On Fri, 2014-09-12 at 13:17 +0200, Martin Kosek wrote:
> On 09/12/2014 10:25 AM, Martin Kosek wrote:
> > On 09/12/2014 10:13 AM, Ludwig Krispenz wrote:
> >>
> >> On 09/12/2014 09:37 AM, Martin Kosek wrote:
> >>> On 09/12/2014 03:21 AM, Nathaniel McCallum wrote:
> >>>> On Thu, 2014-09-11 at 16:48 +0200, Petr Viktorin wrote:
> >>>>> On 09/11/2014 04:43 PM, Nathaniel McCallum wrote:
> >>>>>> On Thu, 2014-09-11 at 16:39 +0200, Petr Viktorin wrote:
> >>>>>>> On 09/11/2014 04:38 PM, Ludwig Krispenz wrote:
> >>>>>>>>
> >>>>>>>> On 09/11/2014 04:31 PM, Petr Viktorin wrote:
> >>>>>>>>> On 09/11/2014 04:26 PM, Martin Kosek wrote:
> >>>>>>> ...
> >>>>>>>>>> Also, we will need to add the F21 389-ds-base build to FreeIPA 
> >>>>>>>>>> Copr:
> >>>>>>>>>> http://copr.fedoraproject.org/coprs/mkosek/freeipa/
> >>>>>>>>>> so that F20 users can upgrade to the newest FreeIPA. Are there any
> >>>>>>>>>> known issues
> >>>>>>>>>> in the F21 389-ds-base build that would prevent upstream FreeIPA
> >>>>>>>>>> 4.0.x to be
> >>>>>>>>>> based on it?
> >>>>>>>>>>
> >>>>>>>>>> If yes, we may need to include the patch in Fedora 21 downstream 
> >>>>>>>>>> only
> >>>>>>>>>> after all..
> >>>>>>>>>
> >>>>>>>>> We're basing the Fedora 21 Alpha downstream on FreeIPA 4.0.3, so we
> >>>>>>>>> couldn't include the patch even there.
> >>>>>>>>> There better be no such issues.
> >>>>>>>> what do you mean by "no such issues" ? I don't think that 389/F21 
> >>>>>>>> will
> >>>>>>>> be the first bug free software. At the moment Thierry is 
> >>>>>>>> investigating a
> >>>>>>>> crash in dna-plugin and Noriko a memory leak, which could be in F21 -
> >>>>>>>>
> >>>>>>>
> >>>>>>> any known issues in the F21 389-ds-base build that would prevent
> >>>>>>> upstream FreeIPA 4.0.x to be based on it
> >>>>>>
> >>>>>> Yes. 389 will not start if weak ciphers are specified. Currently,
> >>>>>> FreeIPA specifies weak ciphers. This means that FreeIPA in F21 doesn't
> >>>>>> work at all because the DS will never start.
> >>>>>>
> >>>>>> We need this patch merged: https://fedorahosted.org/389/ticket/47838
> >>>>
> >>>> Done: thanks everyone on the DS side!
> >>>>
> >>>>>> Then, we need an F21 build of 389-ds-base.
> >>>>
> >>>> Done: thanks nhosoi!
> >>>>
> >>>>>> Then we need to merge Ludwig's IPA patch from this thread with a
> >>>>>> versioned dependency on the new 389-ds-base build.
> >>>>
> >>>> New patch attached which includes a versioned dep on the new DS.
> >>>
> >>> ipa-server-install still fails for me, even when I use
> >>> 389-ds-base-1.3.3.2-1.fc20.x86_64:
> >>>
> >>> # ipa-server-install
> >>> ...
> >>>   [12/13]: restarting httpd
> >>>   [13/13]: configuring httpd to start on boot
> >>> Done configuring the web interface (httpd).
> >>> Applying LDAP updates
> >>> Unexpected error - see /var/log/ipaserver-install.log for details:
> >>> ObjectclassViolation: attribute "allowweakciphers" not allowed
> >>>
> >>>
> >>> I think you simply use a wrong config name - have extra "s" in the end. 
> >>> It is
> >>> defined as
> >> that typo was already in my first draft of the patch, sorry
> >>>
> >>> allowWeakCipher in "cn=encryption,cn=config". allowWeakCipher: [on | off]
> >>>
> >>>
> >>> Also, do we really need to put it to "off" in the updates? AFAIU, it is 
> >>> off
> >>> by default in our config and with current setting, users could not put it 
> >>> to
> >>> "on" (for whatever reason) without the value being overwritten with every 
> >>> run
> >>> of FreeIPA upgrade.
> >> could there be an upgrade from a install not yet using that params. should
> >> "only:allowWeakCipher" be replaced by "addifnew" ?
> >
> > You can try "default:allowWeakCiphers: off" - it would set the attribute to 
> > off
> > if it was not there before.
> >
> > Given you are probably working on updated version, I would also recommend
> > following
> >
> > http://www.freeipa.org/page/Contribute/Patch_Format#Patch_format_2
> >
> > as I saw couple nitpicks with your patch
> > - ticket number in patch description and not in it's body
> > - bad "From" field - I would rather expect it to be "Ludwig Krispenz
> > <lkris...@redhat.com>" than "lkrispen <lkris...@redhat.com>"
> >
> > Thanks,
> > Martin
> 
> Hello, any update on this front? Are you or Nathaniel updating the patch?

