-
Bug
-
Resolution: Done-Errata
-
Minor
-
rhel-10.0
-
No
-
Low
-
2
-
rhel-security-crypto-clubs
-
ssg_security
-
28
-
1
-
False
-
False
-
-
None
-
Crypto25August, Crypto25September
-
-
Pass
-
Enabled
-
Automated
-
Unspecified
-
Unspecified
-
Unspecified
-
None
nss-3.101.0-13.el10.x86_64
NSS server group selection is weird, on RHEL-10.1, when client advertises the following groups (with '*' meaning send a key_share for it too), we get the following results:
*X25519MLKEM768:SECP256R1MLKEM768:SECP384R1MLKEM1024:*P-256:P-384:*X25519:ffdhe2048:ffdhe3072 = X25519MLKEM768 (GOOD) *X25519MLKEM768:SECP256R1MLKEM768:SECP384R1MLKEM1024:*P-256:P-384:*X25519 = X25519MLKEM768 (GOOD) X25519MLKEM768:*SECP256R1MLKEM768:SECP384R1MLKEM1024:*P-256:P-384:*X25519 = X25519 (BAD) X25519MLKEM768:*SECP256R1MLKEM768:SECP384R1MLKEM1024:*P-256:P-384:X25519 = X25519MLKEM768 (OK, but suboptimal, means a HRR) *SECP256R1MLKEM768:SECP384R1MLKEM1024:*P-256:P-384:X25519 = SecP256r1MLKEM768 (GOOD) *SECP256R1MLKEM768:SECP384R1MLKEM1024:*P-256:P-384:*X25519 = X25519 (BAD, worst) X25519MLKEM768:SECP256R1MLKEM768:SECP384R1MLKEM1024:*P-256:P-384:X25519 = X25519MLKEM768 (GOOD) *SECP256R1MLKEM768:SECP384R1MLKEM1024:*P-256:P-384 = SecP256r1MLKEM768 (GOOD) *SECP256R1MLKEM768:SECP384R1MLKEM1024:*P-256:P-384:ffdhe2048:*ffdhe3072 = SecP256r1MLKEM768 (GOOD) X25519MLKEM768:SECP256R1MLKEM768:SECP384R1MLKEM1024:*P-256:P-384 = X25519MLKEM768 (GOOD)
- links to
-
RHEA-2025:152258 nss enhancement update