Bug 2052819

Summary: Fix FIPS Reliance on Crypto Policies [rhel-9, openjdk-17]
Product: Red Hat Enterprise Linux 9 Reporter: Andrew John Hughes <ahughes>
Component: java-17-openjdkAssignee: Andrew John Hughes <ahughes>
Status: CLOSED ERRATA QA Contact: OpenJDK QA <java-qa>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 9.0CC: jandrlik, jvanek
Target Milestone: rcKeywords: Triaged
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: java-17-openjdk-17.0.2.0.8-6.el9 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-05-17 14:06:28 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Andrew John Hughes 2022-02-10 05:55:39 UTC
At present, FIPS support relies on crypto policies being present and active.

However, after the move to using /proc/sys/crypto/fips_enabled or NSS to detect FIPS mode (RH1929465), there is no need for FIPS mode to have anything with system crypto policies, and indeed, it can work fine on RHEL 7 using the /proc check.

We should thus refactor the code so the two are independent of one another, and update the documentation which suggests FIPS mode can be disabled by turning off the crypto policy support.

Comment 8 errata-xmlrpc 2022-05-17 14:06:28 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (new packages: java-17-openjdk), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2022:2647