Bug 1786382
| Summary: | Support for TLSv1.3 in dovecot | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 8 | Reporter: | Dimitris <centos> |
| Component: | dovecot | Assignee: | Michal Hlavinka <mhlavink> |
| Status: | CLOSED CURRENTRELEASE | QA Contact: | BaseOS QE - Apps <qe-baseos-apps> |
| Severity: | unspecified | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | 8.0 | CC: | mpoole, onatalen, reupke |
| Target Milestone: | rc | ||
| Target Release: | 8.0 | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2020-10-20 14:36:52 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
Dimitris
2019-12-24 22:41:37 UTC
I believe I did not make this clear, if I replace the "TLSv1.3" setting with "TLSv1.2" then the connection is successful and shows the following:
Post-Handshake New Session Ticket arrived:
SSL-Session:
Protocol : TLSv1.3
Cipher : TLS_AES_256_GCM_SHA384
For some reason, focing TLS v1.2 results in v1.3.
Bug or "feature"?
dovecot on RHEL8 has been updated to v2.3.8
Part of the update include changes to protocol setting
"ssl_protocols setting was replaced by ssl_min_protocol. Now you only specify the minimum ssl protocol version Dovecot accepts, defaulting to TLSv1."
Modulo the limits enforced by crypto-policies simply setting "ssl_min_protocol = TLSv1.2" should give the desired result.
Closing, based on comment #3, as it provides the requested functionality and it's the route upstream went. |