Uploaded image for project: 'RHEL'
  1. RHEL
  2. RHEL-107059

sign with RSA X9.31 is allowed

Linking RHIVOS CVEs to...Migration: Automation ...Sync from "Extern...XMLWordPrintable

    • Icon: Bug Bug
    • Resolution: Unresolved
    • Icon: Normal Normal
    • rhel-10.1.z
    • rhel-10.1
    • fips-provider-next
    • None
    • No
    • Low
    • rhel-security-crypto-clubs
    • 0
    • False
    • False
    • Hide

      None

      Show
      None
    • None
    • None
    • Hide

      AC) It is not possible to create X9.31 RSA signatures when using fips-provider-next as FIPS provider in OpenSSL.

      Notice that this is implemented by /CoreOS/openssl/Regression/bz2042448-Creation-of-self-signed-certificates-in-FIPS-mode but fips-provider-next must be installed on the system and active as OpenSSL provider.

      Show
      AC) It is not possible to create X9.31 RSA signatures when using fips-provider-next as FIPS provider in OpenSSL. Notice that this is implemented by /CoreOS/openssl/Regression/bz2042448-Creation-of-self-signed-certificates-in-FIPS-mode but fips-provider-next must be installed on the system and active as OpenSSL provider.
    • None
    • Enabled
    • Automated
    • Unspecified
    • Unspecified
    • Unspecified
    • All
    • None

      What were you trying to do that didn't work?

      fips-provider next allows signature using rsa-x931 while openssl-fips-provider did not allowed that:

      openssl dgst -sign rsa.key -sigopt rsa_padding_mode:x931 -out file.rsa-x931.sig.new file.txt

      Please provide the package NVR for which the bug is seen:

      fips-provider-next-1.2.0-1.el10

      Steps to reproduce

      1. echo some text > file.txt
      2. openssl req -x509 -newkey rsa -keyout localhost.key -out localhost.crt -subj /CN=localhost -nodes -batch
      3. openssl dgst -sign rsa.key -sigopt rsa_padding_mode:x931 -out file.rsa-x931.sig.new file.txt
      4. openssl dgst -prverify rsa.key -sigopt rsa_padding_mode:x931 -signature file.rsa-x931.sig file.txt

      Actual results

      3. Signed successfully

      4. 

      Verified OK

      Expected results

      3. 

      Signature parameter error "rsa_padding_mode:x931"
      8042FB23BB7F0000:error:1C8000A5:Provider routines:rsa_set_ctx_params:illegal or unsupported padding mode:providers/implementations/signature/rsa_sig.c:1318:X.931 padding no longer allowed in FIPS mode, since it was removed from FIPS 186-5

      Additional information

      /CoreOS/openssl/Regression/bz2042448-Creation-of-self-signed-certificates-in-FIPS-mode

              rhn-engineering-ssorce Simo Sorce
              omoris Ondrej Moris
              Simo Sorce Simo Sorce
              Stanislav Zidek Stanislav Zidek
              Votes:
              0 Vote for this issue
              Watchers:
              6 Start watching this issue

                Created:
                Updated: