Script 'mail_helper' called by obssrc
Hello community,
here is the log from the commit of package crypto-policies for openSUSE:Factory
checked in at 2025-03-24 13:25:09
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/crypto-policies (Old)
and /work/SRC/openSUSE:Factory/.crypto-policies.new.2696 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "crypto-policies"
Mon Mar 24 13:25:09 2025 rev:9 rq:1255022 version:20250124.4d262e7
Changes:
--------
--- /work/SRC/openSUSE:Factory/crypto-policies/crypto-policies.changes
2024-02-02 15:44:38.615006922 +0100
+++
/work/SRC/openSUSE:Factory/.crypto-policies.new.2696/crypto-policies.changes
2025-03-24 13:25:09.818077502 +0100
@@ -1,0 +2,153 @@
+Tue Mar 18 13:45:44 UTC 2025 - Pedro Monreal <[email protected]>
+
+- Allow sshd in FIPS mode when using the DEFAULT policy [bsc#1227370]
+ * Add crypto-policies-Allow-sshd-in-FIPS-mode-using-DEFAULT.patch
+
+-------------------------------------------------------------------
+Tue Mar 11 12:40:44 UTC 2025 - Pedro Monreal <[email protected]>
+
+- Enable SHA1 sigver in the DEFAULT policy.
+ * Add crypto-policies-enable-SHA1-sigver-in-DEFAULT.patch
+
+-------------------------------------------------------------------
+Fri Feb 28 13:18:00 UTC 2025 - Pedro Monreal <[email protected]>
+
+- Fix fips-mode-setup in EFI or Secure Boot mode. [bsc#1227637]
+ * Rebase crypto-policies-FIPS.patch
+
+-------------------------------------------------------------------
+Wed Feb 12 11:45:57 UTC 2025 - Pedro Monreal <[email protected]>
+
+- Remove dangling symlink for the libreswan config [bsc#1236858]
+- Remove also sequoia config and generator files
+- Remove not needed fips bind mount service
+
+-------------------------------------------------------------------
+Tue Feb 04 10:18:07 UTC 2025 - Pedro Monreal <[email protected]>
+
+- Update to version 20250124.4d262e7: [bsc#1239009, bsc#1236165]
+ * openssl: stricter enabling of Ciphersuites
+ * openssl: make use of -CBC and -AESGCM keywords
+ * openssl: add TLS 1.3 Brainpool identifiers
+ * fix warning on using experimental key_exchanges
+ * update-crypto-policies: don't output FIPS warning in fips mode
+ * openssh: map mlkem768x25519-sha256 to KEM-ECDH & MLKEM768-X25519 & SHA2-256
+ * openssh, libssh: refactor kx maps to use tuples
+ * alg_lists: mark MLKEM768/SNTRUP kex experimental
+ * nss: revert enabling mlkem768secp256r1
+ * nss: add mlkem768x25519 and mlkem768secp256r1, remove xyber
+ * gnutls: add GROUP-X25519-MLKEM768 and GROUP-SECP256R1-MLKEM768
+ * openssl: use both names for SecP256r1MLKEM768 / X25519MLKEM768
+ * openssh, TEST-PQ: rename MLKEM key_exchange to MLKEM768
+ * openssh: add support for sntrup761x25519-sha512 and mlkem768x25519-sha256
+ * openssl: map NULL to TLS_SHA256_SHA256:TLS_SHA384_SHA384...
+ * python/update-crypto-policies: pacify pylint
+ * fips-mode-setup: tolerate fips dracut module presence w/o FIPS
+ * fips-mode-setup: small Argon2 detection fix
+ * SHA1: add __openssl_block_sha1_signatures = 0
+ * fips-mode-setup: block if LUKS devices using Argon2 are detected
+ * update-crypto-policies: skip warning on --set=FIPS if bootc
+ * fips-setup-helper: skip warning, BTW
+ * fips-mode-setup: force --no-bootcfg when UKI is detected
+ * fips-setup-helper: add a libexec helper for anaconda
+ * fips-crypto-policy-overlay: automount FIPS policy
+ * openssh: make dss no longer enableble, support is dropped
+ * gnutls: wire GROUP-X25519-KYBER768 to X25519-KYBER768
+ * DEFAULT: switch to rh-allow-sha1-signatures = no...
+ * java: drop unused javasystem backend
+ * java: stop specifying jdk.tls.namedGroups in javasystem
+ * ec_min_size: introduce and use in java, default to 256
+ * java: use and include jdk.disabled.namedCurves
+ * BSI: Update BSI policy for new 2024 minimum recommendations
+ * fips-mode-setup: flashy ticking warning upon use
+ * fips-mode-setup: add another scary "unsupported"
+ * CONTRIBUTING.md: add a small section on updating policies
+ * CONTRIBUTING.md: remove trailing punctuation from headers
+ * BSI: switch to 3072 minimum RSA key size
+ * java: make hash, mac and sign more orthogonal
+ * java: specify jdk.tls.namedGroups system property
+ * java: respect more key size restrictions
+ * java: disable anon ciphersuites, tying them to NULL...
+ * java: start controlling / disable DTLSv1.0
+ * nss: wire KYBER768 to XYBER768D00
+ * nss: unconditionally load p11-kit-proxy.so
+ * gnutls: make DTLS0.9 controllable again
+ * gnutls: retire GNUTLS_NO_TLS_SESSION_HASH
+ * openssh: remove OPENSSH_MIN_RSA_SIZE / OPENSSH_MIN_RSA_SIZE_FORCE
+ * gnutls: remove extraneous newline
+ * sequoia: move away from subprocess.getstatusoutput
+ * python/cryptopolicies/cryptopolicies.py: add trailing commas
+ * python, tests: rename MalformedLine to MalformedLineError
+ * Makefile: introduce SKIP_LINTING flag for packagers to use
+ * Makefile: run ruff
+ * tests: use pathlib
+ * tests: run(check=True) + CalledProcessError where convenient
+ * tests: use subprocess.run
+ * tests/krb5.py: check all generated policies
+ * tests: print to stderr on error paths
+ * tests/nss.py: also use encoding='utf-8'
+ * tests/nss.py: also use removesuffix
+ * tests/nss.py: skip creating tempfiles
+ * tests/java.pl -> tests/java.py
+ * tests/gnutls.pl -> tests/gnutls.py
+ * tests/openssl.pl -> tests/openssl.py
+ * tests/verify-output.pl: remove
+ * libreswan: do not use up pfs= / ikev2= keywords for default behaviour
+ * Rebase patches:
+ - crypto-policies-no-build-manpages.patch
+ - crypto-policies-policygenerators.patch
+ - crypto-policies-supported.patch
+ - crypto-policies-nss.patch
+
+-------------------------------------------------------------------
+Wed Nov 06 12:27:56 UTC 2024 - Pedro Monreal <[email protected]>
+
+- Update to version 20241010.5930b9a:
+ * LEGACY: enable 192-bit ciphers for nss pkcs12/smime
+ * nss: be stricter with new purposes
+ * nss: rewrite backend for 3.101
+ * cryptopolicies: parent scopes for dumping purposes
+ * policygenerators: move scoping inside generators
+ * TEST-PQ: disable pure Kyber768
+ * nss: wire XYBER768D00 to X25519-KYBER768
+ * TEST-PQ: update
+ * TEST-PQ: also enable [email protected]
+ * TEST-PQ, alg_lists, openssl: enable more experimental `sign` values
+ * TEST-PQ, python: add more groups, mark experimental
+ * openssl: mark liboqsprovider groups optional with ?
