Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package crypto-policies for openSUSE:Factory 
checked in at 2023-10-02 20:03:59
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/crypto-policies (Old)
 and      /work/SRC/openSUSE:Factory/.crypto-policies.new.28202 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "crypto-policies"

Mon Oct  2 20:03:59 2023 rev:6 rq:1114288 version:20230920.570ea89

Changes:
--------
--- /work/SRC/openSUSE:Factory/crypto-policies/crypto-policies.changes  
2023-09-07 21:12:04.791887233 +0200
+++ 
/work/SRC/openSUSE:Factory/.crypto-policies.new.28202/crypto-policies.changes   
    2023-10-02 20:04:03.925623668 +0200
@@ -1,0 +2,36 @@
+Wed Sep 27 10:54:17 UTC 2023 - Pedro Monreal <[email protected]>
+
+- nss: Skip the NSS policy check if the mozilla-nss-tools package
+  is not installed. This avoids adding more dependencies in ring0.
+  * Add crypto-policies-nss.patch [bsc#1211301]
+
+-------------------------------------------------------------------
+Fri Sep 22 10:27:53 UTC 2023 -  Pedro Monreal <[email protected]>
+
+- Update to version 20230920.570ea89:
+  * fips-mode-setup: more thorough --disable, still unsupported
+  * FIPS:OSPP: tighten beyond reason for OSPP 4.3
+  * krb5: sort enctypes mac-first, cipher-second, prioritize SHA-2 ones
+  * openssl: implement relaxing EMS in FIPS (NO-ENFORCE-EMS)
+  * gnutls: prepare for tls-session-hash option coming
+  * nss: prepare for TLS-REQUIRE-EMS option coming
+  * NO-ENFORCE-EMS: add subpolicy
+  * FIPS: set __ems = ENFORCE
+  * cryptopolicies: add enums and __ems tri-state
+  * docs: replace `FIPS 140-2` with just `FIPS 140`
+  * .gitlab-ci: remove forcing OPENSSH_MIN_RSA_SIZE
+  * cryptopolicies: add comments on dunder options
+  * nss: retire NSS_OLD and replace with NSS_LAX 3.80 check
+  * BSI: start a BSI TR 02102 policy [jsc#PED-4933]
+  * Rebase patches:
+    - crypto-policies-policygenerators.patch
+    - crypto-policies-revert-rh-allow-sha1-signatures.patch
+    - crypto-policies-FIPS.patch
+
+-------------------------------------------------------------------
+Fri Sep 15 11:23:06 UTC 2023 - Pedro Monreal <[email protected]>
+
+- Conditionally recommend the crypto-policies-scripts package
+  when python is not installed in the system [bsc#1215201]
+
+-------------------------------------------------------------------
@@ -14 +50 @@
-  for transactional systems [jsc#PED-4578].
+  for transactional systems [jsc#PED-5041].

Old:
----
  BSI.pol
  fedora-crypto-policies-20230614.5f3458e.tar.gz

New:
----
  crypto-policies-nss.patch
  fedora-crypto-policies-20230920.570ea89.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ crypto-policies.spec ++++++
--- /var/tmp/diff_new_pack.J7X0d7/_old  2023-10-02 20:04:05.881694013 +0200
+++ /var/tmp/diff_new_pack.J7X0d7/_new  2023-10-02 20:04:05.885694157 +0200
@@ -22,7 +22,7 @@
 %bcond_with manbuild
 %global _python_bytecompile_extra 0
 Name:           crypto-policies
-Version:        20230614.5f3458e
+Version:        20230920.570ea89
 Release:        0
 Summary:        System-wide crypto policies
 License:        LGPL-2.1-or-later
@@ -35,8 +35,6 @@
 Source4:        fips-mode-setup.8.gz
 Source5:        fips-finish-install.8.gz
 Source6:        crypto-policies-rpmlintrc
-# BSI TR-02102 encoded for jsc#PED-4933 (customer request to have BSI TR-02102 
policies)
-Source7:        BSI.pol
 %if %{without manbuild}
 #PATCH-FIX-OPENSUSE Manpages build cycles and dependencies
 # To reduce the build dependencies in Ring0, we have to compile the
@@ -55,6 +53,8 @@
 Patch5:         crypto-policies-pylint.patch
 #PATCH-FIX-OPENSUSE Adpat the fips-mode-setup script for SUSE/openSUSE 
[jsc#PED-4578]
 Patch6:         crypto-policies-FIPS.patch
+#PATCH-FIX-OPENSUSE Skip NSS policy check if not installed mozilla-nss-tools 
[bsc#1211301]
+Patch7:         crypto-policies-nss.patch
 BuildRequires:  python3-base >= 3.6
 # The sequoia stuff needs python3-toml, removed until needed
 # BuildRequires:  python3-toml
@@ -69,7 +69,7 @@
 BuildRequires:  java-devel
 BuildRequires:  krb5-devel
 BuildRequires:  libxslt
-#BuildRequires:  mozilla-nss-tools
+BuildRequires:  mozilla-nss-tools
 BuildRequires:  openssl
 BuildRequires:  perl
 BuildRequires:  python3-coverage
@@ -82,7 +82,9 @@
 BuildRequires:  perl(File::Which)
 BuildRequires:  perl(File::pushd)
 %endif
+%if 0%{?primary_python:1}
 Recommends:     crypto-policies-scripts
+%endif
 Conflicts:      gnutls < 3.7.3
 #Conflicts:      libreswan < 3.28
 Conflicts:      nss < 3.90.0
@@ -138,9 +140,6 @@
 
 make DESTDIR=%{buildroot} DIR=%{_datarootdir}/crypto-policies 
MANDIR=%{_mandir} %{?_smp_mflags} install
 
-# BSI.pol
-install -c -m 644 %{SOURCE7} 
%{buildroot}/%{_datarootdir}/crypto-policies/policies/
-
 install -p -m 644 default-config 
%{buildroot}%{_sysconfdir}/crypto-policies/config
 touch %{buildroot}%{_sysconfdir}/crypto-policies/state/current
 touch %{buildroot}%{_sysconfdir}/crypto-policies/state/CURRENT.pol
@@ -166,7 +165,7 @@
 rm -rf %{buildroot}%{_datarootdir}/crypto-policies/*FEDORA*
 
 # Create back-end configs for mounting with read-only /etc/
-for d in LEGACY DEFAULT FUTURE FIPS ; do
+for d in LEGACY DEFAULT FUTURE FIPS BSI ; do
     mkdir -p -m 755 %{buildroot}%{_datarootdir}/crypto-policies/back-ends/$d
     for f in %{buildroot}%{_datarootdir}/crypto-policies/$d/* ; do
         ln $f 
%{buildroot}%{_datarootdir}/crypto-policies/back-ends/$d/$(basename $f 
.txt).config
@@ -241,6 +240,7 @@
 %ghost %config(missingok,noreplace) %verify(not mode) 
%{_sysconfdir}/crypto-policies/back-ends/gnutls.config
 %ghost %config(missingok,noreplace) %verify(not mode) 
%{_sysconfdir}/crypto-policies/back-ends/openssl.config
 %ghost %config(missingok,noreplace) %verify(not mode) 
%{_sysconfdir}/crypto-policies/back-ends/opensslcnf.config
+%ghost %config(missingok,noreplace) %verify(not mode) 
%{_sysconfdir}/crypto-policies/back-ends/openssl_fips.config
 %ghost %config(missingok,noreplace) %verify(not mode) 
%{_sysconfdir}/crypto-policies/back-ends/openssh.config
 %ghost %config(missingok,noreplace) %verify(not mode) 
%{_sysconfdir}/crypto-policies/back-ends/opensshserver.config
 %ghost %config(missingok,noreplace) %verify(not mode) 
%{_sysconfdir}/crypto-policies/back-ends/nss.config
@@ -262,6 +262,7 @@
 %{_datarootdir}/crypto-policies/DEFAULT
 %{_datarootdir}/crypto-policies/FUTURE
 %{_datarootdir}/crypto-policies/FIPS
+%{_datarootdir}/crypto-policies/BSI
 %{_datarootdir}/crypto-policies/EMPTY
 %{_datarootdir}/crypto-policies/back-ends
 %{_datarootdir}/crypto-policies/default-config

