Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package crypto-policies for openSUSE:Factory checked in at 2025-03-24 13:25:09 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/crypto-policies (Old) and /work/SRC/openSUSE:Factory/.crypto-policies.new.2696 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "crypto-policies" Mon Mar 24 13:25:09 2025 rev:9 rq:1255022 version:20250124.4d262e7 Changes: -------- --- /work/SRC/openSUSE:Factory/crypto-policies/crypto-policies.changes 2024-02-02 15:44:38.615006922 +0100 +++ /work/SRC/openSUSE:Factory/.crypto-policies.new.2696/crypto-policies.changes 2025-03-24 13:25:09.818077502 +0100 @@ -1,0 +2,153 @@ +Tue Mar 18 13:45:44 UTC 2025 - Pedro Monreal <pmonr...@suse.com> + +- Allow sshd in FIPS mode when using the DEFAULT policy [bsc#1227370] + * Add crypto-policies-Allow-sshd-in-FIPS-mode-using-DEFAULT.patch + +------------------------------------------------------------------- +Tue Mar 11 12:40:44 UTC 2025 - Pedro Monreal <pmonr...@suse.com> + +- Enable SHA1 sigver in the DEFAULT policy. + * Add crypto-policies-enable-SHA1-sigver-in-DEFAULT.patch + +------------------------------------------------------------------- +Fri Feb 28 13:18:00 UTC 2025 - Pedro Monreal <pmonr...@suse.com> + +- Fix fips-mode-setup in EFI or Secure Boot mode. [bsc#1227637] + * Rebase crypto-policies-FIPS.patch + +------------------------------------------------------------------- +Wed Feb 12 11:45:57 UTC 2025 - Pedro Monreal <pmonr...@suse.com> + +- Remove dangling symlink for the libreswan config [bsc#1236858] +- Remove also sequoia config and generator files +- Remove not needed fips bind mount service + +------------------------------------------------------------------- +Tue Feb 04 10:18:07 UTC 2025 - Pedro Monreal <pmonr...@suse.com> + +- Update to version 20250124.4d262e7: [bsc#1239009, bsc#1236165] + * openssl: stricter enabling of Ciphersuites + * openssl: make use of -CBC and -AESGCM keywords + * openssl: add TLS 1.3 Brainpool identifiers + * fix warning on using experimental key_exchanges + * update-crypto-policies: don't output FIPS warning in fips mode + * openssh: map mlkem768x25519-sha256 to KEM-ECDH & MLKEM768-X25519 & SHA2-256 + * openssh, libssh: refactor kx maps to use tuples + * alg_lists: mark MLKEM768/SNTRUP kex experimental + * nss: revert enabling mlkem768secp256r1 + * nss: add mlkem768x25519 and mlkem768secp256r1, remove xyber + * gnutls: add GROUP-X25519-MLKEM768 and GROUP-SECP256R1-MLKEM768 + * openssl: use both names for SecP256r1MLKEM768 / X25519MLKEM768 + * openssh, TEST-PQ: rename MLKEM key_exchange to MLKEM768 + * openssh: add support for sntrup761x25519-sha512 and mlkem768x25519-sha256 + * openssl: map NULL to TLS_SHA256_SHA256:TLS_SHA384_SHA384... + * python/update-crypto-policies: pacify pylint + * fips-mode-setup: tolerate fips dracut module presence w/o FIPS + * fips-mode-setup: small Argon2 detection fix + * SHA1: add __openssl_block_sha1_signatures = 0 + * fips-mode-setup: block if LUKS devices using Argon2 are detected + * update-crypto-policies: skip warning on --set=FIPS if bootc + * fips-setup-helper: skip warning, BTW + * fips-mode-setup: force --no-bootcfg when UKI is detected + * fips-setup-helper: add a libexec helper for anaconda + * fips-crypto-policy-overlay: automount FIPS policy + * openssh: make dss no longer enableble, support is dropped + * gnutls: wire GROUP-X25519-KYBER768 to X25519-KYBER768 + * DEFAULT: switch to rh-allow-sha1-signatures = no... + * java: drop unused javasystem backend + * java: stop specifying jdk.tls.namedGroups in javasystem + * ec_min_size: introduce and use in java, default to 256 + * java: use and include jdk.disabled.namedCurves + * BSI: Update BSI policy for new 2024 minimum recommendations + * fips-mode-setup: flashy ticking warning upon use + * fips-mode-setup: add another scary "unsupported" + * CONTRIBUTING.md: add a small section on updating policies + * CONTRIBUTING.md: remove trailing punctuation from headers + * BSI: switch to 3072 minimum RSA key size + * java: make hash, mac and sign more orthogonal + * java: specify jdk.tls.namedGroups system property + * java: respect more key size restrictions + * java: disable anon ciphersuites, tying them to NULL... + * java: start controlling / disable DTLSv1.0 + * nss: wire KYBER768 to XYBER768D00 + * nss: unconditionally load p11-kit-proxy.so + * gnutls: make DTLS0.9 controllable again + * gnutls: retire GNUTLS_NO_TLS_SESSION_HASH + * openssh: remove OPENSSH_MIN_RSA_SIZE / OPENSSH_MIN_RSA_SIZE_FORCE + * gnutls: remove extraneous newline + * sequoia: move away from subprocess.getstatusoutput + * python/cryptopolicies/cryptopolicies.py: add trailing commas + * python, tests: rename MalformedLine to MalformedLineError + * Makefile: introduce SKIP_LINTING flag for packagers to use + * Makefile: run ruff + * tests: use pathlib + * tests: run(check=True) + CalledProcessError where convenient + * tests: use subprocess.run + * tests/krb5.py: check all generated policies + * tests: print to stderr on error paths + * tests/nss.py: also use encoding='utf-8' + * tests/nss.py: also use removesuffix + * tests/nss.py: skip creating tempfiles + * tests/java.pl -> tests/java.py + * tests/gnutls.pl -> tests/gnutls.py + * tests/openssl.pl -> tests/openssl.py + * tests/verify-output.pl: remove + * libreswan: do not use up pfs= / ikev2= keywords for default behaviour + * Rebase patches: + - crypto-policies-no-build-manpages.patch + - crypto-policies-policygenerators.patch + - crypto-policies-supported.patch + - crypto-policies-nss.patch + +------------------------------------------------------------------- +Wed Nov 06 12:27:56 UTC 2024 - Pedro Monreal <pmonr...@suse.com> + +- Update to version 20241010.5930b9a: + * LEGACY: enable 192-bit ciphers for nss pkcs12/smime + * nss: be stricter with new purposes + * nss: rewrite backend for 3.101 + * cryptopolicies: parent scopes for dumping purposes + * policygenerators: move scoping inside generators + * TEST-PQ: disable pure Kyber768 + * nss: wire XYBER768D00 to X25519-KYBER768 + * TEST-PQ: update + * TEST-PQ: also enable sntrup761x25519-sha...