+ * Remove patches:
+ - crypto-policies-revert-rh-allow-sha1-signatures.patch
+
+-------------------------------------------------------------------
+Tue Feb 06 10:29:11 UTC 2024 - Pedro Monreal <[email protected]>
+
+- Update to version 20240201.9f501f3:
+ * .gitlab-ci.yml: install sequoia-policy-config
+ * java: disable ChaCha20-Poly1305 where applicable
+ * fips-mode-setup: make sure ostree is detected in chroot
+ * fips-finish-install: make sure ostree is detected in chroot
+ * TEST-PQ: enable X25519-KYBER768 / P384-KYBER768 for openssl
+ * TEST-PQ: add a no-op subpolicy
+ * update-crypto-policies: Keep mid-sentence upper case
+ * fips-mode-setup: Write error messages to stderr
+ * fips-mode-setup: Fix some shellcheck warnings
+ * fips-mode-setup: Fix test for empty /boot
+ * fips-mode-setup: Avoid 'boot=UUID=' if /boot == /
+ * Update man pages
+ * Rebase patches:
+ - crypto-policies-FIPS.patch
+ - crypto-policies-revert-rh-allow-sha1-signatures.patch
+
+-------------------------------------------------------------------
+Mon Feb 02 08:34:40 UTC 2024 - Pedro Monreal <[email protected]>
+
+- Update to version 20231108.adb5572b:
+ * Print matches in syntax deprecation warnings
+ * Restore support for scoped ssh_etm directives
+ * fips-mode-setup: Fix usage with --no-bootcfg
+ * turn ssh_etm into an etm@SSH tri-state
+ * fips-mode-setup: increase chroot-friendliness
+ * bind: fix a typo that led to duplication of ECDSAPxxxSHAxxx
+ * pylintrc: use-implicit-booleaness-not-comparison-to-*
+
+-------------------------------------------------------------------
Old:
----
crypto-policies-revert-rh-allow-sha1-signatures.patch
fedora-crypto-policies-20230920.570ea89.tar.gz
New:
----
crypto-policies-Allow-sshd-in-FIPS-mode-using-DEFAULT.patch
crypto-policies-enable-SHA1-sigver-in-DEFAULT.patch
fedora-crypto-policies-20250124.4d262e7.tar.gz
BETA DEBUG BEGIN:
Old: * Remove patches:
- crypto-policies-revert-rh-allow-sha1-signatures.patch
BETA DEBUG END:
BETA DEBUG BEGIN:
New:- Allow sshd in FIPS mode when using the DEFAULT policy [bsc#1227370]
* Add crypto-policies-Allow-sshd-in-FIPS-mode-using-DEFAULT.patch
New:- Enable SHA1 sigver in the DEFAULT policy.
* Add crypto-policies-enable-SHA1-sigver-in-DEFAULT.patch
BETA DEBUG END:
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ crypto-policies.spec ++++++
--- /var/tmp/diff_new_pack.SZsVSB/_old 2025-03-24 13:25:10.758116670 +0100
+++ /var/tmp/diff_new_pack.SZsVSB/_new 2025-03-24 13:25:10.762116836 +0100
@@ -1,7 +1,7 @@
#
# spec file for package crypto-policies
#
-# Copyright (c) 2024 SUSE LLC
+# Copyright (c) 2025 SUSE LLC
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
@@ -21,8 +21,9 @@
# manbuild is disabled by default
%bcond_with manbuild
%global _python_bytecompile_extra 0
+
Name: crypto-policies
-Version: 20230920.570ea89
+Version: 20250124.4d262e7
Release: 0
Summary: System-wide crypto policies
License: LGPL-2.1-or-later
@@ -47,41 +48,34 @@
Patch2: crypto-policies-policygenerators.patch
#PATCH-FIX-OPENSUSE bsc#1209998 Mention the supported back-end policies
Patch3: crypto-policies-supported.patch
-#PATCH-FIX-OPENSUSE Revert a breaking change that introduces
rh-allow-sha1-signatures
-Patch4: crypto-policies-revert-rh-allow-sha1-signatures.patch
#PATCH-FIX-OPENSUSE Remove version for pylint from Makefile
Patch5: crypto-policies-pylint.patch
#PATCH-FIX-OPENSUSE Adpat the fips-mode-setup script for SUSE/openSUSE
[jsc#PED-4578]
Patch6: crypto-policies-FIPS.patch
#PATCH-FIX-OPENSUSE Skip NSS policy check if not installed mozilla-nss-tools
[bsc#1211301]
Patch7: crypto-policies-nss.patch
-BuildRequires: python3-base >= 3.6
-# The sequoia stuff needs python3-toml, removed until needed
-# BuildRequires: python3-toml
+#PATCH-FIX-OPENSUSE enable SHA1 sigver in DEFAULT
+Patch8: crypto-policies-enable-SHA1-sigver-in-DEFAULT.patch
+#PATCH-FIX-OPENSUSE Allow sshd in FIPS mode when using the DEFAULT policy
[bsc#1227370]
+Patch9: crypto-policies-Allow-sshd-in-FIPS-mode-using-DEFAULT.patch
+BuildRequires: python3-base >= 3.11
%if %{with manbuild}
BuildRequires: asciidoc
%endif
%if %{with testsuite}
# The following packages are needed for the testsuite
BuildRequires: bind
-BuildRequires: codespell
-BuildRequires: gnutls >= 3.6.0
+BuildRequires: crypto-policies-scripts
+BuildRequires: gnutls
BuildRequires: java-devel
-BuildRequires: krb5-devel
BuildRequires: libxslt
BuildRequires: mozilla-nss-tools
+BuildRequires: openssh-clients
BuildRequires: openssl
-BuildRequires: perl
BuildRequires: python-rpm-macros
-BuildRequires: python3-coverage
-BuildRequires: python3-devel >= 3.6
-BuildRequires: python3-flake8
-BuildRequires: python3-pylint
+BuildRequires: python3-devel >= 3.11
BuildRequires: python3-pytest
-BuildRequires: perl(File::Copy)
-BuildRequires: perl(File::Temp)
-BuildRequires: perl(File::Which)
-BuildRequires: perl(File::pushd)
+BuildRequires: systemd-rpm-macros
%else
# Avoid cycle with python-rpm-macros
#!BuildIgnore: python-rpm-packaging python-rpm-macros
@@ -89,10 +83,10 @@
%if 0%{?primary_python:1}
Recommends: crypto-policies-scripts
%endif
-Conflicts: gnutls < 3.7.3
-#Conflicts: libreswan < 3.28
-Conflicts: nss < 3.90.0
-#Conflicts: openssh < 8.2p1
+Conflicts: gnutls < 3.8.8
+Conflicts: nss < 3.105
+Conflicts: openssh < 9.9p1
+Conflicts: openssl < 3.0.2
#!BuildIgnore: crypto-policies
BuildArch: noarch
@@ -105,6 +99,7 @@
Summary: Tool to switch between crypto policies
Requires: %{name} = %{version}-%{release}
Recommends: perl-Bootloader
+Provides: fips-mode-setup = %{version}-%{release}
%description scripts
This package provides a tool update-crypto-policies, which applies
@@ -121,15 +116,8 @@
# Make README.SUSE available for %%doc
cp -p %{SOURCE1} .
