Bug 1826337
| Summary: | libreswan in FIPS mode rejects ECDSA keys based on faulty RSA key size check being applied | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 8 | Reporter: | Paul Wouters <pwouters> |
| Component: | libreswan | Assignee: | Paul Wouters <pwouters> |
| Status: | CLOSED ERRATA | QA Contact: | Ondrej Moriš <omoris> |
| Severity: | unspecified | Docs Contact: | |
| Priority: | high | ||
| Version: | 8.3 | CC: | pvrabec |
| Target Milestone: | rc | Keywords: | Triaged |
| Target Release: | 8.0 | Flags: | pm-rhel:
mirror+
|
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: |
Cause:
Minimal key length check for FIPS assumed keys were RSA based
Consequence:
ECDSA keys that have less bits were getting rejected, despite being fine for FIPS
Fix:
Do not apply RSA size check to ECDSA keys
Result:
ECDSA based certificates and authby=ecdsa can now be used in FIPS mode.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | 2020-11-04 03:18:00 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 1820206 | ||
| Bug Blocks: | |||
|
Description
Paul Wouters
2020-04-21 13:15:19 UTC
upstrean test case fips-14-ikev2-x509-ecdsa upstream tests: fips-13-ikev2-x509-key2032 fips-14-ikev2-x509-ecdsa fips-15-ikev2-x509-key2048 Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (libreswan bug fix and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHEA-2020:4722 |