-
Bug
-
Resolution: Unresolved
-
Major
-
None
-
rhel-9.4.z
-
None
-
None
-
None
-
rhel-sst-virtualization
-
ssg_virtualization
-
5
-
False
-
-
None
-
None
-
None
-
None
-
None
What were you trying to do that didn't work?
RHEL-45736 was discovered by a customer.
This was caused by RHEL 9 deprecating (disabling) SHA1 on the host (via openssl), and swtpm also blocking the guest from using the vTPM's SHA1 digest in context of cert signing.
However, the TPM 2.0 spec requires SHA1 to be available:
https://trustedcomputinggroup.org/wp-content/uploads/PC-Client-Specific-Platform-TPM-Profile-for-TPM-2p0-v1p05p_r14_pub.pdf (search for "SHA1")
The request here is to introduce a test in swtpm CI/testing to check for TPM 2.0 spec compliance.
Please provide the package NVR for which bug is seen:
swtpm 0.8.0
How reproducible:
always on RHEL 9 default
Steps to reproduce
- RHEL 9.4
- qemu kvm
- Launch Win 11 guest
- Rnu `Get-TPMSupportedFeature` in guest
Expected results
Passes
Actual results
Fails
- split from
-
RHEL-45736 swtpm: Windows reports TPM error due to missing SHA1 on RHEL 9 hosts
- Closed