Re: AI-generated content in Fedora packages: do we have rules?

2025-07-18 Thread Clemens Lang
would need to compute 1/sqrt(x). Ending up with an exact copy of the Doom implementation really isn’t great from a copyright and license compliance point of view. -- Clemens Lang RHEL Crypto Team Red Hat -- ___ devel mailing list -- devel@lists.fedora

Re: fedpkg considering public key as private and refusing to give access

2025-05-02 Thread Clemens Lang
c key needs to have limited permissions. -- Clemens Lang RHEL Crypto Team Red Hat -- ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedorapr

Re: Regenerating rescue kernels (Fedora upgrade documentation)

2025-04-30 Thread Clemens Lang
nel on its own. If you want to do that, the simplest way is probably to just `dnf reinstall` the kernel. Alternatively, invoking /usr/bin/kernel-install with the right parameters will run this scriptlet, and also re-generate the rescue kernel. HTH, Clemens -- Clemens Lang RHEL Crypto Team Red Ha

Re: F43 change Proposal: Disabling support of building OpenSSL engines (system-wide)

2025-02-26 Thread Clemens Lang
lly disable them. I suspect a bunch of other entries on that list are in the same position. -- Clemens Lang RHEL Crypto Team Red Hat -- ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraprojec

Re: F43 change Proposal: Disabling support of building OpenSSL engines (system-wide)

2025-02-25 Thread Clemens Lang
the better. At best, you’re buying yourself a year by rejecting this change. -- Clemens Lang RHEL Crypto Team Red Hat -- ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org Fedora C

Re: Where to fill bugs for fedora-kickstarts?

2025-02-11 Thread Clemens Lang
nd string handling. I have a hacky patch at [1] that fixes it, but it should really be reported to Python so it can be fixed upstream. From what I recall, there was no way to fix this in livicd-creator. [1]: https://github.com/neverpanic/qubip-live-image/blob/main/urllib.patch -- Clemens

Re: WRT "Add explicit BR: libxcrypt-devel"

2025-02-04 Thread Clemens Lang
view, all that libxcrypt is doing is essentially equivalent to a base64encode(), and FIPS doesn’t care (*). *) this is not legal advice, I am not a lawyer, do your own research -- Clemens Lang RHEL Crypto Team Red Hat -- ___ devel mailin

Re: Fedora EPEL - sequoia-sq package and "cli breakages"

2025-01-13 Thread Clemens Lang
t yet provide a stable interface. [1]: https://access.redhat.com/articles/rhel9-abi-compatibility [2]: https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html-single/package_manifest/index#application_streams -- Clemens Lang RHEL Crypto Team Red Hat -- __

Re: Promoting co-maintainer to main maintainer for orphaned packages?

2024-12-18 Thread Clemens Lang
Hi, > On 18. Dec 2024, at 17:51, Fabio Valentini wrote: > > On Wed, Dec 18, 2024 at 10:43 AM Clemens Lang wrote: >> >> See https://src.fedoraproject.org/rpms/stunnel, or >> https://src.fedoraproject.org/rpms/gnutls, owned by @crypto-team. > > Looks like th

Re: Promoting co-maintainer to main maintainer for orphaned packages?

2024-12-18 Thread Clemens Lang
maintainer is currently out of office. As a consequence, I am very much opposed to a rule that would require packages to be maintained by single individuals. Are there such cases as you describe? Absolutely! Should they be a reason to completely ban groups? No. --

Re: F42 Change Proposal: DNF5 Expired Keys (System-Wide)

2024-12-05 Thread Clemens Lang
ke it part of the change proposal right now. -- Clemens Lang RHEL Crypto Team Red Hat -- ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.

