Re: crypto-policies

2023-03-27 Thread Neal H. Walfield
Hi Zbyszek, Thanks for the clarifications. Neal On Mon, 27 Mar 2023 14:32:58 +0200, Zbigniew Jędrzejewski-Szmek wrote: > On Mon, Mar 27, 2023 at 01:29:38PM +0200, Neal H. Walfield wrote: > > On Mon, 27 Mar 2023 13:16:45 +0200, > > Zbigniew Jędrzejewski-Szmek wrote: > > > I agree. The scope of th

Re: crypto-policies

2023-03-27 Thread Zbigniew Jędrzejewski-Szmek
On Mon, Mar 27, 2023 at 01:29:38PM +0200, Neal H. Walfield wrote: > On Mon, 27 Mar 2023 13:16:45 +0200, > Zbigniew Jędrzejewski-Szmek wrote: > > I agree. The scope of the issue is fairly narrow, and the underlying > > issue is an invalid signature made by the anydesk maintainers. > > We also have a

Re: crypto-policies

2023-03-27 Thread Neal H. Walfield
On Mon, 27 Mar 2023 13:16:45 +0200, Zbigniew Jędrzejewski-Szmek wrote: > I agree. The scope of the issue is fairly narrow, and the underlying > issue is an invalid signature made by the anydesk maintainers. > We also have a simple command that users can use to work around > the issue. If you are t

Re: crypto-policies

2023-03-27 Thread Zbigniew Jędrzejewski-Szmek
On Mon, Mar 27, 2023 at 11:40:05AM +0200, Fabio Valentini wrote: > On Mon, Mar 27, 2023 at 11:23 AM Kamil Paral wrote: > > > > On Sat, Mar 25, 2023 at 8:20 AM Neal H. Walfield wrote: > >> > >> Panu wrote https://bugzilla.redhat.com/show_bug.cgi?id=2170878#c126 : > >> > >> > To me the key points h

Re: crypto-policies

2023-03-27 Thread Panu Matilainen
On 3/27/23 12:40, Fabio Valentini wrote: On Mon, Mar 27, 2023 at 11:23 AM Kamil Paral wrote: On Sat, Mar 25, 2023 at 8:20 AM Neal H. Walfield wrote: Panu wrote https://bugzilla.redhat.com/show_bug.cgi?id=2170878#c126 : To me the key points here are 1) there's a lot of obsolete/broken cryp

Re: crypto-policies

2023-03-27 Thread Fabio Valentini
On Mon, Mar 27, 2023 at 11:23 AM Kamil Paral wrote: > > On Sat, Mar 25, 2023 at 8:20 AM Neal H. Walfield wrote: >> >> Panu wrote https://bugzilla.redhat.com/show_bug.cgi?id=2170878#c126 : >> >> > To me the key points here are >> > 1) there's a lot of obsolete/broken crypto out there >> > 2) we ne

Re: crypto-policies

2023-03-27 Thread Kamil Paral
On Sat, Mar 25, 2023 at 8:20 AM Neal H. Walfield wrote: > Panu wrote https://bugzilla.redhat.com/show_bug.cgi?id=2170878#c126 : > > > To me the key points here are > > 1) there's a lot of obsolete/broken crypto out there > > 2) we need better error messages > > > > Properly dealing with 2) needs

crypto-policies

2023-03-25 Thread Neal H. Walfield
Hi Ben, Thanks for working on this. On Fri, 24 Mar 2023 19:25:46 +0100, Ben Cotton wrote: > Accepted blockers > - > > 1. crypto-policies ― Insecure installed RPMs (like Google Chrome) > prevent system updates in F38, can't be removed ― ASSIGNED > ACTION:

Re: crypto-policies and a certain usage of SHA-1

2021-10-18 Thread Simo Sorce
On Fri, 2021-10-15 at 10:33 -0500, Michael Catanzaro wrote: > On Fri, Oct 15 2021 at 10:10:38 AM +0200, Björn Persson > wrote: > > My question is: Is it true that this usage of SHA-1 makes the TLS > > session weak, so that it's correct to forbid it in the crypto policy? > > Hm, I think Fedora's