-# Remove not needed policy generators
-find -name libreswan.py -delete
-find -name sequoia.py -delete
-
%build
export OPENSSL_CONF=''
-sed -i "s/MIN_RSA_DEFAULT = .*/MIN_RSA_DEFAULT = 'RequiredRSASize'/" \
- python/policygenerators/openssh.py
-grep "MIN_RSA_DEFAULT = 'RequiredRSASize'" python/policygenerators/openssh.py
%make_build
%install
@@ -162,12 +150,19 @@
install -p -m 755 fips-mode-setup %{buildroot}%{_bindir}/
install -p -m 755 fips-finish-install %{buildroot}%{_bindir}/
-# Drop pre-generated GOST-ONLY policy, we do not need to ship them
+# Drop pre-generated GOST-ONLY and FEDORA policies, we do not need to ship them
rm -rf %{buildroot}%{_datarootdir}/crypto-policies/GOST-ONLY
-
-# Drop FEDORA policies
rm -rf %{buildroot}%{_datarootdir}/crypto-policies/*FEDORA*
+# Drop libreswan and sequoia config files
+find %{buildroot} -type f -name 'libreswan.*' -print -delete
+find %{buildroot} -type f -name 'sequoia.*' -print -delete
+
+# Drop not needed fips bind mount service
+find %{buildroot} -type f -name 'default-fips-config' -print -delete
+find %{buildroot} -type f -name 'fips-setup-helper' -print -delete
+find %{buildroot} -type f -name 'fips-crypto-policy-overlay*' -print -delete
+
# Create back-end configs for mounting with read-only /etc/
for d in LEGACY DEFAULT FUTURE FIPS BSI ; do
mkdir -p -m 755 %{buildroot}%{_datarootdir}/crypto-policies/back-ends/$d
@@ -229,12 +224,24 @@
end
end
+cfg_path_libreswan =
"%{_sysconfdir}/crypto-policies/back-ends/libreswan.config"
+st = posix.stat(cfg_path_libreswan)
+if st and st.type == "link" then
+ posix.unlink(cfg_path_libreswan)
+end
+
+cfg_path_javasystem =
"%{_sysconfdir}/crypto-policies/back-ends/javasystem.config"
+st = posix.stat(cfg_path_javasystem)
+if st and st.type == "link" then
+ posix.unlink(cfg_path_javasystem)
+end
+
%posttrans scripts
%{_bindir}/update-crypto-policies --no-check >/dev/null 2>/dev/null || :
%files
%license COPYING.LESSER
-%doc README.md NEWS CONTRIBUTING.md
+%doc README.md CONTRIBUTING.md
%doc %{_sysconfdir}/crypto-policies/README.SUSE
%dir %{_sysconfdir}/crypto-policies/
@@ -256,12 +263,8 @@
%ghost %config(missingok,noreplace) %verify(not mode)
%{_sysconfdir}/crypto-policies/back-ends/nss.config
%ghost %config(missingok,noreplace) %verify(not mode)
%{_sysconfdir}/crypto-policies/back-ends/bind.config
%ghost %config(missingok,noreplace) %verify(not mode)
%{_sysconfdir}/crypto-policies/back-ends/java.config
-%ghost %config(missingok,noreplace) %verify(not mode)
%{_sysconfdir}/crypto-policies/back-ends/javasystem.config
%ghost %config(missingok,noreplace) %verify(not mode)
%{_sysconfdir}/crypto-policies/back-ends/krb5.config
-%ghost %config(missingok,noreplace) %verify(not mode)
%{_sysconfdir}/crypto-policies/back-ends/libreswan.config
%ghost %config(missingok,noreplace) %verify(not mode)
%{_sysconfdir}/crypto-policies/back-ends/libssh.config
-%ghost %config(missingok,noreplace) %verify(not mode)
%{_sysconfdir}/crypto-policies/back-ends/sequoia.config
-%ghost %config(missingok,noreplace) %verify(not mode)
%{_sysconfdir}/crypto-policies/back-ends/rpm-sequoia.config
# %%verify(not mode) comes from the fact that these turn into symlinks and
back to regular files at will.
%ghost %{_sysconfdir}/crypto-policies/state/current
++++++ _service ++++++
--- /var/tmp/diff_new_pack.SZsVSB/_old 2025-03-24 13:25:10.818119170 +0100
+++ /var/tmp/diff_new_pack.SZsVSB/_new 2025-03-24 13:25:10.818119170 +0100
@@ -4,7 +4,7 @@
<param name="scm">git</param>
<param name="versionformat">%cd.%h</param>
<param name="changesgenerate">enable</param>
- <param name="revision">570ea89092555c6c289f226bb48c2d8c1f332b0f</param>
+ <param name="revision">4d262e79be1cd15c84cad55ad88c53a2d7712e85</param>
</service>
<service name="recompress" mode="disabled">
<param name="file">*.tar</param>
++++++ _servicedata ++++++
--- /var/tmp/diff_new_pack.SZsVSB/_old 2025-03-24 13:25:10.854120670 +0100
+++ /var/tmp/diff_new_pack.SZsVSB/_new 2025-03-24 13:25:10.858120836 +0100
@@ -1,6 +1,6 @@
<servicedata>
<service name="tar_scm">
<param
name="url">https://gitlab.com/redhat-crypto/fedora-crypto-policies.git</param>
- <param
name="changesrevision">570ea89092555c6c289f226bb48c2d8c1f332b0f</param></service></servicedata>
+ <param
name="changesrevision">4d262e79be1cd15c84cad55ad88c53a2d7712e85</param></service></servicedata>
(No newline at EOF)
++++++ crypto-policies-Allow-sshd-in-FIPS-mode-using-DEFAULT.patch ++++++
diff -PpuriN fedora-crypto-policies-20250124.4d262e7-orig/policies/DEFAULT.pol
fedora-crypto-policies-20250124.4d262e7/policies/DEFAULT.pol
--- fedora-crypto-policies-20250124.4d262e7-orig/policies/DEFAULT.pol
2025-01-24 18:31:31.000000000 +0100
+++ fedora-crypto-policies-20250124.4d262e7/policies/DEFAULT.pol
2025-03-18 14:39:54.565216139 +0100
@@ -15,9 +15,11 @@
mac = AEAD HMAC-SHA2-256 HMAC-SHA1 UMAC-128 HMAC-SHA2-384 HMAC-SHA2-512
mac@Kerberos = HMAC-SHA2-384 HMAC-SHA2-256 AEAD UMAC-128 HMAC-SHA2-512
HMAC-SHA1
+mac@SSH = AEAD HMAC-SHA2-256 HMAC-SHA1 HMAC-SHA2-384 HMAC-SHA2-512
group = X25519 SECP256R1 X448 SECP521R1 SECP384R1 \
FFDHE-2048 FFDHE-3072 FFDHE-4096 FFDHE-6144 FFDHE-8192
+group@SSH = -X25519
hash = SHA2-256 SHA2-384 SHA2-512 SHA3-256 SHA3-384 SHA3-512 SHA2-224 SHA3-224
\
SHAKE-256
@@ -53,7 +55,8 @@ cipher@RPM = AES-256-CFB AES-128-CFB CAM
# CBC ciphers in SSH are considered vulnerable to plaintext recovery attacks
# and disabled in client OpenSSH 7.6 (2017) and server OpenSSH 6.7 (2014).
-cipher@SSH = -*-CBC
+# disable also chachapoly, as we might run DEFAULT in FIPS mode too.
