crypto-policies

Edit Package crypto-policies
No description set
Refresh
Refresh
Source Files
Filename Size Changed
README.SUSE 0000000221 221 Bytes
_service 0000000560 560 Bytes
_servicedata 0000000257 257 Bytes
crypto-policies-FIPS.patch 0000006902 6.74 KB
crypto-policies-no-build-manpages.patch 0000001278 1.25 KB
crypto-policies-policygenerators.patch 0000001438 1.4 KB
crypto-policies-revert-rh-allow-sha1-signatures.patch 0000013687 13.4 KB
crypto-policies-rpmlintrc 0000000098 98 Bytes
crypto-policies-supported.patch 0000001419 1.39 KB
crypto-policies.7.gz 0000006896 6.73 KB
crypto-policies.changes 0000011490 11.2 KB
crypto-policies.spec 0000010551 10.3 KB
fedora-crypto-policies-20230420.3d08ae7.tar.gz 0000085811 83.8 KB
fips-finish-install.8.gz 0000000824 824 Bytes
fips-mode-setup.8.gz 0000001541 1.5 KB
update-crypto-policies.8.gz 0000004178 4.08 KB
Revision 16 (latest revision is 31)
Pedro Monreal Gonzalez's avatar Pedro Monreal Gonzalez (pmonrealgonzalez) accepted request 1089054 from Pedro Monreal Gonzalez's avatar Pedro Monreal Gonzalez (pmonrealgonzalez) (revision 16)
- FIPS: Enable to set the kernel FIPS mode with fips-mode-setup
  and fips-finish-install commands, add also the man pages. The
  required FIPS modules are left to be installed by the user.
  * Rebase crypto-policies-FIPS.patch

- Revert a breaking change that introduces the config option
  rh-allow-sha1-signatures that is unkown to OpenSSL and fails
  on startup. We will consider adding this option to openssl.
  * https://gitlab.com/redhat-crypto/fedora-crypto-policies/-/commit/97fe4494
  * Add crypto-policies-revert-rh-allow-sha1-signatures.patch

  * Skip not needed LibreswanGenerator and SequoiaGenerator:
Comments 2

Anonymous Checkouts's avatar

The LEGACY crypto-policy no longer works as documented as of OpenSSL 3.1. In order to have TLSv1.0 and TLSv1.1 work with OpenSSL 3.1 @SECLEVEL=0 is required.

I already had added the legacy provider to openssl.cnf when OpenSSL 3.0 replaced 1.1.1 in tumbleweed in order to keep OpenVPN working, so I cannot say for sure but I would not be the least bit surprised if that is also required for TLS < v1.2 to function in practice.

Also, prior to the transition to OpenSSL 3.1, the DEFAULT crypto-policy did not enforce the documented requirement of TLS >= v1.2. It was only with the transition from OpenSSL 3.0 to 3.1 that I switched my system's crypto-policy from DEFAULT to LEGACY to no avail in an attempt to unbreak the connection to a POP3S server which only supports TLSv1.0.


Pedro Monreal Gonzalez's avatar

Thanks for your comments! Could you open a bug report in bugzilla.opensuse.org with as much information as possible and the steps to reproduce. TIA.

openSUSE Build Service is sponsored by