Back to bug 2157950
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Red Hat Bugzilla | 2023-01-03 16:53:57 UTC | Pool ID | sst_security_crypto_rhel_9 | |
| Red Hat One Jira (issues.redhat.com) | 2023-01-03 17:04:01 UTC | Link ID | Red Hat Issue Tracker RHELPLAN-143560 | |
| Bob Relyea | 2023-01-04 17:07:01 UTC | Priority | unspecified | medium |
| CC | rrelyea | |||
| Keywords | Triaged | |||
| Red Hat One Jira (issues.redhat.com) | 2023-01-04 17:13:47 UTC | Link ID | Red Hat Issue Tracker CRYPTO-9242 | |
| Stanislav Zidek | 2023-03-06 13:51:13 UTC | QA Contact | qe-baseos-security | asosedki |
| Clemens Lang | 2023-05-02 13:22:11 UTC | CC | cllang | |
| Bob Relyea | 2023-08-02 16:22:08 UTC | Status | NEW | MODIFIED |
| Bob Relyea | 2023-08-07 17:07:40 UTC | Blocks | 2229793 | |
| Bob Relyea | 2023-08-09 16:01:23 UTC | Doc Text | Feature: A new policy has been added to NSS which allows admins to require EMS when doing tls 1.2 Reason: FIPS requires EMS. NSS does remove the indicator when not doing EMS, but we want to make our FIPS policy conform the our security policy whenever possible. crypto-policies add this policy to it's FIPS policy, which the system switches to when in FIPS mode. Result: NSS (along with openssl and gnutls) will not be able to connect to clients and servers that do not support EMS when the systen is in FIPS mode. | |
| Doc Type | If docs needed, set a value | Enhancement | ||
| Assignee | nss-nspr-maint | rrelyea | ||
| Bob Relyea | 2023-08-09 18:41:59 UTC | Status | MODIFIED | ON_QA |
| Summary | Deal with the new EMS requirement for TLS 1.2 in FIPS mode | Deal with the new EMS requirement for TLS 1.2 in FIPS mode [rhel-9.3.0] | ||
| Alexander Sosedkin | 2023-08-10 12:57:21 UTC | Status | ON_QA | VERIFIED |
| Bob Relyea | 2023-08-10 15:11:15 UTC | Fixed In Version | nss-3.90.0-3.el9_2 |
Back to bug 2157950