Bug 2058663
| Summary: | OpenSSL mustn't work with ECDSA with explicit curve parameters in FIPS mode | |||
|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 9 | Reporter: | Alicja Kario <hkario> | |
| Component: | openssl | Assignee: | Dmitry Belyavskiy <dbelyavs> | |
| Status: | CLOSED CURRENTRELEASE | QA Contact: | Alicja Kario <hkario> | |
| Severity: | medium | Docs Contact: | Jan Fiala <jafiala> | |
| Priority: | medium | |||
| Version: | 9.0 | CC: | cllang, dbelyavs, jafiala, ssorce | |
| Target Milestone: | rc | Keywords: | Triaged, ZStream | |
| Target Release: | --- | Flags: | pm-rhel:
mirror+
|
|
| Hardware: | Unspecified | |||
| OS: | Unspecified | |||
| Whiteboard: | ||||
| Fixed In Version: | openssl-3.0.1-43.el9_0 | Doc Type: | Deprecated Functionality | |
| Doc Text: |
.OpenSSL does not accept explicit curve parameters in FIPS mode
Elliptic curve cryptography parameters, private keys, public keys, and certificates that specified explicit curve parameters no longer work in FIPS mode. Specifying the curve parameters using ASN.1 object identifiers, which use one of the FIPS-approved curves, still works in FIPS mode.
|
Story Points: | --- | |
| Clone Of: | ||||
| : | 2085521 (view as bug list) | Environment: | ||
| Last Closed: | 2023-06-05 16:07:27 UTC | Type: | Bug | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Embargoed: | ||||
| Bug Depends On: | ||||
| Bug Blocks: | 2085521 | |||
|
Description
Alicja Kario
2022-02-25 14:57:45 UTC
Upstream has forbidden the explicit FIPS parameters in FIPS mode. See https://github.com/openssl/openssl/pull/17998 We've decided to follow upstream in this behaviour, as such explicit curve parameters will no longer work in FIPS mode. Explicit curve parameters will be supported in non-FIPS mode, see bug 2066412. RHEL 9.1 contains openssl-3.0.1-43.el9_0. |