@openssh.com + * TEST-PQ, alg_lists, openssl: enable more experimental `sign` values + * TEST-PQ, python: add more groups, mark experimental + * openssl: mark liboqsprovider groups optional with ? + * Remove patches: + - crypto-policies-revert-rh-allow-sha1-signatures.patch + +------------------------------------------------------------------- +Tue Feb 06 10:29:11 UTC 2024 - Pedro Monreal <pmonr...@suse.com> + +- Update to version 20240201.9f501f3: + * .gitlab-ci.yml: install sequoia-policy-config + * java: disable ChaCha20-Poly1305 where applicable + * fips-mode-setup: make sure ostree is detected in chroot + * fips-finish-install: make sure ostree is detected in chroot + * TEST-PQ: enable X25519-KYBER768 / P384-KYBER768 for openssl + * TEST-PQ: add a no-op subpolicy + * update-crypto-policies: Keep mid-sentence upper case + * fips-mode-setup: Write error messages to stderr + * fips-mode-setup: Fix some shellcheck warnings + * fips-mode-setup: Fix test for empty /boot + * fips-mode-setup: Avoid 'boot=UUID=' if /boot == / + * Update man pages + * Rebase patches: + - crypto-policies-FIPS.patch + - crypto-policies-revert-rh-allow-sha1-signatures.patch + +------------------------------------------------------------------- +Mon Feb 02 08:34:40 UTC 2024 - Pedro Monreal <pmonr...@suse.com> + +- Update to version 20231108.adb5572b: + * Print matches in syntax deprecation warnings + * Restore support for scoped ssh_etm directives + * fips-mode-setup: Fix usage with --no-bootcfg + * turn ssh_etm into an etm@SSH tri-state + * fips-mode-setup: increase chroot-friendliness + * bind: fix a typo that led to duplication of ECDSAPxxxSHAxxx + * pylintrc: use-implicit-booleaness-not-comparison-to-* + +------------------------------------------------------------------- Old: ---- crypto-policies-revert-rh-allow-sha1-signatures.patch fedora-crypto-policies-20230920.570ea89.tar.gz New: ---- crypto-policies-Allow-sshd-in-FIPS-mode-using-DEFAULT.patch crypto-policies-enable-SHA1-sigver-in-DEFAULT.patch fedora-crypto-policies-20250124.4d262e7.tar.gz BETA DEBUG BEGIN: Old: * Remove patches: - crypto-policies-revert-rh-allow-sha1-signatures.patch BETA DEBUG END: BETA DEBUG BEGIN: New:- Allow sshd in FIPS mode when using the DEFAULT policy [bsc#1227370] * Add crypto-policies-Allow-sshd-in-FIPS-mode-using-DEFAULT.patch New:- Enable SHA1 sigver in the DEFAULT policy. * Add crypto-policies-enable-SHA1-sigver-in-DEFAULT.patch BETA DEBUG END: ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ crypto-policies.spec ++++++ --- /var/tmp/diff_new_pack.SZsVSB/_old 2025-03-24 13:25:10.758116670 +0100 +++ /var/tmp/diff_new_pack.SZsVSB/_new 2025-03-24 13:25:10.762116836 +0100 @@ -1,7 +1,7 @@ # # spec file for package crypto-policies # -# Copyright (c) 2024 SUSE LLC +# Copyright (c) 2025 SUSE LLC # # All modifications and additions to the file contributed by third parties # remain the property of their copyright owners, unless otherwise agreed @@ -21,8 +21,9 @@ # manbuild is disabled by default %bcond_with manbuild %global _python_bytecompile_extra 0 + Name: crypto-policies -Version: 20230920.570ea89 +Version: 20250124.4d262e7 Release: 0 Summary: System-wide crypto policies License: LGPL-2.1-or-later @@ -47,41 +48,34 @@ Patch2: crypto-policies-policygenerators.patch #PATCH-FIX-OPENSUSE bsc#1209998 Mention the supported back-end policies Patch3: crypto-policies-supported.patch -#PATCH-FIX-OPENSUSE Revert a breaking change that introduces rh-allow-sha1-signatures -Patch4: crypto-policies-revert-rh-allow-sha1-signatures.patch #PATCH-FIX-OPENSUSE Remove version for pylint from Makefile Patch5: crypto-policies-pylint.patch #PATCH-FIX-OPENSUSE Adpat the fips-mode-setup script for SUSE/openSUSE [jsc#PED-4578] Patch6: crypto-policies-FIPS.patch #PATCH-FIX-OPENSUSE Skip NSS policy check if not installed mozilla-nss-tools [bsc#1211301] Patch7: crypto-policies-nss.patch -BuildRequires: python3-base >= 3.6 -# The sequoia stuff needs python3-toml, removed until needed -# BuildRequires: python3-toml +#PATCH-FIX-OPENSUSE enable SHA1 sigver in DEFAULT +Patch8: crypto-policies-enable-SHA1-sigver-in-DEFAULT.patch +#PATCH-FIX-OPENSUSE Allow sshd in FIPS mode when using the DEFAULT policy [bsc#1227370] +Patch9: crypto-policies-Allow-sshd-in-FIPS-mode-using-DEFAULT.patch +BuildRequires: python3-base >= 3.11 %if %{with manbuild} BuildRequires: asciidoc %endif %if %{with testsuite} # The following packages are needed for the testsuite BuildRequires: bind -BuildRequires: codespell -BuildRequires: gnutls >= 3.6.0 +BuildRequires: crypto-policies-scripts +BuildRequires: gnutls BuildRequires: java-devel -BuildRequires: krb5-devel BuildRequires: libxslt BuildRequires: mozilla-nss-tools +BuildRequires: openssh-clients BuildRequires: openssl -BuildRequires: perl BuildRequires: python-rpm-macros -BuildRequires: python3-coverage -BuildRequires: python3-devel >= 3.6 -BuildRequires: python3-flake8 -BuildRequires: python3-pylint +BuildRequires: python3-devel >= 3.11 BuildRequires: python3-pytest -BuildRequires: perl(File::Copy) -BuildRequires: perl(File::Temp) -BuildRequires: perl(File::Which) -BuildRequires: perl(File::pushd) +BuildRequires: systemd-rpm-macros %else # Avoid cycle with python-rpm-macros #!BuildIgnore: python-rpm-packaging python-rpm-macros @@ -89,10 +83,10 @@ %if 0%{?primary_python:1} Recommends: crypto-policies-scripts %endif -Conflicts: gnutls < 3.7.3 -#Conflicts: libreswan < 3.28 -Conflicts: nss < 3.90.0 -#Conflicts: openssh < 8.2p1 +Conflicts: gnutls < 3.8.8 +Conflicts: nss < 3.105 +Conflicts: openssh < 9.9p1 +Conflicts: openssl < 3.0.2 #!BuildIgnore: crypto-policies BuildArch: noarch @@ -105,6 +99,7 @@ Summary: Tool to switch between crypto policies Requires: %{name} = %{version}-%{release} Recommends: perl-Bootloader +Provides: fips-mode-setup = %{version}-%{release} %description scripts This package provides a tool update-crypto-policies, which applies @@ -121,15 +116,8 @@ # Make README.SUSE available for %%doc cp -p %{SOURCE1} . -# Remove not needed policy generators -find -name libreswan.py -delete -find -name sequoia.py -delete - %build export OPENSSL_CONF='' -sed -i "s/MIN_RSA_DEFAULT = .