<p dir="ltr">You can run strace on the tsql process and see where the md5 bits are being found and delete the keys found.</p>
<p dir="ltr">Is it possible that the far side of the tsql connection is using md5 based on prior connections before fips change?</p>
<div class="gmail_quote">On Aug 13, 2015 4:38 PM, "Adrya Stembridge" <<a href="mailto:adrya.stembridge@gmail.com">adrya.stembridge@gmail.com</a>> wrote:<br type="attribution"><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr">ls -ltR /etc/pki/ reveals no newly created files prior to enabling FIPS. <br><div><br></div><div>There are a few package differences, but for things like openmanage and some additional tools needed on the production side. libgcrypt and freetds (contains tsql) are identical. <br><br>Last night I removed/reinstalled freetds with no success (the old conf file was moved out of the way). </div></div><div class="gmail_extra"><br><div class="gmail_quote">On Thu, Aug 13, 2015 at 2:36 PM, Jim Kinney <span dir="ltr"><<a href="mailto:jim.kinney@gmail.com" target="_blank">jim.kinney@gmail.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div><div>OK. Time to run rpm -qa on both dev and new and diff the list. Something is missing or diff version on new system.</div><div><br></div><div>Hmm. So the pre-fips connection with tsql worked. That implies it was using md5. Converting the system to fips compliant didn't change the tsql config to use sha1 keys so it still uses (tries) md5. </div><div><br></div><div>Delete the old md5 keys for tsql or remove the package entirely and reinstall (after renaming out the config as conf.old). Do you see keys with creation dates prior to FIPS in /etc/pki?</div><div><div><div><br></div><div>On Thu, 2015-08-13 at 14:22 -0400, Adrya Stembridge wrote:</div><blockquote type="cite"><div dir="ltr"><div class="gmail_extra"><div class="gmail_quote">On Thu, Aug 13, 2015 at 12:25 PM, Jim Kinney <span dir="ltr"><<a href="mailto:jim.kinney@gmail.com" target="_blank">jim.kinney@gmail.com</a>></span> wrote:<br><blockquote type="cite"><span style="font-size:12.8000001907349px">The rhel instructions look like the system keys will default to weaker non-FIPS unless fips=1 is a kernel param at </span>at system installation. So <b>converting an existing system won't work</b>. So weak keys with libgcrypt will call for fallback to non-fips but then fails since it's a denied operations mode.<br></blockquote><div><br></div><div>I went through the same steps of activating FIPS on my dev instance, and do not have the libgcrypt error, and am able to tsql to my SQL Server machine. Confirmed FIPS is active and working using the steps written in my initial post to the list. <br><br><br></div></div></div></div>
</blockquote></div></div><span><font color="#888888"><div><span><pre>--
James P. Kinney III
Every time you stop a school, you will have to build a jail. What you
gain at one end you lose at the other. It's like feeding a dog on his
own tail. It won't fatten the dog.
- Speech 11/23/1900 Mark Twain
<a href="http://heretothereideas.blogspot.com/" target="_blank">http://heretothereideas.blogspot.com/</a>
</pre></span></div></font></span></div></blockquote></div><br></div>
</blockquote></div>