Mon, 02 Dec 2024 13:05:59 UTC | login

Information for build crypto-policies-20230301-1.gita12f7b2.fc38

ID236664
Package Namecrypto-policies
Version20230301
Release1.gita12f7b2.fc38
Epoch
SummarySystem-wide crypto policies
DescriptionThis package provides pre-built configuration files with cryptographic policies for various cryptographic back-ends, such as SSL/TLS libraries.
Built bydavidlt
State complete
Volume DEFAULT
StartedSat, 11 Mar 2023 09:14:16 UTC
CompletedSat, 11 Mar 2023 09:14:16 UTC
Tags
f38
f39
f40
RPMs
src
crypto-policies-20230301-1.gita12f7b2.fc38.src.rpm (info) (download)
noarch
crypto-policies-20230301-1.gita12f7b2.fc38.noarch.rpm (info) (download)
crypto-policies-scripts-20230301-1.gita12f7b2.fc38.noarch.rpm (info) (download)
Changelog * Wed Mar 01 2023 Alexander Sosedkin <asosedkin@redhat.com> - 20230301-1.git2ea6d2a - rpm-sequoia: add separate rpm-sequoia backend - DEFAULT: allow SHA-1 and 1024 bit DSA in RPM (https://pagure.io/fesco/issue/2960) * Mon Feb 20 2023 Alexander Sosedkin <asosedkin@redhat.com> - 20230220-1.git8c7de04 - Makefile: support asciidoc 10 * Thu Jan 19 2023 Fedora Release Engineering <releng@fedoraproject.org> - 20221215-2.gita4c31a3 - Rebuilt for https://fedoraproject.org/wiki/Fedora_38_Mass_Rebuild * Thu Dec 15 2022 Alexander Sosedkin <asosedkin@redhat.com> - 20221215-1.gita4c31a3 - bind: expand the list of disableable algorithms * Thu Nov 10 2022 Alexander Sosedkin <asosedkin@redhat.com> - 20221110-1.git87a75f4 - sequoia: introduce new backend - migrate license tag to SPDX * Mon Oct 03 2022 Alexander Sosedkin <asosedkin@redhat.com> - 20221003-1.gitcb1ad32 - openssh: force RequiredRSASize option name * Wed Aug 24 2022 Alexander Sosedkin <asosedkin@redhat.com> - 20220824-2.git2187e9c - revert premature Fedora 38 Rawhide SHA-1 "jump scare" until https://fedoraproject.org/wiki/Changes/StrongCryptoSettings3Forewarning2 gets approved * Wed Aug 24 2022 Alexander Sosedkin <asosedkin@redhat.com> - 20220824-1.gitd4b71ab - disable SHA-1 further for a Fedora 38 Rawhide "jump scare" as described at https://fedoraproject.org/wiki/Changes/StrongCryptoSettings3Forewarning2 This change will be reverted for the branched-off Fedora 38, but never for Fedora 39. Thus the change will reach the users with Fedora 39 release. `update-crypto-policies --set FEDORA38` for the former, obsolete DEFAULT. - openssh: control HostbasedAcceptedAlgorithms Systems having it set at /etc/ssh/sshd_config will have the value ignored and should instead configure it per-host. * Mon Aug 15 2022 Alexander Sosedkin <asosedkin@redhat.com> - 20220815-1.gite4ed860 - openssh: add RSAMinSize option following min_rsa_size * Tue Aug 02 2022 Alexander Sosedkin <asosedkin@redhat.com> - 20220802-1.gita99dfd2 - tests/java: fix java.security.disableSystemPropertiesFile=true - docs: add customization recommendation * Wed Jul 20 2022 Fedora Release Engineering <releng@fedoraproject.org> - 20220428-3.gitdfb10ea - Rebuilt for https://fedoraproject.org/wiki/Fedora_37_Mass_Rebuild * Fri Jul 08 2022 Jiri Vanek <jvanek@redhat.com> - 20220428-2.gitdfb10ea - Rebuilt for