Description of problem: We have backported TLSv12 support into RHV 4.1.5 (BZ1412552), but it was turned off by default and enabled TLSv12 required manual configuration. We want to enable TLSv12 by default to make it aligned with RHV 4.2 Version-Release number of selected component (if applicable): How reproducible: Steps to Reproduce: 1. 2. 3. Actual results: Expected results: Additional info:
Marking as TestOnly because in 4.2 we have already enabled TLSv12 by default as a part of BZ1408847
The documentation text flag should only be set after 'doc text' field is provided. Please provide the documentation text and set the flag to '?' again.
Changing the target since the fix was part of 4.1.8 RC.
(In reply to Piotr Kliczewski from comment #4) > Changing the target since the fix was part of 4.1.8 RC. Moving back, for 4.1.8 we have clone BZ1513886
ok (this bz exists only to allow backporting this into 4.1.8) # rpm2cpio vdsm-python-4.20.9-1.el7ev.noarch.rpm | cpio --to-stdout -i './usr/lib/python2.7/site-packages/vdsm/common/config.py' 2>/dev/null | grep -A 2 ssl_protocol ('ssl_protocol', 'sslv23', 'SSL protocol used by encrypted connection'),
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHEA-2018:1489
BZ<2>Jira Resync