Re: F42 Change Proposal: DNF5 Expired Keys (System-Wide)

2024-12-04 Thread Clemens Lang
ore strict crypto-policy, the next run would remove (or propose to remove) keys that are no longer considered secure under that crypto-policy? Thanks, Clemens -- Clemens Lang RHEL Crypto Team Red Hat -- ___ devel mailing list -- devel@lists.fedorap

Re: Looking for advice on packaging newer version of ncdu

2024-11-22 Thread Clemens Lang
SSDs, and does not come with the Zig dependency. I’ve been using that for quite a while now and I don’t miss ncdu at all. -- Clemens Lang RHEL Crypto Team Red Hat -- ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an e

Re: pkcs11-provider update breaks eduroam

2024-11-20 Thread Clemens Lang
Hi Michael, > On 20. Nov 2024, at 15:52, Michael Catanzaro wrote: > > On Wed, Nov 20 2024 at 11:09:05 AM +01:00:00, Clemens Lang > wrote: >> The idea here was to auto-enable pkcs11-provider when it is installed, which >> still makes sense to me. The issue here I t

Re: pkcs11-provider update breaks eduroam

2024-11-20 Thread Clemens Lang
it is installed, which still makes sense to me. The issue here I think is that many people ended up with pkcs11-provider installed because of a recommendation. We should remove that recommendation, most users don’t need pcks11-provider installed. HTH, Clemens -- C

Re: Unorphan dovecot-fts-xapian

2024-09-30 Thread Clemens Lang
replied already… would you mind doing a package review for it at https://bugzilla.redhat.com/show_bug.cgi?id=2315641? I just learned that that’s required since the package has been orphaned for more than 8 weeks. -- Clemens Lang RHEL Crypto Team Red Hat --

Unorphan dovecot-fts-xapian

2024-09-27 Thread Clemens Lang
]: https://copr.fedorainfracloud.org/coprs/logic/dovecot-fts-xapian/package/dovecot-fts-xapian/ -- Clemens Lang RHEL Crypto Team Red Hat -- ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le

Re: Anyone with powers to bump/rebuild nss?

2024-08-08 Thread Clemens Lang
uch in the middle of doing the required NSS rebase in Fedora, CentOS Stream, and RHEL. -- Clemens Lang RHEL Crypto Team Red Hat -- ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproj

Re: Fedora rawhide (to be f41) and openssl engines

2024-07-23 Thread Clemens Lang
Hi, > On 23. Jul 2024, at 16:36, Gary Buhrmaster wrote: > > On Tue, Jul 23, 2024 at 8:55 AM Clemens Lang wrote: > >> However, we should still consider the effect this will have on developers >> that build software on Fedora — they will also have to specify >>

Re: Fedora rawhide (to be f41) and openssl engines

2024-07-23 Thread Clemens Lang
d software on Fedora — they will also have to specify -DOPENSSL_NO_ENGINE now or see failing builds, and we don’t really see that impact until 41 releases. -- Clemens Lang RHEL Crypto Team Red Hat -- ___ devel mailing list -- devel@lists.fedorapr

Re: Fedora rawhide (to be f41) and openssl engines

2024-07-22 Thread Clemens Lang
Hi, > On 22. Jul 2024, at 16:32, Fabio Valentini wrote: > > On Mon, Jul 22, 2024 at 4:28 PM Clemens Lang wrote: >> >> Hi Neal, >> >> >>> On 22. Jul 2024, at 15:01, Neal Gompa wrote: >>> >>> The CentOS approach isn't a de

Re: Fedora rawhide (to be f41) and openssl engines

2024-07-22 Thread Clemens Lang
pening, then there's no way to support removing the > engine API from Fedora's OpenSSL. We’re happy to help maintainers that want to do this. We may do it ourselves for selected components. We will not fix every single use ourselves. -- Clemens Lang RHEL Crypto Team Red Hat -- __

Re: Fedora rawhide (to be f41) and openssl engines

2024-07-22 Thread Clemens Lang
now whether there would be any specific other Fedora process we would have to follow — maybe others can chime in on this. -- Clemens Lang RHEL Crypto Team Red Hat -- ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscrib

