Note: This bug is displayed in read-only format because the product is no longer active in Red Hat Bugzilla.
RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.

Bug 2058663

Summary: OpenSSL mustn't work with ECDSA with explicit curve parameters in FIPS mode
Product: Red Hat Enterprise Linux 9 Reporter: Alicja Kario <hkario>
Component: opensslAssignee: Dmitry Belyavskiy <dbelyavs>
Status: CLOSED CURRENTRELEASE QA Contact: Alicja Kario <hkario>
Severity: medium Docs Contact: Jan Fiala <jafiala>
Priority: medium    
Version: 9.0CC: cllang, dbelyavs, jafiala, ssorce
Target Milestone: rcKeywords: Triaged, ZStream
Target Release: ---Flags: pm-rhel: mirror+
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: openssl-3.0.1-43.el9_0 Doc Type: Deprecated Functionality
Doc Text:
.OpenSSL does not accept explicit curve parameters in FIPS mode Elliptic curve cryptography parameters, private keys, public keys, and certificates that specified explicit curve parameters no longer work in FIPS mode. Specifying the curve parameters using ASN.1 object identifiers, which use one of the FIPS-approved curves, still works in FIPS mode.
Story Points: ---
Clone Of:
: 2085521 (view as bug list) Environment:
Last Closed: 2023-06-05 16:07:27 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 2085521    

Description Alicja Kario 2022-02-25 14:57:45 UTC
Description of problem:
When system is configured to work in FIPS mode, the ECDSA operations with explicit parameters don't work. This is in contrast to RHEL-8

Version-Release number of selected component (if applicable):
openssl-3.0.1-13.el9

How reproducible:
always

Steps to Reproduce:
1. set up FIPS mode
2. openssl ecparam -out ecparams.pem -param_enc explicit -name P-256
3. openssl ecparam -in ecparams.pem -check

Actual results:
Could not read params of EC parameters from ecparams.pem
80CB0D2AEB7F0000:error:1608010C:STORE routines:ossl_store_handle_load_result:unsupported:crypto/store/store_result.c:151:

Expected results:
passed, same for key generation, signature creation, and signature verification

Additional info:

Comment 7 Dmitry Belyavskiy 2022-04-27 11:47:24 UTC
Upstream has forbidden the explicit FIPS parameters in FIPS mode. See https://github.com/openssl/openssl/pull/17998

Comment 9 Alicja Kario 2022-05-06 15:50:15 UTC
We've decided to follow upstream in this behaviour, as such explicit curve parameters will no longer work in FIPS mode.
Explicit curve parameters will be supported in non-FIPS mode, see bug 2066412.

Comment 24 Clemens Lang 2023-06-05 16:07:27 UTC
RHEL 9.1 contains openssl-3.0.1-43.el9_0.