Bug 1712023
Summary: | openssl pkcs12 uses certpbe algorithm not compliant with FIPS by default | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 8 | Reporter: | Ondrej Moriš <omoris> |
Component: | openssl | Assignee: | Tomas Mraz <tmraz> |
Status: | CLOSED ERRATA | QA Contact: | Daiki Ueno <dueno> |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | 8.0 | CC: | dueno, hkario |
Target Milestone: | rc | Keywords: | Triaged |
Target Release: | 8.1 | Flags: | pm-rhel:
mirror+
|
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | openssl-1.1.1b-6.el8 | Doc Type: | If docs needed, set a value |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2019-11-05 22:40:19 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Ondrej Moriš
2019-05-20 16:00:33 UTC
(In reply to Ondrej Moriš from comment #0) > Additional info: > > In FIPS openssl should use FIPS compliant algorithm (analogously to keypbe). It seems that PBE-SHA1-RC2-40 is used by default actually. Also please notice that both DES-EDE3-CBC and PBE-SHA1-3DES work fine. *** Bug 1710950 has been marked as a duplicate of this bug. *** Also, I think the default option should be the same when FIPS mode is enabled or disabled (and compliant with FIPS at the same time). It will help to avoid situation when keys are generated with FIPS mode disabled using a non-compliant algorithm and then cannot be used once FIPS mode is enabled. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2019:3700 |