Re: nbdkit -> openssl-devel-engine build dependency

2024-07-19 Thread Clemens Lang
ll packages using > ENGINE_cleanup and tell them to decide whether to BuildRequires: > openssl-devel-engine. Correct, I just didn’t have the time to work on this yet. See https://bugzilla.redhat.com/show_bug.cgi?id=2296114 for some progress towards this. If anybody has automated tooling to

Re: nbdkit -> openssl-devel-engine build dependency

2024-07-19 Thread Clemens Lang
applications can be written in a way that they don’t care whether the private key is in a file or a smartcard. ENGINEs also use various differing code paths inside of OpenSSL, which often trigger subtle bugs and weird behavior. HTH, Clemens -- Clemens Lang RHEL

Re: nbdkit -> openssl-devel-engine build dependency

2024-07-19 Thread Clemens Lang
include > # endif > > +#if ! __has_include() > +# define OPENSSL_NO_ENGINE > +#endif > + > #ifdef __cplusplus > extern "C" { > #endif That’s one potential way, thanks for the patch – however, it has the same fail-silent problem. -- Clemens Lang RHEL Crypt

Re: F41 Change Proposal: Make OpenSSL distrust SHA-1 signatures by default (system-wide)

2024-07-05 Thread Clemens Lang
to make such things configurable. -- Clemens Lang RHEL Crypto Team Red Hat -- ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en

Re: F41 Change Proposal: Make OpenSSL distrust SHA-1 signatures by default (system-wide)

2024-07-05 Thread Clemens Lang
Hi, > On 5. Jul 2024, at 14:49, Daniel P. Berrangé wrote: > > On Fri, Jul 05, 2024 at 02:37:41PM +0200, Clemens Lang wrote: >> >> >> Please start addressing this with whoever maintains the TPM specification. > > The TPM spec is maintained by the Trusted

Re: HEADS UP: openssl engine-related FTBFS and Boost

2024-07-05 Thread Clemens Lang
nly have to add BuildRequires: openssl-devel-engine instead of adding a preprocessor define. It also has the same downside of silently disabling engines if the maintainer doesn’t check. -- Clemens Lang RHEL Crypto Team Red Hat -- __

Re: F41 Change Proposal: Make OpenSSL distrust SHA-1 signatures by default (system-wide)

2024-07-05 Thread Clemens Lang
mode. You should really use a separate openssl configuration file using OPENSSL_CONF instead, and start a discussion to get the TPM standard updated. -- Clemens Lang RHEL Crypto Team Red Hat -- ___ devel mailing list -- devel@lists.fedoraproject.

Re: HEADS UP: openssl engine-related FTBFS and Boost

2024-07-05 Thread Clemens Lang
her is fail-silent with work for maintainers that want to continue using engines. Which ones is better? -- Clemens Lang RHEL Crypto Team Red Hat -- ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le..

Re: F41 Change Proposal: Make OpenSSL distrust SHA-1 signatures by default (system-wide)

2024-06-11 Thread Clemens Lang
Rich. > > Anyway, -1 from me, too > > For exactly that reason. Can you elaborate what you would need, in addition to the LEGACY policy (which still allows these connections) and the runcp utility? -- Clemens Lang RHEL Crypto Team Red Hat -- __

Re: F41 Change Proposal: Make OpenSSL distrust SHA-1 signatures by default (system-wide)

2024-06-10 Thread Clemens Lang
to the legacy machines, while maintaining general system > security. See this text in the proposal (emphasis mine): Users that need the previous behaviour and don't mind the security implications will be able to revert to the old behavior system-wide (update-crypto-policies --set FEDORA4

Re: F41 Change Proposal: Make OpenSSL distrust SHA-1 signatures by default (system-wide)

2024-06-10 Thread Clemens Lang
bout post-quantum cryptographic signature algorithms soon, otherwise we’ll end up having the same discussion again in 10 years, when TLS and many other common protocols have moved. -- Clemens Lang RHEL Crypto Team Red Hat -- ___ dev