Re: crypto-policies and a certain usage of SHA-1

2021-10-16 Thread Björn Persson
Michael Catanzaro wrote: > SHA-1 is blocked in certificate signatures because those can be > attacked offline. Signatures in the TLS handshake are entirely > different. I'm hardly an expert, but I think the attacker only has a > few seconds to generate a hash collision before the user gives up a

Re: crypto-policies and a certain usage of SHA-1

2021-10-15 Thread Michael Catanzaro
On Fri, Oct 15 2021 at 10:10:38 AM +0200, Björn Persson wrote: My question is: Is it true that this usage of SHA-1 makes the TLS session weak, so that it's correct to forbid it in the crypto policy? Hm, I think Fedora's crypto policy should not be stricter than upstream Firefox. This should p

crypto-policies and a certain usage of SHA-1

2021-10-15 Thread Björn Persson
Hello, I have a question for someone with deep knowledge about cryptology. The question regards Fedora's crypto policies and a certain usage of SHA-1 in TLS. I encountered a web server that Seamonkey and Firefox refuse to talk to. Both give me the error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGO

[Bug 1851243] perl-Test-Fake-HTTPD: FTBFS with crypto-policies-20200625-1.gitb298a9e.fc33

2020-06-26 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1851243 Petr Pisar changed: What|Removed |Added Status|NEW |ASSIGNED Assignee|de...@fateyev.

Re: Rawhide broken: crypto-policies

2020-05-29 Thread Jerry James
On Fri, May 29, 2020 at 10:25 AM Igor Raits wrote: > This is fixed now. > > https://bugzilla.redhat.com/show_bug.cgi?id=1841851 Thank you for the quick response. -- Jerry James http://www.jamezone.org/ ___ devel mailing list -- devel@lists.fedoraprojec

Re: Rawhide broken: crypto-policies

2020-05-29 Thread Igor Raits
unning transaction test > Transaction test succeeded. > Running transaction > error: lua script failed: [string > "%prein(crypto-policies-20200527-3.gitb234a47.fc33.noarch)"]:19: > attempt to call a nil value > > Error in PREIN scriptlet in rpm package crypto-polici

Re: Rawhide broken: crypto-policies

2020-05-29 Thread Miro Hrončok
failed: [string "%prein(crypto-policies-20200527-3.gitb234a47.fc33.noarch)"]:19: attempt to call a nil value Error in PREIN scriptlet in rpm package crypto-policies error: crypto-policies-20200527-3.gitb234a47.fc33.noarch: install failed https://bugzilla.redhat.com/show_bug.cgi?id=1841851

Rawhide broken: crypto-policies

2020-05-29 Thread Jerry James
Trying to build a package just now failed (https://koji.fedoraproject.org/koji/taskinfo?taskID=45145531): Running transaction check Transaction check succeeded. Running transaction test Transaction test succeeded. Running transaction error: lua script failed: [string "%prein(crypto-pol

Re: F31 Self-Contained Change proposal: Custom Crypto Policies

2019-06-19 Thread Tomas Mraz
On Wed, 2019-06-19 at 12:38 +0200, Vít Ondruch wrote: > Dne 18. 06. 19 v 21:50 Ben Cotton napsal(a): > > == How To Test == > > > > This will be tested as part of the upstream crypto-policies > > testsuite. > > I think this section should describe, how I, as a F

Re: F31 Self-Contained Change proposal: Custom Crypto Policies

2019-06-19 Thread Tomas Mraz
i/Changes/CustomCryptoPolicies > > > > > > > > == Summary == > > > > This new feature of crypto-policies allows system > > > > administrators > > > > and > > > > third party providers to modify and adjust the existing system- > &g

