New OpenSSL requirements in RHEL 9 in fips mode [RHSA-2023:3722-01], cannot connect to Chef Server anymore with no EMS support #3679
Labels
Status: Untriaged
An issue that has yet to be triaged.
Chef Server Version
Chef Server 15.7.0 el9
Platform Details
Rocky Linux 9.2 / RHEL 9.2
Scenario
After RHEL 9/Rocky Linux 9 released
Steps to Reproduce
RHEL/Rocky Linux/Alama Linux 9 has released security update RHSA-2023:3722-01 [ https://lwn.net/Articles/935817/ ] which prevents clients (who are also in fips mode) from connecting to the Chef server when running in FIPS mode. The new updates forces EMS support which is ONLY supported in Openssl 1.1+ or higher and won't work with Opensll 1.0.xx which has already been deprecated for awhile. Since Chef Server [chef-server-core-15.7.0-1.el9.x86_64.rpm or chef-server-core-15.7.0-1.el8.x86_64.rpm] is using it's own openssl 1.0.x version which is not compatible as stated in the RHEL release notes [ https://access.redhat.com/solutions/7018256 ]
The integrated OpenSSL version in Chef for nginx needs to be upgraded and it currently blocks everything.
Expected Result
Show just works.
Actual Result
When manually trying to connect via curl when the client is set to fips and using the newer openssl version.
The text was updated successfully, but these errors were encountered: