RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 1071883 - mod_ssl ephemeral DH key handling fixes
Summary: mod_ssl ephemeral DH key handling fixes
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: httpd
Version: 6.5
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: rc
: ---
Assignee: Luboš Uhliarik
QA Contact: Ondřej Pták
URL:
Whiteboard:
: 1057656 (view as bug list)
Depends On:
Blocks: 1057687
TreeView+ depends on / blocked
 
Reported: 2014-03-03 11:59 UTC by Tomas Mraz
Modified: 2021-01-14 09:35 UTC (History)
8 users (show)

Fixed In Version: httpd-2.2.15-32.el6
Doc Type: Bug Fix
Doc Text:
Cause: The mod_ssl module only supported ephemeral DH keys of 512 and 1024 bit lengths. Consequence: Due to this limitation, SSL ciphersuites using ephemeral DH keys could not be used with mod_ssl FIPS mode was enabled. Fix: mod_ssl will now use ephemeral DH keys with lengths up to 8192 bits. Result: mod_ssl can now correctly operate under FIPS mode.
Clone Of:
Environment:
Last Closed: 2014-10-14 08:08:50 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Bugzilla 1057656 0 high CLOSED Custom/big DH parameters not supported 2021-02-22 00:41:40 UTC
Red Hat Product Errata RHBA-2014:1386 0 normal SHIPPED_LIVE httpd bug fix and enhancement update 2014-10-14 01:27:20 UTC

Internal Links: 1057656

Description Tomas Mraz 2014-03-03 11:59:12 UTC
httpd must support >1024 bit DH group sizes at least when the openssl is running in the FIPS mode. Otherwise the https server would not be compliant with the FIPS security policy of the OpenSSL FIPS module.

There is already support for >1024 bit DH group sizes in apache-2.4.x.

Comment 9 Joe Orton 2014-06-20 11:07:13 UTC
*** Bug 1057656 has been marked as a duplicate of this bug. ***

Comment 13 Ondřej Pták 2014-09-15 10:07:57 UTC
==================================
httpd-2.2.15-30.el6_5 in FIPS mode
==================================

/CoreOS/httpd/Sanity/mod_ssl-smoke
----------------------------------

:: [   FAIL   ] :: File 'reinstall_log' should not contain 'scriptlet failure' 
:: [   ERROR  ] :: rlServiceStart: Starting service httpd failed
:: [   ERROR  ] :: Status of the failed service:
:: [   LOG    ] ::   httpd is stopped
:: [   FAIL   ] :: Command 'rlServiceStart httpd' (Expected 0, got 1)

