Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

crypto-policies-scripts-20241010-1.git8baf557.fc41 RPM for noarch

From Fedora 41 for s390x / c

Name: crypto-policies-scripts Distribution: Fedora Project
Version: 20241010 Vendor: Fedora Project
Release: 1.git8baf557.fc41 Build date: Fri Oct 11 07:52:36 2024
Group: Unspecified Build host: buildvm-x86-14.iad2.fedoraproject.org
Size: 395965 Source RPM: crypto-policies-20241010-1.git8baf557.fc41.src.rpm
Packager: Fedora Project
Url: https://gitlab.com/redhat-crypto/fedora-crypto-policies
Summary: Tool to switch between crypto policies
This package provides a tool update-crypto-policies, which applies
the policies provided by the crypto-policies package. These can be
either the pre-built policies from the base package or custom policies
defined in simple policy definition files.

The package also provides a tool fips-mode-setup, which can be used
to enable or disable the system FIPS mode.

Provides

Requires

License

LGPL-2.1-or-later

Changelog

* Thu Oct 10 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20241010-1.git8baf557
  - LEGACY: enable 192-bit ciphers for nss pkcs12/smime
  - openssl: map NULL to TLS_SHA256_SHA256:TLS_SHA384_SHA384
* Fri Sep 27 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20240927-1.git93b7251
  - nss: be stricter with new purposes
* Wed Aug 28 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20240828-1.git5f66e81
  - fips-mode-setup: small Argon2 detection fix
* Mon Aug 26 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20240826-1.gite824389
  - SHA1: add __openssl_block_sha1_signatures = 0
* Thu Aug 22 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20240822-1.git64c9381
  - fips-mode-setup: block if LUKS devices using Argon2 are detected
* Wed Aug 07 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20240807-1.git5795660
  - fips-crypto-policy-overlay: a unit to automount FIPS policy when fips=1
  - fips-setup-helper: add a libexec helper for anaconda
  - fips-mode-setup: force --no-bootcfg when UKI is detected
* Fri Aug 02 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20240802-1.git2e5e430
  - nss: rewrite backend for nss 3.101
* Thu Jul 25 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20240725-1.git9555558
  - gnutls: wire X25519-KYBER768 to GROUP-X25519-KYBER768
  - openssh: make dss no longer enableble, support is dropped
* Wed Jul 17 2024 Fedora Release Engineering <releng@fedoraproject.org> - 20240717-2.git154fd4e
  - Rebuilt for https://fedoraproject.org/wiki/Fedora_41_Mass_Rebuild
* Wed Jul 17 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20240717-1.git154fd4e
  - Changes/OpenSSLDistrustSHA1SigVer: implement, see below
  - DEFAULT: switch to rh-allow-sha1-signatures = no...
  - TEST-FEDORA41: reset to DEFAULT
  - FEDORA40: introduce with the previous contents of DEFAULT
  - nss: wire XYBER768D00 to X25519-KYBER768, not KYBER768
  - TEST-PQ: disable KYBER768
* Tue Jul 16 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20240715-2.gitf8b6a29
  - fix running pre scriptlet in first transaction ever, pre-coreutils
* Mon Jul 15 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20240715-1.gitf8b6a29
  - BSI: Update BSI policy for new 2024 minimum recommendations
  - java: use and include jdk.disabled.namedCurves
  - ec_min_size: introduce and use in java, default to 256
  - java: stop specifying jdk.tls.namedGroups in javasystem
  - java: drop unused javasystem backend
* Fri Jun 28 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20240628-1.gitddd11d3
  - nss: wire KYBER768 to XYBER768D00
  - java: start controlling / disable DTLSv1.0
  - java: disable anon ciphersuites, tying them to NULL
  - java: respect more key size restrictions
  - java: specify jdk.tls.namedGroups system property
  - java: make hash, mac and sign more orthogonal
  - fips-mode-setup: add another scary "unsupported"
  - fips-mode-setup: flashy ticking warning upon use
  - BSI: switch to 3072 minimum RSA key size
* Tue May 21 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20240521-1.gitf71d135
  - nss: unconditionally include p11-kit-proxy
  - TEST-PQ: update algorithm list, mark all PQ algorithms experimental
* Wed May 15 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20240515-1.gita24a14b
  - gnutls: use tls-session-hash option, enforcing EMS in FIPS mode
  - gnutls: DTLS 0.9 is controllable again
  - gnutls: remove extraneous newline
