Bug 1145490 - FIPS 140-2 compliant mode doesn't work in JDK-8
Summary: FIPS 140-2 compliant mode doesn't work in JDK-8
Keywords:
Status: CLOSED EOL
Alias: None
Product: JBoss Enterprise Application Platform 6
Classification: JBoss
Component: Security
Version: 6.3.0
Hardware: Unspecified
OS: Unspecified
unspecified
medium
Target Milestone: ---
: TBD EAP 6
Assignee: eap-docs
QA Contact: Pavel Slavicek
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2014-09-23 08:02 UTC by Josef Cacek
Modified: 2019-08-19 12:45 UTC (History)
5 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2019-08-19 12:45:37 UTC
Type: Bug
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Bugzilla 1205097 1 None None None 2021-01-20 06:05:38 UTC
Red Hat Bugzilla java8 0 None CLOSED Java 8 Tracker 2019-10-14 15:12:14 UTC

Internal Links: 1104190 1205097

Description Josef Cacek 2014-09-23 08:02:32 UTC
Oracle JDK8 has some issues, which prevents using EAP 6.x in FIPS 140-2 compliant mode. 
Look at JDK known issues page for more details:
http://www.oracle.com/technetwork/java/javase/8-known-issues-2157115.html

Namely sections:
Area: Security Libs / javax.crypto / Solaris
Area: Security Libs / javax.net.ssl 

Workaround which worked for us:
- disable TLS 1.2 on both server and client side

Comment 1 Dominik Pospisil 2014-10-14 17:06:33 UTC
From JDK release notes:
http://bugs.java.com/bugdatabase/view_bug.do?bug_id=8036970

Synopsis
When using RSA client key exchange in SSL/TLS protocols, SunJSSE provider cannot work in FIPS 140 compliant mode. This issue does not impact the default mode of SunJSSE.

A straightforward workaround is to disable FIPS mode of SunJSSE provider. For more information see, FIPS 140 Compliant Mode for SunJSSE.

An alternative workaround is to disable the use of RSA key exchange in SSL/TLS protocols. This issue only happens to RSA key exchange based SSL/TLS cipher suites. To workaround this issue, applications can use DHE/ECDHE cipher suites instead (for example, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, etc.). See JSSE Reference Guide for information about customizing SSL/TLS cipher suites.

Comment 2 Dominik Pospisil 2014-10-14 17:18:21 UTC
My understanding of the issue is that it a JDK bug with known workaround and as such will need to fall into known-issues category.

Comment 3 Boleslaw Dawidowicz 2014-10-20 15:18:59 UTC
Dominik, could you write a doc proposal for the known issue?

Comment 4 John Doyle 2014-10-28 13:21:44 UTC
Please document as a known issue for 6.4 release.


Note You need to log in before you can comment on or make changes to this bug.