/CoreOS/httpd/Regression/bz1057687-Custom-big-DH-parameters-not-supported
-------------------------------------------------------------------------
:: [   INFO   ] :: Testing 2048 bit RSA keys with 2048 DHE keys
:: [   PASS   ] :: Command 'rm -f /etc/pki/tls/private/localhost.key /etc/pki/tls/certs/localhost.crt' (Expected 0, got 0)
:: [   PASS   ] :: Command 'openssl req -x509 -newkey rsa:2048 -keyout /etc/pki/tls/private/localhost.key -out /etc/pki/tls/certs/localhost.crt -subj /CN=localhost -nodes -batch' (Expected 0, got 0)
:: [   LOG    ] :: rlServiceStart: Service httpd started successfully
:: [   PASS   ] :: Command 'rlServiceStart httpd' (Expected 0, got 0)
:: [   PASS   ] :: Command 'sleep 5' (Expected 0, got 0)
:: [   PASS   ] :: Command 'openssl s_client -CAfile /etc/pki/tls/certs/localhost.crt -cipher 'ALL:!ECDH' -connect localhost:443 < request.txt' (Expected 0, got 0)
:: [   PASS   ] :: File '/var/tmp/tmp.Xzff7c5rfq' should contain 'Server Temp Key' 
:: [   PASS   ] :: File '/var/tmp/tmp.Xzff7c5rfq' should contain 'Cipher is DHE-RSA' 
:: [   FAIL   ] :: File '/var/tmp/tmp.Xzff7c5rfq' should contain 'Server Temp Key: DH, 2048 bits' 
:: [   PASS   ] :: File '/var/tmp/tmp.Xzff7c5rfq' should contain 'Server public key is 2048 bit' 
:: [   PASS   ] :: File '/var/tmp/tmp.Xzff7c5rfq' should contain 'Verify return code: 0' 
:: [   PASS   ] :: File '/var/tmp/tmp.Xzff7c5rfq' should not contain ':error:' 
:: [   PASS   ] :: File '/var/tmp/tmp.Xzff7c5rfq' should not contain ':fail' 
:: [   PASS   ] :: Command 'rlServiceStop httpd' (Expected 0, got 0)
:: [   PASS   ] :: Command 'sleep 5' (Expected 0, got 0)
:: [   INFO   ] :: Testing 3072 bit RSA keys with 3072 DHE keys
:: [   PASS   ] :: Command 'rm -f /etc/pki/tls/private/localhost.key /etc/pki/tls/certs/localhost.crt' (Expected 0, got 0)
:: [   PASS   ] :: Command 'openssl req -x509 -newkey rsa:3072 -keyout /etc/pki/tls/private/localhost.key -out /etc/pki/tls/certs/localhost.crt -subj /CN=localhost -nodes -batch' (Expected 0, got 0)
:: [   LOG    ] :: rlServiceStart: Service httpd started successfully
:: [   PASS   ] :: Command 'rlServiceStart httpd' (Expected 0, got 0)
:: [   PASS   ] :: Command 'sleep 5' (Expected 0, got 0)
:: [   PASS   ] :: Command 'openssl s_client -CAfile /etc/pki/tls/certs/localhost.crt -cipher 'ALL:!ECDH' -connect localhost:443 < request.txt' (Expected 0, got 0)
:: [   PASS   ] :: File '/var/tmp/tmp.8BocBUU4BE' should contain 'Server Temp Key' 
:: [   PASS   ] :: File '/var/tmp/tmp.8BocBUU4BE' should contain 'Cipher is DHE-RSA' 
:: [   FAIL   ] :: File '/var/tmp/tmp.8BocBUU4BE' should contain 'Server Temp Key: DH, 3072 bits' 
:: [   PASS   ] :: File '/var/tmp/tmp.8BocBUU4BE' should contain 'Server public key is 3072 bit' 
:: [   PASS   ] :: File '/var/tmp/tmp.8BocBUU4BE' should contain 'Verify return code: 0' 
:: [   PASS   ] :: File '/var/tmp/tmp.8BocBUU4BE' should not contain ':error:' 
:: [   PASS   ] :: File '/var/tmp/tmp.8BocBUU4BE' should not contain ':fail' 

================================
httpd-2.2.15-39.el6 in FIPS mode
================================

/CoreOS/httpd/Sanity/mod_ssl-smoke
----------------------------------
:: [   PASS   ] :: Command 'yum reinstall -y mod_ssl 2>&1 | tee reinstall_log' (Expected 0, got 0)
:: [   PASS   ] :: File 'reinstall_log' should not contain 'scriptlet failure' 
:: [   LOG    ] :: rlServiceStart: Service httpd started successfully
:: [   PASS   ] :: Command 'rlServiceStart httpd' (Expected 0, got 0)