  - openssh: remove support for old names of RequiredRSASize
* Wed Mar 20 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20240320-1.git58e3d95
  - modules/FEDORA32, FEDORA38, TEST-FEDORA39: drop
  - openssl: mark liboqsprovider groups optional with ?
  - TEST-PQ: add more group and sign values, marked experimental
  - TEST-FEDORA41: add a new policy with __openssl_block_sha1_signatures = 1
  - TEST-PQ: also enable sntrup761x25519-sha512@openssh.com
* Mon Mar 04 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20240304-1.git0375239
  - packaging: remove perl build-dependency, it's not needed anymore
  - packaging: stop linting at check-time, relying on upstream CI instead
  - packaging: drop stale workarounds
  - libreswan: do not use up pfs= / ikev2= keywords for default behaviour
* Tue Feb 27 2024 Jiri Vanek <jvanek@redhat.com> - 20240201-2.git9f501f3
  - Rebuilt for java-21-openjdk as system jdk
* Thu Feb 01 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20240201-1.git9f501f3
  - fips-finish-install: make sure ostree is detected in chroot
  - fips-mode-setup: make sure ostree is detected in chroot
  - java: disable ChaCha20-Poly1305 where applicable
* Wed Jan 24 2024 Fedora Release Engineering <releng@fedoraproject.org> - 20231204-3.git1e3a2e4
  - Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild
* Fri Jan 19 2024 Fedora Release Engineering <releng@fedoraproject.org> - 20231204-2.git1e3a2e4
  - Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild
* Mon Dec 04 2023 Alexander Sosedkin <asosedkin@redhat.com> - 20231204-1.git1e3a2e4
  - TEST-PQ: add a subpolicy to test post-quantum algorithms. Do not rely on.
* Mon Nov 13 2023 Clemens Lang <cllang@redhat.com> - 20231113-1.gitb402e82
  - fips-mode-setup: Write error messages to stderr
  - fips-mode-setup: Fix some shellcheck warnings
  - fips-mode-setup: Fix test for empty /boot
  - fips-mode-setup: Avoid 'boot=UUID=' if /boot == /
* Thu Nov 09 2023 Clemens Lang <cllang@redhat.com> - 20231109-1.gitadb5572
  - Restore support for scoped ssh_etm directives
  - Print matches in syntax deprecation warnings
* Tue Nov 07 2023 Clemens Lang <cllang@redhat.com> - 20231107-1.gitd5877b3
  - fips-mode-setup: Fix usage with --no-bootcfg
* Tue Nov 07 2023 Clemens Lang <cllang@redhat.com> - 20231107-1.git8f49dfa
  - turn ssh_etm into an etm@SSH tri-state
  - fips-mode-setup: increase chroot-friendliness (rhbz#2164847)
* Wed Sep 20 2023 Alexander Sosedkin <asosedkin@redhat.com> - 20230920-1.git570ea89
  - OSPP subpolicy: tighten beyond reason for OSPP 4.3
  - fips-mode-setup: more thorough --disable, still unsupported
* Tue Jul 25 2023 Alexander Sosedkin <asosedkin@redhat.com> - 20230731-1.git5ed06e0
  - BSI: start a BSI TR 02102 policy
  - krb5: sort enctypes mac-first, cipher-second, prioritize SHA-2 ones
  - FIPS: enforce EMS in FIPS mode
  - NO-ENFORCE-EMS: add subpolicy to undo the EMS enforcement in FIPS mode
  - nss: implement EMS enforcement in FIPS mode (not enabled yet)
  - openssl: implement EMS enforcement in FIPS mode
  - gnutls: implement EMS enforcement in FIPS mode (not enabled yet)
  - docs: replace `FIPS 140-2` with just `FIPS 140`
* Wed Jul 19 2023 Fedora Release Engineering <releng@fedoraproject.org> - 20230614-2.git5f3458e
  - Rebuilt for https://fedoraproject.org/wiki/Fedora_39_Mass_Rebuild
* Wed Jun 14 2023 Alexander Sosedkin <asosedkin@redhat.com> - 20230614-1.git5f3458e
  - policies: restore group order to old OpenSSL default order
* Thu Apr 20 2023 Alexander Sosedkin <asosedkin@redhat.com> - 20230420-1.git3d08ae7
  - openssl: specify Groups explicitly
  - openssl: add support for Brainpool curves
* Wed Mar 01 2023 Alexander Sosedkin <asosedkin@redhat.com> - 20230301-1.git2ea6d2a
  - rpm-sequoia: add separate rpm-sequoia backend
  - DEFAULT: allow SHA-1 and 1024 bit DSA in RPM (https://pagure.io/fesco/issue/2960)
* Mon Feb 20 2023 Alexander Sosedkin <asosedkin@redhat.com> - 20230220-1.git8c7de04
  - Makefile: support asciidoc 10
* Thu Jan 19 2023 Fedora Release Engineering <releng@fedoraproject.org> - 20221215-2.gita4c31a3
  - Rebuilt for https://fedoraproject.org/wiki/Fedora_38_Mass_Rebuild
* Thu Dec 15 2022 Alexander Sosedkin <asosedkin@redhat.com> - 20221215-1.gita4c31a3
  - bind: expand the list of disableable algorithms
* Thu Nov 10 2022 Alexander Sosedkin <asosedkin@redhat.com> - 20221110-1.git87a75f4
  - sequoia: introduce new backend
  - migrate license tag to SPDX

