Bug 1160467
Summary: | support TLS 1.1 and later | ||||||||
---|---|---|---|---|---|---|---|---|---|
Product: | Red Hat Enterprise Linux 6 | Reporter: | Rich Megginson <rmeggins> | ||||||
Component: | openldap | Assignee: | Jan Synacek <jsynacek> | ||||||
Status: | CLOSED ERRATA | QA Contact: | Patrik Kis <pkis> | ||||||
Severity: | unspecified | Docs Contact: | |||||||
Priority: | unspecified | ||||||||
Version: | 6.7 | CC: | ebenes, extras-qa, jsynacek, jv+fedora, lnykryn, mpoole, phracek, pkis, rh, rik.theys, rmeggins, sramling | ||||||
Target Milestone: | rc | Keywords: | TestBlocker | ||||||
Target Release: | --- | ||||||||
Hardware: | Unspecified | ||||||||
OS: | Unspecified | ||||||||
Whiteboard: | |||||||||
Fixed In Version: | Doc Type: | Enhancement | |||||||
Doc Text: |
* Support for the TLS protocol version 1.1 and later has been added. (BZ#1160467)
|
Story Points: | --- | ||||||
Clone Of: | 1160466 | ||||||||
: | 1160468 (view as bug list) | Environment: | |||||||
Last Closed: | 2015-07-22 06:18:41 UTC | Type: | Bug | ||||||
Regression: | --- | Mount Type: | --- | ||||||
Documentation: | --- | CRM: | |||||||
Verified Versions: | Category: | --- | |||||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||
Cloudforms Team: | --- | Target Upstream Version: | |||||||
Embargoed: | |||||||||
Bug Depends On: | 1160466, 1164889 | ||||||||
Bug Blocks: | 1160468 | ||||||||
Attachments: |
|
Description
Rich Megginson
2014-11-04 21:42:12 UTC
This is blocking 389-ds-base to be tested with latest versions of TLS1.1, TLS1.2 and above. Hence, marking this as testBlocker Created attachment 1037365 [details]
add tls1.2 ciphers
Comment on attachment 1037365 [details] add tls1.2 ciphers https://bugzilla.redhat.com/attachment.cgi?id=1037365&action=diff#openldap-2.4.40/libraries/libldap/tls_m.c.tls12_ciphers_sec4 What about adding an option for SHA384? I put in the define for SSL_SHA384 since I noticed the recent discussion but I see no definitions for SHA384 hashes on ciphers in the 3.19.1 sources. (In reply to Martin Poole from comment #19) > I put in the define for SSL_SHA384 since I noticed the recent discussion but > I see no definitions for SHA384 hashes on ciphers in the 3.19.1 sources. ok. ack. I appear to have got at least one name wrong, and am checking whether I managed the full suite of TLSv1.2 ciphers. Should have new patch shortly. Created attachment 1038095 [details]
V2 patch with more complete (and correct) cipher names
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://rhn.redhat.com/errata/RHBA-2015-1292.html |