Attached.
From d4d24366c6392a1cd0c3d7c8513e20d0f9520766 Mon Sep 17 00:00:00 2001
From: Nathaniel McCallum <npmccal...@redhat.com>
Date: Fri, 12 Sep 2014 10:02:00 -0400
Subject: [PATCH] Update 389 SSL cipher config

We allow 389 to choose its own ciphers, but we default to
disabling weak ciphers. This offloads the choice to the
proper place so that we don't have to manage it in FreeIPA
anymore.

Thanks to Ludwig Krispenz <lkris...@redhat.com> for the
first version of this patch.

https://fedorahosted.org/freeipa/ticket/4395
---
 freeipa.spec.in                      | 6 +++---
 install/updates/20-sslciphers.update | 6 ++++++
 install/updates/Makefile.am          | 1 +
 ipaserver/install/dsinstance.py      | 7 ++-----
 4 files changed, 12 insertions(+), 8 deletions(-)
 create mode 100644 install/updates/20-sslciphers.update

diff --git a/freeipa.spec.in b/freeipa.spec.in
index b672ecb03bdd73c1a911a6a982ccd894bebcbce4..685b345fedb9d157c8deedc66f8712da32c5963b 100644
--- a/freeipa.spec.in
+++ b/freeipa.spec.in
@@ -18,7 +18,7 @@ Source0:        freeipa-%{version}.tar.gz
 BuildRoot:      %{_tmppath}/%{name}-%{version}-%{release}-root-%(%{__id_u} -n)
 
 %if ! %{ONLY_CLIENT}
-BuildRequires:  389-ds-base-devel >= 1.3.2.16
+BuildRequires:  389-ds-base-devel >= 1.3.3.2
 BuildRequires:  svrcore-devel
 BuildRequires:  policycoreutils >= %{POLICYCOREUTILSVER}
 BuildRequires:  systemd-units
@@ -87,7 +87,7 @@ Group: System Environment/Base
 Requires: %{name}-python = %{version}-%{release}
 Requires: %{name}-client = %{version}-%{release}
 Requires: %{name}-admintools = %{version}-%{release}
-Requires: 389-ds-base >= 1.3.2.20
+Requires: 389-ds-base >= 1.3.3.2
 Requires: openldap-clients > 2.4.35-4
 Requires: nss >= 3.14.3-12.0
 Requires: nss-tools >= 3.14.3-12.0
@@ -124,7 +124,7 @@ Requires: zip
 Requires: policycoreutils >= %{POLICYCOREUTILSVER}
 Requires: tar
 Requires(pre): certmonger >= 0.75.13
-Requires(pre): 389-ds-base >= 1.3.2.20
+Requires(pre): 389-ds-base >= 1.3.3.2
 Requires: fontawesome-fonts
 Requires: open-sans-fonts
 
diff --git a/install/updates/20-sslciphers.update b/install/updates/20-sslciphers.update
new file mode 100644
index 0000000000000000000000000000000000000000..eef95f1907b397a277dc96046d5bb91a92aaf304
--- /dev/null
+++ b/install/updates/20-sslciphers.update
@@ -0,0 +1,6 @@
+# change configured ciphers
+# the result of this update will be that all ciphers
+# provided by NSS which ar not weak will be enabled
+dn: cn=encryption,cn=config
+only:nsSSL3Ciphers: +all
+default:allowWeakCipher: off
diff --git a/install/updates/Makefile.am b/install/updates/Makefile.am
index 1d912a7d29552000d082aca58d345924ab84e11c..026cde0498dc15bda10605dd427881d71c4bfa25 100644
--- a/install/updates/Makefile.am
+++ b/install/updates/Makefile.am
@@ -14,6 +14,7 @@ app_DATA =				\
 	20-indices.update		\
 	20-nss_ldap.update		\
 	20-replication.update		\
+	20-sslciphers.update		\
 	20-syncrepl.update		\
 	20-user_private_groups.update	\
 	20-winsync_index.update		\
diff --git a/ipaserver/install/dsinstance.py b/ipaserver/install/dsinstance.py
index cc1d32709f552a7c6366edbb8b9c03ec28ac6e3a..0518dd0e0f20255f4e42911af6f1f95fc25f554e 100644
--- a/ipaserver/install/dsinstance.py
+++ b/ipaserver/install/dsinstance.py
@@ -664,11 +664,8 @@ class DsInstance(service.Service):
         conn.do_simple_bind(DN(('cn', 'directory manager')), self.dm_password)
 
         mod = [(ldap.MOD_REPLACE, "nsSSLClientAuth", "allowed"),
-               (ldap.MOD_REPLACE, "nsSSL3Ciphers",
-                "-rsa_null_md5,+rsa_rc4_128_md5,+rsa_rc4_40_md5,+rsa_rc2_40_md5,\
-+rsa_des_sha,+rsa_fips_des_sha,+rsa_3des_sha,+rsa_fips_3des_sha,+fortezza,\
-+fortezza_rc4_128_sha,+fortezza_null,+tls_rsa_export1024_with_rc4_56_sha,\
-+tls_rsa_export1024_with_des_cbc_sha")]
+               (ldap.MOD_REPLACE, "nsSSL3Ciphers", "+all"),
+               (ldap.MOD_REPLACE, "allowWeakCipher", "off")]
         conn.modify_s(DN(('cn', 'encryption'), ('cn', 'config')), mod)
 
         mod = [(ldap.MOD_ADD, "nsslapd-security", "on")]
-- 
2.1.0

_______________________________________________
Freeipa-devel mailing list
Freeipa-devel@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-devel

Reply via email to