++++++ _service ++++++
--- /var/tmp/diff_new_pack.J7X0d7/_old  2023-10-02 20:04:05.921695452 +0200
+++ /var/tmp/diff_new_pack.J7X0d7/_new  2023-10-02 20:04:05.925695596 +0200
@@ -4,7 +4,7 @@
     <param name="scm">git</param>
     <param name="versionformat">%cd.%h</param>
     <param name="changesgenerate">enable</param>
-    <param name="revision">5f3458e619628288883f22695f3311f1ccd6a39f</param>
+    <param name="revision">570ea89092555c6c289f226bb48c2d8c1f332b0f</param>
   </service>
   <service name="recompress" mode="disabled">
     <param name="file">*.tar</param>

++++++ _servicedata ++++++
--- /var/tmp/diff_new_pack.J7X0d7/_old  2023-10-02 20:04:05.941696172 +0200
+++ /var/tmp/diff_new_pack.J7X0d7/_new  2023-10-02 20:04:05.945696315 +0200
@@ -1,6 +1,6 @@
 <servicedata>
 <service name="tar_scm">
                 <param 
name="url">https://gitlab.com/redhat-crypto/fedora-crypto-policies.git</param>
-              <param 
name="changesrevision">5f3458e619628288883f22695f3311f1ccd6a39f</param></service></servicedata>
+              <param 
name="changesrevision">570ea89092555c6c289f226bb48c2d8c1f332b0f</param></service></servicedata>
 (No newline at EOF)
 

++++++ crypto-policies-FIPS.patch ++++++
--- /var/tmp/diff_new_pack.J7X0d7/_old  2023-10-02 20:04:05.953696603 +0200
+++ /var/tmp/diff_new_pack.J7X0d7/_new  2023-10-02 20:04:05.957696747 +0200
@@ -1,7 +1,7 @@
-Index: fedora-crypto-policies-20230614.5f3458e/fips-mode-setup
+Index: fedora-crypto-policies-20230920.570ea89/fips-mode-setup
 ===================================================================
---- fedora-crypto-policies-20230614.5f3458e.orig/fips-mode-setup
-+++ fedora-crypto-policies-20230614.5f3458e/fips-mode-setup
+--- fedora-crypto-policies-20230920.570ea89.orig/fips-mode-setup
++++ fedora-crypto-policies-20230920.570ea89/fips-mode-setup
 @@ -81,6 +81,19 @@ if [ "$(id -u)" != 0 ]; then
        exit 1
  fi
@@ -22,7 +22,7 @@
  
  # Detect 1: kernel FIPS flag
  fips_kernel_enabled=$(cat /proc/sys/crypto/fips_enabled)
-@@ -203,9 +216,22 @@ else
+@@ -204,9 +217,22 @@ else
          fi
  fi
  
@@ -48,7 +48,7 @@
  fi
  
  echo "FIPS mode will be $(enable2txt $enable_fips)."
-@@ -216,15 +242,19 @@ if test $boot_config = 0 ; then
+@@ -217,15 +243,19 @@ if test $boot_config = 0 ; then
        echo "Now you need to configure the bootloader to add kernel options 
\"$fipsopts\""
        echo "and reboot the system for the setting to take effect."
  else
@@ -77,37 +77,40 @@
        echo "Please reboot the system for the setting to take effect."
  fi
  
-Index: fedora-crypto-policies-20230614.5f3458e/fips-finish-install
+Index: fedora-crypto-policies-20230920.570ea89/fips-finish-install
 ===================================================================
---- fedora-crypto-policies-20230614.5f3458e.orig/fips-finish-install
-+++ fedora-crypto-policies-20230614.5f3458e/fips-finish-install
-@@ -23,7 +23,16 @@ fi
+--- fedora-crypto-policies-20230920.570ea89.orig/fips-finish-install
++++ fedora-crypto-policies-20230920.570ea89/fips-finish-install
+@@ -24,6 +24,15 @@ fi
  
  umask 022
  
--trap "rm -f $dracut_cfg" ERR
-+# trap "rm -f $dracut_cfg" ERR
-+
 +# Install required packages: patterns-base-fips and perl-Bootloader
 +if test ! -f $dracut_cfg && test ! -x "$(command -v pbl)" ; then
-+      zypper -n install patterns-base-fips perl-Bootloader
++       zypper -n install patterns-base-fips perl-Bootloader
 +elif test ! -f $dracut_cfg ; then
-+      zypper -n install patterns-base-fips
++       zypper -n install patterns-base-fips
 +elif test ! -x "$(command -v pbl)" ; then
-+      zypper -n install perl-Bootloader
++       zypper -n install perl-Bootloader
 +fi
- 
++
  if test ! -d $dracut_cfg_d -o ! -d /boot -o "$is_ostree_system" = 1 ; then
        # No dracut configuration or boot directory present, do not try to 
modify it.
-@@ -32,23 +41,23 @@ if test ! -d $dracut_cfg_d -o ! -d /boot
+       # Also, on OSTree systems, we currently rely on the initrd already 
including
+@@ -31,28 +40,28 @@ if test ! -d $dracut_cfg_d -o ! -d /boot
        exit 0
  fi
  
--cat >$dracut_cfg <<EOF
+-if test x"$1" == x--complete; then
+-      trap "rm -f $dracut_cfg" ERR
+-      cat >$dracut_cfg <<EOF
 -# turn on fips module
 -
 -add_dracutmodules+=" fips "
 -EOF
+-elif test x"$1" == x--undo; then
+-      rm -f $dracut_cfg
+-fi
 -
 -echo "Kernel initramdisks are being regenerated. This might take some time."
 -
@@ -123,16 +126,21 @@
 -              echo '`zipl` execution has been skipped: `zipl` not found.'
 -      fi
 -fi
-+# cat >$dracut_cfg <<EOF
++# if test x"$1" == x--complete; then
++#     trap "rm -f $dracut_cfg" ERR
++#     cat >$dracut_cfg <<EOF
 +# # turn on fips module
-+#
++
 +# add_dracutmodules+=" fips "
 +# EOF
-+#
++# elif test x"$1" == x--undo; then
++#     rm -f $dracut_cfg
++# fi
++
 +# echo "Kernel initramdisks are being regenerated. This might take some time."
-+#
++
 +# dracut -f --regenerate-all
-+#
++
 +# # This is supposed to be a fast and safe operation that's always good to 
run.
 +# # Regenerating an initrd and skipping it might render the system unbootable
 +# # (RHBZ#2013195).
@@ -143,10 +151,10 @@
 +#             echo '`zipl` execution has been skipped: `zipl` not found.'
 +#     fi
 +# fi
-Index: fedora-crypto-policies-20230614.5f3458e/fips-mode-setup.8.txt
+Index: fedora-crypto-policies-20230920.570ea89/fips-mode-setup.8.txt
 ===================================================================
---- fedora-crypto-policies-20230614.5f3458e.orig/fips-mode-setup.8.txt
-+++ fedora-crypto-policies-20230614.5f3458e/fips-mode-setup.8.txt
+--- fedora-crypto-policies-20230920.570ea89.orig/fips-mode-setup.8.txt
++++ fedora-crypto-policies-20230920.570ea89/fips-mode-setup.8.txt
 @@ -45,6 +45,23 @@ Then the command modifies the boot loade
  When disabling the system FIPS mode the system crypto policy is switched
  to DEFAULT and the kernel command line option 'fips=0' is set.