Re: F41 Change Proposal: Make OpenSSL distrust SHA-1 signatures by default (system-wide)

2024-06-10 Thread Clemens Lang
1] uses the OpenPGP packet format, which can (and in practice likely does) contain a different hash of the signed content, over which it creates a signature, so even commits with a SHA-1 commit ID can be signed in a fashion that will continue to validate with this change. -- Clem

Re: F41 Change Proposal: OpenSSL Deprecate Engine (system-wide)

2024-04-03 Thread Clemens Lang
e other eventually. I suspect if Fedora decides to keep ENGINE support, we’ll have the exact same discussion in a few years when OpenSSL 4.0 is released, and people will demand that the rebase to 4.0 that removes engine support should be a system-wide change proposal because it breaks engi

Re: F41 Change Proposal: Disable openSSL Engine Support (system-wide)

2024-03-21 Thread Clemens Lang
example https://github.com/latchset/pkcs11-provider/pull/328, which allows the PKCS11 provider to work everywhere where a simple PEM private key file is currently supported. With this, the Ruby OpenSSL module has all the time in the world to make the transition. -- Clemens La

Re: F41 Change Proposal: Disable openSSL Engine Support (system-wide)

2024-03-20 Thread Clemens Lang
ump *already* exists between different builds of OpenSSL with different configuration. [1]: https://github.com/openssl/openssl/blob/master/util/libssl.num [2]: https://github.com/openssl/openssl/blob/master/util/libcrypto.num -- Clemens Lang RHEL Crypto Team Red Hat -- __

Re: do we need CONFIG_UPROBES=y in our kernels?

2024-02-14 Thread Clemens Lang
is that the host was not already able to do these things. If you don’t trust your host, look into confidential computing and confidential containers. Those also don’t solve every single problem, but they get you closer. -- Clemens Lang RHEL Crypto Team Red Hat -- _

Re: Figure out what killed an app (rhbz#2253099)

2024-01-31 Thread Clemens Lang
t there, is it possible that evolution runs with a seccomp filter or other BPF program configured to kill the process on violation, and that’s what’s happening here? For software that regularly deals with untrusted input, it doesn’t seem unreasonable that the developers might have implemented somethin

Re: Intention to tighten RPM crypto-policy back

2023-09-28 Thread Clemens Lang
out this. I think the importer should be modified to attempt to import all keys in a file and ignore those that fail. The other alternative is that all keys should be imported regardless of whether they will be considered usable for verification, and verification of RPMs will later fail if tho

Re: CentOS Stream, RHEL, and Fedora [was Re: What is Fedora?]

2023-06-26 Thread Clemens Lang
use the community as guinea pigs; we ourselves were surprised by the fallout, and have been working internally with the maintainers of our signing keys to get this resolved. That work is still ongoing, but we will probably delay disabling SHA-1 in PGP use until CentOS Stream 10/RHEL 10. --

Re: What happen kup in Fedora 37

2023-03-27 Thread Clemens Lang
Steve Dickson wrote: I'm trying to access kernel.org with kup script but it does not seem to be in Fedora 37. The only rpm I can find is kup-0.3.6-11.fc36.rpm. What am I missing?? The package has been orphaned and retired: https://src.fedoraproject.org/rpms/kup If you want to unretire a

Re: fkinit -u instructions

2023-02-15 Thread Clemens Lang
Hi, Kenneth Goldman wrote: -Original Message- From: Clemens Lang Sent: Tuesday, February 14, 2023 12:59 PM To: Development discussions related to Fedora You are right, but fkinit will tell you, so I don’t think we need to clarify this in the documentation: :) cllang@frootmig

Re: fkinit -u instructions

2023-02-14 Thread Clemens Lang
e that the prompt is for only the token) Enter OTP Token Value: :) cllang@frootmig:~$ HTH, Clemens -- Clemens Lang RHEL Crypto Team Red Hat ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email t

Re: F38 proposal: Reproducible builds: Clamp build mtimes to $SOURCE_DATE_EPOCH (System-Wide Change proposal)

