Bug 1711438
Summary: | nss server application should not return RSA-SHA256 signature in TLS 1.3 if the private key from PKCS#11 does not support RSA-PSS nor raw-RSA [rhel-7] | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 7 | Reporter: | Alicja Kario <hkario> |
Component: | nss | Assignee: | nss-nspr-maint <nss-nspr-maint> |
Status: | CLOSED DEFERRED | QA Contact: | BaseOS QE Security Team <qe-baseos-security> |
Severity: | medium | Docs Contact: | Lenka Špačková <lkuprova> |
Priority: | medium | ||
Version: | 7.7 | CC: | dueno, hkario, jjelen, lmanasko, nss-nspr-maint, qe-baseos-security, rrelyea, ssorce, szidek |
Target Milestone: | rc | Keywords: | Triaged |
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Known Issue | |
Doc Text: |
.PKCS#11 devices not supporting RSA-PSS cannot be used with TLS 1.3
The TLS protocol version 1.3 requires RSA-PSS signatures, which are not supported by all PKCS#11 devices, such as hardware security modules (HSM) or smart cards. Currently, server applications using NSS do not check the PKCS#11 module capabilities before negotiating TLS 1.3. As a consequence, attempts to authenticate using PKCS#11 devices that do not support RSA-PSS fail. To work around this problem, use TLS 1.2 instead.
|
Story Points: | --- |
Clone Of: | 1681278 | Environment: | |
Last Closed: | 2021-03-10 17:08:30 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1681278, 1701233 | ||
Bug Blocks: |