| Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
| Name: crypto-policies-scripts | Distribution: AlmaLinux |
| Version: 20240828 | Vendor: AlmaLinux |
| Release: 1.gitd249111.el10 | Build date: Mon Sep 9 11:11:42 2024 |
| Group: Unspecified | Build host: s390x-builder02.almalinux.org |
| Size: 388653 | Source RPM: crypto-policies-20240828-1.gitd249111.el10.src.rpm |
| Packager: AlmaLinux Packaging Team <packager@almalinux.org> | |
| Url: https://gitlab.com/redhat-crypto/fedora-crypto-policies | |
| Summary: Tool to switch between crypto policies | |
This package provides a tool update-crypto-policies, which applies the policies provided by the crypto-policies package. These can be either the pre-built policies from the base package or custom policies defined in simple policy definition files. The package also provides a tool fips-mode-setup, which can be used to enable or disable the system FIPS mode.
LGPL-2.1-or-later
* Wed Aug 28 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20240828-1.gitd249111
- fips-mode-setup: small Argon2 detection fix
* Thu Aug 22 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20240822-1.git367040b
- fips-mode-setup: block if LUKS devices using Argon2 are detected
* Wed Aug 07 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20240807-1.git7ea320f
- fips-crypto-policy-overlay: a unit to automount FIPS policy when fips=1
- fips-setup-helper: add a libexec helper for anaconda
- fips-mode-setup: force --no-bootcfg when UKI is detected
* Fri Aug 02 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20240802-1.git8cb6f2d
- nss: rewrite backend for nss 3.101
* Thu Jul 25 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20240725-1.git3de485c
- nss: wire KYBER768 to X25519-XYBER768D00
- java: start controlling / disable DTLSv1.0
- java: disable anon ciphersuites, tying them to NULL
- java: respect more key size restrictions
- java: specify jdk.tls.namedGroups system property
- java: make hash, mac and sign more orthogonal
- fips-mode-setup: add another scary "unsupported"
- fips-mode-setup: flashy ticking warning upon use
- java: use and include jdk.disabled.namedCurves
- ec_min_size: introduce and use in java, default to 256
- java: stop specifying jdk.tls.namedGroups in javasystem
- java: drop unused javasystem backend
- openssh: make dss no longer enableble, support is dropped
- LEGACY: disable sign = *-SHA1
- DEFAULT: disable RSA key exchange
- nss: TLS-REQUIRE-EMS in FIPS
* Mon Jun 24 2024 Troy Dawson <tdawson@redhat.com> - 20240522-2.git77963ab
- Bump release for June 2024 mass rebuild
* Wed May 22 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20240522-1.git77963ab
- Switch to a version based on Fedora 41 crypto-policies
(20240521-1.gitf71d135.fc41),
thus replace the changelog below with Fedora changelog
- Shape up RHEL-10: remove GOST-ONLY policy and GOST subpolicy
- Shape up RHEL-10: remove NEXT policy
- Shape up RHEL-10: remove BSI policy
- Shape up RHEL-10: remove TEST-FEDORA41 policy
- Shape up RHEL-10: remove NO-SHA1 subpolicy
- Shape up RHEL-10: remove SHA1 subpolicy
- Shape up RHEL-10: remove TEST-PQ policy
- Shape up RHEL-10: disable CAMELLIA in all policies...
- Shape up RHEL-10: drop FFDHE-1024 from LEGACY
- Shape up RHEL-10: DEFAULT: remove Fedora-only DSA-SHA1 RPM enablement
- Shape up RHEL-10: remove Fedora-specific __openssl_block_sha1_signatures...
- Shape up RHEL-10: disable 3DES in LEGACY
- Shape up RHEL-10: disable DSA
- Shape up RHEL-10: mark LEGACY as 80-bit security (@tomato42)
- Shape up RHEL-10: require TLSv1.2/DTLSv1.2 in all policies
- Shape up RHEL-10: requre 2048 bit params in LEGACY
- Shape up RHEL-10: FUTURE: disable CBC ciphers for all but krb5
- Shape up RHEL-10: disable DHE-DSS even in LEGACY
- Shape up RHEL-10: gnutls: explicit ECDSA-SECPNNNR1-SHANNN + reorder
- Shape up RHEL-10: openssh: disable DHE-FFDHE-1024-SHA1 server config hack
- Shape up RHEL-10: FIPS: disable SHA-1 HMAC in FIPS policy
- Shape up RHEL-10: FIPS: disable CBC ciphers except in Kerberos
- Shape up RHEL-10: policies/modules: update AD-SUPPORT away from RC4/MD5
- Shape up RHEL-10: drop DNSSEC SHA-1 exception from DEFAULT
* Tue May 21 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20240521-1.gitf71d135
- nss: unconditionally include p11-kit-proxy
- TEST-PQ: update algorithm list, mark all PQ algorithms experimental
* Wed May 15 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20240515-1.gita24a14b
- gnutls: use tls-session-hash option, enforcing EMS in FIPS mode
- gnutls: DTLS 0.9 is controllable again
- gnutls: remove extraneous newline
- openssh: remove support for old names of RequiredRSASize
* Wed Mar 20 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20240320-1.git58e3d95
- modules/FEDORA32, FEDORA38, TEST-FEDORA39: drop
- openssl: mark liboqsprovider groups optional with ?
- TEST-PQ: add more group and sign values, marked experimental
- TEST-FEDORA41: add a new policy with __openssl_block_sha1_signatures = 1
- TEST-PQ: also enable sntrup761x25519-sha512@openssh.com
* Mon Mar 04 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20240304-1.git0375239
- packaging: remove perl build-dependency, it's not needed anymore
- packaging: stop linting at check-time, relying on upstream CI instead
- packaging: drop stale workarounds
- libreswan: do not use up pfs= / ikev2= keywords for default behaviour
* Tue Feb 27 2024 Jiri Vanek <jvanek@redhat.com> - 20240201-2.git9f501f3
- Rebuilt for java-21-openjdk as system jdk
* Thu Feb 01 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20240201-1.git9f501f3
- fips-finish-install: make sure ostree is detected in chroot
- fips-mode-setup: make sure ostree is detected in chroot
- java: disable ChaCha20-Poly1305 where applicable
* Wed Jan 24 2024 Fedora Release Engineering <releng@fedoraproject.org> - 20231204-3.git1e3a2e4
- Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild
* Fri Jan 19 2024 Fedora Release Engineering <releng@fedoraproject.org> - 20231204-2.git1e3a2e4
- Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild
* Mon Dec 04 2023 Alexander Sosedkin <asosedkin@redhat.com> - 20231204-1.git1e3a2e4
- TEST-PQ: add a subpolicy to test post-quantum algorithms. Do not rely on.
* Mon Nov 13 2023 Clemens Lang <cllang@redhat.com> - 20231113-1.gitb402e82
- fips-mode-setup: Write error messages to stderr
- fips-mode-setup: Fix some shellcheck warnings
- fips-mode-setup: Fix test for empty /boot
- fips-mode-setup: Avoid 'boot=UUID=' if /boot == /
* Thu Nov 09 2023 Clemens Lang <cllang@redhat.com> - 20231109-1.gitadb5572
- Restore support for scoped ssh_etm directives
- Print matches in syntax deprecation warnings
* Tue Nov 07 2023 Clemens Lang <cllang@redhat.com> - 20231107-1.gitd5877b3
- fips-mode-setup: Fix usage with --no-bootcfg
* Tue Nov 07 2023 Clemens Lang <cllang@redhat.com> - 20231107-1.git8f49dfa
- turn ssh_etm into an etm@SSH tri-state
- fips-mode-setup: increase chroot-friendliness (rhbz#2164847)
* Wed Sep 20 2023 Alexander Sosedkin <asosedkin@redhat.com> - 20230920-1.git570ea89
- OSPP subpolicy: tighten beyond reason for OSPP 4.3
- fips-mode-setup: more thorough --disable, still unsupported
* Tue Jul 25 2023 Alexander Sosedkin <asosedkin@redhat.com> - 20230731-1.git5ed06e0
- BSI: start a BSI TR 02102 policy
- krb5: sort enctypes mac-first, cipher-second, prioritize SHA-2 ones
- FIPS: enforce EMS in FIPS mode
- NO-ENFORCE-EMS: add subpolicy to undo the EMS enforcement in FIPS mode
- nss: implement EMS enforcement in FIPS mode (not enabled yet)
- openssl: implement EMS enforcement in FIPS mode
- gnutls: implement EMS enforcement in FIPS mode (not enabled yet)
- docs: replace `FIPS 140-2` with just `FIPS 140`
* Wed Jul 19 2023 Fedora Release Engineering <releng@fedoraproject.org> - 20230614-2.git5f3458e
- Rebuilt for https://fedoraproject.org/wiki/Fedora_39_Mass_Rebuild
* Wed Jun 14 2023 Alexander Sosedkin <asosedkin@redhat.com> - 20230614-1.git5f3458e
- policies: restore group order to old OpenSSL default order
* Thu Apr 20 2023 Alexander Sosedkin <asosedkin@redhat.com> - 20230420-1.git3d08ae7
- openssl: specify Groups explicitly
- openssl: add support for Brainpool curves
* Wed Mar 01 2023 Alexander Sosedkin <asosedkin@redhat.com> - 20230301-1.git2ea6d2a
- rpm-sequoia: add separate rpm-sequoia backend
