-
Bug
-
Resolution: Done-Errata
-
Undefined
-
None
-
None
-
None
-
None
-
ZStream
-
rhel-sst-dotnet
-
None
-
False
-
-
None
-
Red Hat Enterprise Linux
-
None
-
Approved Blocker
-
None
This ticket is a follow-up for RHEL-22734 (https://issues.redhat.com/browse/RHEL-22734)
Upon further review we discovered that there are more services affected by this issue. The suggested OPENSSL_ENABLE_SHA1_SIGNATURES flag isn't taken into consideration in FIPS mode, which leaves us with no viable workaround.
The issue comes from the fact that certain third party libraries have CheckCertificateRevocationList enabled when performing requests. We cannot unfortunately disable this flag.
This affects, for example: connections to databases, to third party services, to customer-provided endpoints, etc.
For the moment we decided to disable CRL checks altogether. This only fixes the issue for the moment as we were made aware of the fact that CRL checks will become mandatory as of March 15 2024.
We were wondering if there is a way for you guys to enable SHA1 for digital signatures validation inside FIPS (as SHA1 is allowed in FIPS 140-2 and 140-3 for digital signature validation). This would allow us to use the recommended approach of defining OPENSSL_ENABLE_SHA1_SIGNATURES inside our containers.
- is related to
-
RHEL-22734 OpenSSL 3.0 & .NET: The remote certificate is invalid on Get when using CheckCertificateRevocationList
- Closed
- relates to
-
RHEL-28358 CheckCertificateRevocationList flag for SHA1 CAs
- Planning
- links to
-
RHBA-2024:133408 dotnet8.0 bug fix and enhancement update