Re: F31 Self-Contained Change proposal: Custom Crypto Policies

2019-06-19 Thread Vít Ondruch
Dne 19. 06. 19 v 12:00 Tomas Mraz napsal(a): > On Wed, 2019-06-19 at 10:19 +0200, Vít Ondruch wrote: >> Dne 18. 06. 19 v 21:50 Ben Cotton napsal(a): >>> https://fedoraproject.org/wiki/Changes/CustomCryptoPolicies >>> >>> == Summary == >>> This

Re: F31 Self-Contained Change proposal: Custom Crypto Policies

2019-06-19 Thread Vít Ondruch
Dne 18. 06. 19 v 21:50 Ben Cotton napsal(a): > == How To Test == > > This will be tested as part of the upstream crypto-policies testsuite. I think this section should describe, how I, as a Fedora user, am supposed to test this. E.g. 1) Get this test package 2) Modify this file 3)

Re: F31 Self-Contained Change proposal: Custom Crypto Policies

2019-06-19 Thread Tomas Mraz
On Wed, 2019-06-19 at 10:19 +0200, Vít Ondruch wrote: > Dne 18. 06. 19 v 21:50 Ben Cotton napsal(a): > > https://fedoraproject.org/wiki/Changes/CustomCryptoPolicies > > > > == Summary == > > This new feature of crypto-policies allows system administrators > >

Re: F31 Self-Contained Change proposal: Custom Crypto Policies

2019-06-19 Thread Vít Ondruch
Dne 18. 06. 19 v 21:50 Ben Cotton napsal(a): > https://fedoraproject.org/wiki/Changes/CustomCryptoPolicies > > == Summary == > This new feature of crypto-policies allows system administrators and > third party providers to modify and adjust the existing system-wide > crypto pol

F31 Self-Contained Change proposal: Custom Crypto Policies

2019-06-18 Thread Ben Cotton
https://fedoraproject.org/wiki/Changes/CustomCryptoPolicies == Summary == This new feature of crypto-policies allows system administrators and third party providers to modify and adjust the existing system-wide crypto policies to enable or disable algorithms and protocols. == Owner == * Name

Re: crypto-policies not very useful, FUTURE too strict?

2016-12-19 Thread Nikos Mavrogiannopoulos
consolidated way to select > > > system- > > > wide crypto > > > policy. It's great, but granularity of selection is little > > > lacking.  > > > We have > > > basically two sensible choices: > > > - DEFAULT, which is, well, default

Re: crypto-policies not very useful, FUTURE too strict?

2016-12-19 Thread Nikos Mavrogiannopoulos
On Mon, 2016-12-19 at 09:35 +0100, Nikos Mavrogiannopoulos wrote: $ update-crypto-policies --set FUTURE Setting system policy to FUTURE $ wget https://github.com Resolving github.com (github.com)... 192.30.253.112,  192.30.253.113    github.com

Re: crypto-policies not very useful, FUTURE too strict?

2016-12-19 Thread Tomasz Torcz
but granularity of selection is little lacking. > > We have > > basically two sensible choices: > > - DEFAULT, which is, well, default > > That is one of the main goals of crypto policies. To set a sensible > default across the system applications, irrespective of which bac

Re: crypto-policies not very useful, FUTURE too strict?

2016-12-19 Thread Nikos Mavrogiannopoulos
gt; - DEFAULT, which is, well, default That is one of the main goals of crypto policies. To set a sensible default across the system applications, irrespective of which back-end library it uses. It should not be underestimated, as even now we are not there yet, especially with the applications de

Re: crypto-policies not very useful, FUTURE too strict?

2016-12-17 Thread Scott Schmit
On Sat, Dec 17, 2016 at 01:07:52PM -0500, Scott Schmit wrote: > On Sat, Dec 17, 2016 at 06:05:49PM +0100, Nicolas Chauvet wrote: > > Maybe we need to rename FUTURE by QUITE_SOON instead, because the > > error you have pointed is about sha-1 been deprecated: > > > > According to this blog, chrome w

Re: crypto-policies not very useful, FUTURE too strict?