*/MIN_RSA_DEFAULT = 'RequiredRSASize'/" \ - python/policygenerators/openssh.py -grep "MIN_RSA_DEFAULT = 'RequiredRSASize'" python/policygenerators/openssh.py %make_build %install @@ -162,12 +150,19 @@ install -p -m 755 fips-mode-setup %{buildroot}%{_bindir}/ install -p -m 755 fips-finish-install %{buildroot}%{_bindir}/ -# Drop pre-generated GOST-ONLY policy, we do not need to ship them +# Drop pre-generated GOST-ONLY and FEDORA policies, we do not need to ship them rm -rf %{buildroot}%{_datarootdir}/crypto-policies/GOST-ONLY - -# Drop FEDORA policies rm -rf %{buildroot}%{_datarootdir}/crypto-policies/*FEDORA* +# Drop libreswan and sequoia config files +find %{buildroot} -type f -name 'libreswan.*' -print -delete +find %{buildroot} -type f -name 'sequoia.*' -print -delete + +# Drop not needed fips bind mount service +find %{buildroot} -type f -name 'default-fips-config' -print -delete +find %{buildroot} -type f -name 'fips-setup-helper' -print -delete +find %{buildroot} -type f -name 'fips-crypto-policy-overlay*' -print -delete + # Create back-end configs for mounting with read-only /etc/ for d in LEGACY DEFAULT FUTURE FIPS BSI ; do mkdir -p -m 755 %{buildroot}%{_datarootdir}/crypto-policies/back-ends/$d @@ -229,12 +224,24 @@ end end +cfg_path_libreswan = "%{_sysconfdir}/crypto-policies/back-ends/libreswan.config" +st = posix.stat(cfg_path_libreswan) +if st and st.type == "link" then + posix.unlink(cfg_path_libreswan) +end + +cfg_path_javasystem = "%{_sysconfdir}/crypto-policies/back-ends/javasystem.config" +st = posix.stat(cfg_path_javasystem) +if st and st.type == "link" then + posix.unlink(cfg_path_javasystem) +end + %posttrans scripts %{_bindir}/update-crypto-policies --no-check >/dev/null 2>/dev/null || : %files %license COPYING.LESSER -%doc README.md NEWS CONTRIBUTING.md +%doc README.md CONTRIBUTING.md %doc %{_sysconfdir}/crypto-policies/README.SUSE %dir %{_sysconfdir}/crypto-policies/ @@ -256,12 +263,8 @@ %ghost %config(missingok,noreplace) %verify(not mode) %{_sysconfdir}/crypto-policies/back-ends/nss.config %ghost %config(missingok,noreplace) %verify(not mode) %{_sysconfdir}/crypto-policies/back-ends/bind.config %ghost %config(missingok,noreplace) %verify(not mode) %{_sysconfdir}/crypto-policies/back-ends/java.config -%ghost %config(missingok,noreplace) %verify(not mode) %{_sysconfdir}/crypto-policies/back-ends/javasystem.config %ghost %config(missingok,noreplace) %verify(not mode) %{_sysconfdir}/crypto-policies/back-ends/krb5.config -%ghost %config(missingok,noreplace) %verify(not mode) %{_sysconfdir}/crypto-policies/back-ends/libreswan.config %ghost %config(missingok,noreplace) %verify(not mode) %{_sysconfdir}/crypto-policies/back-ends/libssh.config -%ghost %config(missingok,noreplace) %verify(not mode) %{_sysconfdir}/crypto-policies/back-ends/sequoia.config -%ghost %config(missingok,noreplace) %verify(not mode) %{_sysconfdir}/crypto-policies/back-ends/rpm-sequoia.config # %%verify(not mode) comes from the fact that these turn into symlinks and back to regular files at will. %ghost %{_sysconfdir}/crypto-policies/state/current ++++++ _service ++++++ --- /var/tmp/diff_new_pack.SZsVSB/_old 2025-03-24 13:25:10.818119170 +0100 +++ /var/tmp/diff_new_pack.SZsVSB/_new 2025-03-24 13:25:10.818119170 +0100 @@ -4,7 +4,7 @@ <param name="scm">git</param> <param name="versionformat">%cd.%h</param> <param name="changesgenerate">enable</param> - <param name="revision">570ea89092555c6c289f226bb48c2d8c1f332b0f</param> + <param name="revision">4d262e79be1cd15c84cad55ad88c53a2d7712e85</param> </service> <service name="recompress" mode="disabled"> <param name="file">*.tar</param> ++++++ _servicedata ++++++ --- /var/tmp/diff_new_pack.SZsVSB/_old 2025-03-24 13:25:10.854120670 +0100 +++ /var/tmp/diff_new_pack.SZsVSB/_new 2025-03-24 13:25:10.858120836 +0100 @@ -1,6 +1,6 @@ <servicedata> <service name="tar_scm"> <param name="url">https://gitlab.com/redhat-crypto/fedora-crypto-policies.git</param> - <param name="changesrevision">570ea89092555c6c289f226bb48c2d8c1f332b0f</param></service></servicedata> + <param name="changesrevision">4d262e79be1cd15c84cad55ad88c53a2d7712e85</param></service></servicedata> (No newline at EOF) ++++++ crypto-policies-Allow-sshd-in-FIPS-mode-using-DEFAULT.patch ++++++ diff -PpuriN fedora-crypto-policies-20250124.4d262e7-orig/policies/DEFAULT.pol fedora-crypto-policies-20250124.4d262e7/policies/DEFAULT.pol --- fedora-crypto-policies-20250124.4d262e7-orig/policies/DEFAULT.pol 2025-01-24 18:31:31.000000000 +0100 +++ fedora-crypto-policies-20250124.4d262e7/policies/DEFAULT.pol 2025-03-18 14:39:54.565216139 +0100 @@ -15,9 +15,11 @@ mac = AEAD HMAC-SHA2-256 HMAC-SHA1 UMAC-128 HMAC-SHA2-384 HMAC-SHA2-512 mac@Kerberos = HMAC-SHA2-384 HMAC-SHA2-256 AEAD UMAC-128 HMAC-SHA2-512 HMAC-SHA1 +mac@SSH = AEAD HMAC-SHA2-256 HMAC-SHA1 HMAC-SHA2-384 HMAC-SHA2-512 group = X25519 SECP256R1 X448 SECP521R1 SECP384R1 \ FFDHE-2048 FFDHE-3072 FFDHE-4096 FFDHE-6144 FFDHE-8192 +group@SSH = -X25519 hash = SHA2-256 SHA2-384 SHA2-512 SHA3-256 SHA3-384 SHA3-512 SHA2-224 SHA3-224 \ SHAKE-256 @@ -53,7 +55,8 @@ cipher@RPM = AES-256-CFB AES-128-CFB CAM # CBC ciphers in SSH are considered vulnerable to plaintext recovery attacks # and disabled in client OpenSSH 7.6 (2017) and server OpenSSH 6.7 (2014). -cipher@SSH = -*-CBC +# disable also chachapoly, as we might run DEFAULT in FIPS mode too. +cipher@SSH = AES-256-GCM AES-256-CCM CAMELLIA-256-GCM AES-256-CTR AES-128-GCM AES-128-CCM CAMELLIA-128-GCM AES-128-CTR # 'RSA' is intentionally before DHE ciphersuites, as the DHE ciphersuites have # interoperability issues in TLS. diff -PpuriN fedora-crypto-policies-20250124.4d262e7-orig/tests/outputs/DEFAULT-opensshserver.txt fedora-crypto-policies-20250124.4d262e7/tests/outputs/DEFAULT-opensshserver.txt --- fedora-crypto-policies-20250124.4d262e7-orig/tests/outputs/DEFAULT-opensshserver.txt 2025-01-24 18:31:31.000000000 +0100 +++ fedora-crypto-policies-20250124.4d262e7/tests/outputs/DEFAULT-opensshserver.txt 2025-03-18 14:40:54.831266197 +0100 @@ -1,5 +1,5 @@ -Ciphers aes256-...