+cipher@SSH = AES-256-GCM AES-256-CCM CAMELLIA-256-GCM AES-256-CTR AES-128-GCM
AES-128-CCM CAMELLIA-128-GCM AES-128-CTR
# 'RSA' is intentionally before DHE ciphersuites, as the DHE ciphersuites have
# interoperability issues in TLS.
diff -PpuriN
fedora-crypto-policies-20250124.4d262e7-orig/tests/outputs/DEFAULT-opensshserver.txt
fedora-crypto-policies-20250124.4d262e7/tests/outputs/DEFAULT-opensshserver.txt
---
fedora-crypto-policies-20250124.4d262e7-orig/tests/outputs/DEFAULT-opensshserver.txt
2025-01-24 18:31:31.000000000 +0100
+++
fedora-crypto-policies-20250124.4d262e7/tests/outputs/DEFAULT-opensshserver.txt
2025-03-18 14:40:54.831266197 +0100
@@ -1,5 +1,5 @@
-Ciphers
[email protected],[email protected],aes256-ctr,[email protected],aes128-ctr
-MACs
[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha1,[email protected],hmac-sha2-512
+Ciphers [email protected],aes256-ctr,[email protected],aes128-ctr
+MACs
[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha1,hmac-sha2-512
GSSAPIKexAlgorithms
gss-curve25519-sha256-,gss-nistp256-sha256-,gss-group14-sha256-,gss-group16-sha512-
KexAlgorithms
curve25519-sha256,[email protected],ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512
HostKeyAlgorithms
ecdsa-sha2-nistp256,[email protected],[email protected],[email protected],ecdsa-sha2-nistp384,[email protected],ecdsa-sha2-nistp521,[email protected],ssh-ed25519,[email protected],[email protected],[email protected],rsa-sha2-256,[email protected],rsa-sha2-512,[email protected]
diff -PpuriN
fedora-crypto-policies-20250124.4d262e7-orig/tests/outputs/DEFAULT-openssh.txt
fedora-crypto-policies-20250124.4d262e7/tests/outputs/DEFAULT-openssh.txt
---
fedora-crypto-policies-20250124.4d262e7-orig/tests/outputs/DEFAULT-openssh.txt
2025-01-24 18:31:31.000000000 +0100
+++ fedora-crypto-policies-20250124.4d262e7/tests/outputs/DEFAULT-openssh.txt
2025-03-18 15:41:32.234673018 +0100
@@ -1,7 +1,8 @@
-Ciphers
[email protected],[email protected],aes256-ctr,[email protected],aes128-ctr
-MACs
[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha1,[email protected],hmac-sha2-512
+Ciphers [email protected],aes256-ctr,[email protected],aes128-ctr
+MACs
[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha1,hmac-sha2-512
GSSAPIKexAlgorithms
gss-curve25519-sha256-,gss-nistp256-sha256-,gss-group14-sha256-,gss-group16-sha512-
KexAlgorithms
curve25519-sha256,[email protected],ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512
+HostKeyAlgorithms
ecdsa-sha2-nistp256,[email protected],[email protected],[email protected],ecdsa-sha2-nistp384,[email protected],ecdsa-sha2-nistp521,[email protected],ssh-ed25519,[email protected],[email protected],[email protected],rsa-sha2-256,[email protected],rsa-sha2-512,[email protected]
PubkeyAcceptedAlgorithms
ecdsa-sha2-nistp256,[email protected],[email protected],[email protected],ecdsa-sha2-nistp384,[email protected],ecdsa-sha2-nistp521,[email protected],ssh-ed25519,[email protected],[email protected],[email protected],rsa-sha2-256,[email protected],rsa-sha2-512,[email protected]
HostbasedAcceptedAlgorithms
ecdsa-sha2-nistp256,[email protected],[email protected],[email protected],ecdsa-sha2-nistp384,[email protected],ecdsa-sha2-nistp521,[email protected],ssh-ed25519,[email protected],[email protected],[email protected],rsa-sha2-256,[email protected],rsa-sha2-512,[email protected]
CASignatureAlgorithms
ecdsa-sha2-nistp256,[email protected],ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,[email protected],rsa-sha2-256,rsa-sha2-512
++++++ crypto-policies-FIPS.patch ++++++
--- /var/tmp/diff_new_pack.SZsVSB/_old 2025-03-24 13:25:10.894122337 +0100
+++ /var/tmp/diff_new_pack.SZsVSB/_new 2025-03-24 13:25:10.898122503 +0100
@@ -1,7 +1,7 @@
-Index: fedora-crypto-policies-20230920.570ea89/fips-mode-setup
+Index: fedora-crypto-policies-20240201.9f501f3/fips-mode-setup
===================================================================
---- fedora-crypto-policies-20230920.570ea89.orig/fips-mode-setup
-+++ fedora-crypto-policies-20230920.570ea89/fips-mode-setup
+--- fedora-crypto-policies-20240201.9f501f3.orig/fips-mode-setup
++++ fedora-crypto-policies-20240201.9f501f3/fips-mode-setup
@@ -81,6 +81,19 @@ if [ "$(id -u)" != 0 ]; then
exit 1
fi
@@ -22,36 +22,48 @@
# Detect 1: kernel FIPS flag
fips_kernel_enabled=$(cat /proc/sys/crypto/fips_enabled)
-@@ -204,9 +217,22 @@ else
- fi
+@@ -167,10 +180,10 @@ if test $check = 1 ; then
fi
+ # Boot configuration
-if test "$boot_config" = 1 && test ! -x "$(command -v grubby)" ; then
-- echo "The grubby command is missing, please configure the bootloader
manually."
+- echo >&2 "The grubby command is missing, please configure the
bootloader manually."
- boot_config=0
+-fi
++# if test "$boot_config" = 1 && test ! -x "$(command -v grubby)" ; then
++# echo >&2 "The grubby command is missing, please configure the
bootloader manually."
++# boot_config=0
++# fi
+
+ if test "$boot_config" = 1 && test ! -d /boot ; then
+ echo >&2 "/boot directory is missing, FIPS mode cannot be $(enable2txt
$enable_fips)."
+@@ -236,20 +249,42 @@ if test "$boot_config" = 1 ; then
+ fi
+ fi
+
+if test "$boot_config" = 1 ; then
+ # Install required packages: patterns-base-fips and perl-Bootloader
+ if test ! -f /etc/dracut.conf.d/40-fips.conf && \
+ test ! -x "$(command -v pbl)" && \
+ test "$enable_fips" = 1; then
-+ zypper -n install patterns-base-fips perl-Bootloader
++ zypper -n install patterns-base-fips perl-Bootloader
+ elif test ! -f /etc/dracut.conf.d/40-fips.conf && \
+ test "$enable_fips" = 1 ; then
-+ zypper -n install patterns-base-fips
++ zypper -n install patterns-base-fips
+ elif test ! -x "$(command -v pbl)" ; then
-+ zypper -n install perl-Bootloader
++ zypper -n install perl-Bootloader
+ fi
+ if test $? != 0 ; then
-+ echo "The pbl command or the fips pattern are missing, please
configure the bootloader manually."
-+ boot_config=0
++ echo "The pbl command or the fips pattern are missing, please
configure the bootloader manually."
++ boot_config=0
+ fi
- fi
-
++fi
++
echo "FIPS mode will be $(enable2txt $enable_fips)."
-@@ -217,15 +243,19 @@ if test $boot_config = 0 ; then
- echo "Now you need to configure the bootloader to add kernel options
\"$fipsopts\""
- echo "and reboot the system for the setting to take effect."
- else
+
+ fipsopts="fips=$enable_fips$boot_device_opt"
+
+ if test "$boot_config" = 1 ; then
- grubby --update-kernel=ALL --args="$fipsopts"
- if test x"$(uname -m)" = xs390x; then
- if command -v zipl >/dev/null; then
@@ -62,7 +74,7 @@
- fi
- fi
+ pbl --add-option "$fipsopts"
-+ grub2-mkconfig -o /boot/grub2/grub.cfg && dracut -f --regenerate-all
++ pbl --config; pbl --install && dracut -f --regenerate-all
+
+ # grubby --update-kernel=ALL --args="$fipsopts"
+ # if test x"$(uname -m)" = xs390x; then
@@ -75,12 +87,12 @@
+ # fi
+
echo "Please reboot the system for the setting to take effect."
- fi
-
-Index: fedora-crypto-policies-20230920.570ea89/fips-finish-install
+ else
+ echo "Now you need to configure the bootloader to add kernel options
\"$fipsopts\""
+Index: fedora-crypto-policies-20240201.9f501f3/fips-finish-install
===================================================================
---- fedora-crypto-policies-20230920.570ea89.orig/fips-finish-install
-+++ fedora-crypto-policies-20230920.570ea89/fips-finish-install
+--- fedora-crypto-policies-20240201.9f501f3.orig/fips-finish-install
++++ fedora-crypto-policies-20240201.9f501f3/fips-finish-install
@@ -24,6 +24,15 @@ fi
umask 022
@@ -151,10 +163,10 @@
+# echo '`zipl` execution has been skipped: `zipl` not found.'
