Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

crypto-policies-scripts-20230920.570ea89-3.5 RPM for noarch

From OpenSuSE Tumbleweed for noarch

Name: crypto-policies-scripts Distribution: openSUSE Tumbleweed
Version: 20230920.570ea89 Vendor: openSUSE
Release: 3.5 Build date: Tue Jan 30 19:36:34 2024
Group: Productivity/Networking/Security Build host: reproducible
Size: 253339 Source RPM: crypto-policies-20230920.570ea89-3.5.src.rpm
Packager: https://bugs.opensuse.org
Url: https://gitlab.com/redhat-crypto/fedora-crypto-policies
Summary: Tool to switch between crypto policies
This package provides a tool update-crypto-policies, which applies
the policies provided by the crypto-policies package. These can be
either the pre-built policies from the base package or custom policies
defined in simple policy definition files.

The package also provides a tool fips-mode-setup, which can be used
to enable or disable the system FIPS mode.

Provides

Requires

License

LGPL-2.1-or-later

Changelog

* Tue Jan 30 2024 Dirk Müller <dmueller@suse.com>
  - avoid the cycle rpm/cmake/crypto-policies/python-rpm-macros:
    we only need python3-base here, we don't need the python
    macros as no module is being built
* Thu Oct 05 2023 Daniel Garcia <daniel.garcia@suse.com>
  - Remove dependency on /usr/bin/python3, making scripts to depends on
    the real python3 binary, not the link. bsc#1212476
* Wed Sep 27 2023 Pedro Monreal <pmonreal@suse.com>
  - nss: Skip the NSS policy check if the mozilla-nss-tools package
    is not installed. This avoids adding more dependencies in ring0.
    * Add crypto-policies-nss.patch [bsc#1211301]
* Fri Sep 22 2023 Pedro Monreal <pmonreal@suse.com>
  - Update to version 20230920.570ea89:
    * fips-mode-setup: more thorough --disable, still unsupported
    * FIPS:OSPP: tighten beyond reason for OSPP 4.3
    * krb5: sort enctypes mac-first, cipher-second, prioritize SHA-2 ones
    * openssl: implement relaxing EMS in FIPS (NO-ENFORCE-EMS)
    * gnutls: prepare for tls-session-hash option coming
    * nss: prepare for TLS-REQUIRE-EMS option coming
    * NO-ENFORCE-EMS: add subpolicy
    * FIPS: set __ems = ENFORCE
    * cryptopolicies: add enums and __ems tri-state
    * docs: replace `FIPS 140-2` with just `FIPS 140`
    * .gitlab-ci: remove forcing OPENSSH_MIN_RSA_SIZE
    * cryptopolicies: add comments on dunder options
    * nss: retire NSS_OLD and replace with NSS_LAX 3.80 check
    * BSI: start a BSI TR 02102 policy [jsc#PED-4933]
    * Rebase patches:
    - crypto-policies-policygenerators.patch
    - crypto-policies-revert-rh-allow-sha1-signatures.patch
    - crypto-policies-FIPS.patch
* Fri Sep 15 2023 Pedro Monreal <pmonreal@suse.com>
  - Conditionally recommend the crypto-policies-scripts package
    when python is not installed in the system [bsc#1215201]
* Thu Aug 31 2023 Pedro Monreal <pmonreal@suse.com>
  - Tests: Fix pylint versioning for TW and fix the parsing of the
    policygenerators to account for the commented lines correctly.
    * Add crypto-policies-pylint.patch
    * Rebase crypto-policies-policygenerators.patch
* Tue Aug 01 2023 Pedro Monreal <pmonreal@suse.com>
  - FIPS: Adapt the fips-mode-setup script to use the pbl command
    from the perl-Bootloader package to replace grubby. Add a note
    for transactional systems [jsc#PED-5041].
    * Rebase crypto-policies-FIPS.patch
* Fri Jul 14 2023 Marcus Meissner <meissner@suse.com>
  - BSI.pol: Added a new BSI policy for BSI TR 02102* (jsc#PED-4933)
    derived from NEXT.pol
* Thu Jul 13 2023 Pedro Monreal <pmonreal@suse.com>
  - Update to version 20230614.5f3458e:
    * policies: impose old OpenSSL groups order for all back-ends
    * Rebase patches:
    - crypto-policies-revert-rh-allow-sha1-signatures.patch