++++++ crypto-policies-nss.patch ++++++
Index: fedora-crypto-policies-20230920.570ea89/python/policygenerators/nss.py
===================================================================
--- fedora-crypto-policies-20230920.570ea89.orig/python/policygenerators/nss.py
+++ fedora-crypto-policies-20230920.570ea89/python/policygenerators/nss.py
@@ -198,12 +198,20 @@ class NSSGenerator(ConfigGenerator):
         try:
             with os.fdopen(fd, 'w') as f:
                 f.write(config)
-            try:
-                ret = call(f'/usr/bin/nss-policy-check {options} {path}'
-                           '>/dev/null',
-                           shell=True)
-            except CalledProcessError:
-                cls.eprint("/usr/bin/nss-policy-check: Execution failed")
+            if os.path.exists('/usr/bin/nss-policy-check'):
+                # Perform a policy check only if the mozilla-nss-tools
+                # package is installed. This avoids adding more
+                # dependencies to Ring0.
+                try:
+                    ret = call(f'/usr/bin/nss-policy-check {options} {path}'
+                               '>/dev/null', shell=True)
+                except CalledProcessError:
+                    cls.eprint("/usr/bin/nss-policy-check: Execution failed")
+            else:
+                # The mozilla-nss-tools package is not installed and we can
+                # temporarily skip the policy check for mozilla-nss.
+                ret = 3
+
         finally:
             os.unlink(path)
 
@@ -211,6 +219,10 @@ class NSSGenerator(ConfigGenerator):
             cls.eprint("There is a warning in NSS generated policy")
             cls.eprint(f'Policy:\n{config}')
             return False
+        elif ret == 3:
+            cls.eprint('Skipping NSS policy check: '
+                       '/usr/bin/nss-policy-check not found')
+            return True
         elif ret:
             cls.eprint("There is an error in NSS generated policy")
             cls.eprint(f'Policy:\n{config}')

++++++ crypto-policies-policygenerators.patch ++++++
--- /var/tmp/diff_new_pack.J7X0d7/_old  2023-10-02 20:04:05.977697466 +0200
+++ /var/tmp/diff_new_pack.J7X0d7/_new  2023-10-02 20:04:05.981697610 +0200
@@ -1,8 +1,8 @@
-Index: 
fedora-crypto-policies-20230614.5f3458e/python/policygenerators/__init__.py
+Index: 
fedora-crypto-policies-20230920.570ea89/python/policygenerators/__init__.py
 ===================================================================
---- 
fedora-crypto-policies-20230614.5f3458e.orig/python/policygenerators/__init__.py
-+++ fedora-crypto-policies-20230614.5f3458e/python/policygenerators/__init__.py
-@@ -8,15 +8,15 @@ from .gnutls import GnuTLSGenerator
+--- 
fedora-crypto-policies-20230920.570ea89.orig/python/policygenerators/__init__.py
++++ fedora-crypto-policies-20230920.570ea89/python/policygenerators/__init__.py
+@@ -8,7 +8,7 @@ from .gnutls import GnuTLSGenerator
  from .java import JavaGenerator
  from .java import JavaSystemGenerator
  from .krb5 import KRB5Generator
@@ -11,9 +11,10 @@
  from .libssh import LibsshGenerator
  from .nss import NSSGenerator
  from .openssh import OpenSSHClientGenerator
- from .openssh import OpenSSHServerGenerator
+@@ -16,8 +16,8 @@ from .openssh import OpenSSHServerGenera
  from .openssl import OpenSSLConfigGenerator
  from .openssl import OpenSSLGenerator
+ from .openssl import OpenSSLFIPSGenerator
 -from .sequoia import SequoiaGenerator
 -from .sequoia import RPMSequoiaGenerator
 +# from .sequoia import SequoiaGenerator
@@ -21,7 +22,7 @@
  
  __all__ = [
      'BindGenerator',
-@@ -24,13 +24,14 @@ __all__ = [
+@@ -25,7 +25,6 @@ __all__ = [
      'JavaGenerator',
      'JavaSystemGenerator',
      'KRB5Generator',
@@ -29,14 +30,15 @@
      'LibsshGenerator',
      'NSSGenerator',
      'OpenSSHClientGenerator',
-     'OpenSSHServerGenerator',
+@@ -33,6 +32,8 @@ __all__ = [
      'OpenSSLConfigGenerator',
      'OpenSSLGenerator',
+     'OpenSSLFIPSGenerator',
 -    'SequoiaGenerator',
 -    'RPMSequoiaGenerator',
  ]
 +
-+#    'LibreswanGenerator',
-+#    'SequoiaGenerator',
-+#    'RPMSequoiaGenerator',
++#   'LibreswanGenerator',
++#   'SequoiaGenerator',
++#   'RPMSequoiaGenerator',
 

++++++ crypto-policies-revert-rh-allow-sha1-signatures.patch ++++++
--- /var/tmp/diff_new_pack.J7X0d7/_old  2023-10-02 20:04:05.993698042 +0200
+++ /var/tmp/diff_new_pack.J7X0d7/_new  2023-10-02 20:04:05.997698185 +0200
@@ -4,11 +4,11 @@
 Subject: openssl: disable SHA-1 signatures in FUTURE/NO-SHA1
 
