Fri, 19 Apr 2024 18:31:54 UTC | login

Information for build crypto-policies-20221003-1.git04dee29.el9

ID25217
Package Namecrypto-policies
Version20221003
Release1.git04dee29.el9
Epoch
DraftFalse
Sourcegit+https://gitlab.com/redhat/centos-stream/rpms/crypto-policies#a56329e5d8ed75ff4d0980a0ffcf17fe13ac4502
SummarySystem-wide crypto policies
DescriptionThis package provides pre-built configuration files with cryptographic policies for various cryptographic back-ends, such as SSL/TLS libraries.
Built byasosedki
State complete
Volume DEFAULT
StartedMon, 03 Oct 2022 16:16:59 UTC
CompletedMon, 03 Oct 2022 16:18:01 UTC
Taskbuild (c9s-candidate, /redhat/centos-stream/rpms/crypto-policies:a56329e5d8ed75ff4d0980a0ffcf17fe13ac4502)
Extra{'source': {'original_url': 'git+https://gitlab.com/redhat/centos-stream/rpms/crypto-policies#a56329e5d8ed75ff4d0980a0ffcf17fe13ac4502'}}
Tags
c9s-released
RPMs
src
crypto-policies-20221003-1.git04dee29.el9.src.rpm (info) (download)
noarch
crypto-policies-20221003-1.git04dee29.el9.noarch.rpm (info) (download)
crypto-policies-scripts-20221003-1.git04dee29.el9.noarch.rpm (info) (download)
Logs
noarch
build.log
installed_pkgs.log
root.log
state.log
hw_info.log
mock_output.log
noarch_rpmdiff.json
Changelog * Mon Oct 03 2022 Alexander Sosedkin <asosedkin@redhat.com> - 20221003-1.git04dee29 - openssh: rename RSAMinSize option to RequiredRSASize * Mon Aug 15 2022 Alexander Sosedkin <asosedkin@redhat.com> - 20220815-1.git0fbe86f - openssh: add RSAMinSize option following min_rsa_size * Wed Apr 27 2022 Alexander Sosedkin <asosedkin@redhat.com> - 20220427-1.gitb2323a1 - bind: control ED25519/ED448 * Mon Apr 04 2022 Alexander Sosedkin <asosedkin@redhat.com> - 20220404-1.git845c0c1 - DEFAULT: drop DNSSEC SHA-1 exception - openssh: add support for sntrup761x25519-sha512@openssh.com * Wed Feb 23 2022 Alexander Sosedkin <asosedkin@redhat.com> - 20220223-1.git5203b41 - openssl: allow SHA-1 signatures with rh-allow-sha1-signatures in LEGACY - update AD-SUPPORT, move RC4 enctype enabling to AD-SUPPORT-LEGACY - fips-mode-setup: catch more inconsistencies, clarify --check * Thu Feb 03 2022 Alexander Sosedkin <asosedkin@redhat.com> - 20220203-1.gitf03e75e - gnutls: enable SHAKE, needed for Ed448 - fips-mode-setup: improve handling FIPS plus subpolicies - FIPS: disable SHA-1 HMAC - FIPS: disable CBC ciphers except in Kerberos * Tue Feb 01 2022 Alexander Sosedkin <asosedkin@redhat.com> - 20220201-1.git636a91d - openssl: revert to SECLEVEL=2 in LEGACY - openssl: add newlines at the end of the output * Mon Nov 15 2021 Alexander Sosedkin <asosedkin@redhat.com> - 20211115-1.git70de135 - OSPP: relax -ECDSA-SHA2-512, -FFDHE-* - fips-mode-setup, fips-finish-install: call zipl more often (s390x-specific) * Wed Sep 22 2021 Alexander Sosedkin <asosedkin@redhat.com> - 20210922-1.git6fb269b - openssl: fix disabling ChaCha20 - update for pylint 2.11 * Tue Sep 14 2021 Alexander Sosedkin <asosedkin@redhat.com> - 20210914-1.git97d08ef - gnutls: reorder ECDSA-SECPMMMR1-SHANNN together with ECDSA-SHANNN - fix several issues