Bug 1877991
| Summary: | Prominently document deprecation of single- and triple-DES | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 8 | Reporter: | Josip Vilicic <jvilicic> |
| Component: | krb5 | Assignee: | Robbie Harwood <rharwood> |
| Status: | CLOSED CURRENTRELEASE | QA Contact: | Filip Dvorak <fdvorak> |
| Severity: | unspecified | Docs Contact: | Josip Vilicic <jvilicic> |
| Priority: | unspecified | ||
| Version: | 8.3 | CC: | dpal, fdvorak, lmanasko, mpershin, rharwood |
| Target Milestone: | rc | Flags: | pm-rhel:
mirror+
|
| Target Release: | 8.0 | ||
| Hardware: | Unspecified | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | Deprecated Functionality | |
| Doc Text: |
.DES and 3DES encryption types have been removed
Due to security reasons, the Data Encryption Standard (DES) algorithm has been deprecated and disabled by default since RHEL 7. With the recent rebase of Kerberos packages, single-DES (DES) and triple-DES (3DES) encryption types have been removed from RHEL 8.
If you have configured services or users to only use DES or 3DES encryption, you might experience service interruptions such as:
* Kerberos authentication errors
* `unknown enctype` encryption errors
* Kerberos Distribution Centers (KDCs) with DES-encrypted Database Master Keys (`K/M`) fail to start
Perform the following actions to prepare for the upgrade:
. Check if your KDC uses DES or 3DES encryption with the `krb5check` open source Python scripts. See link:https://github.com/frozencemetery/krb5check[krb5check] on GitHub.
. If you are using DES or 3DES encryption with any Kerberos principals, re-key them with a supported encryption type, such as Advanced Encryption Standard (AES). For instructions on re-keying, see link:https://web.mit.edu/kerberos/krb5-latest/doc/admin/advanced/retiring-des.html[Retiring DES] from MIT Kerberos Documentation.
. Test independence from DES and 3DES by temporarily setting the following Kerberos options before upgrading:
.. In `/var/kerberos/krb5kdc/kdc.conf` on the KDC, set `supported_enctypes` and do not include `des` or `des3`.
.. For every host, in `/etc/krb5.conf` and any files in `/etc/krb5.conf.d`, set `allow_weak_crypto` to `false`. It is false by default.
.. For every host, in `/etc/krb5.conf` and any files in `/etc/krb5.conf.d`, set `permitted_enctypes`, `default_tgs_enctypes`, and `default_tkt_enctypes`, and do not include `des` or `des3`.
. If you do not experience any service interruptions with the test Kerberos settings from the previous step, remove them and upgrade. You do not need those settings after upgrading to the latest Kerberos packages.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | 2020-12-08 18:45:13 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
Josip Vilicic
2020-09-11 02:09:09 UTC
|