working but user needs to manually enable the OpenSSL legacy provider
Ioanna Gkioka 2021-09-30 12:28:52 UTC Docs Contact mmuehlfe phybl
CC igkioka
Petr Hybl 2021-10-14 09:00:19 UTC Doc Text Cause:

RHEL9 applications were migrated to use OpenSSL-3.0.0

Consequence:

many wifi and 802.1x wired connections profiles were no more able to connect

Fix:

wpa_supplicant's OpenSSL backend was fixed

Result:

All the profiles that were failing are now connecting properly. Profiles using legacy cryptographic algorithms, namely those who need DES (like MS-CHAPv2) or RC4 (like TKIP), are still working but user needs to manually enable the OpenSSL legacy provider
Previously many wifi and 802.1x wired connections profiles were not able to connect. This bug is now fixed. All the profiles are now connecting properly. Profiles using legacy cryptographic algorithms, namely those who need DES (for example MS-CHAPv2) or RC4 (for example TKIP), are still working but the user needs to manually enable the OpenSSL legacy provider.
Flags needinfo?(dcaratti)
Petr Hybl 2021-10-14 09:11:12 UTC Doc Text Previously many wifi and 802.1x wired connections profiles were not able to connect. This bug is now fixed. All the profiles are now connecting properly. Profiles using legacy cryptographic algorithms, namely those who need DES (for example MS-CHAPv2) or RC4 (for example TKIP), are still working but the user needs to manually enable the OpenSSL legacy provider. .Wifi and 802.1x wired connections profiles are now connecting properly.

Previously many wifi and 802.1x wired connections profiles were not able to connect. This bug is now fixed. All the profiles are now connecting properly. Profiles using legacy cryptographic algorithms, namely those who need DES (for example MS-CHAPv2) or RC4 (for example TKIP), are still working but the user needs to manually enable the OpenSSL legacy provider.
Davide Caratti 2021-10-14 12:03:09 UTC Flags needinfo?(dcaratti)
Petr Hybl 2021-10-21 09:00:55 UTC Doc Text .Wifi and 802.1x wired connections profiles are now connecting properly.

Previously many wifi and 802.1x wired connections profiles were not able to connect. This bug is now fixed. All the profiles are now connecting properly. Profiles using legacy cryptographic algorithms, namely those who need DES (for example MS-CHAPv2) or RC4 (for example TKIP), are still working but the user needs to manually enable the OpenSSL legacy provider.
.Wifi and 802.1x Ethernet connections profiles are now connecting properly

Previously, many Wifi and 802.1x Ethernet connections profiles were not able to connect. This bug is now fixed. All the profiles are now connecting properly. Profiles that use legacy cryptographic algorithms still work but you need to manually enable the OpenSSL legacy provider. This is required, for example, when you use DES with MS-CHAPv2 and RC4 with TKIP.
Vratislav Hutsky 2021-12-07 21:33:05 UTC Status VERIFIED CLOSED
Resolution --- CURRENTRELEASE
Last Closed 2021-12-07 21:33:05 UTC
Filip Dvorak 2022-01-14 09:33:11 UTC CC fdvorak

Back to bug 1975718