Bug 1273016
| Summary: | improve fetchmail SSL support - cannot disable SSLv3 and _not_ disable TLSv1.1+ together | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 7 | Reporter: | Vitezslav Crhonek <vcrhonek> |
| Component: | fetchmail | Assignee: | Vitezslav Crhonek <vcrhonek> |
| Status: | CLOSED ERRATA | QA Contact: | Alois Mahdal <amahdal> |
| Severity: | unspecified | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | 7.3 | CC: | amahdal, mprpic, psklenar, qe-baseos-daemons, swadeley, tmraz |
| Target Milestone: | rc | ||
| Target Release: | --- | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | fetchmail-6.3.24-6.el7 | Doc Type: | Bug Fix |
| Doc Text: |
Cause – user wants fetchmail to avoid using insecure SSLv3 SSL protocol
Consequence – user is confused because of unclear documentation and finally realizes, that it's not possible to disable SSLv3 and not to disable TLSv1.1+ at the same time
Fix – latest upstream improvements of SSL protocols handling and documentation has been backported
Result – SSL protocols support in fetchmail is clear and well documented now
|
Story Points: | --- |
| Clone Of: | 1234853 | Environment: | |
| Last Closed: | 2017-08-01 20:58:46 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | |||
| Bug Blocks: | 1288169, 1400961 | ||
|
Description
Vitezslav Crhonek
2015-10-19 12:15:32 UTC
The backported option is now fairly covered by /CoreOS/fetchmail/Sanity/option-sslproto (cca 70 cases: from ssl3 to tls1.2 on both server and client side, plus some corner cases). With the new build, the test passes on all platforms. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2017:2051 |