Files

/usr/bin/fips-finish-install
/usr/bin/fips-mode-setup
/usr/bin/update-crypto-policies
/usr/share/crypto-policies/python
/usr/share/crypto-policies/python/__pycache__
/usr/share/crypto-policies/python/__pycache__/build-crypto-policies.cpython-313.opt-1.pyc
/usr/share/crypto-policies/python/__pycache__/build-crypto-policies.cpython-313.pyc
/usr/share/crypto-policies/python/__pycache__/update-crypto-policies.cpython-313.opt-1.pyc
/usr/share/crypto-policies/python/__pycache__/update-crypto-policies.cpython-313.pyc
/usr/share/crypto-policies/python/build-crypto-policies.py
/usr/share/crypto-policies/python/cryptopolicies
/usr/share/crypto-policies/python/cryptopolicies/__init__.py
/usr/share/crypto-policies/python/cryptopolicies/__pycache__
/usr/share/crypto-policies/python/cryptopolicies/__pycache__/__init__.cpython-313.opt-1.pyc
/usr/share/crypto-policies/python/cryptopolicies/__pycache__/__init__.cpython-313.pyc
/usr/share/crypto-policies/python/cryptopolicies/__pycache__/alg_lists.cpython-313.opt-1.pyc
/usr/share/crypto-policies/python/cryptopolicies/__pycache__/alg_lists.cpython-313.pyc
/usr/share/crypto-policies/python/cryptopolicies/__pycache__/cryptopolicies.cpython-313.opt-1.pyc
/usr/share/crypto-policies/python/cryptopolicies/__pycache__/cryptopolicies.cpython-313.pyc
/usr/share/crypto-policies/python/cryptopolicies/alg_lists.py
/usr/share/crypto-policies/python/cryptopolicies/cryptopolicies.py
/usr/share/crypto-policies/python/cryptopolicies/validation
/usr/share/crypto-policies/python/cryptopolicies/validation/__init__.py
/usr/share/crypto-policies/python/cryptopolicies/validation/__pycache__
/usr/share/crypto-policies/python/cryptopolicies/validation/__pycache__/__init__.cpython-313.opt-1.pyc
/usr/share/crypto-policies/python/cryptopolicies/validation/__pycache__/__init__.cpython-313.pyc
/usr/share/crypto-policies/python/cryptopolicies/validation/__pycache__/alg_lists.cpython-313.opt-1.pyc
/usr/share/crypto-policies/python/cryptopolicies/validation/__pycache__/alg_lists.cpython-313.pyc
/usr/share/crypto-policies/python/cryptopolicies/validation/__pycache__/general.cpython-313.opt-1.pyc
/usr/share/crypto-policies/python/cryptopolicies/validation/__pycache__/general.cpython-313.pyc
/usr/share/crypto-policies/python/cryptopolicies/validation/__pycache__/rules.cpython-313.opt-1.pyc
/usr/share/crypto-policies/python/cryptopolicies/validation/__pycache__/rules.cpython-313.pyc
/usr/share/crypto-policies/python/cryptopolicies/validation/__pycache__/scope.cpython-313.opt-1.pyc
/usr/share/crypto-policies/python/cryptopolicies/validation/__pycache__/scope.cpython-313.pyc
/usr/share/crypto-policies/python/cryptopolicies/validation/alg_lists.py
/usr/share/crypto-policies/python/cryptopolicies/validation/general.py
/usr/share/crypto-policies/python/cryptopolicies/validation/rules.py
/usr/share/crypto-policies/python/cryptopolicies/validation/scope.py
/usr/share/crypto-policies/python/policygenerators
/usr/share/crypto-policies/python/policygenerators/__init__.py
/usr/share/crypto-policies/python/policygenerators/__pycache__