    - crypto-policies-supported.patch
* Thu May 25 2023 Pedro Monreal <pmonreal@suse.com>
  - FIPS: Enable to set the kernel FIPS mode with fips-mode-setup
    and fips-finish-install commands, add also the man pages. The
    required FIPS modules are left to be installed by the user.
    * Rebase crypto-policies-FIPS.patch
* Wed May 24 2023 Pedro Monreal <pmonreal@suse.com>
  - Revert a breaking change that introduces the config option
    rh-allow-sha1-signatures that is unkown to OpenSSL and fails
    on startup. We will consider adding this option to openssl.
    * https://gitlab.com/redhat-crypto/fedora-crypto-policies/-/commit/97fe4494
    * Add crypto-policies-revert-rh-allow-sha1-signatures.patch
* Mon May 08 2023 Pedro Monreal <pmonreal@suse.com>
  - Update the update-crypto-policies(8) man pages and README.SUSE
    to mention the supported back-end policies. [bsc#1209998]
    * Add crypto-policies-supported.patch
* Mon May 08 2023 Pedro Monreal <pmonreal@suse.com>
  - Update to version 20230420.3d08ae7:
    * openssl, alg_lists: add brainpool support
    * openssl: set Groups explicitly
    * codespell: ignore aNULL
    * rpm-sequoia: allow 1024 bit DSA and SHA-1 per FeSCO decision 2960
    * sequoia: add separate rpm-sequoia backend
    * crypto-policies.7: state upfront that FUTURE is not so interoperable
    * Makefile: update for asciidoc 10
    * Skip not needed LibreswanGenerator and SequoiaGenerator:
    - Add crypto-policies-policygenerators.patch
    * Remove crypto-policies-test_supported_modules_only.patch
    * Rebase crypto-policies-no-build-manpages.patch
* Fri Jan 20 2023 Pedro Monreal <pmonreal@suse.com>
  - Update to version 20221214.a4c31a3:
    * bind: expand the list of disableable algorithms
    * libssh: Add support for openssh fido keys
    * .gitlab-ci.yml: install krb5-devel for krb5-config
    * sequoia: check using sequoia-policy-config-check
    * sequoia: introduce new back-end
    * Makefile: support overriding asciidoc executable name
    * openssh: make none and auto explicit and different
    * openssh: autodetect and allow forcing RequiredRSASize presence/name
    * openssh: remove _pre_8_5_ssh
    * pylintrc: update
    * Revert "disable SHA-1 further for a Fedora 38 Rawhide "jump scare"..."
    * disable SHA-1 further for a Fedora 38 Rawhide "jump scare"...
    * Makefile: exclude built manpages from codespell
    * add openssh HostbasedAcceptedAlgorithms
    * openssh: add RSAMinSize option following min_rsa_size
    * Revert ".gitlab-ci.yml: skip pylint (bz2069837)"
    * docs: add customization recommendation
    * tests/java: fix java.security.disableSystemPropertiesFile=true
    * policies: add FEDORA38 and TEST-FEDORA39
    * bind: control ED25519/ED448
    * openssl: disable SHA-1 signatures in FUTURE/NO-SHA1
    * .gitlab-ci.yml: skip pylint (bz2069837)
    * openssh: add support for sntrup761x25519-sha512@openssh.com
    * fips-mode-setup: fix one unrelated check to intended state
    * fips-mode-setup, fips-finish-install: abandon /etc/system-fips
    * Makefile: fix alt-policy test of LEGACY:AD-SUPPORT
    * fips-mode-setup: catch more inconsistencies, clarify --check
    * fips-mode-setup: improve handling FIPS plus subpolicies
    * .gitlab-ci.yml: use rawhide so that we get gnutls 3.7.3
    * gnutls: enable SHAKE, needed for Ed448
    * gnutls: use allowlisting
    * openssl: add newlines at the end of the output
    * FIPS:OSPP: relax -ECDSA-SHA2-512, -FFDHE-*
    * fips-mode-setup, fips-finish-install: call zipl more often
    * Add crypto-policies-rpmlintrc file to avoid files-duplicate,
      zero-length and non-conffile-in-etc warnings.
    * Rebase patches:
    - crypto-policies-FIPS.patch
    - crypto-policies-no-build-manpages.patch
    * Update README.SUSE