 
-Index: fedora-crypto-policies-20230614.5f3458e/policies/FUTURE.pol
+Index: fedora-crypto-policies-20230920.570ea89/policies/FUTURE.pol
 ===================================================================
---- fedora-crypto-policies-20230614.5f3458e.orig/policies/FUTURE.pol
-+++ fedora-crypto-policies-20230614.5f3458e/policies/FUTURE.pol
-@@ -65,7 +65,3 @@ sha1_in_certs = 0
+--- fedora-crypto-policies-20230920.570ea89.orig/policies/FUTURE.pol
++++ fedora-crypto-policies-20230920.570ea89/policies/FUTURE.pol
+@@ -66,7 +66,3 @@ sha1_in_certs = 0
  arbitrary_dh_groups = 1
  ssh_certs = 1
  ssh_etm = 1
@@ -16,10 +16,10 @@
 -# https://fedoraproject.org/wiki/Changes/StrongCryptoSettings3Forewarning1
 -# SHA-1 signatures are blocked in OpenSSL in FUTURE only
 -__openssl_block_sha1_signatures = 1
-Index: fedora-crypto-policies-20230614.5f3458e/policies/modules/NO-SHA1.pmod
+Index: fedora-crypto-policies-20230920.570ea89/policies/modules/NO-SHA1.pmod
 ===================================================================
---- fedora-crypto-policies-20230614.5f3458e.orig/policies/modules/NO-SHA1.pmod
-+++ fedora-crypto-policies-20230614.5f3458e/policies/modules/NO-SHA1.pmod
+--- fedora-crypto-policies-20230920.570ea89.orig/policies/modules/NO-SHA1.pmod
++++ fedora-crypto-policies-20230920.570ea89/policies/modules/NO-SHA1.pmod
 @@ -3,7 +3,3 @@
  hash = -SHA1
  sign = -*-SHA1
@@ -28,23 +28,23 @@
 -# https://fedoraproject.org/wiki/Changes/StrongCryptoSettings3Preview1
 -# SHA-1 signatures are blocked in OpenSSL in FUTURE only
 -__openssl_block_sha1_signatures = 1
-Index: 
fedora-crypto-policies-20230614.5f3458e/python/cryptopolicies/cryptopolicies.py
+Index: 
fedora-crypto-policies-20230920.570ea89/python/cryptopolicies/cryptopolicies.py
 ===================================================================
---- 
fedora-crypto-policies-20230614.5f3458e.orig/python/cryptopolicies/cryptopolicies.py
-+++ 
fedora-crypto-policies-20230614.5f3458e/python/cryptopolicies/cryptopolicies.py
-@@ -19,7 +19,6 @@ from . import validation  # moved out of
+--- 
fedora-crypto-policies-20230920.570ea89.orig/python/cryptopolicies/cryptopolicies.py
++++ 
fedora-crypto-policies-20230920.570ea89/python/cryptopolicies/cryptopolicies.py
+@@ -24,7 +24,6 @@ from . import validation  # moved out of
  INT_DEFAULTS = {k: 0 for k in (
      'arbitrary_dh_groups',
      'min_dh_size', 'min_dsa_size', 'min_rsa_size',
--    '__openssl_block_sha1_signatures',
+-    '__openssl_block_sha1_signatures',  # FUTURE/TEST-FEDORA39/NO-SHA1
      'sha1_in_certs',
      'ssh_certs', 'ssh_etm',
  )}
-Index: 
fedora-crypto-policies-20230614.5f3458e/python/policygenerators/openssl.py
+Index: 
fedora-crypto-policies-20230920.570ea89/python/policygenerators/openssl.py
 ===================================================================
---- 
fedora-crypto-policies-20230614.5f3458e.orig/python/policygenerators/openssl.py
-+++ fedora-crypto-policies-20230614.5f3458e/python/policygenerators/openssl.py
-@@ -7,14 +7,6 @@ from subprocess import check_output, Cal
+--- 
fedora-crypto-policies-20230920.570ea89.orig/python/policygenerators/openssl.py
++++ fedora-crypto-policies-20230920.570ea89/python/policygenerators/openssl.py
+@@ -7,13 +7,6 @@ from subprocess import check_output, Cal
  
  from .configgenerator import ConfigGenerator
  
@@ -55,13 +55,12 @@
 -[evp_properties]
 -rh-allow-sha1-signatures = {}
 -'''
--
  
- class OpenSSLGenerator(ConfigGenerator):
-     CONFIG_NAME = 'openssl'
-@@ -254,12 +246,6 @@ class OpenSSLConfigGenerator(OpenSSLGene
-         groups = [cls.group_map[i] for i in p['group'] if i in cls.group_map]
-         s += 'Groups = ' + ':'.join(groups) + '\n'
+ FIPS_MODULE_CONFIG = '''
+ [fips_sect]
+@@ -263,12 +256,6 @@ class OpenSSLConfigGenerator(OpenSSLGene
+         if policy.enums['__ems'] == 'RELAX':
+             s += 'Options = RHNoEnforceEMSinFIPS\n'
  
 -        # In the future it'll be just
 -        # s += RH_SHA1_SECTION.format('yes' if 'SHA1' in p['hash'] else 'no')
@@ -72,11 +71,11 @@
          return s
  
