Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1312491 - NSSProtocol is ignored when NSSFIPS is enabled.
NSSProtocol is ignored when NSSFIPS is enabled.
Status: CLOSED ERRATA
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: mod_nss (Show other bugs)
7.3
Unspecified Unspecified
unspecified Severity unspecified
: rc
: ---
Assigned To: Matthew Harmsen
Kaleem
:
Depends On: 1312052
Blocks:
  Show dependency treegraph
 
Reported: 2016-02-26 16:37 EST by Matthew Harmsen
Modified: 2016-11-03 17:20 EDT (History)
6 users (show)

See Also:
Fixed In Version: mod_nss-1.0.14-1.el7
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: 1312052
Environment:
Last Closed: 2016-11-03 17:20:20 EDT
Type: Bug
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2016:2602 normal SHIPPED_LIVE Low: mod_nss security, bug fix, and enhancement update 2016-11-03 08:12:49 EDT

  None (edit)
Comment 2 Scott Poore 2016-09-20 21:33:05 EDT
Verified.

Version ::

mod_nss-1.0.14-5.el7.x86_64


Results ::

[root@vm3 conf.d]# grep -e FIPS -e TLSv /etc/httpd/conf.d/nss.conf
#   middle of a range may be excluded, the entry "NSSProtocol SSLv3,TLSv1.1"
#   is identical to the entry "NSSProtocol SSLv3,TLSv1.0,TLSv1.1".
#NSSProtocol TLSv1.0,TLSv1.1,TLSv1.2
NSSProtocol TLSv1.2
NSSFIPS on

[root@vm3 conf.d]# systemctl restart httpd

[root@vm3 conf.d]# curl --tlsv1.0  https://vm3.example.com:8443/ 
curl: (35) Peer reports incompatible or unsupported protocol version.

[root@vm3 conf.d]# curl --tlsv1.1  https://vm3.example.com:8443/ 
curl: (35) Peer reports incompatible or unsupported protocol version.

[root@vm3 conf.d]# curl --tlsv1.2  https://vm3.example.com:8443/ 
PASS
Comment 4 errata-xmlrpc 2016-11-03 17:20:20 EDT
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://rhn.redhat.com/errata/RHSA-2016-2602.html

Note You need to log in before you can comment on or make changes to this bug.