with update-crypto-policies --check * Mon Aug 09 2021 Mohan Boddu <mboddu@redhat.com> - 20210707-2.git29f6c0b - Rebuilt for IMA sigs, glibc 2.34, aarch64 flags Related: rhbz#1991688 * Wed Jul 07 2021 Alexander Sosedkin <asosedkin@redhat.com> - 20210707-1.git29f6c0b - gnutls: explicitly enable ECDSA-SECPNNNR1-SHANNN - packaging: adapt to the RHEL-9 %check-time testing tools availability * Mon Jun 28 2021 Alexander Sosedkin <asosedkin@redhat.com> - 20210628-1.gitdd7d273 - implement scoped policies, e.g., cipher@SSH = ... - implement algorithm globbing, e.g., cipher@SSH = -*-CBC - deprecate derived properties: tls_cipher, ssh_cipher, ssh_group, ike_protocol, sha1_in_dnssec - deprecate unscoped form of protocol property - openssl: set MinProtocol / MaxProtocol separately for TLS and DTLS - openssh: use PubkeyAcceptedAlgorithms instead of PubkeyAcceptedKeyTypes - libssh: respect ssh_certs - restrict FIPS:OSPP further - improve Python 3.10 compatibility - update documentation - expand upstream test coverage - FUTURE: disable CBC ciphers for all backends but krb5 - openssl: LEGACY must have SECLEVEL=1, enabling SHA1 - disable DHE-DSS in LEGACY - bump LEGACY key size requirements from 1023 to 1024 - add javasystem backend - *ssh: condition ecdh-sha2-nistp384 on SECP384R1 - set %verify(not mode) for backend sometimes-symlinks-sometimes-not - gnutls: use allowlisting * Tue Jun 22 2021 Mohan Boddu <mboddu@redhat.com> - 20210218-3.git2246c55 - Rebuilt for RHEL 9 BETA for openssl 3.0 Related: rhbz#1971065 * Thu Apr 15 2021 Mohan Boddu <mboddu@redhat.com> - 20210218-2.git2246c55 - Rebuilt for RHEL 9 BETA on Apr 15th 2021. Related: rhbz#1947937 * Thu Feb 18 2021 Alexander Sosedkin <asosedkin@redhat.com> - 20210218-1.git2246c55 - require 2048 bit params in LEGACY - require TLSv1.2/DTLSv1.2 in all policies - disable DSA - disable 3DES in LEGACY - drop FFDHE-1024 from LEGACY - drop (sub)policies we're not going to offer in RHEL-9 * Sat Feb 13 2021 Alexander Sosedkin <asosedkin@redhat.com> - 20210213-1.git5c710c0 - exclude RC4 from LEGACY - introduce rc4_md5_in_krb5 to narrow AD_SUPPORT's impact - an assortment of small fixes * Wed Jan 27 2021 Alexander Sosedkin <asosedkin@redhat.com> - 20210127-2.gitb21c811 - fix comparison in %post lua scriptlet * Wed Jan 27 2021 Alexander Sosedkin <asosedkin@redhat.com> - 20210127-1.gitb21c811 - don't create /etc/crypto-policies/back-ends/.config in %post * Tue Jan 26 2021 Fedora Release Engineering <releng@fedoraproject.org> - 20210118-2.gitb21c811 - Rebuilt for https://fedoraproject.org/wiki/Fedora_34_Mass_Rebuild * Mon Jan 18 2021 Alexander Sosedkin <asosedkin@redhat.com> - 20210118-1.gitb21c811 - output sigalgs required by nss >=3.59 (or 3.60 in Fedora case) - bump Python requirement to 3.6 * Tue Dec 15 2020 Alexander Sosedkin <asosedkin@redhat.com> - 20201215-1.giteb57e00 - Kerberos 5: Fix policy generator to account for macs * Tue Dec 08 2020 Alexander Sosedkin <asosedkin@redhat.com> - 20201208-1.git70def9f - add AES-192 support (non-TLS scenarios) - add documentation of the --check option