Richard W.M. Jones <rjo...@redhat.com> wrote:

I somehow thought that loading the legacy provider would be the same
as the LEGACY crypto policy, except just for Python 2.7 rather than
for the entire system.

It’s a common misconception. So common that I recently wrote a blog post to
explain the difference:

 
https://www.redhat.com/en/blog/legacy-cryptography-fedora-36-and-red-hat-enterprise-linux-9


Setting the whole system crypto-policy to LEGACY (and reverting the
code for loading the legacy provider) fixes almost everything.

Thanks for testing and confirming that. In that case, it’s really just a
case of running the test with a separate OpenSSL configuration file that
applies weaker defaults.


HTH,
Clemens

--
Clemens Lang
RHEL Crypto Team
Red Hat


_______________________________________________
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure

Reply via email to