This is a tracking bug for Change: System-wide crypto policy For more details, see: http://fedoraproject.org//wiki/Changes/CryptoPolicy Unify the crypto policies used by different applications and libraries. That is allow setting a consistent security level for crypto on all applications in a Fedora system. The implementation approach will be to initially modify SSL libraries to respect the policy and gradually adding more libraries and applications.
I wrote up something about this already (but can't find it) that can be used in the Release Notes and Security Guide. As soon as I can lay my hands on it, again, I'll post it for review.
Created attachment 878145 [details] Proposed Release Notes and Security Guide entry This is the text I'd like to use for the Release Notes and Security Guide if it looks good to the feature owner.
Let's not update the release notes and manual yet, as the details are not yet fixed. I expect these to be fixed by the end of next month.
I've updated the proposed text for the release notes. <title>Crypto Policy</title> <para>Beginning in Fedora 21, a system-wide crypto policy will be available for users to quickly setup the cryptographic options for their systems. Users that must meet certain cryptographic standards can make the policy change in <filename>//etc/crypto-policies/config</filename>, and run update-crypto-policies. At this point applications that are utilize the default set of ciphers in the GnuTLS and OpenSSL libraries will follow the policy requirements.</para> <para>The available options are: (1) LEGACY, which ensures compatibility with legacy systems - 64-bit security, (2) DEFAULT, a reasonable default for today's standards - 80-bit security, and (3) FUTURE, a conservative level that is believed to withstand any near-term future attacks -128-bit security. These levels affect SSL/TLS settings, including elliptic curve, signature hash functions, and ciphersuites and key sizes.</para> <para>Additional information on this new feature can be found on the <ulink url="https://fedoraproject.org/wiki/Changes/CryptoPolicy">CryptoPolicy Changes wiki page</ulink>.</para>
(In reply to Nikos Mavrogiannopoulos from comment #4) Awesome, thanks! I've added it to the Security Beat (https://fedoraproject.org/wiki/Documentation_Security_Beat) and it should be in the Release Notes for F21.
Is there a man page or something shipped in the distro which we can reference for this? When changing the mod_ssl configuration I want to explain why we don't specify a default and how users determine what policy is used.
There is update-crypto-policies(8) included on the respective package. Let me know if there something that can be improved. https://git.fedorahosted.org/cgit/crypto-profiles.git/tree/update-crypto-policies.8.txt
(In reply to Nikos Mavrogiannopoulos from comment #4) I've added that text to the Security Guide for the F21 release.
This message is a reminder that Fedora 21 Accepted Changes Freeze Deadline is on 2014-07-08 [1]. At this point, all accepted Changes should be substantially complete, and testable. Additionally, if a change is to be enabled by default, it must be so enabled at Change Freeze. This bug should be set to the MODIFIED state to indicate that it achieved completeness. Status will be provided to FESCo right after the deadline. If, for any reasons, your Change is not in required state, let me know and we will try to find solution. For Changes you decide to cancel/move to the next release, please use the NEW status and set needinfo on me and it will be acted upon. In case of any questions, don't hesitate to ask Wrangler (jreznik). Thank you. [1] https://fedoraproject.org/wiki/Releases/21/Schedule
I see this uses OPENSSL but am unsure from the wiki page exactly how to implement this. If you could guide me I'm more than willing to implement.
Ignore previous, wrong BZ, apologies.
The project is substantially testable as of Fedora 21 Alpha TC4.
Adding this dependency for completeness: https://fedorahosted.org/fpc/ticket/452
glib-networking still uses a custom priority string [1] impacting the entire GNOME stack. We're going to override it in WebKit using our own custom priority string [2]. Suggestions welcome, but I guess the solution is Fedora patches? [1] https://git.gnome.org/browse/glib-networking/tree/tls/gnutls/gtlsconnection-gnutls.c#n201 [2] https://bugs.webkit.org/show_bug.cgi?id=137859
The plan for Fedora 21 is to convert few packages only and test the results of using a globally set priority string. If that goes well the plan for 22 is to convert as many as possible packages (including glib-networking) to that global settings. There is nothing wrong with filling a bug similar to #1108597 for glib-networking though,, but instructions are limited on the bug report and the RPM guidelines at https://fedoraproject.org/wiki/User:Nmav/CryptoPolicies are not yet approved.
What about patches to deprecate SSLv2 and SSLv3 ?
(In reply to Loganaden Velvindron from comment #16) > What about patches to deprecate SSLv2 and SSLv3 ? The point of this change is to make such settings configurable so that we don't need any patches to disable algorithms. For application/library-specific patches please contact the maintainers directly.