      @classmethod
-Index: 
fedora-crypto-policies-20230614.5f3458e/tests/alternative-policies/FUTURE.pol
+Index: 
fedora-crypto-policies-20230920.570ea89/tests/alternative-policies/FUTURE.pol
 ===================================================================
---- 
fedora-crypto-policies-20230614.5f3458e.orig/tests/alternative-policies/FUTURE.pol
-+++ 
fedora-crypto-policies-20230614.5f3458e/tests/alternative-policies/FUTURE.pol
-@@ -71,7 +71,3 @@ sha1_in_dnssec = 0
+--- 
fedora-crypto-policies-20230920.570ea89.orig/tests/alternative-policies/FUTURE.pol
++++ 
fedora-crypto-policies-20230920.570ea89/tests/alternative-policies/FUTURE.pol
+@@ -73,7 +73,3 @@ sha1_in_dnssec = 0
  arbitrary_dh_groups = 1
  ssh_certs = 1
  ssh_etm = 1
@@ -84,10 +83,10 @@
 -# https://fedoraproject.org/wiki/Changes/StrongCryptoSettings3Preview1
 -# SHA-1 signatures are blocked in OpenSSL in FUTURE only
 -__openssl_block_sha1_signatures = 1
-Index: 
fedora-crypto-policies-20230614.5f3458e/tests/outputs/DEFAULT-opensslcnf.txt
+Index: 
fedora-crypto-policies-20230920.570ea89/tests/outputs/DEFAULT-opensslcnf.txt
 ===================================================================
---- 
fedora-crypto-policies-20230614.5f3458e.orig/tests/outputs/DEFAULT-opensslcnf.txt
-+++ 
fedora-crypto-policies-20230614.5f3458e/tests/outputs/DEFAULT-opensslcnf.txt
+--- 
fedora-crypto-policies-20230920.570ea89.orig/tests/outputs/DEFAULT-opensslcnf.txt
++++ 
fedora-crypto-policies-20230920.570ea89/tests/outputs/DEFAULT-opensslcnf.txt
 @@ -6,9 +6,3 @@ DTLS.MinProtocol = DTLSv1.2
  DTLS.MaxProtocol = DTLSv1.2
  SignatureAlgorithms = 
ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:rsa_pss_rsae_sha256:rsa_pss_rsae_sha384:rsa_pss_rsae_sha512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224
@@ -98,10 +97,10 @@
 -
 -[evp_properties]
 -rh-allow-sha1-signatures = yes
-Index: 
fedora-crypto-policies-20230614.5f3458e/tests/outputs/DEFAULT:FEDORA32-opensslcnf.txt
+Index: 
fedora-crypto-policies-20230920.570ea89/tests/outputs/DEFAULT:FEDORA32-opensslcnf.txt
 ===================================================================
---- 
fedora-crypto-policies-20230614.5f3458e.orig/tests/outputs/DEFAULT:FEDORA32-opensslcnf.txt
-+++ 
fedora-crypto-policies-20230614.5f3458e/tests/outputs/DEFAULT:FEDORA32-opensslcnf.txt
+--- 
fedora-crypto-policies-20230920.570ea89.orig/tests/outputs/DEFAULT:FEDORA32-opensslcnf.txt
++++ 
fedora-crypto-policies-20230920.570ea89/tests/outputs/DEFAULT:FEDORA32-opensslcnf.txt
 @@ -6,9 +6,3 @@ DTLS.MinProtocol = DTLSv1
  DTLS.MaxProtocol = DTLSv1.2
  SignatureAlgorithms = 
ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:rsa_pss_rsae_sha256:rsa_pss_rsae_sha384:rsa_pss_rsae_sha512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:ECDSA+SHA1:RSA+SHA1
@@ -112,10 +111,10 @@
 -
 -[evp_properties]
 -rh-allow-sha1-signatures = yes
-Index: 
fedora-crypto-policies-20230614.5f3458e/tests/outputs/DEFAULT:GOST-opensslcnf.txt
+Index: 
fedora-crypto-policies-20230920.570ea89/tests/outputs/DEFAULT:GOST-opensslcnf.txt
 ===================================================================
---- 
fedora-crypto-policies-20230614.5f3458e.orig/tests/outputs/DEFAULT:GOST-opensslcnf.txt
-+++ 
fedora-crypto-policies-20230614.5f3458e/tests/outputs/DEFAULT:GOST-opensslcnf.txt
+--- 
fedora-crypto-policies-20230920.570ea89.orig/tests/outputs/DEFAULT:GOST-opensslcnf.txt
++++ 
fedora-crypto-policies-20230920.570ea89/tests/outputs/DEFAULT:GOST-opensslcnf.txt
 @@ -6,9 +6,3 @@ DTLS.MinProtocol = DTLSv1.2
  DTLS.MaxProtocol = DTLSv1.2
  SignatureAlgorithms = 
ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:rsa_pss_rsae_sha256:rsa_pss_rsae_sha384:rsa_pss_rsae_sha512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224
@@ -126,10 +125,10 @@
 -
 -[evp_properties]
 -rh-allow-sha1-signatures = yes
-Index: 
fedora-crypto-policies-20230614.5f3458e/tests/outputs/EMPTY-opensslcnf.txt
+Index: 
fedora-crypto-policies-20230920.570ea89/tests/outputs/EMPTY-opensslcnf.txt
 ===================================================================
---- 
fedora-crypto-policies-20230614.5f3458e.orig/tests/outputs/EMPTY-opensslcnf.txt
-+++ fedora-crypto-policies-20230614.5f3458e/tests/outputs/EMPTY-opensslcnf.txt
+--- 
fedora-crypto-policies-20230920.570ea89.orig/tests/outputs/EMPTY-opensslcnf.txt
++++ fedora-crypto-policies-20230920.570ea89/tests/outputs/EMPTY-opensslcnf.txt
 @@ -2,9 +2,3 @@ CipherString = @SECLEVEL=0:-kPSK:-kDHEPS
  Ciphersuites = 
  SignatureAlgorithms = 
@@ -140,10 +139,10 @@
 -
 -[evp_properties]
 -rh-allow-sha1-signatures = yes
-Index: 
fedora-crypto-policies-20230614.5f3458e/tests/outputs/FIPS-opensslcnf.txt
+Index: 
fedora-crypto-policies-20230920.570ea89/tests/outputs/FIPS-opensslcnf.txt
 ===================================================================
---- 
fedora-crypto-policies-20230614.5f3458e.orig/tests/outputs/FIPS-opensslcnf.txt
-+++ fedora-crypto-policies-20230614.5f3458e/tests/outputs/FIPS-opensslcnf.txt
+--- 
fedora-crypto-policies-20230920.570ea89.orig/tests/outputs/FIPS-opensslcnf.txt
++++ fedora-crypto-policies-20230920.570ea89/tests/outputs/FIPS-opensslcnf.txt
 @@ -6,9 +6,3 @@ DTLS.MinProtocol = DTLSv1.2
  DTLS.MaxProtocol = DTLSv1.2
  SignatureAlgorithms = 
ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:rsa_pss_rsae_sha256:rsa_pss_rsae_sha384:rsa_pss_rsae_sha512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224
@@ -154,10 +153,10 @@
 -
 -[evp_properties]
 -rh-allow-sha1-signatures = yes
-Index: 
fedora-crypto-policies-20230614.5f3458e/tests/outputs/FIPS:ECDHE-ONLY-opensslcnf.txt
+Index: 
fedora-crypto-policies-20230920.570ea89/tests/outputs/FIPS:ECDHE-ONLY-opensslcnf.txt
 ===================================================================
---- 
fedora-crypto-policies-20230614.5f3458e.orig/tests/outputs/FIPS:ECDHE-ONLY-opensslcnf.txt
-+++ 
fedora-crypto-policies-20230614.5f3458e/tests/outputs/FIPS:ECDHE-ONLY-opensslcnf.txt
+--- 
fedora-crypto-policies-20230920.570ea89.orig/tests/outputs/FIPS:ECDHE-ONLY-opensslcnf.txt
++++ 
fedora-crypto-policies-20230920.570ea89/tests/outputs/FIPS:ECDHE-ONLY-opensslcnf.txt
 @@ -6,9 +6,3 @@ DTLS.MinProtocol = DTLSv1.2
  DTLS.MaxProtocol = DTLSv1.2
  SignatureAlgorithms = 
ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:rsa_pss_rsae_sha256:rsa_pss_rsae_sha384:rsa_pss_rsae_sha512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224
@@ -168,10 +167,10 @@
 -
 -[evp_properties]
 -rh-allow-sha1-signatures = yes
-Index: 
fedora-crypto-policies-20230614.5f3458e/tests/outputs/FUTURE-opensslcnf.txt
+Index: 
fedora-crypto-policies-20230920.570ea89/tests/outputs/FUTURE-opensslcnf.txt
 ===================================================================
---- 
fedora-crypto-policies-20230614.5f3458e.orig/tests/outputs/FUTURE-opensslcnf.txt
-+++ fedora-crypto-policies-20230614.5f3458e/tests/outputs/FUTURE-opensslcnf.txt
+--- 
fedora-crypto-policies-20230920.570ea89.orig/tests/outputs/FUTURE-opensslcnf.txt
++++ fedora-crypto-policies-20230920.570ea89/tests/outputs/FUTURE-opensslcnf.txt
 @@ -6,9 +6,3 @@ DTLS.MinProtocol = DTLSv1.2
  DTLS.MaxProtocol = DTLSv1.2
  SignatureAlgorithms = 
ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:rsa_pss_rsae_sha256:rsa_pss_rsae_sha384:rsa_pss_rsae_sha512:RSA+SHA256:RSA+SHA384:RSA+SHA512
@@ -182,10 +181,10 @@
 -
 -[evp_properties]
 -rh-allow-sha1-signatures = no
-Index: 
fedora-crypto-policies-20230614.5f3458e/tests/outputs/GOST-ONLY-opensslcnf.txt
+Index: 
fedora-crypto-policies-20230920.570ea89/tests/outputs/GOST-ONLY-opensslcnf.txt
 ===================================================================
---- 
fedora-crypto-policies-20230614.5f3458e.orig/tests/outputs/GOST-ONLY-opensslcnf.txt
-+++ 
fedora-crypto-policies-20230614.5f3458e/tests/outputs/GOST-ONLY-opensslcnf.txt
+--- 
fedora-crypto-policies-20230920.570ea89.orig/tests/outputs/GOST-ONLY-opensslcnf.txt
++++ 
fedora-crypto-policies-20230920.570ea89/tests/outputs/GOST-ONLY-opensslcnf.txt
 @@ -4,9 +4,3 @@ TLS.MinProtocol = TLSv1
  TLS.MaxProtocol = TLSv1.3
  SignatureAlgorithms = 
@@ -196,10 +195,10 @@
 -
 -[evp_properties]
 -rh-allow-sha1-signatures = yes
-Index: 
fedora-crypto-policies-20230614.5f3458e/tests/outputs/LEGACY-opensslcnf.txt
+Index: 
fedora-crypto-policies-20230920.570ea89/tests/outputs/LEGACY-opensslcnf.txt
 ===================================================================
