Bug 1724034
Summary: | Unexpected OCSP in proxy SSL connection | ||||||
---|---|---|---|---|---|---|---|
Product: | Red Hat Enterprise Linux 7 | Reporter: | Hisanobu Okuda <hokuda> | ||||
Component: | httpd | Assignee: | Luboš Uhliarik <luhliari> | ||||
Status: | CLOSED ERRATA | QA Contact: | Maryna Nalbandian <mnalband> | ||||
Severity: | unspecified | Docs Contact: | |||||
Priority: | unspecified | ||||||
Version: | 7.6 | CC: | bgollahe, bnater, jorton, luhliari, pdwyer | ||||
Target Milestone: | rc | Keywords: | Regression, Triaged | ||||
Target Release: | --- | ||||||
Hardware: | Unspecified | ||||||
OS: | Unspecified | ||||||
Whiteboard: | |||||||
Fixed In Version: | Doc Type: | If docs needed, set a value | |||||
Doc Text: | Story Points: | --- | |||||
Clone Of: | |||||||
: | 1744120 1744121 (view as bug list) | Environment: | |||||
Last Closed: | 2020-03-31 20:03:28 UTC | Type: | Bug | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | |||||||
Bug Blocks: | 1716962, 1744120, 1744121 | ||||||
Attachments: |
|
Description
Hisanobu Okuda
2019-06-26 06:03:55 UTC
Created attachment 1584605 [details]
untarme.tgz
The ocsp_mask's initial value should be SSL_OCSPCHECK_NONE: [root@e5018ace4173 ssl]# diff -u ssl_engine_config.c.org ssl_engine_config.c --- ssl_engine_config.c.org 2019-06-27 00:07:25.590004085 +0000 +++ ssl_engine_config.c 2019-06-27 00:09:15.764960120 +0000 @@ -130,7 +130,7 @@ mctx->auth.verify_depth = UNSET; mctx->auth.verify_mode = SSL_CVERIFY_UNSET; - mctx->ocsp_mask = UNSET; + mctx->ocsp_mask = SSL_OCSPCHECK_NONE; mctx->ocsp_force_default = FALSE; mctx->ocsp_responder = NULL; mctx->ocsp_resptime_skew = UNSET; [root@e5018ace4173 ssl]# Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2020:1121 |