-
Bug
-
Resolution: Done
-
Normal
-
rhel-9.5
-
None
-
None
-
ktls: restrict hash functions to supported sizes - https://github.com/oracle/ktls-utils/commit/f28f084fda537f82d99ca3a8f6e45638f95870e8
-
rhel-sst-filesystems
-
ssg_filesystems_storage_and_HA
-
12
-
20
-
2
-
QE ack, Dev ack
-
False
-
-
None
-
None
-
None
-
None
-
All
-
None
Description:
Linux NVMe/TCP currently sends multiple options for cipher suites in the TLS ClientHello message. This could be a problem if the target OpenSSL server picks a cipher suite that does not correspond to the PSK identity. So the ask here is to ensure the Linux NVMe/TCP host sends a single cipher suite alone that corresponds to the PSK identity in its TLS CLientHello message to avoid a potential TLS handshake failure.
- duplicates
-
RHEL-39442 Upgrade ktls-utils
- Closed