---- 
fedora-crypto-policies-20230614.5f3458e.orig/tests/outputs/LEGACY-opensslcnf.txt
-+++ fedora-crypto-policies-20230614.5f3458e/tests/outputs/LEGACY-opensslcnf.txt
+--- 
fedora-crypto-policies-20230920.570ea89.orig/tests/outputs/LEGACY-opensslcnf.txt
++++ fedora-crypto-policies-20230920.570ea89/tests/outputs/LEGACY-opensslcnf.txt
 @@ -6,9 +6,3 @@ DTLS.MinProtocol = DTLSv1
  DTLS.MaxProtocol = DTLSv1.2
  SignatureAlgorithms = 
ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:rsa_pss_rsae_sha256:rsa_pss_rsae_sha384:rsa_pss_rsae_sha512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512:DSA+SHA224:ECDSA+SHA1:RSA+SHA1:DSA+SHA1
@@ -210,10 +209,10 @@
 -
 -[evp_properties]
 -rh-allow-sha1-signatures = yes
-Index: 
fedora-crypto-policies-20230614.5f3458e/tests/outputs/LEGACY:AD-SUPPORT-opensslcnf.txt
+Index: 
fedora-crypto-policies-20230920.570ea89/tests/outputs/LEGACY:AD-SUPPORT-opensslcnf.txt
 ===================================================================
---- 
fedora-crypto-policies-20230614.5f3458e.orig/tests/outputs/LEGACY:AD-SUPPORT-opensslcnf.txt
-+++ 
fedora-crypto-policies-20230614.5f3458e/tests/outputs/LEGACY:AD-SUPPORT-opensslcnf.txt
+--- 
fedora-crypto-policies-20230920.570ea89.orig/tests/outputs/LEGACY:AD-SUPPORT-opensslcnf.txt
++++ 
fedora-crypto-policies-20230920.570ea89/tests/outputs/LEGACY:AD-SUPPORT-opensslcnf.txt
 @@ -6,9 +6,3 @@ DTLS.MinProtocol = DTLSv1
  DTLS.MaxProtocol = DTLSv1.2
  SignatureAlgorithms = 
ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:rsa_pss_rsae_sha256:rsa_pss_rsae_sha384:rsa_pss_rsae_sha512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512:DSA+SHA224:ECDSA+SHA1:RSA+SHA1:DSA+SHA1
@@ -224,10 +223,10 @@
 -
 -[evp_properties]
 -rh-allow-sha1-signatures = yes
-Index: fedora-crypto-policies-20230614.5f3458e/tests/unit/test_cryptopolicy.py
+Index: fedora-crypto-policies-20230920.570ea89/tests/unit/test_cryptopolicy.py
 ===================================================================
---- 
fedora-crypto-policies-20230614.5f3458e.orig/tests/unit/test_cryptopolicy.py
-+++ fedora-crypto-policies-20230614.5f3458e/tests/unit/test_cryptopolicy.py
+--- 
fedora-crypto-policies-20230920.570ea89.orig/tests/unit/test_cryptopolicy.py
++++ fedora-crypto-policies-20230920.570ea89/tests/unit/test_cryptopolicy.py
 @@ -260,7 +260,6 @@ def test_cryptopolicy_to_string_empty(tm
          min_dh_size = 0
          min_dsa_size = 0
@@ -236,7 +235,7 @@
          sha1_in_certs = 0
          ssh_certs = 0
          ssh_etm = 0
-@@ -291,7 +290,6 @@ def test_cryptopolicy_to_string_twisted(
+@@ -292,7 +291,6 @@ def test_cryptopolicy_to_string_twisted(
          min_dh_size = 0
          min_dsa_size = 0
          min_rsa_size = 0
@@ -244,11 +243,11 @@
          sha1_in_certs = 0
          ssh_certs = 0
          ssh_etm = 0
-Index: fedora-crypto-policies-20230614.5f3458e/policies/TEST-FEDORA39.pol
+Index: fedora-crypto-policies-20230920.570ea89/policies/TEST-FEDORA39.pol
 ===================================================================
---- fedora-crypto-policies-20230614.5f3458e.orig/policies/TEST-FEDORA39.pol
-+++ fedora-crypto-policies-20230614.5f3458e/policies/TEST-FEDORA39.pol
-@@ -67,7 +67,3 @@ sha1_in_certs = 0
+--- fedora-crypto-policies-20230920.570ea89.orig/policies/TEST-FEDORA39.pol
++++ fedora-crypto-policies-20230920.570ea89/policies/TEST-FEDORA39.pol
+@@ -68,7 +68,3 @@ sha1_in_certs = 0
  arbitrary_dh_groups = 1
  ssh_certs = 1
  ssh_etm = 1
@@ -256,10 +255,10 @@
 -# https://fedoraproject.org/wiki/Changes/StrongCryptoSettings3Forewarning1
 -# SHA-1 signatures will blocked in OpenSSL
 -__openssl_block_sha1_signatures = 1
-Index: 
fedora-crypto-policies-20230614.5f3458e/tests/outputs/FEDORA38-opensslcnf.txt
+Index: 
fedora-crypto-policies-20230920.570ea89/tests/outputs/FEDORA38-opensslcnf.txt
 ===================================================================
---- 
fedora-crypto-policies-20230614.5f3458e.orig/tests/outputs/FEDORA38-opensslcnf.txt
-+++ 
fedora-crypto-policies-20230614.5f3458e/tests/outputs/FEDORA38-opensslcnf.txt
+--- 
fedora-crypto-policies-20230920.570ea89.orig/tests/outputs/FEDORA38-opensslcnf.txt
++++ 
fedora-crypto-policies-20230920.570ea89/tests/outputs/FEDORA38-opensslcnf.txt
 @@ -6,9 +6,3 @@ DTLS.MinProtocol = DTLSv1.2
  DTLS.MaxProtocol = DTLSv1.2
  SignatureAlgorithms = 
ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:rsa_pss_rsae_sha256:rsa_pss_rsae_sha384:rsa_pss_rsae_sha512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224
@@ -270,10 +269,10 @@
 -
 -[evp_properties]
 -rh-allow-sha1-signatures = yes
-Index: 
fedora-crypto-policies-20230614.5f3458e/tests/outputs/TEST-FEDORA39-opensslcnf.txt
+Index: 
fedora-crypto-policies-20230920.570ea89/tests/outputs/TEST-FEDORA39-opensslcnf.txt
 ===================================================================
---- 
fedora-crypto-policies-20230614.5f3458e.orig/tests/outputs/TEST-FEDORA39-opensslcnf.txt
-+++ 
fedora-crypto-policies-20230614.5f3458e/tests/outputs/TEST-FEDORA39-opensslcnf.txt
+--- 
fedora-crypto-policies-20230920.570ea89.orig/tests/outputs/TEST-FEDORA39-opensslcnf.txt
++++ 
fedora-crypto-policies-20230920.570ea89/tests/outputs/TEST-FEDORA39-opensslcnf.txt
 @@ -6,9 +6,3 @@ DTLS.MinProtocol = DTLSv1.2
  DTLS.MaxProtocol = DTLSv1.2
  SignatureAlgorithms = 
ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:rsa_pss_rsae_sha256:rsa_pss_rsae_sha384:rsa_pss_rsae_sha512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224
@@ -284,14 +283,42 @@
 -
 -[evp_properties]
 -rh-allow-sha1-signatures = no
-Index: 
fedora-crypto-policies-20230614.5f3458e/tests/outputs/FIPS:OSPP-opensslcnf.txt
+Index: 
fedora-crypto-policies-20230920.570ea89/tests/outputs/FIPS:OSPP-opensslcnf.txt
+===================================================================
+--- 
fedora-crypto-policies-20230920.570ea89.orig/tests/outputs/FIPS:OSPP-opensslcnf.txt
++++ 
fedora-crypto-policies-20230920.570ea89/tests/outputs/FIPS:OSPP-opensslcnf.txt
+@@ -6,9 +6,3 @@ DTLS.MinProtocol = DTLSv1.2
+ DTLS.MaxProtocol = DTLSv1.2
+ SignatureAlgorithms = 
ECDSA+SHA384:ECDSA+SHA512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:rsa_pss_rsae_sha256:rsa_pss_rsae_sha384:rsa_pss_rsae_sha512:RSA+SHA256:RSA+SHA384:RSA+SHA512
+ Groups = secp521r1:secp384r1:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192
+-
+-[openssl_init]
+-alg_section = evp_properties
+-
+-[evp_properties]
+-rh-allow-sha1-signatures = yes
+Index: fedora-crypto-policies-20230920.570ea89/tests/outputs/BSI-opensslcnf.txt
 ===================================================================
---- 
fedora-crypto-policies-20230614.5f3458e.orig/tests/outputs/FIPS:OSPP-opensslcnf.txt
-+++ 
fedora-crypto-policies-20230614.5f3458e/tests/outputs/FIPS:OSPP-opensslcnf.txt
+--- 
fedora-crypto-policies-20230920.570ea89.orig/tests/outputs/BSI-opensslcnf.txt
++++ fedora-crypto-policies-20230920.570ea89/tests/outputs/BSI-opensslcnf.txt
 @@ -6,9 +6,3 @@ DTLS.MinProtocol = DTLSv1.2
  DTLS.MaxProtocol = DTLSv1.2
- SignatureAlgorithms = 
ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:rsa_pss_rsae_sha256:rsa_pss_rsae_sha384:rsa_pss_rsae_sha512:RSA+SHA256:RSA+SHA384:RSA+SHA512
+ SignatureAlgorithms = 
ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:rsa_pss_rsae_sha256:rsa_pss_rsae_sha384:rsa_pss_rsae_sha512:RSA+SHA256:RSA+SHA384:RSA+SHA512
+ Groups = 
secp256r1:secp384r1:secp521r1:ffdhe2048:ffdhe3072:ffdhe4096:brainpoolP512r1:brainpoolP384r1:brainpoolP256r1
+-
+-[openssl_init]
+-alg_section = evp_properties
+-
+-[evp_properties]
+-rh-allow-sha1-signatures = yes
+Index: 
fedora-crypto-policies-20230920.570ea89/tests/outputs/FIPS:NO-ENFORCE-EMS-opensslcnf.txt
+===================================================================
+--- 
fedora-crypto-policies-20230920.570ea89.orig/tests/outputs/FIPS:NO-ENFORCE-EMS-opensslcnf.txt
++++ 
fedora-crypto-policies-20230920.570ea89/tests/outputs/FIPS:NO-ENFORCE-EMS-opensslcnf.txt
+@@ -7,9 +7,3 @@ DTLS.MaxProtocol = DTLSv1.2
+ SignatureAlgorithms = 
ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:rsa_pss_rsae_sha256:rsa_pss_rsae_sha384:rsa_pss_rsae_sha512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224
  Groups = 
secp256r1:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192
+ Options = RHNoEnforceEMSinFIPS
 -
 -[openssl_init]
 -alg_section = evp_properties

