Bug 1160745

Summary: Rebase mod_nss to 1.0.11
Product: Red Hat Enterprise Linux 7 Reporter: Rob Crittenden <rcritten>
Component: mod_nssAssignee: Matthew Harmsen <mharmsen>
Status: CLOSED ERRATA QA Contact: Kaleem <ksiddiqu>
Severity: unspecified Docs Contact: Bara Ancincova <bancinco>
Priority: unspecified    
Version: 7.0CC: batkisso, hkario, ksrot, martin, mharmsen, mpoole, nkinder, nsoman, szidek
Target Milestone: rcKeywords: Rebase
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: mod_nss-1.0.11-4.el7 Doc Type: Rebase: Bug Fixes and Enhancements
Doc Text:
mod_nss rebase to version 1.0.11 The _mod_nss packages_ have been upgraded to upstream version 1.0.11, which provides a number of bug fixes and enhancements over the previous version. Notably, *mod_nss* can now enable TLSv1.2, and SSLv2 has been completely removed. Also, support for the ciphers generally considered to be most secure has been added.
Story Points: ---
Clone Of: Environment:
Last Closed: 2015-11-19 11:09:23 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1057566, 1181710, 1246125    

Description Rob Crittenden 2014-11-05 14:36:18 UTC
Description of problem:

NSS 3.15.1+ supports TLSv1.2, mod_nss can enable it now as well. Support was added to NSS via BZ https://bugzilla.mozilla.org/show_bug.cgi?id=480514

The basic framework for supporting it in mod_nss is already there from BZ https://bugzilla.redhat.com/show_bug.cgi?id=979798

Supported was added upstream to mod_nss in https://bugzilla.redhat.com/show_bug.cgi?id=1119484

Comment 4 Matthew Harmsen 2015-06-11 17:34:25 UTC
Based upon:
* http://koji.fedoraproject.org/koji/buildinfo?buildID=616335 mod_nss-1.0.11-3.fc22

Comment 19 Namita Soman 2015-09-17 12:26:46 UTC
# cat /etc/redhat-release 
Red Hat Enterprise Linux Server release 7.2 Beta (Maipo)

# rpm -qi mod_nss
Name        : mod_nss
Version     : 1.0.11
Release     : 4.el7
Architecture: x86_64
Install Date: Wed 16 Sep 2015 02:07:42 PM EDT
Group       : System Environment/Daemons
Size        : 280726
License     : ASL 2.0
Signature   : RSA/SHA256, Tue 01 Sep 2015 11:27:24 AM EDT, Key ID 938a80caf21541eb
Source RPM  : mod_nss-1.0.11-4.el7.src.rpm
Build Date  : Fri 28 Aug 2015 01:24:59 PM EDT
Build Host  : x86-018.build.eng.bos.redhat.com
Relocations : (not relocatable)
Packager    : Red Hat, Inc. <http://bugzilla.redhat.com/bugzilla>
Vendor      : Red Hat, Inc.
URL         : https://fedorahosted.org/mod_nss/
Summary     : SSL/TLS module for the Apache HTTP server
Description :
The mod_nss module provides strong cryptography for the Apache Web
server via the Secure Sockets Layer (SSL) and Transport Layer
Security (TLS) protocols using the Network Security Services (NSS)
security library.

Comment 27 Namita Soman 2015-09-24 13:55:23 UTC
# cat /etc/redhat-release 
Red Hat Enterprise Linux Server release 7.2 Beta (Maipo)

# rpm -qi mod_nss
Name        : mod_nss
Version     : 1.0.11
Release     : 4.el7
Architecture: x86_64
Install Date: Sun 20 Sep 2015 08:54:55 PM EDT
Group       : System Environment/Daemons
Size        : 280726
License     : ASL 2.0
Signature   : RSA/SHA256, Tue 01 Sep 2015 11:27:24 AM EDT, Key ID 938a80caf21541eb
Source RPM  : mod_nss-1.0.11-4.el7.src.rpm
Build Date  : Fri 28 Aug 2015 01:24:59 PM EDT
Build Host  : x86-018.build.eng.bos.redhat.com
Relocations : (not relocatable)
Packager    : Red Hat, Inc. <http://bugzilla.redhat.com/bugzilla>
Vendor      : Red Hat, Inc.
URL         : https://fedorahosted.org/mod_nss/
Summary     : SSL/TLS module for the Apache HTTP server
Description :
The mod_nss module provides strong cryptography for the Apache Web
server via the Secure Sockets Layer (SSL) and Transport Layer
Security (TLS) protocols using the Network Security Services (NSS)
security library.

Comment 32 errata-xmlrpc 2015-11-19 11:09:23 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://rhn.redhat.com/errata/RHBA-2015-2305.html