Bug 2091694
| Summary: | FIPS compliance of signature APIs used by OpenSSH | |||
|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 9 | Reporter: | Alicja Kario <hkario> | |
| Component: | openssh | Assignee: | Dmitry Belyavskiy <dbelyavs> | |
| Status: | CLOSED ERRATA | QA Contact: | Marek Havrila <mhavrila> | |
| Severity: | medium | Docs Contact: | ||
| Priority: | medium | |||
| Version: | 9.0 | CC: | cllang, dbelyavs, jjelen, mhavrila | |
| Target Milestone: | rc | Keywords: | Triaged | |
| Target Release: | --- | Flags: | pm-rhel:
mirror+
|
|
| Hardware: | Unspecified | |||
| OS: | Unspecified | |||
| Whiteboard: | ||||
| Fixed In Version: | openssh-8.7p1-30.el9 | Doc Type: | No Doc Update | |
| Doc Text: |
If this bug requires documentation, please select an appropriate Doc Type value.
|
Story Points: | --- | |
| Clone Of: | ||||
| : | 2092503 (view as bug list) | Environment: | ||
| Last Closed: | 2023-11-07 08:52:54 UTC | Type: | Bug | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Embargoed: | ||||
| Bug Depends On: | ||||
| Bug Blocks: | 2092503 | |||
|
Description
Alicja Kario
2022-05-30 18:06:35 UTC
What should be done: In the function sshkey_calculate_signature/sshkey_verify_signature we should use the DigestSignInit/Update/Final API ECDSA_do_sign/verify calls should be eliminated from both SSH and ssh_pam (leave just in sk-dummy.c) It can be done via reconstructing EVP_PKEY object and dealing with it and new API DH/ECDH key exchanges should be rewritten to use EVP_PKEY API The keys created via EVP_PKEY_set1_* functions follow the legacy code path. It means we have to recreate non-legacy EVP_PKEY objects from components. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (openssh bug fix and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2023:6622 |