++++++ crypto-policies.7.gz ++++++
--- /var/tmp/diff_new_pack.J7X0d7/_old  2023-10-02 20:04:06.025699192 +0200
+++ /var/tmp/diff_new_pack.J7X0d7/_new  2023-10-02 20:04:06.033699480 +0200
@@ -2,12 +2,12 @@
 .\"     Title: crypto-policies
 .\"    Author: [see the "AUTHOR" section]
 .\" Generator: DocBook XSL Stylesheets vsnapshot <http://docbook.sf.net/>
-.\"      Date: 08/31/2023
+.\"      Date: 09/22/2023
 .\"    Manual: \ \&
 .\"    Source: crypto-policies
 .\"  Language: English
 .\"
-.TH "CRYPTO\-POLICIES" "7" "08/31/2023" "crypto\-policies" "\ \&"
+.TH "CRYPTO\-POLICIES" "7" "09/22/2023" "crypto\-policies" "\ \&"
 .\" -----------------------------------------------------------------
 .\" * Define some portability stuff
 .\" -----------------------------------------------------------------
@@ -646,14 +646,196 @@
 .RE
 .RE
 .PP
+\fBBSI\fR
+.RS 4
+A security policy based on recommendations by the german government agency BSI 
(Bundesamt fuer Sicherheit in der Informationstechnik, translated as "agency 
for security in software technology") in its ruleset BSI TR 02102 (TR \- 
technical recommendation)\&. The BSI TR 02102 standard is updated in regular 
intervals\&.
+.sp
+.if n \{\
+.RS 4
+.\}
+.nf
+This policy does not allow the use of *SHA\-1* in signature algorithms
+(except *DNSSEC* and *RPM*)\&.
+.fi
+.if n \{\
+.RE
+.\}
+.sp
+.if n \{\
+.RS 4
+.\}
+.nf
+The policy also provides some (not complete) preparation for
+post\-quantum encryption support in form of 256\-bit symmetric encryption
+requirement\&.
+.fi
+.if n \{\
+.RE
+.\}
+.sp
+.if n \{\
+.RS 4
+.\}
+.nf
+The *RSA* parameters are accepted if larger than 2047 bits, and
+*Diffie\-Hellman* parameters are accepted if larger than 3071 bits\&.
+.fi
+.if n \{\
+.RE
+.\}
+.sp
+.if n \{\
+.RS 4
+.\}
+.nf
+This policy provides at least 128\-bit security, excepting the transition
+of *RSA*\&.
+.fi
+.if n \{\
+.RE
+.\}
+.sp
+.RS 4
+.ie n \{\
+\h'-04'\(bu\h'+03'\c
+.\}
+.el \{\
+.sp -1
+.IP \(bu 2.3
+.\}
+MACs: all
+\fBHMAC\fR
+with
+\fBSHA\-256\fR
+or better + all modern MACs
+.RE
+.sp
+.RS 4
+.ie n \{\
+\h'-04'\(bu\h'+03'\c
+.\}
+.el \{\
+.sp -1
+.IP \(bu 2.3
+.\}
+Curves: all prime >= 255 bits (including Bernstein curves)
+.RE
+.sp
+.RS 4
+.ie n \{\
+\h'-04'\(bu\h'+03'\c
+.\}
+.el \{\
+.sp -1
+.IP \(bu 2.3
+.\}
+Signature algorithms: with
+\fBSHA\-256\fR
+hash or better (no
+\fBDSA\fR)
+.RE
+.sp
+.RS 4
+.ie n \{\
+\h'-04'\(bu\h'+03'\c
+.\}
+.el \{\
+.sp -1
+.IP \(bu 2.3
+.\}
+\fBTLS\fR
+Ciphers: >= 256\-bit key, >= 128\-bit block, only Authenticated Encryption 
(AE) ciphers
+.RE
+.sp
+.RS 4
+.ie n \{\
+\h'-04'\(bu\h'+03'\c
+.\}
+.el \{\
+.sp -1
+.IP \(bu 2.3
+.\}
+non\-TLS Ciphers: same as
+\fBTLS\fR
+ciphers with added non AE ciphers
+.RE
+.sp
+.RS 4
+.ie n \{\
+\h'-04'\(bu\h'+03'\c
+.\}
+.el \{\
+.sp -1
+.IP \(bu 2.3
+.\}
+key exchange:
+\fBECDHE\fR,
+\fBDHE\fR
+(no
+\fBDHE\-DSS\fR, no
+\fBRSA\fR)
+.RE
+.sp
+.RS 4
+.ie n \{\
+\h'-04'\(bu\h'+03'\c
+.\}
+.el \{\
+.sp -1
+.IP \(bu 2.3
+.\}
+\fBDH\fR
+params size: >= 3072
+.RE
+.sp
+.RS 4
+.ie n \{\
+\h'-04'\(bu\h'+03'\c
+.\}
+.el \{\
+.sp -1
+.IP \(bu 2.3
+.\}
+\fBRSA\fR
+keys size: >= 2048 (until end of 2023, then it will switch to 3072)
+.RE
+.sp
+.RS 4
+.ie n \{\
+\h'-04'\(bu\h'+03'\c
+.\}
+.el \{\
+.sp -1
+.IP \(bu 2.3
+.\}
+\fBTLS\fR
+protocols:
+\fBTLS\fR
+>= 1\&.2,
+\fBDTLS\fR
+>= 1\&.2
+.sp
+.if n \{\
+.RS 4
+.\}
+.nf
+Note that compared to others profiles *Chacha20* and *Camellia* are not
+recommended by the BSI\&.
+.fi
+.if n \{\
+.RE
+.\}
+.RE
+.RE
+.PP
 \fBFIPS\fR
 .RS 4
 A policy to aid conformance to the
-\fBFIPS 140\-2\fR
+\fBFIPS 140\fR
 requirements\&. This policy is used internally by the
 \fBfips\-mode\-setup(8)\fR
 tool which can switch the system into the
-\fBFIPS 140\-2\fR
+\fBFIPS 140\fR
 mode\&. This policy provides at least 112\-bit security\&.
 .sp
 .RS 4
@@ -1056,7 +1238,7 @@
 .RS 4
 This command allows the system administrator to enable, or disable the system 
FIPS mode and also apply the
 \fBFIPS\fR
-cryptographic policy which limits the allowed algorithms and protocols to 
these allowed by the FIPS 140\-2 requirements\&.
+cryptographic policy which limits the allowed algorithms and protocols to 
these allowed by the FIPS 140 requirements\&.
 .RE
 .SH "NOTES"
 .sp