Files

/usr/bin/fips-finish-install
/usr/bin/fips-mode-setup
/usr/bin/update-crypto-policies
/usr/share/crypto-policies/python
/usr/share/crypto-policies/python/__pycache__
/usr/share/crypto-policies/python/__pycache__/build-crypto-policies.cpython-313.pyc
/usr/share/crypto-policies/python/__pycache__/update-crypto-policies.cpython-313.pyc
/usr/share/crypto-policies/python/build-crypto-policies.py
/usr/share/crypto-policies/python/cryptopolicies
/usr/share/crypto-policies/python/cryptopolicies/__init__.py
/usr/share/crypto-policies/python/cryptopolicies/__pycache__
/usr/share/crypto-policies/python/cryptopolicies/__pycache__/__init__.cpython-313.pyc
/usr/share/crypto-policies/python/cryptopolicies/__pycache__/alg_lists.cpython-313.pyc
/usr/share/crypto-policies/python/cryptopolicies/__pycache__/cryptopolicies.cpython-313.pyc
/usr/share/crypto-policies/python/cryptopolicies/alg_lists.py
/usr/share/crypto-policies/python/cryptopolicies/cryptopolicies.py
/usr/share/crypto-policies/python/cryptopolicies/validation
/usr/share/crypto-policies/python/cryptopolicies/validation/__init__.py
/usr/share/crypto-policies/python/cryptopolicies/validation/__pycache__
/usr/share/crypto-policies/python/cryptopolicies/validation/__pycache__/__init__.cpython-313.pyc
/usr/share/crypto-policies/python/cryptopolicies/validation/__pycache__/alg_lists.cpython-313.pyc
/usr/share/crypto-policies/python/cryptopolicies/validation/__pycache__/general.cpython-313.pyc
/usr/share/crypto-policies/python/cryptopolicies/validation/__pycache__/rules.cpython-313.pyc
/usr/share/crypto-policies/python/cryptopolicies/validation/__pycache__/scope.cpython-313.pyc
/usr/share/crypto-policies/python/cryptopolicies/validation/alg_lists.py
/usr/share/crypto-policies/python/cryptopolicies/validation/general.py
/usr/share/crypto-policies/python/cryptopolicies/validation/rules.py
/usr/share/crypto-policies/python/cryptopolicies/validation/scope.py
/usr/share/crypto-policies/python/policygenerators
/usr/share/crypto-policies/python/policygenerators/__init__.py
/usr/share/crypto-policies/python/policygenerators/__pycache__
/usr/share/crypto-policies/python/policygenerators/__pycache__/__init__.cpython-313.pyc
/usr/share/crypto-policies/python/policygenerators/__pycache__/bind.cpython-313.pyc
/usr/share/crypto-policies/python/policygenerators/__pycache__/configgenerator.cpython-313.pyc
/usr/share/crypto-policies/python/policygenerators/__pycache__/gnutls.cpython-313.pyc
/usr/share/crypto-policies/python/policygenerators/__pycache__/java.cpython-313.pyc
/usr/share/crypto-policies/python/policygenerators/__pycache__/krb5.cpython-313.pyc
/usr/share/crypto-policies/python/policygenerators/__pycache__/libssh.cpython-313.pyc
/usr/share/crypto-policies/python/policygenerators/__pycache__/nss.cpython-313.pyc
/usr/share/crypto-policies/python/policygenerators/__pycache__/openssh.cpython-313.pyc
/usr/share/crypto-policies/python/policygenerators/__pycache__/openssl.cpython-313.pyc
/usr/share/crypto-policies/python/policygenerators/bind.py
/usr/share/crypto-policies/python/policygenerators/configgenerator.py
/usr/share/crypto-policies/python/policygenerators/gnutls.py
/usr/share/crypto-policies/python/policygenerators/java.py
/usr/share/crypto-policies/python/policygenerators/krb5.py
/usr/share/crypto-policies/python/policygenerators/libssh.py
/usr/share/crypto-policies/python/policygenerators/nss.py
/usr/share/crypto-policies/python/policygenerators/openssh.py
/usr/share/crypto-policies/python/policygenerators/openssl.py
/usr/share/crypto-policies/python/update-crypto-policies.py
/usr/share/man/man8/fips-finish-install.8.gz
/usr/share/man/man8/fips-mode-setup.8.gz
/usr/share/man/man8/update-crypto-policies.8.gz


Generated by rpm2html 1.8.1

Fabrice Bellet, Sat Mar 22 23:22:24 2025