Drop i686 JDKs * Thu Apr 28 2022 Alexander Sosedkin <asosedkin@redhat.com> - 20220428-1.gitdfb10ea - policies: add FEDORA38 and TEST-FEDORA39 - fix condition of conflicting with openssl * Wed Apr 27 2022 Alexander Sosedkin <asosedkin@redhat.com> - 20220427-1.gitca01c3e - bind: control ED25519/ED448 * Tue Apr 12 2022 Alexander Sosedkin <asosedkin@redhat.com> - 20220412-1.git97fe449 - openssl: disable SHA-1 signatures in FUTURE/NO-SHA1 - skip pylint until it's fixed in Fedora (tracked in bz206983) * Mon Apr 04 2022 Alexander Sosedkin <asosedkin@redhat.com> - 20220404-1.git17914f1 - fips-mode-setup: improve handling FIPS plus subpolicies - fips-mode-setup: catch more inconsistencies, clarify --check - fips-mode-setup, fips-finish-install: abandon /etc/system-fips - openssh: add support for sntrup761x25519-sha512@openssh.com * Sat Feb 05 2022 Jiri Vanek <jvanek@redhat.com> - 20220203-2.git112f859 - Rebuilt for java-17-openjdk as system jdk * Thu Feb 03 2022 Alexander Sosedkin <asosedkin@redhat.com> - 20220203-1.git112f859 - gnutls: enable SHAKE, needed for Ed448 - fips-mode-setup: improve handling FIPS plus subpolicies * Wed Jan 19 2022 Alexander Sosedkin <asosedkin@redhat.com> - 20220119-1.git50109e7 - gnutls: switch to allowlisting (https://fedoraproject.org/wiki/Changes/GnutlsAllowlisting) - openssl: add newlines at the end of the output * Mon Nov 15 2021 Alexander Sosedkin <asosedkin@redhat.com> - 20211115-1.git1b1c04c - OSPP: relax -ECDSA-SHA2-512, -FFDHE-* - fips-mode-setup, fips-finish-install: call zipl more often (s390x-specific) * Fri Sep 17 2021 Alexander Sosedkin <asosedkin@redhat.com> - 20210917-1.gitc9d86d1 - openssl: fix disabling ChaCha20 - fix minor things found by pylint 2.11 * Thu Aug 19 2021 Alexander Sosedkin <asosedkin@redhat.com> - 20210819-1.gitd0fdcfb - gnutls: revert hard-disabling DTLS 0.9 - update-crypto-policies: fix --check's sorting when walking the directories - update-crypto-policies: always regenerate the policy to --check against - fix minor things found by new pylint * Wed Jul 21 2021 Fedora Release Engineering <releng@fedoraproject.org> - 20210621-2.gita0e819e - Rebuilt for https://fedoraproject.org/wiki/Fedora_35_Mass_Rebuild * Mon Jun 21 2021 Alexander Sosedkin <asosedkin@redhat.com> - 20210621-1.gita0e819e - bump LEGACY key size requirements from 1023 to 1024 - add javasystem backend - *ssh: condition ecdh-sha2-nistp384 on SECP384R1 - set %verify(not mode) for backend sometimes-symlinks-sometimes-not * Tue Jun 15 2021 Alexander Sosedkin <asosedkin@redhat.com> - 20210615-1.giteed6c85 - implement scoped policies, e.g., cipher@SSH = ... - implement algorithm globbing, e.g., cipher@SSH = -*-CBC - deprecate derived properties: tls_cipher, ssh_cipher, ssh_group, ike_protocol, sha1_in_dnssec - deprecate unscoped form of protocol property - openssl: set MinProtocol / MaxProtocol separately for TLS and DTLS - openssh: use PubkeyAcceptedAlgorithms instead of PubkeyAcceptedKeyTypes - libssh: respect ssh_certs - restrict FIPS:OSPP further - improve Python 3.10 compatibility - update documentation - expand upstream test coverage