/CoreOS/httpd/Regression/bz1057687-Custom-big-DH-parameters-not-supported
-------------------------------------------------------------------------
:: [   INFO   ] :: Testing 2048 bit RSA keys with 2048 DHE keys
:: [   PASS   ] :: Command 'rm -f /etc/pki/tls/private/localhost.key /etc/pki/tls/certs/localhost.crt' (Expected 0, got 0)
:: [   PASS   ] :: Command 'openssl req -x509 -newkey rsa:2048 -keyout /etc/pki/tls/private/localhost.key -out /etc/pki/tls/certs/localhost.crt -subj /CN=localhost -nodes -batch' (Expected 0, got 0)
:: [   LOG    ] :: rlServiceStart: Service httpd started successfully
:: [   PASS   ] :: Command 'rlServiceStart httpd' (Expected 0, got 0)
:: [   PASS   ] :: Command 'sleep 5' (Expected 0, got 0)
:: [   PASS   ] :: Command 'openssl s_client -CAfile /etc/pki/tls/certs/localhost.crt -cipher 'ALL:!ECDH' -connect localhost:443 < request.txt' (Expected 0, got 0)
:: [   PASS   ] :: File '/var/tmp/tmp.rJjLkGltp8' should contain 'Server Temp Key' 
:: [   PASS   ] :: File '/var/tmp/tmp.rJjLkGltp8' should contain 'Cipher is DHE-RSA' 
:: [   PASS   ] :: File '/var/tmp/tmp.rJjLkGltp8' should contain 'Server Temp Key: DH, 2048 bits' 
:: [   PASS   ] :: File '/var/tmp/tmp.rJjLkGltp8' should contain 'Server public key is 2048 bit' 
:: [   PASS   ] :: File '/var/tmp/tmp.rJjLkGltp8' should contain 'Verify return code: 0' 
:: [   PASS   ] :: File '/var/tmp/tmp.rJjLkGltp8' should not contain ':error:' 
:: [   PASS   ] :: File '/var/tmp/tmp.rJjLkGltp8' should not contain ':fail' 
:: [   PASS   ] :: Command 'rlServiceStop httpd' (Expected 0, got 0)
:: [   PASS   ] :: Command 'sleep 5' (Expected 0, got 0)
:: [   INFO   ] :: Testing 3072 bit RSA keys with 3072 DHE keys
:: [   PASS   ] :: Command 'rm -f /etc/pki/tls/private/localhost.key /etc/pki/tls/certs/localhost.crt' (Expected 0, got 0)
:: [   PASS   ] :: Command 'openssl req -x509 -newkey rsa:3072 -keyout /etc/pki/tls/private/localhost.key -out /etc/pki/tls/certs/localhost.crt -subj /CN=localhost -nodes -batch' (Expected 0, got 0)
:: [   LOG    ] :: rlServiceStart: Service httpd started successfully
:: [   PASS   ] :: Command 'rlServiceStart httpd' (Expected 0, got 0)
:: [   PASS   ] :: Command 'sleep 5' (Expected 0, got 0)
:: [   PASS   ] :: Command 'openssl s_client -CAfile /etc/pki/tls/certs/localhost.crt -cipher 'ALL:!ECDH' -connect localhost:443 < request.txt' (Expected 0, got 0)
:: [   PASS   ] :: File '/var/tmp/tmp.rUJYdal1yQ' should contain 'Server Temp Key' 
:: [   PASS   ] :: File '/var/tmp/tmp.rUJYdal1yQ' should contain 'Cipher is DHE-RSA' 
:: [   PASS   ] :: File '/var/tmp/tmp.rUJYdal1yQ' should contain 'Server Temp Key: DH, 3072 bits' 
:: [   PASS   ] :: File '/var/tmp/tmp.rUJYdal1yQ' should contain 'Server public key is 3072 bit' 
:: [   PASS   ] :: File '/var/tmp/tmp.rUJYdal1yQ' should contain 'Verify return code: 0' 
:: [   PASS   ] :: File '/var/tmp/tmp.rUJYdal1yQ' should not contain ':error:' 
:: [   PASS   ] :: File '/var/tmp/tmp.rUJYdal1yQ' should not contain ':fail' 

==================================
httpd-2.2.15-30.el6_5 without FIPS
==================================

