Planned outage: koji database - 2017-04-27 00:00

2017-04-26 Thread Kevin Fenzi
We will be rebooting the koji database server in order to add more
virtual cpus to it.

This outage should be just a minute or two and should not hopefully
affect in progress builds.

Sorry for the short notice of this outage, but we wanted to improve koji
performance and this is an easy way to quickly do so.

See: https://pagure.io/fedora-infrastructure/issue/6015
or #fedora-admin on irc.freenode.net for any questions or comments.

kevin



signature.asc
Description: OpenPGP digital signature
___
devel-announce mailing list -- devel-announce@lists.fedoraproject.org
To unsubscribe send an email to devel-announce-le...@lists.fedoraproject.org


OpenVPN, OpenSSL and Fedora 26+

2017-04-26 Thread David Sommerseth

Hi,

This is actually just a very late heads-up about challenges with OpenVPN
in Fedora 26.

Fedora is moving towards OpenSSL v1.1, which is in my opinion a sane and
good step forward.  Unfortunately, that gives OpenVPN a real challenge.
The OpenSSL v1.1 support is not completed.  Patches have been sent to
the upstream devel mailing list for review, but only half of them have
been processed and applied so far.

So, to be able to provide OpenVPN in Fedora 26 it was decided to switch
to mbed TLS instead of OpenSSL (which OpenVPN also supports).  That have
revealed several issues:

  - mbed TLS 2.3+ does by default not support certificates hashes
"older" than  SHA1.  And RSA keys must be 2048 bits or more.
This have been fixed by a couple of additional patches on top
of the upstream OpenVPN code base.  It supports now RSA keys
of 1024 bits or more.  In addition for OpenSSL support of the
OPENSSL_ENABLE_MD5_VERIFY, a quirk have been added to also enable
MD5 support if that environment variable have been set.

  - mbed TLS build in Fedora lacked PKCS#11 support.  This have
been resolved.  But there are concerns how well this plays along
with another dependency OpenVPN have, pkcs11-helper.  This is being
investigated and tested.  Feel free to help out on bz #1432152 if
you depend on PKCS#11/Smart Card functionality.  Your feedback is
valuable!

  - mbed TLS completely lacks support for PKCS#12 files.

Now, there is kind of an alternative by using compat-openssl-10.  But
that does not play well with pkcs11-helper; which is compiled against
OpenSSL v1.1.

Currently the plan is to stay with mbed TLS support until PKCS#11
support is fully confirmed working or not working at all.  If not
working, we can at least move to compat-openssl10 without PKCS#11
support, which enables PKCS#12 support again.  If PKCS#11 support works
with mbed TLS, then we will stay on mbed TLS for now as I value that
support more important than PKCS#12.

Once OpenVPN have released a version with full OpenSSL v1.1 support (or
at least have all the needed patches reviewed and applied to their
upstream git repos), then I will switch back to the default openssl
package again.

This is far from ideal.  But I do consider this the best compromise than
not having an OpenVPN package in Fedora 26 at all.

For those of you having PKCS#12 files, there is a kind of workaround
where you can split up that file into CA, Certificate and Private Key
PEM files - which OpenVPN can use directly.

$ openssl pkcs12 -nokeys -cacerts -in $PKCS12FILE > ca-cert.pem
$ openssl pkcs12 -nokeys -clcerts -in $PKCS12FILE > cert.pem
$ openssl pkcs12 -nocerts -nodes -in $PKCS12FILE > private-key.pem

If switching from '-nodes' with for example '-aes256' on the last line,
the private key will be encrypted and password protected; similar to
what your PKCS#12 files may already use today.


I am sorry for not having sent this heads-up earlier.  I took over
package maintenance mid-March, and I've taken this package through a
very much needed overhaul to align the packaging with improvements in
the upstream packaging.  The previous maintainers have done a good job
keeping this package alive, but the gap against upstream began to be a
bit too big.  There are still a few things which needs to be ironed out.
 But once the mbed TLS/OpenSSL issue and a few other more minor issues
gets resolved, I'd say we're pretty much in a reasonable shape.

If you have questions, issues or comments ... feel free to reach out!


-- 
kind regards,

David Sommerseth



signature.asc
Description: OpenPGP digital signature
___
devel-announce mailing list -- devel-announce@lists.fedoraproject.org
To unsubscribe send an email to devel-announce-le...@lists.fedoraproject.org