Bug 1352109
| Summary: | Replication stops working only when fips mode is set to true | |||
|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 6 | Reporter: | Jean Figarella <jfigarel> | |
| Component: | 389-ds-base | Assignee: | mreynolds | |
| Status: | CLOSED ERRATA | QA Contact: | Viktor Ashirov <vashirov> | |
| Severity: | unspecified | Docs Contact: | Marc Muehlfeld <mmuehlfe> | |
| Priority: | unspecified | |||
| Version: | 6.7 | CC: | amsharma, hkario, jfigarel, mreynolds, nhosoi, nkinder, rmeggins, rrelyea, vashirov | |
| Target Milestone: | pre-dev-freeze | |||
| Target Release: | --- | |||
| Hardware: | Unspecified | |||
| OS: | Unspecified | |||
| Whiteboard: | ||||
| Fixed In Version: | 389-ds-base-1.2.11.15-84.el6 | Doc Type: | Bug Fix | |
| Doc Text: |
In FIPS mode, the "slapd_pk11_getInternalKeySlot()" function is now used to retrieve the key slot for a token
The Red Hat Directory Server previously tried to retrieve the key slot from a fixed token name, when FIPS mode was enabled on the security database. However, the token name can change. If the key slot is not found, Directory Server is unable to decode the replication manager's password and replication sessions fail. To fix the problem, the "slapd_pk11_getInternalKeySlot()" function now uses FIPS mode to retrieve the current key slot. As a result, replication sessions using *SSL* or *STTARTTLS* no longer fail in the described situation.
|
Story Points: | --- | |
| Clone Of: | ||||
| : | 1425841 (view as bug list) | Environment: | ||
| Last Closed: | 2017-03-21 10:21:50 UTC | Type: | Bug | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Embargoed: | ||||
| Bug Depends On: | 1387811, 1387812, 1390154 | |||
| Bug Blocks: | 1425841, 1425952 | |||
|
Description
Jean Figarella
2016-07-01 15:46:42 UTC
Upstream ticket: https://fedorahosted.org/389/ticket/48909 I got around the issue by refreshing the password via an ldapmodify. Example: dn: cn=ReplAgrmt_name,cn=replica,cn=dc\3Dca-33,cn=mapping tree,cn=config changetype: modify replace: nsDS5ReplicaCredentials nsDS5ReplicaCredentials: passwordgoeshere Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://rhn.redhat.com/errata/RHBA-2017-0667.html |