/CoreOS/httpd/Regression/bz1057687-Custom-big-DH-parameters-not-supported
-------------------------------------------------------------------------
[just failing parts from log]
:: [   FAIL   ] :: File '/var/tmp/tmp.4BMfh4KgxD' should contain 'Server Temp Key: DH, 2048 bits' 
:: [   FAIL   ] :: File '/var/tmp/tmp.RP6IEPDasl' should contain 'Server Temp Key: DH, 2500 bits' 
:: [   FAIL   ] :: File '/var/tmp/tmp.fvUEng9rMj' should contain 'Server Temp Key: DH, 3072 bits' 
:: [   FAIL   ] :: File '/var/tmp/tmp.iAm6jAUqgF' should contain 'Server Temp Key: DH, 4096 bits' 
:: [   FAIL   ] :: File '/var/tmp/tmp.eZS2pT4SwN' should contain 'Server Temp Key: DH, 5000 bits' 
:: [   FAIL   ] :: File '/var/tmp/tmp.aY14YFVjdP' should contain 'Server Temp Key: DH, 6144 bits' 
:: [   FAIL   ] :: File '/var/tmp/tmp.zu4f7iI1mE' should contain 'Server Temp Key: DH, 8192 bits' 

================================
httpd-2.2.15-39.el6 without FIPS
================================

/CoreOS/httpd/Regression/bz1057687-Custom-big-DH-parameters-not-supported
-------------------------------------------------------------------------
:: [   INFO   ] :: Testing 2048 bit RSA keys with 2048 DHE keys
:: [   PASS   ] :: Command 'rm -f /etc/pki/tls/private/localhost.key /etc/pki/tls/certs/localhost.crt' (Expected 0, got 0)
:: [   PASS   ] :: Command 'openssl req -x509 -newkey rsa:2048 -keyout /etc/pki/tls/private/localhost.key -out /etc/pki/tls/certs/localhost.crt -subj /CN=localhost -nodes -batch' (Expected 0, got 0)
:: [   LOG    ] :: rlServiceStart: Service httpd started successfully
:: [   PASS   ] :: Command 'rlServiceStart httpd' (Expected 0, got 0)
:: [   PASS   ] :: Command 'sleep 5' (Expected 0, got 0)
:: [   PASS   ] :: Command 'openssl s_client -CAfile /etc/pki/tls/certs/localhost.crt -cipher 'ALL:!ECDH' -connect localhost:443 < request.txt' (Expected 0, got 0)
:: [   PASS   ] :: File '/var/tmp/tmp.baqPvW9Op3' should contain 'Server Temp Key' 
:: [   PASS   ] :: File '/var/tmp/tmp.baqPvW9Op3' should contain 'Cipher is DHE-RSA' 
:: [   PASS   ] :: File '/var/tmp/tmp.baqPvW9Op3' should contain 'Server Temp Key: DH, 2048 bits' 
:: [   PASS   ] :: File '/var/tmp/tmp.baqPvW9Op3' should contain 'Server public key is 2048 bit' 
:: [   PASS   ] :: File '/var/tmp/tmp.baqPvW9Op3' should contain 'Verify return code: 0' 
:: [   PASS   ] :: File '/var/tmp/tmp.baqPvW9Op3' should not contain ':error:' 
:: [   PASS   ] :: File '/var/tmp/tmp.baqPvW9Op3' should not contain ':fail' 
:: [   PASS   ] :: Command 'rlServiceStop httpd' (Expected 0, got 0)
:: [   PASS   ] :: Command 'sleep 5' (Expected 0, got 0)
[ and similar PASS results with these keys settings ]:
:: [   INFO   ] :: Testing 2048 bit RSA keys with 1024 DHE keys
:: [   INFO   ] :: Testing 2500 bit RSA keys with 2500 DHE keys
:: [   INFO   ] :: Testing 3072 bit RSA keys with 3072 DHE keys
:: [   INFO   ] :: Testing 4096 bit RSA keys with 4096 DHE keys
:: [   INFO   ] :: Testing 5000 bit RSA keys with 5000 DHE keys
:: [   INFO   ] :: Testing 6144 bit RSA keys with 6144 DHE keys
:: [   INFO   ] :: Testing 8192 bit RSA keys with 8192 DHE keys

Comment 14 errata-xmlrpc 2014-10-14 08:08:50 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

http://rhn.redhat.com/errata/RHBA-2014-1386.html


Note You need to log in before you can comment on or make changes to this bug.