Bug 2209766
Summary: | FIPS enabled openssl clients fail in SSL hanshake against httpd with mod_ssl in RHEL7 server | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 7 | Reporter: | Alfredo Moralejo <amoralej> |
Component: | openssl | Assignee: | Dmitry Belyavskiy <dbelyavs> |
Status: | CLOSED DUPLICATE | QA Contact: | BaseOS QE Security Team <qe-baseos-security> |
Severity: | unspecified | Docs Contact: | |
Priority: | unspecified | ||
Version: | 7.9 | CC: | cllang, dbelyavs, jdanek, jorton, luhliari |
Target Milestone: | rc | ||
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2023-08-25 12:14:33 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Alfredo Moralejo
2023-05-24 17:25:28 UTC
See also https://access.redhat.com/solutions/7018256. FIPS 140-3 Implementation Guidance requires that TLS 1.2 can only be used with the Extended Master Secret extension in modules validated after May 16, 2023 (see "D.Q Transition of the TLS 1.2 KDF to Support the Extended Master Secret"). The best course of action is to upgrade the remote machines to support TLS 1.3 or the extended master secret extension in TLS 1.2. *** This bug has been marked as a duplicate of bug 2222593 *** |