Bug 689387
Summary: | Sosreport crashes when generating md5 sum in FIPS mode | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 6 | Reporter: | David Kutálek <dkutalek> |
Component: | sos | Assignee: | Bryn M. Reeves <bmr> |
Status: | CLOSED ERRATA | QA Contact: | BaseOS QE - Apps <qe-baseos-apps> |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | 6.1 | CC: | agk, andriusb, bmr, gavin, iboverma, prc, sgrubb, syeghiay, tcapek |
Target Milestone: | rc | ||
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: |
When FIPS (Federal Information Processing Standard) compliance mode was active on the system, the sosreport program terminated with a traceback during generation of the MD5 checksum. As a consequence, no MD5 checksum was generated and no information about the name of the generated report was given, even though the report archive was generated correctly. This bug has been fixed, MD5 checksums are now generated in non-FIPS compliant mode (for compatibility with prior release) and SHA-2 checksums are generated in FIPS compliant mode.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2011-05-19 14:27:56 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 682670, 689963, 691449 |
Description
David Kutálek
2011-03-21 10:15:14 UTC
Odd. Nothing changed here recently - is it just that this hasn't been tested before? Anyway, thanks for the headsup - looking into this now. Cannot reproduce with openssl 1.0.0-4.el6_0.2 on my system. Did I miss something? # export OPENSSL_FIPS=1; openssl version; mkdir sos; sosreport --batch --tmp-dir=./sos/ OpenSSL 1.0.0-fips 29 Mar 2010 sosreport (version 2.2) [...] Your sosreport has been generated and saved in: /root/sos/sosreport-rhn-support-pcarrier-20110321133428-9911.tar.xz The md5sum is: c7a121bd0acf6ccf55d0ab0befec9911 Please send this file to your support representative. To find out whether is your system FIPS enabled, run: cat /proc/sys/crypto/fips_enabled I am not sure what is official and correct way how to enable it on RHEL6, though. We have a problem with hashlib in FIPS mode: # sosreport Traceback (most recent call last): File "/usr/sbin/sosreport", line 18, in <module> from sos.sosreport import sosreport, doExitCode File "/usr/lib/python2.6/site-packages/sos/sosreport.py", line 40, in <module> import sos.policyredhat File "/usr/lib/python2.6/site-packages/sos/policyredhat.py", line 27, in <module> import hashlib File "/usr/lib64/python2.6/hashlib.py", line 101, in <module> f(usedforsecurity=False) ValueError: error:2D07D06A:FIPS routines:EVP_DigestInit_ex:fips selftest failed Looking into this now.. may affect other packages that use python hashlib when run with FIPS. My openssl was out of date (1.0.0-4.el6) - -7 and -8 had a bunch of opensssl FIPS fixes. Technical note added. If any revisions are required, please edit the "Technical Notes" field accordingly. All revisions will be proofread by the Engineering Content Services team. New Contents: When FIPS (Federal Information Processing Standard) compliance mode was active on the system, the sosreport program terminated with a traceback during generation of the MD5 checksum. As a consequence, no MD5 checksum was generated and no information about the name of the generated report was given, even though the report archive was generated correctly. This bug has been fixed, MD5 checksums are now generated in non-FIPS compliant mode (for compatibility with prior release) and SHA-2 checksums are generated in FIPS compliant mode. An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on therefore solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHBA-2011-0773.html |