-
Bug
-
Resolution: Unresolved
-
Normal
-
None
-
rhel-10.0.beta
-
None
-
None
-
1
-
rhel-sst-security-crypto
-
ssg_security
-
0.2
-
False
-
-
Yes
-
Crypto24Q3
-
-
Pass
-
None
-
Unspecified Release Note Type - Unknown
-
-
Done
-
None
When the server is configured with -cipher DEFAULT:@SECLEVEL=0 -sigalgs SHA1+RSA then TLS1.2 clients that advertise support for SHA-1 signatures implicitly (by not including sig_algs extension) can't connect to the server, the server sends handshake_failure alert
- is related to
-
RHEL-50106 LEGACY policy should not permit SHA-1 signature use
- Release Pending
- relates to
-
RHEL-36677 SHA-1 signature creation and verification works in normal mode
- Release Pending
- links to
-
RHBA-2024:133129 OpenSSL bugfix release