Bug 1204375
Summary: | squid sends incorrect ssl chain breaking newer gnutls using applications | ||||||||
---|---|---|---|---|---|---|---|---|---|
Product: | Red Hat Enterprise Linux 7 | Reporter: | Kevin Fenzi <kevin> | ||||||
Component: | squid | Assignee: | Luboš Uhliarik <luhliari> | ||||||
Status: | CLOSED ERRATA | QA Contact: | Ondřej Pták <optak> | ||||||
Severity: | unspecified | Docs Contact: | |||||||
Priority: | unspecified | ||||||||
Version: | 7.1 | CC: | isenfeld, kevin, luhliari, optak, thozza | ||||||
Target Milestone: | rc | Keywords: | Patch | ||||||
Target Release: | --- | ||||||||
Hardware: | Unspecified | ||||||||
OS: | Unspecified | ||||||||
Whiteboard: | |||||||||
Fixed In Version: | squid-3.3.8-13.el7 | Doc Type: | Bug Fix | ||||||
Doc Text: |
Cause:
SSL certificate is received twice from Squid.
Consequence:
SSL negotiation is failing for some client applications.
Fix:
SSL certificate is sent only once.
Result:
SSL client applications are not failing anymore.
|
Story Points: | --- | ||||||
Clone Of: | Environment: | ||||||||
Last Closed: | 2015-11-19 12:20:29 UTC | Type: | Bug | ||||||
Regression: | --- | Mount Type: | --- | ||||||
Documentation: | --- | CRM: | |||||||
Verified Versions: | Category: | --- | |||||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||
Cloudforms Team: | --- | Target Upstream Version: | |||||||
Embargoed: | |||||||||
Attachments: |
|
Description
Kevin Fenzi
2015-03-21 13:17:44 UTC
Created attachment 1011660 [details] This is a backported patch which should fix bug #1204375 Hi Kevin, which version of squid and RHEL are you exactly using? I backported this patch, for the latest squid (3.3.8) in RHEL 7.1. I'm attaching the PATCH, so you can try, if it fixes this bug in your squid configuration. Created attachment 1011700 [details]
SRPM of squid containing patch
We can confirm this fixes the issue. ;) Thanks! Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://rhn.redhat.com/errata/RHSA-2015-2378.html |