++++++ fedora-crypto-policies-20230614.5f3458e.tar.gz -> 
fedora-crypto-policies-20230920.570ea89.tar.gz ++++++
++++ 2109 lines of diff (skipped)

++++++ fips-finish-install.8.gz ++++++
--- /var/tmp/diff_new_pack.J7X0d7/_old  2023-10-02 20:04:06.177704659 +0200
+++ /var/tmp/diff_new_pack.J7X0d7/_new  2023-10-02 20:04:06.181704803 +0200
@@ -2,12 +2,12 @@
 .\"     Title: fips-finish-install
 .\"    Author: [see the "AUTHOR" section]
 .\" Generator: DocBook XSL Stylesheets vsnapshot <http://docbook.sf.net/>
-.\"      Date: 08/31/2023
+.\"      Date: 09/22/2023
 .\"    Manual: \ \&
 .\"    Source: fips-finish-install
 .\"  Language: English
 .\"
-.TH "FIPS\-FINISH\-INSTAL" "8" "08/31/2023" "fips\-finish\-install" "\ \&"
+.TH "FIPS\-FINISH\-INSTAL" "8" "09/22/2023" "fips\-finish\-install" "\ \&"
 .\" -----------------------------------------------------------------
 .\" * Define some portability stuff
 .\" -----------------------------------------------------------------
@@ -31,17 +31,17 @@
 fips-finish-install \- complete the installation of FIPS modules\&.
 .SH "SYNOPSIS"
 .sp
-\fBfips\-finish\-install\fR \-\-complete
+\fBfips\-finish\-install\fR [\-\-complete|\-\-undo]
 .SH "DESCRIPTION"
 .sp
 fips\-finish\-install(8) is used by the fips\-mode\-setup(8) command to 
complete the installation of the system FIPS modules\&. The tool is not 
supposed to be called directly by the system administrator, but it is possible 
to do so\&.
-.sp
-The completion of the installation cannot be undone\&. The system has to be 
reinstalled if the FIPS modules are not supposed to be installed anymore\&.
 .SH "OPTIONS"
 .sp
 The only recognized and mandatory option is:
 .sp
 \-\-complete: The command completes the FIPS module installation and calls 
\fIdracut \-f\fR to regenerate the initramfs\&.
+.sp
+\-\-undo: The command undoes some of the FIPS module installation steps\&. 
Please note that module installation cannot be undone without reformatting of 
and overwriting, at least once, the platform\(cqs hard drive or other permanent 
storage media\&. This option is not meant to be used in production, is not 
supported, and is implemented for testing purposes only\&.
 .SH "SEE ALSO"
 .sp
 fips\-mode\-setup(8)

++++++ fips-mode-setup.8.gz ++++++
--- /var/tmp/diff_new_pack.J7X0d7/_old  2023-10-02 20:04:06.197705378 +0200
+++ /var/tmp/diff_new_pack.J7X0d7/_new  2023-10-02 20:04:06.205705666 +0200
@@ -2,12 +2,12 @@
 .\"     Title: fips-mode-setup
 .\"    Author: [see the "AUTHOR" section]
 .\" Generator: DocBook XSL Stylesheets vsnapshot <http://docbook.sf.net/>
-.\"      Date: 08/31/2023
+.\"      Date: 09/22/2023
 .\"    Manual: \ \&
 .\"    Source: fips-mode-setup
 .\"  Language: English
 .\"
-.TH "FIPS\-MODE\-SETUP" "8" "08/31/2023" "fips\-mode\-setup" "\ \&"
+.TH "FIPS\-MODE\-SETUP" "8" "09/22/2023" "fips\-mode\-setup" "\ \&"
 .\" -----------------------------------------------------------------
 .\" * Define some portability stuff
 .\" -----------------------------------------------------------------
@@ -120,7 +120,7 @@
 .sp -1
 .IP \(bu 2.3
 .\}
-\-\-disable: Undo some of the FIPS\-enablement steps (unsupported)\&.
+\-\-disable: Undo some of the FIPS\-enablement steps\&. Please note that 
module installation cannot be undone without reformatting of and overwriting, 
at least once, the platform\(cqs hard drive or other permanent storage media\&. 
This option is not meant to be used in production, is not supported, and is 
implemented for testing purposes only\&.
 .RE
 .sp
 .RS 4

++++++ update-crypto-policies.8.gz ++++++
--- /var/tmp/diff_new_pack.J7X0d7/_old  2023-10-02 20:04:06.221706241 +0200
+++ /var/tmp/diff_new_pack.J7X0d7/_new  2023-10-02 20:04:06.229706529 +0200
@@ -2,12 +2,12 @@
 .\"     Title: update-crypto-policies
 .\"    Author: [see the "AUTHOR" section]
 .\" Generator: DocBook XSL Stylesheets vsnapshot <http://docbook.sf.net/>
-.\"      Date: 08/31/2023
+.\"      Date: 09/22/2023
 .\"    Manual: \ \&
 .\"    Source: update-crypto-policies
 .\"  Language: English
 .\"
-.TH "UPDATE\-CRYPTO\-POLI" "8" "08/31/2023" "update\-crypto\-policies" "\ \&"
+.TH "UPDATE\-CRYPTO\-POLI" "8" "09/22/2023" "update\-crypto\-policies" "\ \&"
 .\" -----------------------------------------------------------------
 .\" * Define some portability stuff
 .\" -----------------------------------------------------------------

Reply via email to