crypto-policies
No description set
- Devel package for openSUSE:Factory
-
6
derived packages
- Links to openSUSE:Factory / crypto-policies
- Has a link diff
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout security:tls/crypto-policies && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
README.SUSE | 0000000135 135 Bytes | |
_service | 0000000560 560 Bytes | |
_servicedata | 0000000257 257 Bytes | |
crypto-policies-asciidoc.patch | 0000000745 745 Bytes | |
crypto-policies-no-build-manpages.patch | 0000001555 1.52 KB | |
crypto-policies-test_supported_modules_only.patch | 0000000386 386 Bytes | |
crypto-policies-typos.patch | 0000001919 1.87 KB | |
crypto-policies.7.gz | 0000006127 5.98 KB | |
crypto-policies.changes | 0000004027 3.93 KB | |
crypto-policies.spec | 0000008346 8.15 KB | |
fedora-crypto-policies-20210213.5c710c0.tar.gz | 0000057622 56.3 KB | |
fips-finish-install.8.gz | 0000000881 881 Bytes | |
fips-mode-setup.8.gz | 0000001124 1.1 KB | |
update-crypto-policies.8.gz | 0000004018 3.92 KB |
Revision 11 (latest revision is 31)
Pedro Monreal Gonzalez (pmonrealgonzalez)
accepted
request 873431
from
Pedro Monreal Gonzalez (pmonrealgonzalez)
(revision 11)
- Update to version 20210213.5c710c0: [bsc#1180938] * setup_directories(): perform safer creation of directories * save_config(): avoid re-opening output file for each iteration * save_config(): break after first match to avoid unnecessary stat() calls * CryptoPolicy.parse(): actually stop parsing line on syntax error * ProfileConfig.parse_string(): correctly extended subpolicies * Exclude RC4 from LEGACY * Introduce rc4_md5_in_krb5 to narrow AD_SUPPORT * code style: fix 'not in' membership testing * pylintrc: tighten up a bit * formatting: avoid long lines * formatting: use f-strings instead of format() * formatting: reformat all python code with autopep8 * nss: postponing the version check again, to 3.61 * Revert "Unfortunately we have to keep ignoring the openssh check for sk-"
Comments 2
The LEGACY crypto-policy no longer works as documented as of OpenSSL 3.1. In order to have TLSv1.0 and TLSv1.1 work with OpenSSL 3.1 @SECLEVEL=0 is required.
I already had added the legacy provider to openssl.cnf when OpenSSL 3.0 replaced 1.1.1 in tumbleweed in order to keep OpenVPN working, so I cannot say for sure but I would not be the least bit surprised if that is also required for TLS < v1.2 to function in practice.
Also, prior to the transition to OpenSSL 3.1, the DEFAULT crypto-policy did not enforce the documented requirement of TLS >= v1.2. It was only with the transition from OpenSSL 3.0 to 3.1 that I switched my system's crypto-policy from DEFAULT to LEGACY to no avail in an attempt to unbreak the connection to a POP3S server which only supports TLSv1.0.
Thanks for your comments! Could you open a bug report in bugzilla.opensuse.org with as much information as possible and the steps to reproduce. TIA.