/usr/share/crypto-policies/python/policygenerators/__pycache__/__init__.cpython-313.opt-1.pyc
/usr/share/crypto-policies/python/policygenerators/__pycache__/__init__.cpython-313.pyc
/usr/share/crypto-policies/python/policygenerators/__pycache__/bind.cpython-313.opt-1.pyc
/usr/share/crypto-policies/python/policygenerators/__pycache__/bind.cpython-313.pyc
/usr/share/crypto-policies/python/policygenerators/__pycache__/configgenerator.cpython-313.opt-1.pyc
/usr/share/crypto-policies/python/policygenerators/__pycache__/configgenerator.cpython-313.pyc
/usr/share/crypto-policies/python/policygenerators/__pycache__/gnutls.cpython-313.opt-1.pyc
/usr/share/crypto-policies/python/policygenerators/__pycache__/gnutls.cpython-313.pyc
/usr/share/crypto-policies/python/policygenerators/__pycache__/java.cpython-313.opt-1.pyc
/usr/share/crypto-policies/python/policygenerators/__pycache__/java.cpython-313.pyc
/usr/share/crypto-policies/python/policygenerators/__pycache__/krb5.cpython-313.opt-1.pyc
/usr/share/crypto-policies/python/policygenerators/__pycache__/krb5.cpython-313.pyc
/usr/share/crypto-policies/python/policygenerators/__pycache__/libreswan.cpython-313.opt-1.pyc
/usr/share/crypto-policies/python/policygenerators/__pycache__/libreswan.cpython-313.pyc
/usr/share/crypto-policies/python/policygenerators/__pycache__/libssh.cpython-313.opt-1.pyc
/usr/share/crypto-policies/python/policygenerators/__pycache__/libssh.cpython-313.pyc
/usr/share/crypto-policies/python/policygenerators/__pycache__/nss.cpython-313.opt-1.pyc
/usr/share/crypto-policies/python/policygenerators/__pycache__/nss.cpython-313.pyc
/usr/share/crypto-policies/python/policygenerators/__pycache__/openssh.cpython-313.opt-1.pyc
/usr/share/crypto-policies/python/policygenerators/__pycache__/openssh.cpython-313.pyc
/usr/share/crypto-policies/python/policygenerators/__pycache__/openssl.cpython-313.opt-1.pyc
/usr/share/crypto-policies/python/policygenerators/__pycache__/openssl.cpython-313.pyc
/usr/share/crypto-policies/python/policygenerators/__pycache__/sequoia.cpython-313.opt-1.pyc
/usr/share/crypto-policies/python/policygenerators/__pycache__/sequoia.cpython-313.pyc
/usr/share/crypto-policies/python/policygenerators/bind.py
/usr/share/crypto-policies/python/policygenerators/configgenerator.py
/usr/share/crypto-policies/python/policygenerators/gnutls.py
/usr/share/crypto-policies/python/policygenerators/java.py
/usr/share/crypto-policies/python/policygenerators/krb5.py
/usr/share/crypto-policies/python/policygenerators/libreswan.py
/usr/share/crypto-policies/python/policygenerators/libssh.py
/usr/share/crypto-policies/python/policygenerators/nss.py
/usr/share/crypto-policies/python/policygenerators/openssh.py
/usr/share/crypto-policies/python/policygenerators/openssl.py
/usr/share/crypto-policies/python/policygenerators/sequoia.py
/usr/share/crypto-policies/python/update-crypto-policies.py
/usr/share/man/man8/fips-finish-install.8.gz
/usr/share/man/man8/fips-mode-setup.8.gz
/usr/share/man/man8/update-crypto-policies.8.gz


Generated by rpm2html 1.8.1

Fabrice Bellet, Sun Oct 27 06:41:21 2024