Bug 1057656
| Summary: | Custom/big DH parameters not supported | |||
|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 6 | Reporter: | Alicja Kario <hkario> | |
| Component: | httpd | Assignee: | Luboš Uhliarik <luhliari> | |
| Status: | CLOSED DUPLICATE | QA Contact: | BaseOS QE - Apps <qe-baseos-apps> | |
| Severity: | high | Docs Contact: | ||
| Priority: | high | |||
| Version: | 6.5 | CC: | jorton, omoris, tmraz | |
| Target Milestone: | rc | Keywords: | FutureFeature | |
| Target Release: | --- | |||
| Hardware: | Unspecified | |||
| OS: | Unspecified | |||
| Whiteboard: | ||||
| Fixed In Version: | Doc Type: | Enhancement | ||
| Doc Text: | Story Points: | --- | ||
| Clone Of: | ||||
| : | 1057687 (view as bug list) | Environment: | ||
| Last Closed: | 2014-06-20 11:07:13 UTC | Type: | Bug | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Embargoed: | ||||
| Bug Depends On: | 1064878 | |||
| Bug Blocks: | 1057687 | |||
Description of problem: When using DHE based cipher suites, the offered DH parameters by mod_ssl are always 1024 bit sized, even if the certificate used is 2048 bit. This makes httpd not compliant with NIST SP 800-131A when DHE cipher suite is negotiated since 1st of January this year. Version-Release number of selected component (if applicable): mod_ssl-2.2.15-29.el6_4.x86_64 httpd-2.2.15-29.el6_4.x86_64 openssl-1.0.1e-15.el6.x86_64 nss-3.15.1-15.el6.x86_64 How reproducible: Always Steps to Reproduce: 1. Generate RSA certificates that are 2048bit long 2. Generate 2048 bit DH parameters, add them to file referenced by SSLCertificateFile 3. Connect using tstclnt -d /etc/pki/nssdb/ -h localhost -p 443 -V ssl3: -o -v Actual results: tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 1024-bit DHE Compression: NULL Expected results: tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL (note Key Exchange in second line) Additional info: http://csrc.nist.gov/publications/nistpubs/800-131A/sp800-131A.pdf Httpd should automatically select DH parameters that are at least as long as the RSA keys (see SP 800-131A and SP 800-57 Part 1).