2016-12-17 Thread Scott Schmit
On Sat, Dec 17, 2016 at 06:05:49PM +0100, Nicolas Chauvet wrote: > Maybe we need to rename FUTURE by QUITE_SOON instead, because the > error you have pointed is about sha-1 been deprecated: > > According to this blog, chrome will remove support for sha-1 > certificates on 1 January 2017 (it's an o

Re: crypto-policies not very useful, FUTURE too strict?

2016-12-17 Thread Tom Hughes
On 17/12/16 17:05, Nicolas Chauvet wrote: Maybe we need to rename FUTURE by QUITE_SOON instead, because the error you have pointed is about sha-1 been deprecated: According to this blog, chrome will remove support for sha-1 certificates on 1 January 2017 (it's an old post, so I don't know if it

Re: crypto-policies not very useful, FUTURE too strict?

2016-12-17 Thread Nicolas Chauvet
He switches to FUTURE and now GitHub doesn't > work: > > $ update-crypto-policies --set FUTURE > Setting system policy to FUTURE > > $ wget https://github.com > Resolving github.com (github.com)... 192.30.253.112, 192.30.253.113 >

crypto-policies not very useful, FUTURE too strict?

2016-12-17 Thread Tomasz Torcz
ts to change the policy, (s)he will have to switch to FUTURE So let's imagine Joe Sysadmins who in the face of LogJam and other vulnerabilites, wants to tighten security a bit. He switches to FUTURE and now GitHub doesn't work: $ update-crypto-policies --set FUTURE Setting system p

Re: enhancing crypto policies for other languages than C

2014-10-17 Thread Petr Pisar
On 2014-10-16, Nikos Mavrogiannopoulos wrote: > The currently proposed fedora maintainer instructions for the > system-wide crypto policy are mainly for the C language. Could some > experienced in other languages (e.g., ruby/python) propose some text for > them? > > https://fedoraproject.org/wiki

Re: enhancing crypto policies for other languages than C

2014-10-17 Thread Petr Pisar
On 2014-10-16, Nikos Mavrogiannopoulos wrote: > The currently proposed fedora maintainer instructions for the > system-wide crypto policy are mainly for the C language. Could some > experienced in other languages (e.g., ruby/python) propose some text for > them? > > https://fedoraproject.org/wiki

enhancing crypto policies for other languages than C

2014-10-16 Thread Nikos Mavrogiannopoulos
Hello, The currently proposed fedora maintainer instructions for the system-wide crypto policy are mainly for the C language. Could some experienced in other languages (e.g., ruby/python) propose some text for them? https://fedoraproject.org/wiki/User:Nmav/CryptoPolicies regards, Nikos -- dev

Re: Crypto policies packaging guideline

2014-09-29 Thread Miloslav Trmač
- Original Message - > IMHO, we need a crypto-expert or team to formally review this proposal, Nikos, who proposed this, is a crypto expert :) > to identify packages it affects and to advise packagers and upstreams on > how to implement this, because I feel this proposal is way beyond the

Re: Crypto policies packaging guideline

2014-09-29 Thread Miloslav Trmač
Hello, (resurrecting an really old thread, sorry about the delay.) - Original Message - > 1) Will I (as a hobbyist packager) be able to reach the proper > conclusion, e.g. find the real place where these defaults are set, such > as [4, 5]? If you, as the package maintainer, who knows the p

Re: Crypto policies packaging guideline

2014-08-28 Thread Ralf Corsepius
On 08/28/2014 08:55 AM, Vít Ondruch wrote: Dne 27.8.2014 22:42, James Antill napsal(a): #topic #452 Crypto policies packaging guideline .fpc 452 https://fedorahosted.org/fpc/ticket/452 Looking into this topic and the proposed guidelines [1], I am not sure how to apply them for Ruby. FPC

Crypto policies packaging guideline

2014-08-27 Thread Vít Ondruch
Dne 27.8.2014 22:42, James Antill napsal(a): > #topic #452 Crypto policies packaging guideline > .fpc 452 > https://fedorahosted.org/fpc/ticket/452 Looking into this topic and the proposed guidelines [1], I am not sure how to apply them for Ruby. On the first look, lo