@openssh.com,chacha20-poly1...@openssh.com,aes256-ctr,aes128-...@openssh.com,aes128-ctr -MACs hmac-sha2-256-...@openssh.com,hmac-sha1-...@openssh.com,umac-128-...@openssh.com,hmac-sha2-512-...@openssh.com,hmac-sha2-256,hmac-sha1,umac-...@openssh.com,hmac-sha2-512 +Ciphers aes256-...@openssh.com,aes256-ctr,aes128-...@openssh.com,aes128-ctr +MACs hmac-sha2-256-...@openssh.com,hmac-sha1-...@openssh.com,hmac-sha2-512-...@openssh.com,hmac-sha2-256,hmac-sha1,hmac-sha2-512 GSSAPIKexAlgorithms gss-curve25519-sha256-,gss-nistp256-sha256-,gss-group14-sha256-,gss-group16-sha512- KexAlgorithms curve25519-sha256,curve25519-sha...@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512 HostKeyAlgorithms ecdsa-sha2-nistp256,ecdsa-sha2-nistp256-cert-...@openssh.com,sk-ecdsa-sha2-nistp...@openssh.com,sk-ecdsa-sha2-nistp256-cert-...@openssh.com,ecdsa-sha2-nistp384,ecdsa-sha2-nistp384-cert-...@openssh.com,ecdsa-sha2-nistp521,ecdsa-sha2-nistp521-cert-...@openssh.com,ssh-ed25519,ssh-ed25519-cert-...@openssh.com,sk-ssh-ed25...@openssh.com,sk-ssh-ed25519-cert-...@openssh.com,rsa-sha2-256,rsa-sha2-256-cert-...@openssh.com,rsa-sha2-512,rsa-sha2-512-cert-...@openssh.com diff -PpuriN fedora-crypto-policies-20250124.4d262e7-orig/tests/outputs/DEFAULT-openssh.txt fedora-crypto-policies-20250124.4d262e7/tests/outputs/DEFAULT-openssh.txt --- fedora-crypto-policies-20250124.4d262e7-orig/tests/outputs/DEFAULT-openssh.txt 2025-01-24 18:31:31.000000000 +0100 +++ fedora-crypto-policies-20250124.4d262e7/tests/outputs/DEFAULT-openssh.txt 2025-03-18 15:41:32.234673018 +0100 @@ -1,7 +1,8 @@ -Ciphers aes256-...@openssh.com,chacha20-poly1...@openssh.com,aes256-ctr,aes128-...@openssh.com,aes128-ctr -MACs hmac-sha2-256-...@openssh.com,hmac-sha1-...@openssh.com,umac-128-...@openssh.com,hmac-sha2-512-...@openssh.com,hmac-sha2-256,hmac-sha1,umac-...@openssh.com,hmac-sha2-512 +Ciphers aes256-...@openssh.com,aes256-ctr,aes128-...@openssh.com,aes128-ctr +MACs hmac-sha2-256-...@openssh.com,hmac-sha1-...@openssh.com,hmac-sha2-512-...@openssh.com,hmac-sha2-256,hmac-sha1,hmac-sha2-512 GSSAPIKexAlgorithms gss-curve25519-sha256-,gss-nistp256-sha256-,gss-group14-sha256-,gss-group16-sha512- KexAlgorithms curve25519-sha256,curve25519-sha...@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512 +HostKeyAlgorithms ecdsa-sha2-nistp256,ecdsa-sha2-nistp256-cert-...@openssh.com,sk-ecdsa-sha2-nistp...@openssh.com,sk-ecdsa-sha2-nistp256-cert-...@openssh.com,ecdsa-sha2-nistp384,ecdsa-sha2-nistp384-cert-...@openssh.com,ecdsa-sha2-nistp521,ecdsa-sha2-nistp521-cert-...@openssh.com,ssh-ed25519,ssh-ed25519-cert-...@openssh.com,sk-ssh-ed25...@openssh.com,sk-ssh-ed25519-cert-...@openssh.com,rsa-sha2-256,rsa-sha2-256-cert-...@openssh.com,rsa-sha2-512,rsa-sha2-512-cert-...@openssh.com PubkeyAcceptedAlgorithms ecdsa-sha2-nistp256,ecdsa-sha2-nistp256-cert-...@openssh.com,sk-ecdsa-sha2-nistp...@openssh.com,sk-ecdsa-sha2-nistp256-cert-...@openssh.com,ecdsa-sha2-nistp384,ecdsa-sha2-nistp384-cert-...@openssh.com,ecdsa-sha2-nistp521,ecdsa-sha2-nistp521-cert-...@openssh.com,ssh-ed25519,ssh-ed25519-cert-...@openssh.com,sk-ssh-ed25...@openssh.com,sk-ssh-ed25519-cert-...@openssh.com,rsa-sha2-256,rsa-sha2-256-cert-...@openssh.com,rsa-sha2-512,rsa-sha2-512-cert-...@openssh.com HostbasedAcceptedAlgorithms ecdsa-sha2-nistp256,ecdsa-sha2-nistp256-cert-...@openssh.com,sk-ecdsa-sha2-nistp...@openssh.com,sk-ecdsa-sha2-nistp256-cert-...@openssh.com,ecdsa-sha2-nistp384,ecdsa-sha2-nistp384-cert-...@openssh.com,ecdsa-sha2-nistp521,ecdsa-sha2-nistp521-cert-...@openssh.com,ssh-ed25519,ssh-ed25519-cert-...@openssh.com,sk-ssh-ed25...@openssh.com,sk-ssh-ed25519-cert-...@openssh.com,rsa-sha2-256,rsa-sha2-256-cert-...@openssh.com,rsa-sha2-512,rsa-sha2-512-cert-...@openssh.com CASignatureAlgorithms ecdsa-sha2-nistp256,sk-ecdsa-sha2-nistp...@openssh.com,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,sk-ssh-ed25...@openssh.com,rsa-sha2-256,rsa-sha2-512 ++++++ crypto-policies-FIPS.patch ++++++ --- /var/tmp/diff_new_pack.SZsVSB/_old 2025-03-24 13:25:10.894122337 +0100 +++ /var/tmp/diff_new_pack.SZsVSB/_new 2025-03-24 13:25:10.898122503 +0100 @@ -1,7 +1,7 @@ -Index: fedora-crypto-policies-20230920.570ea89/fips-mode-setup +Index: fedora-crypto-policies-20240201.9f501f3/fips-mode-setup =================================================================== ---- fedora-crypto-policies-20230920.570ea89.orig/fips-mode-setup -+++ fedora-crypto-policies-20230920.570ea89/fips-mode-setup +--- fedora-crypto-policies-20240201.9f501f3.orig/fips-mode-setup ++++ fedora-crypto-policies-20240201.9f501f3/fips-mode-setup @@ -81,6 +81,19 @@ if [ "$(id -u)" != 0 ]; then exit 1 fi @@ -22,36 +22,48 @@ # Detect 1: kernel FIPS flag fips_kernel_enabled=$(cat /proc/sys/crypto/fips_enabled) -@@ -204,9 +217,22 @@ else - fi +@@ -167,10 +180,10 @@ if test $check = 1 ; then fi + # Boot configuration -if test "$boot_config" = 1 && test ! -x "$(command -v grubby)" ; then -- echo "The grubby command is missing, please configure the bootloader manually." +- echo >&2 "The grubby command is missing, please configure the bootloader manually." - boot_config=0 +-fi ++# if test "$boot_config" = 1 && test ! -x "$(command -v grubby)" ; then ++# echo >&2 "The grubby command is missing, please configure the bootloader manually." ++# boot_config=0 ++# fi + + if test "$boot_config" = 1 && test ! -d /boot ; then + echo >&2 "/boot directory is missing, FIPS mode cannot be $(enable2txt $enable_fips)." +@@ -236,20 +249,42 @@ if test "$boot_config" = 1 ; then + fi + fi + +if test "$boot_config" = 1 ; then + # Install required packages: patterns-base-fips and perl-Bootloader + if test ! -f /etc/dracut.conf.d/40-fips.conf && \ + test ! -x "$(command -v pbl)" && \ + test "$enable_fips" = 1; then -+ zypper -n install patterns-base-fips perl-Bootloader ++ zypper -n install patterns-base-fips perl-Bootloader + elif test ! -f /etc/dracut.conf.d/40-fips.conf && \ + test "$enable_fips" = 1 ; then -+ zypper -n install patterns-base-fips ++ zypper -n