+# fi
+# fi
-Index: fedora-crypto-policies-20230920.570ea89/fips-mode-setup.8.txt
+Index: fedora-crypto-policies-20240201.9f501f3/fips-mode-setup.8.txt
===================================================================
---- fedora-crypto-policies-20230920.570ea89.orig/fips-mode-setup.8.txt
-+++ fedora-crypto-policies-20230920.570ea89/fips-mode-setup.8.txt
+--- fedora-crypto-policies-20240201.9f501f3.orig/fips-mode-setup.8.txt
++++ fedora-crypto-policies-20240201.9f501f3/fips-mode-setup.8.txt
@@ -45,6 +45,23 @@ Then the command modifies the boot loade
When disabling the system FIPS mode the system crypto policy is switched
to DEFAULT and the kernel command line option 'fips=0' is set.
@@ -179,4 +191,130 @@
[[options]]
OPTIONS
+Index: fedora-crypto-policies-20240201.9f501f3/fips-mode-setup
+===================================================================
+--- fedora-crypto-policies-20240201.9f501f3.orig/fips-mode-setup
++++ fedora-crypto-policies-20240201.9f501f3/fips-mode-setup
+@@ -8,7 +8,6 @@ check=0
+ boot_config=1
+ err_if_disabled=0
+ output_text=1
+-uki_file=/sys/firmware/efi/efivars/StubInfo-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f
+
+ is_ostree_system=0
+ if test -f /run/ostree-booted -o -d /ostree; then
+@@ -61,18 +60,13 @@ while test $# -ge 1 ; do
+ done
+
+ if test $usage = 1 -o x$enable_fips = x ; then
+- echo "Check, enable, or disable (unsupported) the system FIPS mode."
++ echo "Check, enable, or disable the system FIPS mode."
+ echo "usage: $0 --enable|--disable [--no-bootcfg]"
+ echo "usage: $0 --check"
+ echo "usage: $0 --is-enabled"
+ exit 2
+ fi
+
+-if test -e "$uki_file" && test "$FIPS_MODE_SETUP_SKIP_UKI_CHECK" != 1; then
+- echo >&2 "UKI detected ($uki_file is present), forcing --no-bootcfg."
+- boot_config=0
+-fi
+-
+ # We don't handle the boot config on OSTree systems for now; it is assumed to
be
+ # handled at a higher level. E.g. in Fedora CoreOS and RHEL CoreOS, it is
+ # intrinsically tied to the firstboot procedure.
+@@ -186,12 +180,6 @@ if test $check = 1 ; then
+ exit 0
+ fi
+
+-# Boot configuration
+-# if test "$boot_config" = 1 && test ! -x "$(command -v grubby)" ; then
+-# echo >&2 "The grubby command is missing, please configure the
bootloader manually."
+-# boot_config=0
+-# fi
+-
+ if test "$boot_config" = 1 && test ! -d /boot ; then
+ echo >&2 "/boot directory is missing, FIPS mode cannot be $(enable2txt
$enable_fips)."
+ echo >&2 "If you want to configure the bootloader manually, re-run with
--no-bootcfg."
+@@ -204,39 +192,6 @@ if test "$boot_config" = 1 && test -z "$
+ exit 1
+ fi
+
+-if test "$FIPS_MODE_SETUP_SKIP_ARGON2_CHECK" != 1 && \
+- test -x "$(command -v cryptsetup)" ; then
+- # Best-effort detection of LUKS Argon2 usage
+- argon2_found=''
+- # two redundant ways to list device names
+- devs=$( (find /dev/mapper/ -type l -printf '%f\n'; \
+- dmsetup ls --target crypt | cut -f1) \
+- | sort -u)
+- while IFS= read -r devname; do
+- back=$(cryptsetup status "$devname" | \
+- grep -F device: |
+- sed -E 's/.*device:\s+//')
+- if ! test -b "$back"; then
+- echo >&2 -n "Warning: detected device '$back' "
+- echo >&2 -n 'is not a valid block device. '
+- echo >&2 'Cannot check whether it uses Argon2.'
+- continue
+- fi
+- dump=$(cryptsetup luksDump "$back")
+- if grep -qEi 'PBKDF:.*argon' <<<"$dump"; then
+- argon2_found+=" $back($devname)"
+- fi
+- done <<<"$devs"
+- if test -n "$argon2_found" ; then
+- echo >&2 -n "The following encrypted devices use Argon2 PBKDF:"
+- echo >&2 "$argon2_found"
+- echo >&2 'Aborting fips-mode-setup because of that.'
+- echo >&2 -n 'Please refer to the '
+- echo >&2 'cryptsetup-luksConvertKey(8) manpage.'
+- exit 76
+- fi
+-fi
+-
+ if test "$FIPS_MODE_SETUP_SKIP_WARNING" != 1 ; then
+ if test $enable_fips = 1 ; then
+ echo >&2
"*****************************************************************"
+@@ -244,15 +199,13 @@ if test "$FIPS_MODE_SETUP_SKIP_WARNING"
+ echo >&2 "*
*"
+ echo >&2 "* ENABLING FIPS MODE AFTER THE INSTALLATION IS NOT
RECOMMENDED. *"
+ echo >&2 "* THIS OPERATION CANNOT BE UNDONE.
*"
+- echo >&2 "* REINSTALL WITH fips=1 INSTEAD.
*"
+ echo >&2
"*****************************************************************"
+ elif test $enable_fips = 0 ; then
+ echo >&2
"*****************************************************************"
+ echo >&2 "* PRESS CONTROL-C WITHIN 15 SECONDS TO ABORT...
*"
+ echo >&2 "*
*"
+- echo >&2 "* DISABLING FIPS MODE AFTER THE INSTALLATION IS NOT
SUPPORTED. *"
++ echo >&2 "* DISABLING FIPS MODE AFTER THE INSTALLATION IS NOT
RECOMMENDED.*"
+ echo >&2 "* THIS OPERATION CANNOT BE UNDONE.
*"
+- echo >&2 "* WIPE ALL MEDIA AND REINSTALL WITHOUT fips=1
INSTEAD. *"
+ echo >&2
"*****************************************************************"
+ fi
+ for i in {15..1}; do
+@@ -339,21 +292,10 @@ fipsopts="fips=$enable_fips$boot_device_
+ if test "$boot_config" = 1 ; then
+ pbl --add-option "$fipsopts"
+ pbl --config; pbl --install && dracut -f --regenerate-all
+-
+- # grubby --update-kernel=ALL --args="$fipsopts"
+- # if test x"$(uname -m)" = xs390x; then
+- # if command -v zipl >/dev/null; then
+- # zipl
+- # else
+- # echo -n '`zipl` execution has been skipped: '
+- # echo '`zipl` not found.'
+- # fi
+- # fi
+-
+- echo "Please reboot the system for the setting to take effect."
++ echo "Please reboot the system for the settings to take effect."
+ else
+ echo "Now you need to configure the bootloader to add kernel options
\"$fipsopts\""
+- echo "and reboot the system for the setting to take effect."
++ echo "and reboot the system for the settings to take effect."
+ fi
+
+ exit 0
++++++ crypto-policies-enable-SHA1-sigver-in-DEFAULT.patch ++++++
diff -PpuriN fedora-crypto-policies-orig/policies/DEFAULT.pol
fedora-crypto-policies-20250124.4d262e7/policies/DEFAULT.pol
--- fedora-crypto-policies-orig/policies/DEFAULT.pol 2025-01-24
18:31:31.000000000 +0100
+++ fedora-crypto-policies-20250124.4d262e7/policies/DEFAULT.pol
2025-03-11 14:09:01.796831654 +0100
@@ -1,7 +1,6 @@
# A reasonable default for today's standards. It should provide
# 112-bit security with the exception of SHA1 signatures in DNSSec.
# SHA1 is allowed in HMAC where collision attacks do not matter.
-# OpenSSL distrusts signatures using SHA-1 (Changes/OpenSSLDistrustSHA1SigVer).
