Bug 617227
Summary: | ssh on RHEL6 on s390x with enabled FIPS fails with enabled CPACF | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 6 | Reporter: | Miroslav Vadkerti <mvadkert> |
Component: | openssh | Assignee: | Jan F. Chadima <jchadima> |
Status: | CLOSED DUPLICATE | QA Contact: | BaseOS QE Security Team <qe-baseos-security> |
Severity: | medium | Docs Contact: | |
Priority: | low | ||
Version: | 6.0 | CC: | tmraz |
Target Milestone: | rc | Keywords: | Reopened |
Target Release: | --- | ||
Hardware: | s390x | ||
OS: | Linux | ||
Whiteboard: | Regression | ||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2010-08-02 12:29:48 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 618595 | ||
Bug Blocks: |
Description
Miroslav Vadkerti
2010-07-22 14:31:36 UTC
I cannot reproduce this on FIPS enbled s390x without enabled 'crypto chip' (CPACF). Adjusting bug summary to reflect this. Very strange but I couldn't reproduce this again on s390 wit CPACF enabled with latest openssh-5.3p1-19.el6.s390x. Closing as not a bug. Only FIPS approved cryptographic algorithms are accepted by openssh running on FIPSwith enabled CPACF: $ ssh -c arcfour128 root@auto-s390-002 no matching cipher found: client arcfour128 server aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc,rijndael-cbc.se NOTE: Comments 1-5 apply ONLY for OpenSSH in FIPS mode WITHOUT CPACF. Using CPACF in FIPS mode is broken in openssh-5.3p1-19.el6.s390x For log from client see comment 6/ Logs on server show this: /var/log/messages: Jul 27 05:42:45 auto-s390-002 sshd[3197]: error: Could not load host key: /etc/ssh/ssh_host_rsa_key /var/log/secure: Jul 27 05:47:04 auto-s390-002 sshd[3210]: FIPS mode initialized I will try to run sshd in debug mode This is really a duplicate of the bug 618595. If the ibmca engine for openssl and the HW is FIPS certified, then the engine must set proper flag for its RSA implementation method. *** This bug has been marked as a duplicate of bug 618595 *** |