| Summary: | IO::Socket::SSL does not support ECDHE | ||||||
|---|---|---|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 7 | Reporter: | Karel Srot <ksrot> | ||||
| Component: | perl-IO-Socket-SSL | Assignee: | perl-maint-list | ||||
| Status: | CLOSED ERRATA | QA Contact: | Karel Srot <ksrot> | ||||
| Severity: | medium | Docs Contact: | Lenka Špačková <lkuprova> | ||||
| Priority: | high | ||||||
| Version: | 7.2 | CC: | antti, ddas, gabe.fahl, hkario, jorton, jplesnik, lkuprova, ovasik, perl-maint-list, ppisar, psabata, salmy, szidek, tmraz | ||||
| Target Milestone: | rc | Keywords: | FutureFeature, Patch | ||||
| Target Release: | --- | ||||||
| Hardware: | x86_64 | ||||||
| OS: | Linux | ||||||
| Whiteboard: | |||||||
| Fixed In Version: | perl-IO-Socket-SSL-1.94-5.el7 | Doc Type: | Enhancement | ||||
| Doc Text: |
Perl *IO::Socket::SSL* now supports ECDHE
Support for Elliptic Curve Diffie–Hellman Exchange (ECDHE) has been added to the *IO::Socket::SSL* Perl module. The new `SSL_ecdh_curve` option can be used for specifying a suitable curve by the Object Identifier (OID) or Name Identifier (NID). As a result, it is now possible to override the default elliptic curve parameters when implementing a TLS client using *IO::Socket:SSL*.
|
Story Points: | --- | ||||
| Clone Of: | 1078084 | Environment: | |||||
| Last Closed: | 2016-11-04 00:22:29 UTC | Type: | Bug | ||||
| Regression: | --- | Mount Type: | --- | ||||
| Documentation: | --- | CRM: | |||||
| Verified Versions: | Category: | --- | |||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||
| Bug Depends On: | 1316379 | ||||||
| Bug Blocks: | |||||||
| Attachments: |
|
||||||
|
Description
Karel Srot
2016-03-10 06:32:36 UTC
RHEL-6 bug also depends on bug 1078301. I don't know if such a change is needed for RHEL-7 too, please double check that. Created attachment 1134908 [details]
Upstream support for ECDH key exchange ported to 1.94
(In reply to Karel Srot from comment #1) > RHEL-6 bug also depends on bug 1078301. I don't know if such a change is > needed for RHEL-7 too, please double check that. The test failure mention in bug 1078301 is fixed in 1.94. Verification steps are same as in BZ#1078084 comment 7 Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://rhn.redhat.com/errata/RHBA-2016-2201.html |