Bug 1679394
| Summary: | libreswan using NSS IPsec profiles regresses when critical flags are set causing validation failure | |||
|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 8 | Reporter: | Paul Wouters <pwouters> | |
| Component: | libreswan | Assignee: | Paul Wouters <pwouters> | |
| Status: | CLOSED ERRATA | QA Contact: | Jaroslav Aster <jaster> | |
| Severity: | medium | Docs Contact: | ||
| Priority: | medium | |||
| Version: | 8.0 | CC: | jaster, wchadwic | |
| Target Milestone: | rc | Flags: | pm-rhel:
mirror+
|
|
| Target Release: | 8.0 | |||
| Hardware: | Unspecified | |||
| OS: | Unspecified | |||
| Whiteboard: | ||||
| Fixed In Version: | Doc Type: | If docs needed, set a value | ||
| Doc Text: | Story Points: | --- | ||
| Clone Of: | ||||
| : | 1679735 (view as bug list) | Environment: | ||
| Last Closed: | 2019-11-05 20:59:01 UTC | Type: | Bug | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Embargoed: | ||||
| Bug Depends On: | ||||
| Bug Blocks: | 1679735 | |||
|
Description
Paul Wouters
2019-02-21 04:33:14 UTC
See related rhbz#1643388 Proposed patch from upstream: https://github.com/libreswan/libreswan/commit/7de7d5cdb6717101b8161891ed4344dfd32f5e4c This was tested against upstream test case https://github.com/libreswan/libreswan/tree/master/testing/pluto/ikev2-x509-02-eku to show no regression on EKU. note the certificates with the bogus critical flag were created by tinyca. Apparently when you change any setting and save it, it sets the critical flag. So when you go to set server certificate settings and save them, client certificate settings switch to critical, despite not touching client certificate settings at all. This also probably means it is fairly uncommon as tinyca is not widely used. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2019:3391 |