# MACs: all HMAC with SHA1 or better + all modern MACs (Poly1305 etc)
# Curves: all prime >= 255 bits (including Bernstein curves)
@@ -88,6 +87,3 @@ etm@SSH = ANY
sign@RPM = DSA-SHA1+
hash@RPM = SHA1+
min_dsa_size@RPM = 1024
-
-# https://fedoraproject.org/wiki/Changes/OpenSSLDistrustSHA1SigVer
-__openssl_block_sha1_signatures = 1
diff -PpuriN fedora-crypto-policies-orig/tests/alternative-policies/DEFAULT.pol
fedora-crypto-policies-20250124.4d262e7/tests/alternative-policies/DEFAULT.pol
--- fedora-crypto-policies-orig/tests/alternative-policies/DEFAULT.pol
2025-01-24 18:31:31.000000000 +0100
+++
fedora-crypto-policies-20250124.4d262e7/tests/alternative-policies/DEFAULT.pol
2025-03-11 13:53:52.231005482 +0100
@@ -91,6 +91,3 @@ ssh_etm = 1
sign@rpm-sequoia = DSA-SHA1+
hash@rpm-sequoia = SHA1+
min_dsa_size@rpm-sequoia = 1024
-
-# https://fedoraproject.org/wiki/Changes/OpenSSLDistrustSHA1SigVer
-__openssl_block_sha1_signatures = 1
diff -PpuriN
fedora-crypto-policies-orig/tests/outputs/DEFAULT:GOST-opensslcnf.txt
fedora-crypto-policies-20250124.4d262e7/tests/outputs/DEFAULT:GOST-opensslcnf.txt
--- fedora-crypto-policies-orig/tests/outputs/DEFAULT:GOST-opensslcnf.txt
2025-01-24 18:31:31.000000000 +0100
+++
fedora-crypto-policies-20250124.4d262e7/tests/outputs/DEFAULT:GOST-opensslcnf.txt
2025-03-11 14:10:14.134767876 +0100
@@ -11,4 +11,4 @@ Groups = X25519:secp256r1:X448:secp521r1
alg_section = evp_properties
[evp_properties]
-rh-allow-sha1-signatures = no
+rh-allow-sha1-signatures = yes
diff -PpuriN fedora-crypto-policies-orig/tests/outputs/DEFAULT-opensslcnf.txt
fedora-crypto-policies-20250124.4d262e7/tests/outputs/DEFAULT-opensslcnf.txt
--- fedora-crypto-policies-orig/tests/outputs/DEFAULT-opensslcnf.txt
2025-01-24 18:31:31.000000000 +0100
+++
fedora-crypto-policies-20250124.4d262e7/tests/outputs/DEFAULT-opensslcnf.txt
2025-03-11 14:09:55.798784042 +0100
@@ -11,4 +11,4 @@ Groups = X25519:secp256r1:X448:secp521r1
alg_section = evp_properties
[evp_properties]
-rh-allow-sha1-signatures = no
+rh-allow-sha1-signatures = yes
diff -PpuriN
fedora-crypto-policies-orig/tests/outputs/DEFAULT:TEST-PQ-opensslcnf.txt
fedora-crypto-policies-20250124.4d262e7/tests/outputs/DEFAULT:TEST-PQ-opensslcnf.txt
--- fedora-crypto-policies-orig/tests/outputs/DEFAULT:TEST-PQ-opensslcnf.txt
2025-01-24 18:31:31.000000000 +0100
+++
fedora-crypto-policies-20250124.4d262e7/tests/outputs/DEFAULT:TEST-PQ-opensslcnf.txt
2025-03-11 14:10:42.542742833 +0100
@@ -11,4 +11,4 @@ Groups = ?x25519_kyber768:?p256_kyber768
alg_section = evp_properties
[evp_properties]
-rh-allow-sha1-signatures = no
+rh-allow-sha1-signatures = yes
++++++ crypto-policies-no-build-manpages.patch ++++++
--- /var/tmp/diff_new_pack.SZsVSB/_old 2025-03-24 13:25:10.930123837 +0100
+++ /var/tmp/diff_new_pack.SZsVSB/_new 2025-03-24 13:25:10.934124003 +0100
@@ -1,21 +1,21 @@
-Index: fedora-crypto-policies-20230420.3d08ae7/Makefile
+Index: fedora-crypto-policies-20250124.4d262e7/Makefile
===================================================================
---- fedora-crypto-policies-20230420.3d08ae7.orig/Makefile
-+++ fedora-crypto-policies-20230420.3d08ae7/Makefile
-@@ -28,9 +28,9 @@ install: $(MANPAGES)
- mkdir -p $(DESTDIR)$(MANDIR)/man7
- mkdir -p $(DESTDIR)$(MANDIR)/man8
+--- fedora-crypto-policies-20250124.4d262e7.orig/Makefile
++++ fedora-crypto-policies-20250124.4d262e7/Makefile
+@@ -34,9 +34,9 @@ install: $(MANPAGES)
mkdir -p $(DESTDIR)$(BINDIR)
+ mkdir -p $(DESTDIR)$(LIBEXECDIR)
+ mkdir -p $(DESTDIR)$(UNITDIR)
- install -p -m 644 $(MAN7PAGES) $(DESTDIR)$(MANDIR)/man7
- install -p -m 644 $(MAN8PAGES) $(DESTDIR)$(MANDIR)/man8
- install -p -m 755 $(SCRIPTS) $(DESTDIR)$(BINDIR)
+ # install -p -m 644 $(MAN7PAGES) $(DESTDIR)$(MANDIR)/man7
+ # install -p -m 644 $(MAN8PAGES) $(DESTDIR)$(MANDIR)/man8
+ # install -p -m 755 $(SCRIPTS) $(DESTDIR)$(BINDIR)
+ install -p -m 644 $(UNITS) $(DESTDIR)$(UNITDIR)
+ install -p -m 755 $(LIBEXEC_SCRIPTS) $(DESTDIR)$(LIBEXECDIR)
mkdir -p $(DESTDIR)$(DIR)/
- install -p -m 644 default-config $(DESTDIR)$(DIR)
- install -p -m 644 output/reload-cmds.sh $(DESTDIR)$(DIR)
-@@ -114,8 +114,8 @@ clean:
+@@ -133,8 +133,8 @@ clean:
rm -rf output
%: %.txt
++++++ crypto-policies-nss.patch ++++++
--- /var/tmp/diff_new_pack.SZsVSB/_old 2025-03-24 13:25:10.950124669 +0100
+++ /var/tmp/diff_new_pack.SZsVSB/_new 2025-03-24 13:25:10.958125003 +0100
@@ -1,8 +1,8 @@
-Index: fedora-crypto-policies-20230920.570ea89/python/policygenerators/nss.py
+Index: fedora-crypto-policies-20250124.4d262e7/python/policygenerators/nss.py
===================================================================
---- fedora-crypto-policies-20230920.570ea89.orig/python/policygenerators/nss.py
-+++ fedora-crypto-policies-20230920.570ea89/python/policygenerators/nss.py
-@@ -198,12 +198,20 @@ class NSSGenerator(ConfigGenerator):
+--- fedora-crypto-policies-20250124.4d262e7.orig/python/policygenerators/nss.py
++++ fedora-crypto-policies-20250124.4d262e7/python/policygenerators/nss.py
+@@ -422,12 +422,20 @@ class NSSGenerator(ConfigGenerator):
try:
with os.fdopen(fd, 'w') as f:
f.write(config)
@@ -29,7 +29,7 @@
finally:
os.unlink(path)
-@@ -211,6 +219,10 @@ class NSSGenerator(ConfigGenerator):
+@@ -435,6 +443,10 @@ class NSSGenerator(ConfigGenerator):
