Bug 1179317 - Utilize system-wide crypto-policies
Summary: Utilize system-wide crypto-policies
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Fedora
Classification: Fedora
Component: librelp
Version: 24
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Jiří Vymazal
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard:
Depends On:
Blocks: fedora-crypto-policies
TreeView+ depends on / blocked
 
Reported: 2015-01-06 14:58 UTC by Nikos Mavrogiannopoulos
Modified: 2017-03-07 00:50 UTC (History)
2 users (show)

Fixed In Version: librelp-1.2.13-1.fc24 librelp-1.2.13-1.fc25
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2017-03-06 19:20:18 UTC
Type: Bug
Embargoed:


Attachments (Terms of Use)
proposed patch (932 bytes, patch)
2017-02-23 09:51 UTC, Jiří Vymazal
no flags Details | Diff


Links
System ID Private Priority Status Summary Last Updated
Github rsyslog librelp issues 57 0 None None None 2017-02-22 14:03:08 UTC

Description Nikos Mavrogiannopoulos 2015-01-06 14:58:10 UTC
Please convert this application to use the system's crypto policy for SSL and TLS:
https://fedoraproject.org/wiki/Packaging:CryptoPolicies

If this program is compiled against gnutls, change the default priority string to be "@SYSTEM" or to use gnutls_set_default_priority().

If this program is compiled against openssl, and there is no default cipher list specified, you don't need to modify it. Otherwise replace the default cipher list with "PROFILE=SYSTEM".

In both cases please verify that the application uses the system's crypto policies.

If the package is already using the system-wide crypto policies, or it does not use SSL or TLS, no action is required, the bug can simply be closed.

Comment 1 Fedora End Of Life 2015-11-04 14:22:26 UTC
This message is a reminder that Fedora 21 is nearing its end of life.
Approximately 4 (four) weeks from now Fedora will stop maintaining
and issuing updates for Fedora 21. It is Fedora's policy to close all
bug reports from releases that are no longer maintained. At that time
this bug will be closed as EOL if it remains open with a Fedora  'version'
of '21'.

Package Maintainer: If you wish for this bug to remain open because you
plan to fix it in a currently maintained version, simply change the 'version' 
to a later Fedora version.

Thank you for reporting this issue and we are sorry that we were not 
able to fix it before Fedora 21 is end of life. If you would still like 
to see this bug fixed and are able to reproduce it against a later version 
of Fedora, you are encouraged  change the 'version' to a later Fedora 
version prior this bug is closed as described in the policy above.

Although we aim to fix as many bugs as possible during every release's 
lifetime, sometimes those efforts are overtaken by events. Often a 
more recent Fedora release includes newer upstream software that fixes 
bugs or makes them obsolete.

Comment 2 Jan Kurik 2016-02-24 13:19:51 UTC
This bug appears to have been reported against 'rawhide' during the Fedora 24 development cycle.
Changing version to '24'.

More information and reason for this action is here:
https://fedoraproject.org/wiki/Fedora_Program_Management/HouseKeeping/Fedora24#Rawhide_Rebase

Comment 4 Jiří Vymazal 2017-02-21 15:46:15 UTC
scanned package sources and config  - contains no SSL statements or calls, closing

Comment 5 Nikos Mavrogiannopoulos 2017-02-21 15:55:44 UTC
Please scan again in tcp.c.

Comment 6 Jiří Vymazal 2017-02-22 08:02:14 UTC
sorry, my bad, scanned only for SSL, now with GnuTLS have expected result, will provide a patch to fix it

Comment 7 Jiří Vymazal 2017-02-22 14:03:09 UTC
linked upstreanm issue

Comment 8 Jiří Vymazal 2017-02-23 09:51:56 UTC
Created attachment 1256851 [details]
proposed patch

Comment 9 Jiří Vymazal 2017-02-23 09:52:27 UTC
added needed patch

Comment 10 Jiří Vymazal 2017-02-23 11:50:28 UTC
patch present in rawhide librelp-1.2.13-1

Comment 11 Nikos Mavrogiannopoulos 2017-02-23 12:17:53 UTC
Hi Jiri,
 Checking that function, a question for upstream is whether they actually intended to do TLS authentication with PKI (which is what crypto policies cover). Seeing what they already have, they enable anonymous authentication, which is not covered by crypto policies. It is not clear however, whether this anonymous authentication they enable is intentional or a leftover from debugging. Usually a library which uses anonymous authentication wouldn't advertise itself as doing TLS, but rather as opportunistic encryption (similarly to what postfix does).

Comment 12 Fedora Update System 2017-02-24 20:48:25 UTC
librelp-1.2.13-1.fc24 has been submitted as an update to Fedora 24. https://bodhi.fedoraproject.org/updates/FEDORA-2017-e155ed7149

Comment 13 Fedora Update System 2017-02-24 21:27:53 UTC
librelp-1.2.13-1.fc25 has been submitted as an update to Fedora 25. https://bodhi.fedoraproject.org/updates/FEDORA-2017-08e4b9af0f

Comment 14 Fedora Update System 2017-02-26 04:50:55 UTC
librelp-1.2.13-1.fc24 has been pushed to the Fedora 24 testing repository. If problems still persist, please make note of it in this bug report.
See https://fedoraproject.org/wiki/QA:Updates_Testing for
instructions on how to install test updates.
You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2017-e155ed7149

Comment 15 Fedora Update System 2017-02-26 05:25:54 UTC
librelp-1.2.13-1.fc25 has been pushed to the Fedora 25 testing repository. If problems still persist, please make note of it in this bug report.
See https://fedoraproject.org/wiki/QA:Updates_Testing for
instructions on how to install test updates.
You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2017-08e4b9af0f

Comment 16 Fedora Update System 2017-03-06 19:20:18 UTC
librelp-1.2.13-1.fc24 has been pushed to the Fedora 24 stable repository. If problems still persist, please make note of it in this bug report.

Comment 17 Fedora Update System 2017-03-07 00:50:19 UTC
librelp-1.2.13-1.fc25 has been pushed to the Fedora 25 stable repository. If problems still persist, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.