Bug 1828727
| Summary: | sslVersionMin: new default value: TLS1.2 | ||
|---|---|---|---|
| Product: | Red Hat Directory Server | Reporter: | Marc Muehlfeld <mmuehlfe> |
| Component: | Doc-config-command-file-reference | Assignee: | Marc Muehlfeld <mmuehlfe> |
| Status: | CLOSED CURRENTRELEASE | QA Contact: | RHDS QE <ds-qe-bugs> |
| Severity: | unspecified | Docs Contact: | Marc Muehlfeld <mmuehlfe> |
| Priority: | high | ||
| Version: | 11.0 | CC: | mreynolds, pasik, rhel-docs, vashirov |
| Target Milestone: | --- | ||
| Target Release: | dirsrv-11.1 | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | Enhancement | |
| Doc Text: |
.Directory Server sets the `sslVersionMin` parameter based on the system-wide crypto policy
By default, Directory Server now sets the value of the `sslVersionMin` parameter based on the system-wide crypto policy. If you set the crypto policy profile in the `/etc/crypto-policies/config` file to:
* `DEFAULT`, `FUTURE`, or `FIPS`, Directory Server sets `sslVersionMin` to `TLS1.2`
* `LEGACY`, Directory Server sets `sslVersionMin` to `TLS1.0`
Alternatively, you can manually set `sslVersionMin` to higher value than the one defined in the crypto policy:
----
# dsconf -D "cn=Directory Manager" __ldap://server.example.com__ security set --tls-protocol-min TLS1.3
----
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | 2020-07-09 10:08:59 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||