cls.eprint("There is a warning in NSS generated policy")
cls.eprint(f'Policy:\n{config}')
return False
@@ -37,7 +37,7 @@
+ cls.eprint('Skipping NSS policy check: '
+ '/usr/bin/nss-policy-check not found')
+ return True
- elif ret:
+ if ret:
cls.eprint("There is an error in NSS generated policy")
cls.eprint(f'Policy:\n{config}')
++++++ crypto-policies-policygenerators.patch ++++++
--- /var/tmp/diff_new_pack.SZsVSB/_old 2025-03-24 13:25:10.974125670 +0100
+++ /var/tmp/diff_new_pack.SZsVSB/_new 2025-03-24 13:25:10.978125836 +0100
@@ -1,44 +1,41 @@
-Index:
fedora-crypto-policies-20230920.570ea89/python/policygenerators/__init__.py
+Index:
fedora-crypto-policies-20250124.4d262e7/python/policygenerators/__init__.py
===================================================================
----
fedora-crypto-policies-20230920.570ea89.orig/python/policygenerators/__init__.py
-+++ fedora-crypto-policies-20230920.570ea89/python/policygenerators/__init__.py
-@@ -8,7 +8,7 @@ from .gnutls import GnuTLSGenerator
+---
fedora-crypto-policies-20250124.4d262e7.orig/python/policygenerators/__init__.py
++++ fedora-crypto-policies-20250124.4d262e7/python/policygenerators/__init__.py
+@@ -7,7 +7,7 @@ from .bind import BindGenerator
+ from .gnutls import GnuTLSGenerator
from .java import JavaGenerator
- from .java import JavaSystemGenerator
from .krb5 import KRB5Generator
-from .libreswan import LibreswanGenerator
+# from .libreswan import LibreswanGenerator
from .libssh import LibsshGenerator
from .nss import NSSGenerator
- from .openssh import OpenSSHClientGenerator
-@@ -16,8 +16,8 @@ from .openssh import OpenSSHServerGenera
- from .openssl import OpenSSLConfigGenerator
- from .openssl import OpenSSLGenerator
- from .openssl import OpenSSLFIPSGenerator
--from .sequoia import SequoiaGenerator
--from .sequoia import RPMSequoiaGenerator
-+# from .sequoia import SequoiaGenerator
-+# from .sequoia import RPMSequoiaGenerator
+ from .openssh import OpenSSHClientGenerator, OpenSSHServerGenerator
+@@ -16,14 +16,13 @@ from .openssl import (
+ OpenSSLFIPSGenerator,
+ OpenSSLGenerator,
+ )
+-from .sequoia import RPMSequoiaGenerator, SequoiaGenerator
++#from .sequoia import RPMSequoiaGenerator, SequoiaGenerator
__all__ = [
'BindGenerator',
-@@ -25,7 +25,6 @@ __all__ = [
+ 'GnuTLSGenerator',
'JavaGenerator',
- 'JavaSystemGenerator',
'KRB5Generator',
- 'LibreswanGenerator',
'LibsshGenerator',
'NSSGenerator',
'OpenSSHClientGenerator',
-@@ -33,6 +32,8 @@ __all__ = [
+@@ -31,6 +30,8 @@ __all__ = [
'OpenSSLConfigGenerator',
- 'OpenSSLGenerator',
'OpenSSLFIPSGenerator',
-- 'SequoiaGenerator',
+ 'OpenSSLGenerator',
- 'RPMSequoiaGenerator',
+- 'SequoiaGenerator',
]
+
-+# 'LibreswanGenerator',
-+# 'SequoiaGenerator',
-+# 'RPMSequoiaGenerator',
++ # 'LibreswanGenerator',
++ # 'RPMSequoiaGenerator',
++ # 'SequoiaGenerator',
++++++ crypto-policies-supported.patch ++++++
--- /var/tmp/diff_new_pack.SZsVSB/_old 2025-03-24 13:25:11.014127337 +0100
+++ /var/tmp/diff_new_pack.SZsVSB/_new 2025-03-24 13:25:11.018127503 +0100
@@ -13,25 +13,25 @@
+* OpenSSL library (OpenSSL, SSL, TLS) (Supported)
-* NSS library (NSS, SSL, TLS)
-+* NSS library (NSS, SSL, TLS) (Not supported)
++* NSS library (NSS, SSL, TLS) (Supported)
-* OpenJDK (java-tls, SSL, TLS)
+* OpenJDK (java-tls, SSL, TLS) (Supported)
-* Libkrb5 (krb5, kerberos)
-+* Libkrb5 (krb5, kerberos) (Not supported)
++* Libkrb5 (krb5, kerberos) (Supported)
-* BIND (BIND, DNSSec)
-+* BIND (BIND, DNSSec) (Not supported)
++* BIND (BIND, DNSSec) (Supported)
-* OpenSSH (OpenSSH, SSH)
-+* OpenSSH (OpenSSH, SSH) (Not supported)
++* OpenSSH (OpenSSH, SSH) (Supported)
-* Libreswan (libreswan, IKE, IPSec)
-+* Libreswan (libreswan, IKE, IPSec) (Not supported)
++* Libreswan (libreswan, IKE, IPSec) (Not supported as its not available in
SLE/openSUSE)
-* libssh (libssh, SSH)
-+* libssh (libssh, SSH) (Not supported)
++* libssh (libssh, SSH) (Supported)
Applications and languages which rely on any of these back-ends will follow
the system policies as well. Examples are apache httpd, nginx, php, and
++++++ crypto-policies.7.gz ++++++
--- /var/tmp/diff_new_pack.SZsVSB/_old 2025-03-24 13:25:11.050128837 +0100
+++ /var/tmp/diff_new_pack.SZsVSB/_new 2025-03-24 13:25:11.058129170 +0100
@@ -2,12 +2,12 @@
.\" Title: crypto-policies
.\" Author: [see the "AUTHOR" section]
.\" Generator: DocBook XSL Stylesheets vsnapshot <http://docbook.sf.net/>
-.\" Date: 09/22/2023
+.\" Date: 02/07/2025
.\" Manual: \ \&
.\" Source: crypto-policies
.\" Language: English
.\"
-.TH "CRYPTO\-POLICIES" "7" "09/22/2023" "crypto\-policies" "\ \&"
+.TH "CRYPTO\-POLICIES" "7" "02/07/2025" "crypto\-policies" "\ \&"
.\" -----------------------------------------------------------------
.\" * Define some portability stuff
.\" -----------------------------------------------------------------
@@ -131,9 +131,21 @@
.\}
\fBNSS\fR
TLS library (scopes:
-\fBNSS\fR,
+\fBNSS\fR; specific algorithm usage purposes are also affected by
\fBSSL\fR,
-\fBTLS\fR)
+\fBTLS\fR,
+\fBpkcs12\fR,
+\fBpkcs12\-import\fR,
+\fBsmime\fR,
+\fBsmime\-import\fR
+scopes, and internal use
+\fBnss\-tls\fR,
+\fBnss\-pkcs12\fR,
+\fBnss\-pkcs12\-import\fR,
+\fBnss\-smime\fR
+and
+\fBnss\-smime\-import\fR
+scopes\&.)
