Bug 2176248
| Summary: | authby=rsasig fails in FIPS policy | |||
|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 8 | Reporter: | Ondrej Moriš <omoris> | |
| Component: | libreswan | Assignee: | Daiki Ueno <dueno> | |
| Status: | CLOSED CURRENTRELEASE | QA Contact: | Ondrej Moriš <omoris> | |
| Severity: | unspecified | Docs Contact: | Jan Fiala <jafiala> | |
| Priority: | urgent | |||
| Version: | 8.8 | CC: | cllang, dueno, jafiala, mjahoda, rrelyea, sbroz, ssorce | |
| Target Milestone: | rc | Keywords: | Triaged, ZStream | |
| Target Release: | --- | Flags: | jafiala:
needinfo+
pm-rhel: mirror+ |
|
| Hardware: | All | |||
| OS: | Linux | |||
| Whiteboard: | ||||
| Fixed In Version: | Doc Type: | Bug Fix | ||
| Doc Text: |
.Libreswan no longer rejects SHA-1 signature verification in the `FUTURE` and `FIPS` cryptographic policies
Previously, from update to 4.9, Libreswan rejected SHA-1 signature verification in the `FUTURE` and `FIPS` cryptographic policies, and peer authentication failed when `authby=rsasig` or `authby=rsa-sha1` connection options were used. This update reverts this behavior by relaxing how Libreswan handles the `crypto-policies` settings. As a consequence, you can now use the `authby=rsasig` and `authby=rsa-sha1` connection options using SHA-1 signature verification.
|
Story Points: | --- | |
| Clone Of: | ||||
| : | 2187647 (view as bug list) | Environment: | ||
| Last Closed: | 2023-05-25 07:01:38 UTC | Type: | Bug | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Embargoed: | ||||
| Bug Depends On: | ||||
| Bug Blocks: | 2187647 | |||
|
Description
Ondrej Moriš
2023-03-07 18:59:14 UTC
Correction - the problem is only in FIPS policy and not DEFAULT. In RHEL-8 we allow SHA1 in the DEFAULT policy, we don't allow it in FIPS and FUTURE. Also, please notice that on RHEL-8 we only allow RSA keys of 1024 bit size in LEGACY and hence I think it is one more reason to drop the patch mentioned in the description that was specifically intended to keep 1024 bit RSA keys working for authby=rsasig. DocText proposal: Cause: Rebase of Libreswan to version 4.9 in RHEL-8 (2128672) uses high-level NSS API during peer authentication. It takes into consideration the system-wide cryptographic policy. Consequence: As a result, SHA1 is rejected in the FUTURE and FIPS cryptographic policies and peer authentication fails when `authby=rsasig` or `authby=rsa-sha1` connection options are used. Workaround (if any): To work around this problem, use the `authby=rsa-sha2` option to use SHA2 instead of SHA1. Or customize your cryptographic policy to allow SHA1 if you rely on 1024 bit RSA keys. Result: |