Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: crypto-policies | Distribution: CentOS |
Version: 20221215 | Vendor: CentOS |
Release: 1.git9a18988.el9 | Build date: Thu Dec 15 12:52:19 2022 |
Group: Unspecified | Build host: ppc64le-02.stream.rdu2.redhat.com |
Size: 84673 | Source RPM: crypto-policies-20221215-1.git9a18988.el9.src.rpm |
Packager: builder@centos.org | |
Url: https://gitlab.com/redhat-crypto/fedora-crypto-policies | |
Summary: System-wide crypto policies |
This package provides pre-built configuration files with cryptographic policies for various cryptographic back-ends, such as SSL/TLS libraries.
LGPLv2+
* Thu Dec 15 2022 Alexander Sosedkin <asosedkin@redhat.com> - 20221215-1.git9a18988 - bind: expand the list of disableable algorithms * Mon Oct 03 2022 Alexander Sosedkin <asosedkin@redhat.com> - 20221003-1.git04dee29 - openssh: rename RSAMinSize option to RequiredRSASize * Mon Aug 15 2022 Alexander Sosedkin <asosedkin@redhat.com> - 20220815-1.git0fbe86f - openssh: add RSAMinSize option following min_rsa_size * Wed Apr 27 2022 Alexander Sosedkin <asosedkin@redhat.com> - 20220427-1.gitb2323a1 - bind: control ED25519/ED448 * Mon Apr 04 2022 Alexander Sosedkin <asosedkin@redhat.com> - 20220404-1.git845c0c1 - DEFAULT: drop DNSSEC SHA-1 exception - openssh: add support for sntrup761x25519-sha512@openssh.com * Wed Feb 23 2022 Alexander Sosedkin <asosedkin@redhat.com> - 20220223-1.git5203b41 - openssl: allow SHA-1 signatures with rh-allow-sha1-signatures in LEGACY - update AD-SUPPORT, move RC4 enctype enabling to AD-SUPPORT-LEGACY - fips-mode-setup: catch more inconsistencies, clarify --check * Thu Feb 03 2022 Alexander Sosedkin <asosedkin@redhat.com> - 20220203-1.gitf03e75e - gnutls: enable SHAKE, needed for Ed448 - fips-mode-setup: improve handling FIPS plus subpolicies - FIPS: disable SHA-1 HMAC - FIPS: disable CBC ciphers except in Kerberos * Tue Feb 01 2022 Alexander Sosedkin <asosedkin@redhat.com> - 20220201-1.git636a91d - openssl: revert to SECLEVEL=2 in LEGACY - openssl: add newlines at the end of the output * Mon Nov 15 2021 Alexander Sosedkin <asosedkin@redhat.com> - 20211115-1.git70de135 - OSPP: relax -ECDSA-SHA2-512, -FFDHE-* - fips-mode-setup, fips-finish-install: call zipl more often (s390x-specific) * Wed Sep 22 2021 Alexander Sosedkin <asosedkin@redhat.com> - 20210922-1.git6fb269b - openssl: fix disabling ChaCha20 - update for pylint 2.11 * Tue Sep 14 2021 Alexander Sosedkin <asosedkin@redhat.com> - 20210914-1.git97d08ef - gnutls: reorder ECDSA-SECPMMMR1-SHANNN together with ECDSA-SHANNN - fix several issues with update-crypto-policies --check * Mon Aug 09 2021 Mohan Boddu <mboddu@redhat.com> - 20210707-2.git29f6c0b - Rebuilt for IMA sigs, glibc 2.34, aarch64 flags Related: rhbz#1991688 * Wed Jul 07 2021 Alexander Sosedkin <asosedkin@redhat.com> - 20210707-1.git29f6c0b - gnutls: explicitly enable ECDSA-SECPNNNR1-SHANNN - packaging: adapt to the RHEL-9 %check-time testing tools availability * Mon Jun 28 2021 Alexander Sosedkin <asosedkin@redhat.com> - 20210628-1.gitdd7d273 - implement scoped policies, e.g., cipher@SSH = ... - implement algorithm globbing, e.g., cipher@SSH = -*-CBC - deprecate derived properties: tls_cipher, ssh_cipher, ssh_group, ike_protocol, sha1_in_dnssec - deprecate unscoped form of protocol property - openssl: set MinProtocol / MaxProtocol separately for TLS and DTLS - openssh: use PubkeyAcceptedAlgorithms instead of PubkeyAcceptedKeyTypes - libssh: respect ssh_certs - restrict FIPS:OSPP further - improve Python 3.10 compatibility - update documentation - expand upstream test coverage - FUTURE: disable CBC ciphers for all backends but krb5 - openssl: LEGACY must have SECLEVEL=1, enabling SHA1 - disable DHE-DSS in LEGACY - bump LEGACY key size requirements from 1023 to 1024 - add javasystem backend - *ssh: condition ecdh-sha2-nistp384 on SECP384R1 - set %verify(not mode) for backend sometimes-symlinks-sometimes-not - gnutls: use allowlisting * Tue Jun 22 2021 Mohan Boddu <mboddu@redhat.com> - 20210218-3.git2246c55 - Rebuilt for RHEL 9 BETA for openssl 3.0 Related: rhbz#1971065 * Thu Apr 15 2021 Mohan Boddu <mboddu@redhat.com> - 20210218-2.git2246c55 - Rebuilt for RHEL 9 BETA on Apr 15th 2021. Related: rhbz#1947937 * Thu Feb 18 2021 Alexander Sosedkin <asosedkin@redhat.com> - 20210218-1.git2246c55 - require 2048 bit params in LEGACY - require TLSv1.2/DTLSv1.2 in all policies - disable DSA - disable 3DES in LEGACY - drop FFDHE-1024 from LEGACY - drop (sub)policies we're not going to offer in RHEL-9 * Sat Feb 13 2021 Alexander Sosedkin <asosedkin@redhat.com> - 20210213-1.git5c710c0 - exclude RC4 from LEGACY - introduce rc4_md5_in_krb5 to narrow AD_SUPPORT's impact - an assortment of small fixes * Wed Jan 27 2021 Alexander Sosedkin <asosedkin@redhat.com> - 20210127-2.gitb21c811 - fix comparison in %post lua scriptlet * Wed Jan 27 2021 Alexander Sosedkin <asosedkin@redhat.com> - 20210127-1.gitb21c811 - don't create /etc/crypto-policies/back-ends/.config in %post * Tue Jan 26 2021 Fedora Release Engineering <releng@fedoraproject.org> - 20210118-2.gitb21c811 - Rebuilt for https://fedoraproject.org/wiki/Fedora_34_Mass_Rebuild * Mon Jan 18 2021 Alexander Sosedkin <asosedkin@redhat.com> - 20210118-1.gitb21c811 - output sigalgs required by nss >=3.59 (or 3.60 in Fedora case) - bump Python requirement to 3.6 * Tue Dec 15 2020 Alexander Sosedkin <asosedkin@redhat.com> - 20201215-1.giteb57e00 - Kerberos 5: Fix policy generator to account for macs
/etc/crypto-policies /etc/crypto-policies/back-ends /etc/crypto-policies/back-ends/bind.config /etc/crypto-policies/back-ends/gnutls.config /etc/crypto-policies/back-ends/java.config /etc/crypto-policies/back-ends/javasystem.config /etc/crypto-policies/back-ends/krb5.config /etc/crypto-policies/back-ends/libreswan.config /etc/crypto-policies/back-ends/libssh.config /etc/crypto-policies/back-ends/nss.config /etc/crypto-policies/back-ends/openssh.config /etc/crypto-policies/back-ends/opensshserver.config /etc/crypto-policies/back-ends/openssl.config /etc/crypto-policies/back-ends/opensslcnf.config /etc/crypto-policies/config /etc/crypto-policies/local.d /etc/crypto-policies/policies /etc/crypto-policies/policies/modules /etc/crypto-policies/state /etc/crypto-policies/state/CURRENT.pol /etc/crypto-policies/state/current /usr/share/crypto-policies /usr/share/crypto-policies/DEFAULT /usr/share/crypto-policies/DEFAULT/bind.txt /usr/share/crypto-policies/DEFAULT/gnutls.txt /usr/share/crypto-policies/DEFAULT/java.txt /usr/share/crypto-policies/DEFAULT/javasystem.txt /usr/share/crypto-policies/DEFAULT/krb5.txt /usr/share/crypto-policies/DEFAULT/libreswan.txt /usr/share/crypto-policies/DEFAULT/libssh.txt /usr/share/crypto-policies/DEFAULT/nss.txt /usr/share/crypto-policies/DEFAULT/openssh.txt /usr/share/crypto-policies/DEFAULT/opensshserver.txt /usr/share/crypto-policies/DEFAULT/openssl.txt /usr/share/crypto-policies/DEFAULT/opensslcnf.txt /usr/share/crypto-policies/FIPS /usr/share/crypto-policies/FIPS/bind.txt /usr/share/crypto-policies/FIPS/gnutls.txt /usr/share/crypto-policies/FIPS/java.txt /usr/share/crypto-policies/FIPS/javasystem.txt /usr/share/crypto-policies/FIPS/krb5.txt /usr/share/crypto-policies/FIPS/libreswan.txt /usr/share/crypto-policies/FIPS/libssh.txt /usr/share/crypto-policies/FIPS/nss.txt /usr/share/crypto-policies/FIPS/openssh.txt /usr/share/crypto-policies/FIPS/opensshserver.txt /usr/share/crypto-policies/FIPS/openssl.txt /usr/share/crypto-policies/FIPS/opensslcnf.txt /usr/share/crypto-policies/FUTURE /usr/share/crypto-policies/FUTURE/bind.txt /usr/share/crypto-policies/FUTURE/gnutls.txt /usr/share/crypto-policies/FUTURE/java.txt /usr/share/crypto-policies/FUTURE/javasystem.txt /usr/share/crypto-policies/FUTURE/krb5.txt /usr/share/crypto-policies/FUTURE/libreswan.txt /usr/share/crypto-policies/FUTURE/libssh.txt /usr/share/crypto-policies/FUTURE/nss.txt /usr/share/crypto-policies/FUTURE/openssh.txt /usr/share/crypto-policies/FUTURE/opensshserver.txt /usr/share/crypto-policies/FUTURE/openssl.txt /usr/share/crypto-policies/FUTURE/opensslcnf.txt /usr/share/crypto-policies/LEGACY /usr/share/crypto-policies/LEGACY/bind.txt /usr/share/crypto-policies/LEGACY/gnutls.txt /usr/share/crypto-policies/LEGACY/java.txt /usr/share/crypto-policies/LEGACY/javasystem.txt /usr/share/crypto-policies/LEGACY/krb5.txt /usr/share/crypto-policies/LEGACY/libreswan.txt /usr/share/crypto-policies/LEGACY/libssh.txt /usr/share/crypto-policies/LEGACY/nss.txt /usr/share/crypto-policies/LEGACY/openssh.txt /usr/share/crypto-policies/LEGACY/opensshserver.txt /usr/share/crypto-policies/LEGACY/openssl.txt /usr/share/crypto-policies/LEGACY/opensslcnf.txt /usr/share/crypto-policies/back-ends /usr/share/crypto-policies/back-ends/DEFAULT /usr/share/crypto-policies/back-ends/DEFAULT/bind.config /usr/share/crypto-policies/back-ends/DEFAULT/gnutls.config /usr/share/crypto-policies/back-ends/DEFAULT/java.config /usr/share/crypto-policies/back-ends/DEFAULT/javasystem.config /usr/share/crypto-policies/back-ends/DEFAULT/krb5.config /usr/share/crypto-policies/back-ends/DEFAULT/libreswan.config /usr/share/crypto-policies/back-ends/DEFAULT/libssh.config /usr/share/crypto-policies/back-ends/DEFAULT/nss.config /usr/share/crypto-policies/back-ends/DEFAULT/openssh.config /usr/share/crypto-policies/back-ends/DEFAULT/opensshserver.config /usr/share/crypto-policies/back-ends/DEFAULT/openssl.config /usr/share/crypto-policies/back-ends/DEFAULT/opensslcnf.config /usr/share/crypto-policies/back-ends/FIPS /usr/share/crypto-policies/back-ends/FIPS/bind.config /usr/share/crypto-policies/back-ends/FIPS/gnutls.config /usr/share/crypto-policies/back-ends/FIPS/java.config /usr/share/crypto-policies/back-ends/FIPS/javasystem.config /usr/share/crypto-policies/back-ends/FIPS/krb5.config /usr/share/crypto-policies/back-ends/FIPS/libreswan.config /usr/share/crypto-policies/back-ends/FIPS/libssh.config /usr/share/crypto-policies/back-ends/FIPS/nss.config /usr/share/crypto-policies/back-ends/FIPS/openssh.config /usr/share/crypto-policies/back-ends/FIPS/opensshserver.config /usr/share/crypto-policies/back-ends/FIPS/openssl.config /usr/share/crypto-policies/back-ends/FIPS/opensslcnf.config /usr/share/crypto-policies/back-ends/FUTURE /usr/share/crypto-policies/back-ends/FUTURE/bind.config /usr/share/crypto-policies/back-ends/FUTURE/gnutls.config /usr/share/crypto-policies/back-ends/FUTURE/java.config /usr/share/crypto-policies/back-ends/FUTURE/javasystem.config /usr/share/crypto-policies/back-ends/FUTURE/krb5.config /usr/share/crypto-policies/back-ends/FUTURE/libreswan.config /usr/share/crypto-policies/back-ends/FUTURE/libssh.config /usr/share/crypto-policies/back-ends/FUTURE/nss.config /usr/share/crypto-policies/back-ends/FUTURE/openssh.config /usr/share/crypto-policies/back-ends/FUTURE/opensshserver.config /usr/share/crypto-policies/back-ends/FUTURE/openssl.config /usr/share/crypto-policies/back-ends/FUTURE/opensslcnf.config /usr/share/crypto-policies/back-ends/LEGACY /usr/share/crypto-policies/back-ends/LEGACY/bind.config /usr/share/crypto-policies/back-ends/LEGACY/gnutls.config /usr/share/crypto-policies/back-ends/LEGACY/java.config /usr/share/crypto-policies/back-ends/LEGACY/javasystem.config /usr/share/crypto-policies/back-ends/LEGACY/krb5.config /usr/share/crypto-policies/back-ends/LEGACY/libreswan.config /usr/share/crypto-policies/back-ends/LEGACY/libssh.config /usr/share/crypto-policies/back-ends/LEGACY/nss.config /usr/share/crypto-policies/back-ends/LEGACY/openssh.config /usr/share/crypto-policies/back-ends/LEGACY/opensshserver.config /usr/share/crypto-policies/back-ends/LEGACY/openssl.config /usr/share/crypto-policies/back-ends/LEGACY/opensslcnf.config /usr/share/crypto-policies/default-config /usr/share/crypto-policies/policies /usr/share/crypto-policies/policies/DEFAULT.pol /usr/share/crypto-policies/policies/EMPTY.pol /usr/share/crypto-policies/policies/FIPS.pol /usr/share/crypto-policies/policies/FUTURE.pol /usr/share/crypto-policies/policies/LEGACY.pol /usr/share/crypto-policies/policies/modules /usr/share/crypto-policies/policies/modules/AD-SUPPORT-LEGACY.pmod /usr/share/crypto-policies/policies/modules/AD-SUPPORT.pmod /usr/share/crypto-policies/policies/modules/ECDHE-ONLY.pmod /usr/share/crypto-policies/policies/modules/NO-SHA1.pmod /usr/share/crypto-policies/policies/modules/OSPP.pmod /usr/share/crypto-policies/policies/modules/SHA1.pmod /usr/share/crypto-policies/reload-cmds.sh /usr/share/licenses/crypto-policies /usr/share/licenses/crypto-policies/COPYING.LESSER /usr/share/man/man7/crypto-policies.7.gz
Generated by rpm2html 1.8.1
Fabrice Bellet, Thu Mar 30 03:53:23 2023