-
Story
-
Resolution: Unresolved
-
Normal
-
rhel-9.4
-
freerdp-3.2.0-4.el10
-
rhel-sst-display-productivity
-
ssg_display
-
3
-
5
-
0
-
False
-
-
None
-
None
-
If docs needed, set a value
-
-
Unspecified
-
None
Description of problem:
Environments that have FIPS enabled RHEL 7.x client and Windows server are unable to login using NLA. In environments where NLA is required on the Windows Server side this means they cannot login via FreeRDP as the NTLM stack is using unsupported FIPS ciphers.
Version-Release number of selected component (if applicable):
freerdp-1.0.2-15.el7.x86_64.
How reproducible:
Very reproducible.
Steps to Reproduce:
1. Setup FIPS enabled Windows server
2. Setup FIPS enabled RHEL server
3. Enable NLA on Windows Server
4. Connect via freerdp
Actual results:
Connected to hostname.fqdn:3389
Connected to hostname.fqdn:3389
recv: Connection reset by peer
Error: protocol security negotiation failure.
Expected results:
Connect without issue.
Additional info:
The Windows Server is required to have NLA enabled because of the DISA STIG requirements.
- external trackers
- links to
-
RHBA-2024:131108 freerdp bug fix and enhancement update