Bug 1671244

Summary: x25519 allowed in FIPS mode [rhel-7.6.z]
Product: Red Hat Enterprise Linux 7 Reporter: RAD team bot copy to z-stream <autobot-eus-copy>
Component: jssAssignee: Alex Scheel <ascheel>
Status: CLOSED ERRATA QA Contact: Asha Akkiangady <aakkiang>
Severity: urgent Docs Contact:
Priority: high    
Version: 7.6CC: ascheel, bbhavsar, mharmsen
Target Milestone: rcKeywords: TestCaseProvided, ZStream
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: jss-4.4.4-4.el7_6 Doc Type: Bug Fix
Doc Text:
Cause: x25519 was incorrectly enabled in FIPS mode TLS handshakes due to an open NSS bug. Result: x25519 is now disabled in FIPS mode TLS handshakes for programs using JSS.
Story Points: ---
Clone Of: 1669180 Environment:
Last Closed: 2019-03-13 18:45:39 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1669180    
Bug Blocks:    
Attachments:
Description Flags
capture.pcap none

Description RAD team bot copy to z-stream 2019-01-31 08:12:00 UTC
This bug has been copied from bug #1669180 and has been proposed to be backported to 7.6 z-stream (EUS).

Comment 4 Matthew Harmsen 2019-01-31 22:42:20 UTC
Test Case:

* https://bugzilla.redhat.com/show_bug.cgi?id=1669180#c5

Comment 5 bhavik 2019-02-26 14:41:59 UTC
Created attachment 1538839 [details]
capture.pcap

Comment 11 errata-xmlrpc 2019-03-13 18:45:39 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2019:0505