Bug 2039862

Summary: pk12util man page still lists PBE-SHA1-RC2-40 and PBE-SHA1-3DES as default encryption ciphers
Product: Red Hat Enterprise Linux 9 Reporter: Ivan Nikolchev <inikolch>
Component: nssAssignee: Bob Relyea <rrelyea>
Status: CLOSED ERRATA QA Contact: Ivan Nikolchev <inikolch>
Severity: low Docs Contact:
Priority: low    
Version: 9.0CC: rrelyea
Target Milestone: rcKeywords: Triaged
Target Release: ---Flags: pm-rhel: mirror+
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: nss-3.71.0-6.el9 Doc Type: No Doc Update
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-05-17 12:47:48 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Ivan Nikolchev 2022-01-12 15:13:37 UTC
Description of problem:
pk12util man page still lists PBE-SHA1-RC2-40 and PBE-SHA1-3DES as default encryption ciphers.

Version-Release number of selected component (if applicable):
nss-3.71.0-3.el9.x86_64

How reproducible:


Steps to Reproduce:
1.Check the pk12util man page

Actual results:
If no algorithm is specified, the tool defaults to using PKCS #12 SHA-1 and 3-key triple DES for private key encryption. When not in FIPS mode, PKCS #12 SHA-1 and 40-bit RC4 is used for certificate encryption

Expected results:
Man page lists AES-128-CBC/AES-256-CBC with PBKDF2 and SHA-256 as defaults.
The man page should also include CAMELLIA as an option for encryption.

Additional info:

Comment 7 errata-xmlrpc 2022-05-17 12:47:48 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (new packages: nss), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHEA-2022:2398