Bug 2058663

Summary: OpenSSL mustn't work with ECDSA with explicit curve parameters in FIPS mode
Product: Red Hat Enterprise Linux 9 Reporter: Alicja Kario <hkario>
Component: opensslAssignee: Dmitry Belyavskiy <dbelyavs>
Status: CLOSED CURRENTRELEASE QA Contact: Alicja Kario <hkario>
Severity: medium Docs Contact: Jan Fiala <jafiala>
Priority: medium    
Version: 9.0CC: cllang, dbelyavs, jafiala, ssorce
Target Milestone: rcKeywords: Triaged, ZStream
Target Release: ---Flags: pm-rhel: mirror+
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: openssl-3.0.1-43.el9_0 Doc Type: Deprecated Functionality
Doc Text:
.OpenSSL does not accept explicit curve parameters in FIPS mode Elliptic curve cryptography parameters, private keys, public keys, and certificates that specified explicit curve parameters no longer work in FIPS mode. Specifying the curve parameters using ASN.1 object identifiers, which use one of the FIPS-approved curves, still works in FIPS mode.
Story Points: ---
Clone Of:
: 2085521 (view as bug list) Environment:
Last Closed: 2023-06-05 16:07:27 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 2085521    

Description Alicja Kario 2022-02-25 14:57:45 UTC
Description of problem:
When system is configured to work in FIPS mode, the ECDSA operations with explicit parameters don't work. This is in contrast to RHEL-8

Version-Release number of selected component (if applicable):
openssl-3.0.1-13.el9

How reproducible:
always

Steps to Reproduce:
1. set up FIPS mode
2. openssl ecparam -out ecparams.pem -param_enc explicit -name P-256
3. openssl ecparam -in ecparams.pem -check

Actual results:
Could not read params of EC parameters from ecparams.pem
80CB0D2AEB7F0000:error:1608010C:STORE routines:ossl_store_handle_load_result:unsupported:crypto/store/store_result.c:151:

Expected results:
passed, same for key generation, signature creation, and signature verification

Additional info:

Comment 7 Dmitry Belyavskiy 2022-04-27 11:47:24 UTC
Upstream has forbidden the explicit FIPS parameters in FIPS mode. See https://github.com/openssl/openssl/pull/17998

Comment 9 Alicja Kario 2022-05-06 15:50:15 UTC
We've decided to follow upstream in this behaviour, as such explicit curve parameters will no longer work in FIPS mode.
Explicit curve parameters will be supported in non-FIPS mode, see bug 2066412.

Comment 24 Clemens Lang 2023-06-05 16:07:27 UTC
RHEL 9.1 contains openssl-3.0.1-43.el9_0.