2022-11-11 Thread Clemens Lang
Hi, Alexander Sosedkin wrote: In RPM world, I've even entertained an idea of having a subpackage for auditability not unlike how we have debuginfo, since rebuilding a package reproducibly requires builddep pinning. But if that's avoidable, I’d rather just not mix artifacts with meta. Debian

Re: F40 proposal: Porting Fedora to Modern C (System-Wide Change proposal)

2022-10-25 Thread Clemens Lang
, but commonly used software is probably already fixed. HTH, Clemens -- Clemens Lang RHEL Crypto Team Red Hat ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org Fedora Code of Co

Re: F38 proposal: RPM Sequoia (System-Wide Change proposal)

2022-10-10 Thread Clemens Lang
, Clemens -- Clemens Lang RHEL Crypto Team Red Hat ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of

Re: OpenSSL and ECC patents (was Re: Mesa in F37- vaapi support disabled for h264/h265/vc1)

2022-09-29 Thread Clemens Lang
Hi, Kevin Kofler wrote: Clemens Lang wrote: Note that we’re discussing moving openssl to a src-git approach, so it should eventually become much easier to see the relation between upstream code and our downstream copy. At that point, you have the patent-encumbered files in your (src-)git

Re: OpenSSL and ECC patents (was Re: Mesa in F37- vaapi support disabled for h264/h265/vc1)

2022-09-28 Thread Clemens Lang
Hi, Michael J Gruber wrote: Understanding is helped greatly by communication, though. Legal answers such as "We can not" do not further this understanding, and "We can not and we can not tell you why" is not much better, but these are the typical answer we get, not even with a "sorry, but we c

Re: help needed on AskFedora: OpenSSLv3 error when connecting to Eduroam

2022-06-30 Thread Clemens Lang
dards. -- Clemens Lang RHEL Crypto Team Red Hat ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/

Re: F37 proposal: Deprecate openssl1.1 package (System-Wide Change)

2022-06-27 Thread Clemens Lang
case of running the test with a separate OpenSSL configuration file that applies weaker defaults. HTH, Clemens -- Clemens Lang RHEL Crypto Team Red Hat ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le

Re: F37 proposal: Deprecate openssl1.1 package (System-Wide Change)

2022-06-27 Thread Clemens Lang
on how to avoid it. [1] https://github.com/lsh123/xmlsec/issues/339 HTH, Clemens -- Clemens Lang RHEL Crypto Team Red Hat ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org F

Re: F37 Proposal: Strong crypto settings: phase 3, forewarning 1/2 (System-Wide Change proposal)

2022-05-03 Thread Clemens Lang
basically mean “I don’t care about encryption”. In these cases, why not just use plain HTTP, or other unencrypted protocols instead? -- Clemens Lang RHEL Crypto Team Red Hat ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email

Re: F37 Proposal: Strong crypto settings: phase 3, forewarning 1/2 (System-Wide Change proposal)

2022-05-02 Thread Clemens Lang
2 when SECLEVEL is 2. In conclusion: Ubuntu isn’t ahead of us here. [1]: https://discourse.ubuntu.com/t/jammy-jellyfish-release-notes/24668 -- Clemens Lang RHEL Crypto Team Red Hat ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscrib

Re: Problem with SSL in Fedora 36

2022-04-29 Thread Clemens Lang
mail server administrator and asking them to support modern TLS versions. HTH, -- Clemens Lang RHEL Crypto Team Red Hat ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org Fedora

Re: Landing a larger-than-release change (distrusting SHA-1 signatures)

2022-04-07 Thread Clemens Lang
I’ll start working on this now. -- Clemens Lang RHEL Crypto Team Red Hat ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/

Re: Landing a larger-than-release change (distrusting SHA-1 signatures)

2022-03-16 Thread Clemens Lang
at we are proposing. HTH, Clemens -- Clemens Lang RHEL Crypto Team Red Hat ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org