install patterns-base-fips + elif test ! -x "$(command -v pbl)" ; then -+ zypper -n install perl-Bootloader ++ zypper -n install perl-Bootloader + fi + if test $? != 0 ; then -+ echo "The pbl command or the fips pattern are missing, please configure the bootloader manually." -+ boot_config=0 ++ echo "The pbl command or the fips pattern are missing, please configure the bootloader manually." ++ boot_config=0 + fi - fi - ++fi ++ echo "FIPS mode will be $(enable2txt $enable_fips)." -@@ -217,15 +243,19 @@ if test $boot_config = 0 ; then - echo "Now you need to configure the bootloader to add kernel options \"$fipsopts\"" - echo "and reboot the system for the setting to take effect." - else + + fipsopts="fips=$enable_fips$boot_device_opt" + + if test "$boot_config" = 1 ; then - grubby --update-kernel=ALL --args="$fipsopts" - if test x"$(uname -m)" = xs390x; then - if command -v zipl >/dev/null; then @@ -62,7 +74,7 @@ - fi - fi + pbl --add-option "$fipsopts" -+ grub2-mkconfig -o /boot/grub2/grub.cfg && dracut -f --regenerate-all ++ pbl --config; pbl --install && dracut -f --regenerate-all + + # grubby --update-kernel=ALL --args="$fipsopts" + # if test x"$(uname -m)" = xs390x; then @@ -75,12 +87,12 @@ + # fi + echo "Please reboot the system for the setting to take effect." - fi - -Index: fedora-crypto-policies-20230920.570ea89/fips-finish-install + else + echo "Now you need to configure the bootloader to add kernel options \"$fipsopts\"" +Index: fedora-crypto-policies-20240201.9f501f3/fips-finish-install =================================================================== ---- fedora-crypto-policies-20230920.570ea89.orig/fips-finish-install -+++ fedora-crypto-policies-20230920.570ea89/fips-finish-install +--- fedora-crypto-policies-20240201.9f501f3.orig/fips-finish-install ++++ fedora-crypto-policies-20240201.9f501f3/fips-finish-install @@ -24,6 +24,15 @@ fi umask 022 @@ -151,10 +163,10 @@ +# echo '`zipl` execution has been skipped: `zipl` not found.' +# fi +# fi -Index: fedora-crypto-policies-20230920.570ea89/fips-mode-setup.8.txt +Index: fedora-crypto-policies-20240201.9f501f3/fips-mode-setup.8.txt =================================================================== ---- fedora-crypto-policies-20230920.570ea89.orig/fips-mode-setup.8.txt -+++ fedora-crypto-policies-20230920.570ea89/fips-mode-setup.8.txt +--- fedora-crypto-policies-20240201.9f501f3.orig/fips-mode-setup.8.txt ++++ fedora-crypto-policies-20240201.9f501f3/fips-mode-setup.8.txt @@ -45,6 +45,23 @@ Then the command modifies the boot loade When disabling the system FIPS mode the system crypto policy is switched to DEFAULT and the kernel command line option 'fips=0' is set. @@ -179,4 +191,130 @@ [[options]] OPTIONS +Index: fedora-crypto-policies-20240201.9f501f3/fips-mode-setup +=================================================================== +--- fedora-crypto-policies-20240201.9f501f3.orig/fips-mode-setup ++++ fedora-crypto-policies-20240201.9f501f3/fips-mode-setup +@@ -8,7 +8,6 @@ check=0 + boot_config=1 + err_if_disabled=0 + output_text=1 +-uki_file=/sys/firmware/efi/efivars/StubInfo-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f + + is_ostree_system=0 + if test -f /run/ostree-booted -o -d /ostree; then +@@ -61,18 +60,13 @@ while test $# -ge 1 ; do + done + + if test $usage = 1 -o x$enable_fips = x ; then +- echo "Check, enable, or disable (unsupported) the system FIPS mode." ++ echo "Check, enable, or disable the system FIPS mode." + echo "usage: $0 --enable|--disable [--no-bootcfg]" + echo "usage: $0 --check" + echo "usage: $0 --is-enabled" + exit 2 + fi + +-if test -e "$uki_file" && test "$FIPS_MODE_SETUP_SKIP_UKI_CHECK" != 1; then +- echo >&2 "UKI detected ($uki_file is present), forcing --no-bootcfg." +- boot_config=0 +-fi +- + # We don't handle the boot config on OSTree systems for now; it is assumed to be + # handled at a higher level. E.g. in Fedora CoreOS and RHEL CoreOS, it is + # intrinsically tied to the firstboot procedure. +@@ -186,12 +180,6 @@ if test $check = 1 ; then + exit 0 + fi + +-# Boot configuration +-# if test "$boot_config" = 1 && test ! -x "$(command -v grubby)" ; then +-# echo >&2 "The grubby command is missing, please configure the bootloader manually." +-# boot_config=0 +-# fi +- + if test "$boot_config" = 1 && test ! -d /boot ; then + echo >&2 "/boot directory is missing, FIPS mode cannot be $(enable2txt $enable_fips)." + echo >&2 "If you want to configure the bootloader manually, re-run with --no-bootcfg." +@@ -204,39 +192,6 @@ if test "$boot_config" = 1 && test -z "$ + exit 1 + fi + +-if test "$FIPS_MODE_SETUP_SKIP_ARGON2_CHECK" != 1 && \ +- test -x "$(command -v cryptsetup)" ; then +- # Best-effort detection of LUKS Argon2 usage +- argon2_found='' +- # two redundant ways to list device names +- devs=$( (find /dev/mapper/ -type l -printf '%f\n'; \ +- dmsetup ls --target crypt | cut -f1) \ +- | sort -u) +- while IFS= read -r devname; do +- back=$(cryptsetup status "$devname" | \ +- grep -F device: | +- sed -E 's/.*device:\s+//') +- if ! test -b "$back"; then +- echo >&2 -n "Warning: detected device '$back' " +- echo >&2 -n 'is not a valid block device. ' +- echo >&2 'Cannot check whether it uses Argon2.' +- continue +- fi +- dump=$(cryptsetup luksDump "$back") +- if grep -qEi 'PBKDF:.*argon' <<<"$dump"; then +- argon2_found+=" $back($devname)" +- fi +- done <<<"$devs" +- if test -n "$argon2_found" ; then +- echo >&2 -n "The following encrypted devices use Argon2 PBKDF:" +- echo >&2 "$argon2_found" +- echo >&2 'Aborting fips-mode-setup because of that.' +- echo >&2 -n 'Please refer to the ' +- echo >&2 'cryptsetup-luksConvertKey(8) manpage.' +- exit 76 +- fi +-fi +- + if test "$FIPS_MODE_SETUP_SKIP_WARNING" != 1 ; then + if test $enable_fips = 1 ; then + echo >&2 "*****************************************************************" +@@ -244,15 +199,13 @@ if test "$FIPS_MODE_SETUP_SKIP_WARNING" + echo >&2 "* *" + echo >&2 "* ENABLING FIPS MODE AFTER THE INSTALLATION IS NOT RECOMMENDED. *" + echo >&2 "* THIS OPERATION CANNOT BE UNDONE. *" +- echo >&2 "* REINSTALL WITH fips=1 INSTEAD. *" + echo >&2 "*****************************************************************" + elif test $enable_fips = 0 ; then + echo >&2 "*****************************************************************" + echo >&2 "* PRESS CONTROL-C WITHIN 15 SECONDS TO ABORT... *" + echo >&2 "* *" +- echo >&2 "* DISABLING FIPS MODE AFTER THE INSTALLATION IS NOT SUPPORTED. *" ++ echo >&2 "* DISABLING FIPS MODE AFTER THE INSTALLATION IS NOT RECOMMENDED.