.RE
.sp
.RS 4
@@ -1170,6 +1182,21 @@
.sp -1
.IP \(bu 2.3
.\}
+\fBmin_ec_size\fR: Integer value of minimum number of bits for
+\fBEC\fR
+keys (Applies to
+\fBJava\fR
+back end only)
+.RE
+.sp
+.RS 4
+.ie n \{\
+\h'-04'\(bu\h'+03'\c
+.\}
+.el \{\
+.sp -1
+.IP \(bu 2.3
+.\}
\fBsha1_in_certs\fR: Value of 1 if
\fBSHA1\fR
allowed in certificate signatures, 0 otherwise (Applies to
@@ -1211,9 +1238,11 @@
.sp -1
.IP \(bu 2.3
.\}
-\fBssh_etm\fR: Value of 1 if
-\fBOpenSSH\fR
-EtM (encrypt\-then\-mac) extension is allowed, 0 otherwise
+\fBetm\fR:
+\fBANY\fR/\fBDISABLE_ETM\fR/\fBDISABLE_NON_ETM\fR
+allows both EtM (Encrypt\-then\-Mac) and E&M (Encrypt\-and\-Mac), disables
EtM, and disables E&M respectively\&. (Currently only implemented for SSH, do
not use without
+\fB@SSH\fR
+scope\&.)
.RE
.sp
Full policy definition files have suffix \&.pol, subpolicy files have suffix
\&.pmod\&. Subpolicies do not have to have values set for all the keys listed
above\&.
@@ -1655,6 +1684,30 @@
\fBgroup\fR
values is ignored and built\-in order is used instead\&.
.RE
+.sp
+.RS 4
+.ie n \{\
+\h'-04'\(bu\h'+03'\c
+.\}
+.el \{\
+.sp -1
+.IP \(bu 2.3
+.\}
+\fBNSS\fR: currently is the only one respecting the
+\fBpkcs12\fR
+/
+\fBpkcs12\-import\fR
+scopes\&.
+\fBpkcs12\fR
+implies
+\fBpkcs12\-import\fR, it\(cqs not possible to allow exporting without allowing
importing\&. The same applies to
+\fBsmime\fR
+/
+\fBsmime\-import\fR
+scopes, and their
+\fBnss\-\fR
+prefixed internal\-use variants\&. These scopes cannot be used for enabling
signature algorithms that weren\(cqt otherwise enabled\&.
+.RE
.SH "HISTORY"
.sp
The \fBECDHE\-GSS\fR and \fBDHE\-GSS\fR algorithms are newly introduced and
must be specified in the base policy for the SSH GSSAPI key exchange methods to
be enabled\&. Previously the legacy SSH GSSAPI key exchange methods were
automatically enabled when the \fBSHA1\fR hash and \fBDH\fR parameters of at
least 2048 bits were enabled\&.
@@ -1763,6 +1816,21 @@
\fBhash@DNSSec\fR,
\fBsign@DNSSec\fR)\&.
.RE
+.sp
+.RS 4
+.ie n \{\
+\h'-04'\(bu\h'+03'\c
+.\}
+.el \{\
+.sp -1
+.IP \(bu 2.3
+.\}
+\fBssh_etm\fR: Value of 1 if
+\fBOpenSSH\fR
+EtM (encrypt\-then\-mac) extension is allowed, 0 otherwise\&. Use
+\fBetm@SSH\fR
+instead\&.
+.RE
.SH "FILES"
.PP
/etc/crypto\-policies/back\-ends
++++++ fedora-crypto-policies-20230920.570ea89.tar.gz ->
fedora-crypto-policies-20250124.4d262e7.tar.gz ++++++
++++ 7975 lines of diff (skipped)
++++++ fips-finish-install.8.gz ++++++
--- /var/tmp/diff_new_pack.SZsVSB/_old 2025-03-24 13:25:11.290138837 +0100
+++ /var/tmp/diff_new_pack.SZsVSB/_new 2025-03-24 13:25:11.310139671 +0100
@@ -2,12 +2,12 @@
.\" Title: fips-finish-install
.\" Author: [see the "AUTHOR" section]
.\" Generator: DocBook XSL Stylesheets vsnapshot <http://docbook.sf.net/>
-.\" Date: 09/22/2023
+.\" Date: 02/07/2025
.\" Manual: \ \&
.\" Source: fips-finish-install
.\" Language: English
.\"
-.TH "FIPS\-FINISH\-INSTAL" "8" "09/22/2023" "fips\-finish\-install" "\ \&"
+.TH "FIPS\-FINISH\-INSTAL" "8" "02/07/2025" "fips\-finish\-install" "\ \&"
.\" -----------------------------------------------------------------
.\" * Define some portability stuff
.\" -----------------------------------------------------------------
++++++ fips-mode-setup.8.gz ++++++
--- /var/tmp/diff_new_pack.SZsVSB/_old 2025-03-24 13:25:11.334140671 +0100
+++ /var/tmp/diff_new_pack.SZsVSB/_new 2025-03-24 13:25:11.350141337 +0100
@@ -2,12 +2,12 @@
.\" Title: fips-mode-setup
.\" Author: [see the "AUTHOR" section]
.\" Generator: DocBook XSL Stylesheets vsnapshot <http://docbook.sf.net/>
-.\" Date: 09/22/2023
+.\" Date: 02/07/2025
.\" Manual: \ \&
.\" Source: fips-mode-setup
.\" Language: English
.\"
-.TH "FIPS\-MODE\-SETUP" "8" "09/22/2023" "fips\-mode\-setup" "\ \&"
+.TH "FIPS\-MODE\-SETUP" "8" "02/07/2025" "fips\-mode\-setup" "\ \&"
.\" -----------------------------------------------------------------
.\" * Define some portability stuff
.\" -----------------------------------------------------------------
++++++ update-crypto-policies.8.gz ++++++
--- /var/tmp/diff_new_pack.SZsVSB/_old 2025-03-24 13:25:11.382142670 +0100
+++ /var/tmp/diff_new_pack.SZsVSB/_new 2025-03-24 13:25:11.394143171 +0100
@@ -2,12 +2,12 @@
.\" Title: update-crypto-policies
.\" Author: [see the "AUTHOR" section]
.\" Generator: DocBook XSL Stylesheets vsnapshot <http://docbook.sf.net/>
-.\" Date: 09/22/2023
+.\" Date: 02/07/2025
.\" Manual: \ \&
.\" Source: update-crypto-policies
.\" Language: English
.\"
-.TH "UPDATE\-CRYPTO\-POLI" "8" "09/22/2023" "update\-crypto\-policies" "\ \&"
+.TH "UPDATE\-CRYPTO\-POLI" "8" "02/07/2025" "update\-crypto\-policies" "\ \&"
.\" -----------------------------------------------------------------
.\" * Define some portability stuff
.\" -----------------------------------------------------------------
@@ -74,7 +74,7 @@
.sp -1
.IP \(bu 2.3
.\}
-NSS library (NSS, SSL, TLS) (Not supported)
+NSS library (NSS, SSL, TLS) (Supported)
.RE
.sp
.RS 4
@@ -96,7 +96,7 @@
.sp -1
.IP \(bu 2.3
.\}
-Libkrb5 (krb5, kerberos) (Not supported)
+Libkrb5 (krb5, kerberos) (Supported)
.RE
.sp
.RS 4
@@ -107,7 +107,7 @@
.sp -1
.IP \(bu 2.3
.\}
-BIND (BIND, DNSSec) (Not supported)
+BIND (BIND, DNSSec) (Supported)
.RE
.sp
.RS 4
@@ -118,7 +118,7 @@
.sp -1
.IP \(bu 2.3
.\}
-OpenSSH (OpenSSH, SSH) (Not supported)
+OpenSSH (OpenSSH, SSH) (Supported)
.RE
.sp
.RS 4
@@ -140,7 +140,7 @@
.sp -1
.IP \(bu 2.3
.\}
-libssh (libssh, SSH) (Not supported)
+libssh (libssh, SSH) (Supported)
.RE
.sp
Applications and languages which rely on any of these back\-ends will follow
the system policies as well\&. Examples are apache httpd, nginx, php, and
others\&.