- DEFAULT: allow SHA-1 and 1024 bit DSA in RPM (https://pagure.io/fesco/issue/2960)
* Mon Feb 20 2023 Alexander Sosedkin <asosedkin@redhat.com> - 20230220-1.git8c7de04
- Makefile: support asciidoc 10
* Thu Jan 19 2023 Fedora Release Engineering <releng@fedoraproject.org> - 20221215-2.gita4c31a3
- Rebuilt for https://fedoraproject.org/wiki/Fedora_38_Mass_Rebuild
* Thu Dec 15 2022 Alexander Sosedkin <asosedkin@redhat.com> - 20221215-1.gita4c31a3
- bind: expand the list of disableable algorithms
* Thu Nov 10 2022 Alexander Sosedkin <asosedkin@redhat.com> - 20221110-1.git87a75f4
- sequoia: introduce new backend
- migrate license tag to SPDX
* Mon Oct 03 2022 Alexander Sosedkin <asosedkin@redhat.com> - 20221003-1.gitcb1ad32
- openssh: force RequiredRSASize option name
/usr/bin/fips-finish-install /usr/bin/fips-mode-setup /usr/bin/update-crypto-policies /usr/share/crypto-policies/python /usr/share/crypto-policies/python/__pycache__ /usr/share/crypto-policies/python/__pycache__/build-crypto-policies.cpython-312.opt-1.pyc /usr/share/crypto-policies/python/__pycache__/build-crypto-policies.cpython-312.pyc /usr/share/crypto-policies/python/__pycache__/update-crypto-policies.cpython-312.opt-1.pyc /usr/share/crypto-policies/python/__pycache__/update-crypto-policies.cpython-312.pyc /usr/share/crypto-policies/python/build-crypto-policies.py /usr/share/crypto-policies/python/cryptopolicies /usr/share/crypto-policies/python/cryptopolicies/__init__.py /usr/share/crypto-policies/python/cryptopolicies/__pycache__ /usr/share/crypto-policies/python/cryptopolicies/__pycache__/__init__.cpython-312.opt-1.pyc /usr/share/crypto-policies/python/cryptopolicies/__pycache__/__init__.cpython-312.pyc /usr/share/crypto-policies/python/cryptopolicies/__pycache__/alg_lists.cpython-312.opt-1.pyc /usr/share/crypto-policies/python/cryptopolicies/__pycache__/alg_lists.cpython-312.pyc /usr/share/crypto-policies/python/cryptopolicies/__pycache__/cryptopolicies.cpython-312.opt-1.pyc /usr/share/crypto-policies/python/cryptopolicies/__pycache__/cryptopolicies.cpython-312.pyc /usr/share/crypto-policies/python/cryptopolicies/alg_lists.py /usr/share/crypto-policies/python/cryptopolicies/cryptopolicies.py /usr/share/crypto-policies/python/cryptopolicies/validation /usr/share/crypto-policies/python/cryptopolicies/validation/__init__.py /usr/share/crypto-policies/python/cryptopolicies/validation/__pycache__ /usr/share/crypto-policies/python/cryptopolicies/validation/__pycache__/__init__.cpython-312.opt-1.pyc /usr/share/crypto-policies/python/cryptopolicies/validation/__pycache__/__init__.cpython-312.pyc /usr/share/crypto-policies/python/cryptopolicies/validation/__pycache__/alg_lists.cpython-312.opt-1.pyc /usr/share/crypto-policies/python/cryptopolicies/validation/__pycache__/alg_lists.cpython-312.pyc /usr/share/crypto-policies/python/cryptopolicies/validation/__pycache__/general.cpython-312.opt-1.pyc /usr/share/crypto-policies/python/cryptopolicies/validation/__pycache__/general.cpython-312.pyc /usr/share/crypto-policies/python/cryptopolicies/validation/__pycache__/rules.cpython-312.opt-1.pyc /usr/share/crypto-policies/python/cryptopolicies/validation/__pycache__/rules.cpython-312.pyc /usr/share/crypto-policies/python/cryptopolicies/validation/__pycache__/scope.cpython-312.opt-1.pyc /usr/share/crypto-policies/python/cryptopolicies/validation/__pycache__/scope.cpython-312.pyc /usr/share/crypto-policies/python/cryptopolicies/validation/alg_lists.py /usr/share/crypto-policies/python/cryptopolicies/validation/general.py /usr/share/crypto-policies/python/cryptopolicies/validation/rules.py /usr/share/crypto-policies/python/cryptopolicies/validation/scope.py /usr/share/crypto-policies/python/policygenerators /usr/share/crypto-policies/python/policygenerators/__init__.py /usr/share/crypto-policies/python/policygenerators/__pycache__ /usr/share/crypto-policies/python/policygenerators/__pycache__/__init__.cpython-312.opt-1.pyc /usr/share/crypto-policies/python/policygenerators/__pycache__/__init__.cpython-312.pyc /usr/share/crypto-policies/python/policygenerators/__pycache__/bind.cpython-312.opt-1.pyc /usr/share/crypto-policies/python/policygenerators/__pycache__/bind.cpython-312.pyc /usr/share/crypto-policies/python/policygenerators/__pycache__/configgenerator.cpython-312.opt-1.pyc /usr/share/crypto-policies/python/policygenerators/__pycache__/configgenerator.cpython-312.pyc /usr/share/crypto-policies/python/policygenerators/__pycache__/gnutls.cpython-312.opt-1.pyc /usr/share/crypto-policies/python/policygenerators/__pycache__/gnutls.cpython-312.pyc /usr/share/crypto-policies/python/policygenerators/__pycache__/java.cpython-312.opt-1.pyc /usr/share/crypto-policies/python/policygenerators/__pycache__/java.cpython-312.pyc /usr/share/crypto-policies/python/policygenerators/__pycache__/krb5.cpython-312.opt-1.pyc /usr/share/crypto-policies/python/policygenerators/__pycache__/krb5.cpython-312.pyc /usr/share/crypto-policies/python/policygenerators/__pycache__/libreswan.cpython-312.opt-1.pyc /usr/share/crypto-policies/python/policygenerators/__pycache__/libreswan.cpython-312.pyc /usr/share/crypto-policies/python/policygenerators/__pycache__/libssh.cpython-312.opt-1.pyc /usr/share/crypto-policies/python/policygenerators/__pycache__/libssh.cpython-312.pyc /usr/share/crypto-policies/python/policygenerators/__pycache__/nss.cpython-312.opt-1.pyc /usr/share/crypto-policies/python/policygenerators/__pycache__/nss.cpython-312.pyc /usr/share/crypto-policies/python/policygenerators/__pycache__/openssh.cpython-312.opt-1.pyc /usr/share/crypto-policies/python/policygenerators/__pycache__/openssh.cpython-312.pyc /usr/share/crypto-policies/python/policygenerators/__pycache__/openssl.cpython-312.opt-1.pyc /usr/share/crypto-policies/python/policygenerators/__pycache__/openssl.cpython-312.pyc /usr/share/crypto-policies/python/policygenerators/__pycache__/sequoia.cpython-312.opt-1.pyc /usr/share/crypto-policies/python/policygenerators/__pycache__/sequoia.cpython-312.pyc /usr/share/crypto-policies/python/policygenerators/bind.py /usr/share/crypto-policies/python/policygenerators/configgenerator.py /usr/share/crypto-policies/python/policygenerators/gnutls.py /usr/share/crypto-policies/python/policygenerators/java.py /usr/share/crypto-policies/python/policygenerators/krb5.py /usr/share/crypto-policies/python/policygenerators/libreswan.py /usr/share/crypto-policies/python/policygenerators/libssh.py /usr/share/crypto-policies/python/policygenerators/nss.py /usr/share/crypto-policies/python/policygenerators/openssh.py /usr/share/crypto-policies/python/policygenerators/openssl.py /usr/share/crypto-policies/python/policygenerators/sequoia.py /usr/share/crypto-policies/python/update-crypto-policies.py /usr/share/man/man8/fips-finish-install.8.gz /usr/share/man/man8/fips-mode-setup.8.gz /usr/share/man/man8/update-crypto-policies.8.gz
Generated by rpm2html 1.8.1
Fabrice Bellet, Fri Oct 24 06:19:54 2025