*" + echo >&2 "* THIS OPERATION CANNOT BE UNDONE. *" +- echo >&2 "* WIPE ALL MEDIA AND REINSTALL WITHOUT fips=1 INSTEAD. *" + echo >&2 "*****************************************************************" + fi + for i in {15..1}; do +@@ -339,21 +292,10 @@ fipsopts="fips=$enable_fips$boot_device_ + if test "$boot_config" = 1 ; then + pbl --add-option "$fipsopts" + pbl --config; pbl --install && dracut -f --regenerate-all +- +- # grubby --update-kernel=ALL --args="$fipsopts" +- # if test x"$(uname -m)" = xs390x; then +- # if command -v zipl >/dev/null; then +- # zipl +- # else +- # echo -n '`zipl` execution has been skipped: ' +- # echo '`zipl` not found.' +- # fi +- # fi +- +- echo "Please reboot the system for the setting to take effect." ++ echo "Please reboot the system for the settings to take effect." + else + echo "Now you need to configure the bootloader to add kernel options \"$fipsopts\"" +- echo "and reboot the system for the setting to take effect." ++ echo "and reboot the system for the settings to take effect." + fi + + exit 0 ++++++ crypto-policies-enable-SHA1-sigver-in-DEFAULT.patch ++++++ diff -PpuriN fedora-crypto-policies-orig/policies/DEFAULT.pol fedora-crypto-policies-20250124.4d262e7/policies/DEFAULT.pol --- fedora-crypto-policies-orig/policies/DEFAULT.pol 2025-01-24 18:31:31.000000000 +0100 +++ fedora-crypto-policies-20250124.4d262e7/policies/DEFAULT.pol 2025-03-11 14:09:01.796831654 +0100 @@ -1,7 +1,6 @@ # A reasonable default for today's standards. It should provide # 112-bit security with the exception of SHA1 signatures in DNSSec. # SHA1 is allowed in HMAC where collision attacks do not matter. -# OpenSSL distrusts signatures using SHA-1 (Changes/OpenSSLDistrustSHA1SigVer). # MACs: all HMAC with SHA1 or better + all modern MACs (Poly1305 etc) # Curves: all prime >= 255 bits (including Bernstein curves) @@ -88,6 +87,3 @@ etm@SSH = ANY sign@RPM = DSA-SHA1+ hash@RPM = SHA1+ min_dsa_size@RPM = 1024 - -# https://fedoraproject.org/wiki/Changes/OpenSSLDistrustSHA1SigVer -__openssl_block_sha1_signatures = 1 diff -PpuriN fedora-crypto-policies-orig/tests/alternative-policies/DEFAULT.pol fedora-crypto-policies-20250124.4d262e7/tests/alternative-policies/DEFAULT.pol --- fedora-crypto-policies-orig/tests/alternative-policies/DEFAULT.pol 2025-01-24 18:31:31.000000000 +0100 +++ fedora-crypto-policies-20250124.4d262e7/tests/alternative-policies/DEFAULT.pol 2025-03-11 13:53:52.231005482 +0100 @@ -91,6 +91,3 @@ ssh_etm = 1 sign@rpm-sequoia = DSA-SHA1+ hash@rpm-sequoia = SHA1+ min_dsa_size@rpm-sequoia = 1024 - -# https://fedoraproject.org/wiki/Changes/OpenSSLDistrustSHA1SigVer -__openssl_block_sha1_signatures = 1 diff -PpuriN fedora-crypto-policies-orig/tests/outputs/DEFAULT:GOST-opensslcnf.txt fedora-crypto-policies-20250124.4d262e7/tests/outputs/DEFAULT:GOST-opensslcnf.txt --- fedora-crypto-policies-orig/tests/outputs/DEFAULT:GOST-opensslcnf.txt 2025-01-24 18:31:31.000000000 +0100 +++ fedora-crypto-policies-20250124.4d262e7/tests/outputs/DEFAULT:GOST-opensslcnf.txt 2025-03-11 14:10:14.134767876 +0100 @@ -11,4 +11,4 @@ Groups = X25519:secp256r1:X448:secp521r1 alg_section = evp_properties [evp_properties] -rh-allow-sha1-signatures = no +rh-allow-sha1-signatures = yes diff -PpuriN fedora-crypto-policies-orig/tests/outputs/DEFAULT-opensslcnf.txt fedora-crypto-policies-20250124.4d262e7/tests/outputs/DEFAULT-opensslcnf.txt --- fedora-crypto-policies-orig/tests/outputs/DEFAULT-opensslcnf.txt 2025-01-24 18:31:31.000000000 +0100 +++ fedora-crypto-policies-20250124.4d262e7/tests/outputs/DEFAULT-opensslcnf.txt 2025-03-11 14:09:55.798784042 +0100 @@ -11,4 +11,4 @@ Groups = X25519:secp256r1:X448:secp521r1 alg_section = evp_properties [evp_properties] -rh-allow-sha1-signatures = no +rh-allow-sha1-signatures = yes diff -PpuriN fedora-crypto-policies-orig/tests/outputs/DEFAULT:TEST-PQ-opensslcnf.txt fedora-crypto-policies-20250124.4d262e7/tests/outputs/DEFAULT:TEST-PQ-opensslcnf.txt --- fedora-crypto-policies-orig/tests/outputs/DEFAULT:TEST-PQ-opensslcnf.txt 2025-01-24 18:31:31.000000000 +0100 +++ fedora-crypto-policies-20250124.4d262e7/tests/outputs/DEFAULT:TEST-PQ-opensslcnf.txt 2025-03-11 14:10:42.542742833 +0100 @@ -11,4 +11,4 @@ Groups = ?x25519_kyber768:?p256_kyber768 alg_section = evp_properties [evp_properties] -rh-allow-sha1-signatures = no +rh-allow-sha1-signatures = yes ++++++ crypto-policies-no-build-manpages.patch ++++++ --- /var/tmp/diff_new_pack.SZsVSB/_old 2025-03-24 13:25:10.930123837 +0100 +++ /var/tmp/diff_new_pack.SZsVSB/_new 2025-03-24 13:25:10.934124003 +0100 @@ -1,21 +1,21 @@ -Index: fedora-crypto-policies-20230420.3d08ae7/Makefile +Index: fedora-crypto-policies-20250124.4d262e7/Makefile =================================================================== ---- fedora-crypto-policies-20230420.3d08ae7.orig/Makefile -+++ fedora-crypto-policies-20230420.3d08ae7/Makefile -@@ -28,9 +28,9 @@ install: $(MANPAGES) - mkdir -p $(DESTDIR)$(MANDIR)/man7 - mkdir -p $(DESTDIR)$(MANDIR)/man8 +--- fedora-crypto-policies-20250124.4d262e7.orig/Makefile ++++ fedora-crypto-policies-20250124.4d262e7/Makefile +@@ -34,9 +34,9 @@ install: $(MANPAGES) mkdir -p $(DESTDIR)$(BINDIR) + mkdir -p $(DESTDIR)$(LIBEXECDIR) + mkdir -p $(DESTDIR)$(UNITDIR) - install -p -m 644 $(MAN7PAGES) $(DESTDIR)$(MANDIR)/man7 - install -p -m 644 $(MAN8PAGES) $(DESTDIR)$(MANDIR)/man8 - install -p -m 755 $(SCRIPTS) $(DESTDIR)$(BINDIR) + # install -p -m 644 $(MAN7PAGES) $(DESTDIR)$(MANDIR)/man7 + # install -p -m 644 $(MAN8PAGES) $(DESTDIR)$(MANDIR)/man8 + # install -p -m 755 $(SCRIPTS) $(DESTDIR)$(BINDIR) + install -p -m 644 $(UNITS) $(DESTDIR)$(UNITDIR) + install -p -m 755 $(LIBEXEC_SCRIPTS) $(DESTDIR)$(LIBEXECDIR) mkdir -p $(DESTDIR)$(DIR)/ - install -p -m 644 default-config $(DESTDIR)$(DIR) - install -p -m 644 output/reload-cmds.sh $(DESTDIR)$(DIR) -@@ -114,8 +114,8 @@ clean: +@@ -133,8 +133,8 @@ clean: rm -rf output %: %.txt ++++++ crypto-policies-nss.patch ++++++ --- /var/tmp/diff_new_pack.SZsVSB/_old 2025-03-24 13:25:10.950124669 +0100 +++ /var/tmp/diff_new_pack.SZsVSB/_new 2025-03-24 13:25:10.958125003 +0100 @@ -1,8 +1,8 @@ -Index: fedora-crypto-policies-20230920.570ea89/python/policygenerators/nss.py +Index: fedora-crypto-policies-20250124.4d262e7/python/policygenerators/nss.py =================================================================== ---- fedora-crypto-policies-20230920.570ea89.orig/python/policygenerators/nss.py -+++ fedora-crypto-policies-20230920.570ea89/python/policygenerators/nss.py -@@ -198,12 +198,20 @@ class NSSGenerator(ConfigGenerator): +--- fedora-crypto-policies-20250124.4d262e7.orig/python/policygenerators/nss.py ++++ fedora-crypto-policies-20250124.4d262e7/python/policygenerators/nss.py +@@ -422,12 +422,20 @@ class NSSGenerator(ConfigGenerator): try: with os.fdopen(fd, 'w') as f: f.write(config) @@ -29,7 +29,7 @@ finally: os.unlink(path) -@@ -211,6 +219,10 @@ class NSSGenerator(ConfigGenerator): +@@ -435,6 +443,10 @@ class NSSGenerator(ConfigGenerator): cls.eprint("There is a warning in NSS generated policy") cls.eprint(f'Policy:\n{config}') return False @@ -37,7 +37,7 @@ + cls.eprint('Skipping NSS policy check: ' + '/usr/bin/nss-policy-check not found') + return True - elif ret: + if ret: cls.eprint("There is an error in NSS generated policy") cls.eprint(f'Policy:\n{config}') ++++++ crypto-policies-policygenerators.patch ++++++ --- /var/tmp/diff_new_pack.SZsVSB/_old 2025-03-24 13:25:10.974125670 +0100 +++ /var/tmp/diff_new_pack.SZsVSB/_new 2025-03-24 13:25:10.978125836 +0100 @@ -1,44 +1,41 @@ -Index: fedora-crypto-policies-20230920.570ea89/python/policygenerators/__init__.py +Index: fedora-crypto-policies-20250124.4d262e7/python/policygenerators/__init__.py =================================================================== ---- fedora-crypto-policies-20230920.570ea89.orig/python/policygenerators/__init__.py -+++ fedora-crypto-policies-20230920.570ea89/python/policygenerators/__init__.py -@@ -8,7 +8,7 @@ from .gnutls import GnuTLSGenerator +--- fedora-crypto-policies-20250124.4d262e7.orig/python/policygenerators/__init__.py ++++ fedora-crypto-policies-20250124.4d262e7/python/policygenerators/__init__.py +@@ -7,7 +7,7 @@ from .bind import BindGenerator + from .gnutls import GnuTLSGenerator from .java import JavaGenerator - from .java import JavaSystemGenerator from .krb5 import KRB5Generator -from .libreswan import LibreswanGenerator +# from .libreswan import LibreswanGenerator from .libssh import LibsshGenerator from .nss import NSSGenerator - from .openssh import OpenSSHClientGenerator -@@ -16,8 +16,8 @@ from .openssh import OpenSSHServerGenera - from .openssl import OpenSSLConfigGenerator - from .openssl import OpenSSLGenerator - from .openssl import OpenSSLFIPSGenerator --from .sequoia import SequoiaGenerator --from .sequoia import RPMSequoiaGenerator -+# from .sequoia import SequoiaGenerator -+# from .sequoia import RPMSequoiaGenerator + from .openssh import OpenSSHClientGenerator, OpenSSHServerGenerator +@@ -16,14 +16,13 @@ from .openssl import ( + OpenSSLFIPSGenerator, + OpenSSLGenerator, + ) +-from .sequoia import RPMSequoiaGenerator, SequoiaGenerator ++#from .sequoia import RPMSequoiaGenerator, SequoiaGenerator __all__ = [ 'BindGenerator', -@@ -25,7 +25,6 @@ __all__ = [ + 'GnuTLSGenerator', 'JavaGenerator', - 'JavaSystemGenerator', 'KRB5Generator', - 'LibreswanGenerator', 'LibsshGenerator', 'NSSGenerator', 'OpenSSHClientGenerator', -@@ -33,6 +32,8 @@ __all__ = [ +@@ -31,6 +30,8 @@ __all__ = [ 'OpenSSLConfigGenerator', - 'OpenSSLGenerator', 'OpenSSLFIPSGenerator', -- 'SequoiaGenerator', + 'OpenSSLGenerator', - 'RPMSequoiaGenerator', +- 'SequoiaGenerator', ] + -+# 'LibreswanGenerator', -+# 'SequoiaGenerator', -+# 'RPMSequoiaGenerator', ++ # 'LibreswanGenerator', ++ # 'RPMSequoiaGenerator', ++ # 'SequoiaGenerator', ++++++ crypto-policies-supported.patch ++++++ --- /var/tmp/diff_new_pack.SZsVSB/_old 2025-03-24 13:25:11.014127337 +0100 +++ /var/tmp/diff_new_pack.SZsVSB/_new 2025-03-24 13:25:11.018127503 +0100 @@ -13,25 +13,25 @@ +* OpenSSL library (OpenSSL, SSL, TLS) (Supported) -* NSS library (NSS, SSL, TLS) -+* NSS library (NSS, SSL, TLS) (Not supported) ++* NSS library (NSS, SSL, TLS) (Supported) -* OpenJDK (java-tls, SSL, TLS) +* OpenJDK (java-tls, SSL, TLS) (Supported) -* Libkrb5 (krb5, kerberos) -+* Libkrb5 (krb5, kerberos) (Not supported) ++* Libkrb5 (krb5, kerberos) (Supported) -* BIND (BIND, DNSSec) -+* BIND (BIND, DNSSec) (Not supported) ++* BIND (BIND, DNSSec) (Supported) -* OpenSSH (OpenSSH, SSH) -+* OpenSSH (OpenSSH, SSH) (Not supported) ++* OpenSSH (OpenSSH, SSH) (Supported) -* Libreswan (libreswan, IKE, IPSec) -+* Libreswan (libreswan, IKE, IPSec) (Not supported) ++* Libreswan (libreswan, IKE, IPSec) (Not supported as its not available in SLE/openSUSE) -* libssh (libssh, SSH) -+* libssh (libssh, SSH) (Not supported) ++* libssh (libssh, SSH) (Supported) Applications and languages which rely on any of these back-ends will follow the system policies as well. Examples are apache httpd, nginx, php, and ++++++ crypto-policies.7.gz ++++++ --- /var/tmp/diff_new_pack.SZsVSB/_old 2025-03-24 13:25:11.050128837 +0100 +++ /var/tmp/diff_new_pack.SZsVSB/_new 2025-03-24 13:25:11.058129170 +0100 @@ -2,12 +2,12 @@ .\" Title: crypto-policies .\" Author: [see the "AUTHOR" section] .\" Generator: DocBook XSL Stylesheets vsnapshot <http://docbook.sf.net/> -.\" Date: 09/22/2023 +.\" Date: 02/07/2025 .\" Manual: \ \& .\" Source: crypto-policies .\" Language: English .\" -.TH "CRYPTO\-POLICIES" "7" "09/22/2023" "crypto\-policies" "\ \&" +.TH "CRYPTO\-POLICIES" "7" "02/07/2025" "crypto\-policies" "\ \&" .\" ----------------------------------------------------------------- .\" * Define some portability stuff .