RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 2058663 - OpenSSL mustn't work with ECDSA with explicit curve parameters in FIPS mode
Summary: OpenSSL mustn't work with ECDSA with explicit curve parameters in FIPS mode
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: Red Hat Enterprise Linux 9
Classification: Red Hat
Component: openssl
Version: 9.0
Hardware: Unspecified
OS: Unspecified
medium
medium
Target Milestone: rc
: ---
Assignee: Dmitry Belyavskiy
QA Contact: Alicja Kario
Jan Fiala
URL:
Whiteboard:
Depends On:
Blocks: 2085521
TreeView+ depends on / blocked
 
Reported: 2022-02-25 14:57 UTC by Alicja Kario
Modified: 2023-06-05 16:07 UTC (History)
4 users (show)

Fixed In Version: openssl-3.0.1-43.el9_0
Doc Type: Deprecated Functionality
Doc Text:
.OpenSSL does not accept explicit curve parameters in FIPS mode Elliptic curve cryptography parameters, private keys, public keys, and certificates that specified explicit curve parameters no longer work in FIPS mode. Specifying the curve parameters using ASN.1 object identifiers, which use one of the FIPS-approved curves, still works in FIPS mode.
Clone Of:
: 2085521 (view as bug list)
Environment:
Last Closed: 2023-06-05 16:07:27 UTC
Type: Bug
Target Upstream Version:
Embargoed:
pm-rhel: mirror+


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Github openssl openssl issues 17978 0 None open ecparam -check in fips mode 2022-03-28 13:06:57 UTC
Github openssl openssl pull 17998 0 None closed Import only named params into FIPS module 2022-04-27 11:47:24 UTC
Red Hat Bugzilla 2066412 1 None None None 2023-10-13 07:27:03 UTC
Red Hat Issue Tracker CRYPTO-6313 0 None None None 2022-03-02 12:41:59 UTC
Red Hat Issue Tracker RHELPLAN-113856 0 None None None 2022-02-25 15:05:33 UTC

Description Alicja Kario 2022-02-25 14:57:45 UTC
Description of problem:
When system is configured to work in FIPS mode, the ECDSA operations with explicit parameters don't work. This is in contrast to RHEL-8

Version-Release number of selected component (if applicable):
openssl-3.0.1-13.el9

How reproducible:
always

Steps to Reproduce:
1. set up FIPS mode
2. openssl ecparam -out ecparams.pem -param_enc explicit -name P-256
3. openssl ecparam -in ecparams.pem -check

Actual results:
Could not read params of EC parameters from ecparams.pem
80CB0D2AEB7F0000:error:1608010C:STORE routines:ossl_store_handle_load_result:unsupported:crypto/store/store_result.c:151:

Expected results:
passed, same for key generation, signature creation, and signature verification

Additional info:

Comment 7 Dmitry Belyavskiy 2022-04-27 11:47:24 UTC
Upstream has forbidden the explicit FIPS parameters in FIPS mode. See https://github.com/openssl/openssl/pull/17998

Comment 9 Alicja Kario 2022-05-06 15:50:15 UTC
We've decided to follow upstream in this behaviour, as such explicit curve parameters will no longer work in FIPS mode.
Explicit curve parameters will be supported in non-FIPS mode, see bug 2066412.

Comment 24 Clemens Lang 2023-06-05 16:07:27 UTC
RHEL 9.1 contains openssl-3.0.1-43.el9_0.


Note You need to log in before you can comment on or make changes to this bug.