Bug 1844607
Summary: | OpenSSL will use unsafe FFDH primes with 2048 bit RSA keys | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 8 | Reporter: | Alicja Kario <hkario> |
Component: | openssl | Assignee: | Tomas Mraz <tmraz> |
Status: | CLOSED ERRATA | QA Contact: | Alicja Kario <hkario> |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | 8.2 | CC: | crypto-team, extras-qa, jorton, tmraz |
Target Milestone: | rc | Keywords: | Triaged |
Target Release: | 8.3 | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | openssl-1.1.1g-8.el8 | Doc Type: | Bug Fix |
Doc Text: |
OpenSSL will use safe primes in automatically selected DH parameters
Previous versions of OpenSSL configured to automatically select Diffie-Hellman parameters in Transport Layer Security (TLS) connection would use group 22 and group 23 from RFC 5114 when configured with 1024 bit or 2048 bit RSA keys. As those groups use primes with known small subgroups, some implementations may reject them (like OpenSSL from RHEL 8.3 working in FIPS mode).
This change makes OpenSSL select known safe primes defined in RFC 2409 and RFC 3526.
|
Story Points: | --- |
Clone Of: | 1844575 | Environment: | |
Last Closed: | 2020-11-04 01:54:39 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1844575 | ||
Bug Blocks: |
Description
Alicja Kario
2020-06-05 18:35:21 UTC
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Low: openssl security, bug fix, and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2020:4514 |