\" ----------------------------------------------------------------- @@ -131,9 +131,21 @@ .\} \fBNSS\fR TLS library (scopes: -\fBNSS\fR, +\fBNSS\fR; specific algorithm usage purposes are also affected by \fBSSL\fR, -\fBTLS\fR) +\fBTLS\fR, +\fBpkcs12\fR, +\fBpkcs12\-import\fR, +\fBsmime\fR, +\fBsmime\-import\fR +scopes, and internal use +\fBnss\-tls\fR, +\fBnss\-pkcs12\fR, +\fBnss\-pkcs12\-import\fR, +\fBnss\-smime\fR +and +\fBnss\-smime\-import\fR +scopes\&.) .RE .sp .RS 4 @@ -1170,6 +1182,21 @@ .sp -1 .IP \(bu 2.3 .\} +\fBmin_ec_size\fR: Integer value of minimum number of bits for +\fBEC\fR +keys (Applies to +\fBJava\fR +back end only) +.RE +.sp +.RS 4 +.ie n \{\ +\h'-04'\(bu\h'+03'\c +.\} +.el \{\ +.sp -1 +.IP \(bu 2.3 +.\} \fBsha1_in_certs\fR: Value of 1 if \fBSHA1\fR allowed in certificate signatures, 0 otherwise (Applies to @@ -1211,9 +1238,11 @@ .sp -1 .IP \(bu 2.3 .\} -\fBssh_etm\fR: Value of 1 if -\fBOpenSSH\fR -EtM (encrypt\-then\-mac) extension is allowed, 0 otherwise +\fBetm\fR: +\fBANY\fR/\fBDISABLE_ETM\fR/\fBDISABLE_NON_ETM\fR +allows both EtM (Encrypt\-then\-Mac) and E&M (Encrypt\-and\-Mac), disables EtM, and disables E&M respectively\&. (Currently only implemented for SSH, do not use without +\fB@SSH\fR +scope\&.) .RE .sp Full policy definition files have suffix \&.pol, subpolicy files have suffix \&.pmod\&. Subpolicies do not have to have values set for all the keys listed above\&. @@ -1655,6 +1684,30 @@ \fBgroup\fR values is ignored and built\-in order is used instead\&. .RE +.sp +.RS 4 +.ie n \{\ +\h'-04'\(bu\h'+03'\c +.\} +.el \{\ +.sp -1 +.IP \(bu 2.3 +.\} +\fBNSS\fR: currently is the only one respecting the +\fBpkcs12\fR +/ +\fBpkcs12\-import\fR +scopes\&. +\fBpkcs12\fR +implies +\fBpkcs12\-import\fR, it\(cqs not possible to allow exporting without allowing importing\&. The same applies to +\fBsmime\fR +/ +\fBsmime\-import\fR +scopes, and their +\fBnss\-\fR +prefixed internal\-use variants\&. These scopes cannot be used for enabling signature algorithms that weren\(cqt otherwise enabled\&. +.RE .SH "HISTORY" .sp The \fBECDHE\-GSS\fR and \fBDHE\-GSS\fR algorithms are newly introduced and must be specified in the base policy for the SSH GSSAPI key exchange methods to be enabled\&. Previously the legacy SSH GSSAPI key exchange methods were automatically enabled when the \fBSHA1\fR hash and \fBDH\fR parameters of at least 2048 bits were enabled\&. @@ -1763,6 +1816,21 @@ \fBhash@DNSSec\fR, \fBsign@DNSSec\fR)\&. .RE +.sp +.RS 4 +.ie n \{\ +\h'-04'\(bu\h'+03'\c +.\} +.el \{\ +.sp -1 +.IP \(bu 2.3 +.\} +\fBssh_etm\fR: Value of 1 if +\fBOpenSSH\fR +EtM (encrypt\-then\-mac) extension is allowed, 0 otherwise\&. Use +\fBetm@SSH\fR +instead\&. +.RE .SH "FILES" .PP /etc/crypto\-policies/back\-ends ++++++ fedora-crypto-policies-20230920.570ea89.tar.gz -> fedora-crypto-policies-20250124.4d262e7.tar.gz ++++++ ++++ 7975 lines of diff (skipped) ++++++ fips-finish-install.8.gz ++++++ --- /var/tmp/diff_new_pack.SZsVSB/_old 2025-03-24 13:25:11.290138837 +0100 +++ /var/tmp/diff_new_pack.SZsVSB/_new 2025-03-24 13:25:11.310139671 +0100 @@ -2,12 +2,12 @@ .\" Title: fips-finish-install .\" Author: [see the "AUTHOR" section] .\" Generator: DocBook XSL Stylesheets vsnapshot <http://docbook.sf.net/> -.\" Date: 09/22/2023 +.\" Date: 02/07/2025 .\" Manual: \ \& .\" Source: fips-finish-install .\" Language: English .\" -.TH "FIPS\-FINISH\-INSTAL" "8" "09/22/2023" "fips\-finish\-install" "\ \&" +.TH "FIPS\-FINISH\-INSTAL" "8" "02/07/2025" "fips\-finish\-install" "\ \&" .\" ----------------------------------------------------------------- .\" * Define some portability stuff .\" ----------------------------------------------------------------- ++++++ fips-mode-setup.8.gz ++++++ --- /var/tmp/diff_new_pack.SZsVSB/_old 2025-03-24 13:25:11.334140671 +0100 +++ /var/tmp/diff_new_pack.SZsVSB/_new 2025-03-24 13:25:11.350141337 +0100 @@ -2,12 +2,12 @@ .\" Title: fips-mode-setup .\" Author: [see the "AUTHOR" section] .\" Generator: DocBook XSL Stylesheets vsnapshot <http://docbook.sf.net/> -.\" Date: 09/22/2023 +.\" Date: 02/07/2025 .\" Manual: \ \& .\" Source: fips-mode-setup .\" Language: English .\" -.TH "FIPS\-MODE\-SETUP" "8" "09/22/2023" "fips\-mode\-setup" "\ \&" +.TH "FIPS\-MODE\-SETUP" "8" "02/07/2025" "fips\-mode\-setup" "\ \&" .\" ----------------------------------------------------------------- .\" * Define some portability stuff .\" ----------------------------------------------------------------- ++++++ update-crypto-policies.8.gz ++++++ --- /var/tmp/diff_new_pack.SZsVSB/_old 2025-03-24 13:25:11.382142670 +0100 +++ /var/tmp/diff_new_pack.SZsVSB/_new 2025-03-24 13:25:11.394143171 +0100 @@ -2,12 +2,12 @@ .\" Title: update-crypto-policies .\" Author: [see the "AUTHOR" section] .\" Generator: DocBook XSL Stylesheets vsnapshot <http://docbook.sf.net/> -.\" Date: 09/22/2023 +.\" Date: 02/07/2025 .\" Manual: \ \& .\" Source: update-crypto-policies .\" Language: English .\" -.TH "UPDATE\-CRYPTO\-POLI" "8" "09/22/2023" "update\-crypto\-policies" "\ \&" +.TH "UPDATE\-CRYPTO\-POLI" "8" "02/07/2025" "update\-crypto\-policies" "\ \&" .\" ----------------------------------------------------------------- .\" * Define some portability stuff .\" ----------------------------------------------------------------- @@ -74,7 +74,7 @@ .sp -1 .IP \(bu 2.3 .\} -NSS library (NSS, SSL, TLS) (Not supported) +NSS library (NSS, SSL, TLS) (Supported) .RE .sp .RS 4 @@ -96,7 +96,7 @@ .sp -1 .IP \(bu 2.3 .\} -Libkrb5 (krb5, kerberos) (Not supported) +Libkrb5 (krb5, kerberos) (Supported) .RE .sp .RS 4 @@ -107,7 +107,7 @@ .sp -1 .IP \(bu 2.3 .\} -BIND (BIND, DNSSec) (Not supported) +BIND (BIND, DNSSec) (Supported) .RE .sp .RS 4 @@ -118,7 +118,7 @@ .sp -1 .IP \(bu 2.3 .\} -OpenSSH (OpenSSH, SSH) (Not supported) +OpenSSH (OpenSSH, SSH) (Supported) .RE .sp .RS 4 @@ -140,7 +140,7 @@ .sp -1 .IP \(bu 2.3 .\} -libssh (libssh, SSH) (Not supported) +libssh (libssh, SSH) (Supported) .RE .sp Applications and languages which rely on any of these back\-ends will follow the system policies as well\&. Examples are apache httpd, nginx, php, and others\&.