Bug 2176547

Summary: [cee/sd][ceph-dashboard] Disabling TLSv1.2 completely on the ceph-dashboard.
Product: [Red Hat Storage] Red Hat Ceph Storage Reporter: Milind <milverma>
Component: Ceph-DashboardAssignee: Ernesto Puerta <epuertat>
Status: CLOSED ERRATA QA Contact: Sayalee <saraut>
Severity: medium Docs Contact: Akash Raj <akraj>
Priority: unspecified    
Version: 5.2CC: akraj, ceph-eng-bugs, cephqe-warriors, epuertat, lema, nia, tserlin
Target Milestone: ---   
Target Release: 5.3z2   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
.TLS 1.2 protocols and cypher suites are no longer supported Previously, some TLS 1.2 cypher suites were vulnerable to *ROBOT* attacks. Although modern browsers favoured TLS 1.3 over 1.2, under specific circumstances, a bad actor could have forced the server to accept a TLS 1.2 session over a vulnerable protocol-cypher suite (RSA) and would manage to obtain a text signed by the server with its private certificate. With this fix, support for TLS 1.2 protocols and cypher suites is removed and only TLS 1.3 sessions are accepted.
Story Points: ---
Clone Of: Environment:
Last Closed: 2023-04-11 20:07:59 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 2185621    

Description Milind 2023-03-08 16:12:39 UTC

Comment 13 errata-xmlrpc 2023-04-11 20:07:59 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Red Hat Ceph Storage 5.3 Bug Fix update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2023:1732

Comment 14 lema 2023-04-26 04:59:33 UTC
*** Bug 2186642 has been marked as a duplicate of this bug. ***