Back to bug 2157950

Who When What Removed Added
Red Hat Bugzilla 2023-01-03 16:53:57 UTC Pool ID sst_security_crypto_rhel_9
Red Hat One Jira (issues.redhat.com) 2023-01-03 17:04:01 UTC Link ID Red Hat Issue Tracker RHELPLAN-143560
Bob Relyea 2023-01-04 17:07:01 UTC Priority unspecified medium
CC rrelyea
Keywords Triaged
Red Hat One Jira (issues.redhat.com) 2023-01-04 17:13:47 UTC Link ID Red Hat Issue Tracker CRYPTO-9242
Stanislav Zidek 2023-03-06 13:51:13 UTC QA Contact qe-baseos-security asosedki
Clemens Lang 2023-05-02 13:22:11 UTC CC cllang
Bob Relyea 2023-08-02 16:22:08 UTC Status NEW MODIFIED
Bob Relyea 2023-08-07 17:07:40 UTC Blocks 2229793
Bob Relyea 2023-08-09 16:01:23 UTC Doc Text Feature:
A new policy has been added to NSS which allows admins to require EMS when doing tls 1.2

Reason:
FIPS requires EMS. NSS does remove the indicator when not doing EMS, but we want to make our FIPS policy conform the our security policy whenever possible. crypto-policies add this policy to it's FIPS policy, which the system switches to when in FIPS mode.

Result:
NSS (along with openssl and gnutls) will not be able to connect to clients and servers that do not support EMS when the systen is in FIPS mode.
Doc Type If docs needed, set a value Enhancement
Assignee nss-nspr-maint rrelyea
Bob Relyea 2023-08-09 18:41:59 UTC Status MODIFIED ON_QA
Summary Deal with the new EMS requirement for TLS 1.2 in FIPS mode Deal with the new EMS requirement for TLS 1.2 in FIPS mode [rhel-9.3.0]
Alexander Sosedkin 2023-08-10 12:57:21 UTC Status ON_QA VERIFIED
Bob Relyea 2023-08-10 15:11:15 UTC Fixed In Version nss-3.90.0-3.el9_2

Back to bug 2157950