Bug 1775158
Summary: | POST request with TLS 1.3 PHA client auth fails: Re-negotiation handshake failed: Client certificate missing | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 8 | Reporter: | Christian Heimes <cheimes> |
Component: | httpd | Assignee: | Luboš Uhliarik <luhliari> |
Status: | CLOSED ERRATA | QA Contact: | Maryna Nalbandian <mnalband> |
Severity: | high | Docs Contact: | |
Priority: | unspecified | ||
Version: | 8.2 | CC: | anon.amish, bnater, extras-qa, jkaluza, jorton, luhliari, pahan, pasik |
Target Milestone: | rc | ||
Target Release: | 8.0 | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | |
Clone Of: | 1775146 | Environment: | |
Last Closed: | 2020-04-28 15:32:08 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1775146 | ||
Bug Blocks: | 1760850, 1777809 |
Description
Christian Heimes
2019-11-21 13:55:25 UTC
I can reproduce the issue on RHEL 8.2 with idm:DL1 module: Version-Release number of selected component (if applicable): openssl-1.1.1c-6.el8.x86_64 mod_ssl-2.4.37-18.module+el8.2.0+4739+89aa1872.x86_64 httpd-2.4.37-18.module+el8.2.0+4739+89aa1872.x86_64 Actual results: [Thu Nov 21 08:54:02.891746 2019] [ssl:error] [pid 5242:tid 140395275077376] [client 10.0.137.160:36094] AH: verify client post handshake [Thu Nov 21 08:54:02.936393 2019] [ssl:error] [pid 5242:tid 140395241506560] [client 10.0.137.160:36096] AH: verify client post handshake [Thu Nov 21 08:54:02.936472 2019] [ssl:error] [pid 5242:tid 140395241506560] [client 10.0.137.160:36096] AH02263: Re-negotiation handshake failed: Client certificate missing Joe has pushed patched builds to F30 and F31. The patches fix the issue that I'm seeing with TLS 1.3 PHA and HTTP POST requests. FreeIPA's test suite is passing with patched HTTPd and TLS 1.3 enabled. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHEA-2020:1585 |