Hide Forgot
Problem: -> Insights reports the following "Decreased security in httpd when using deprecated TLS protocol version (PCI DSS)" # grep NSSProtocol /etc/httpd/conf.d/nss.conf NSSProtocol TLSv1.0,TLSv1.1,TLSv1.2 Question? Why we still have the weak protocols still enabled and then have Insights complain about this. Action Item: - Use latest NSS version available.
Upstream ticket: https://pagure.io/freeipa/issue/7995
Fixed upstream ipa-4-6: https://pagure.io/freeipa/c/3d6a2a215ed61255f3275efb67d5e04c474a664b https://pagure.io/freeipa/c/a5b6f72d4f2a8287c7f095874d71ef536822d20b Note: the fix applies only to ipa-4-6 branch used for rhel 7.7+
Fix verified for build RHEL-7.8-20191004.0 # rpm -q ipa-server ipa-server-4.6.6-8.el7.x86_6 # grep NSSProtocol /etc/httpd/conf.d/nss.conf # middle of a range may be excluded, the entry "NSSProtocol SSLv3,TLSv1.1" # is identical to the entry "NSSProtocol SSLv3,TLSv1.0,TLSv1.1". NSSProtocol TLSv1.2
Upstream test master: https://pagure.io/freeipa/c/14be2715334e16a2d3f07a6b64bcd6d068ce89c1
ipa-4-8: https://pagure.io/freeipa/c/686b85b14b14134c32c737c6df2de610153f4323
Test automated at https://github.com/freeipa/freeipa/blob/master/ipatests/test_integration/test_commands.py::TestIPACommand::test_enabled_tls_protocols
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2020:1083