معرفی شرکت ها


crypto-policies-scripts-20221215-1.gitece0092.el8.noarch.rpm


Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر

توضیحات

Tool to switch between crypto policies
ویژگی مقدار
سیستم عامل Linux
توزیع CentOS 8-stream
مخزن Centos BaseOS noarch
نام بسته crypto-policies-scripts
نام فایل بسته crypto-policies-scripts-20221215-1.gitece0092.el8.noarch.rpm
نسخه بسته 20221215
انتشار بسته 1.gitece0092.el8
معماری بسته noarch
نگهدارنده -
تاریخ ساخت Fri 16 Dec 2022 10
هاست سازنده x86-01.mbox.centos.org
نوع بسته .rpm
آدرس صفحه اصلی https://gitlab.com/redhat-crypto/fedora-crypto-policies
مجوز LGPLv2+
حجم دانلود 84K
حجم نصب 186.249K
This package provides a tool update-crypto-policies, which applies the policies provided by the crypto-policies package. These can be either the pre-built policies from the base package or custom policies defined in simple policy definition files. The package also provides a tool fips-mode-setup, which can be used to enable or disable the system FIPS mode.


جایگزین ها



نیازمندی

مقدار نام
- /bin/bash
- /bin/sh
- /usr/bin/sh
- /usr/libexec/platform-python
= 20221215-1.gitece0092.el8 crypto-policies


ارائه دهنده

مقدار نام
= 20221215-1.gitece0092.el8 crypto-policies-scripts


نحوه نصب


نصب پکیج rpm crypto-policies-scripts:

    sudo dnf install crypto-policies-scripts-20221215-1.gitece0092.el8.noarch.rpm


فایل ها

مسیرها
/usr/bin/fips-finish-install
/usr/bin/fips-mode-setup
/usr/bin/update-crypto-policies
/usr/share/crypto-policies/python
/usr/share/crypto-policies/python/__pycache__
/usr/share/crypto-policies/python/__pycache__/build-crypto-policies.cpython-36.opt-1.pyc
/usr/share/crypto-policies/python/__pycache__/build-crypto-policies.cpython-36.pyc
/usr/share/crypto-policies/python/__pycache__/update-crypto-policies.cpython-36.opt-1.pyc
/usr/share/crypto-policies/python/__pycache__/update-crypto-policies.cpython-36.pyc
/usr/share/crypto-policies/python/build-crypto-policies.py
/usr/share/crypto-policies/python/cryptopolicies
/usr/share/crypto-policies/python/cryptopolicies/__init__.py
/usr/share/crypto-policies/python/cryptopolicies/__pycache__
/usr/share/crypto-policies/python/cryptopolicies/__pycache__/__init__.cpython-36.opt-1.pyc
/usr/share/crypto-policies/python/cryptopolicies/__pycache__/__init__.cpython-36.pyc
/usr/share/crypto-policies/python/cryptopolicies/__pycache__/alg_lists.cpython-36.opt-1.pyc
/usr/share/crypto-policies/python/cryptopolicies/__pycache__/alg_lists.cpython-36.pyc
/usr/share/crypto-policies/python/cryptopolicies/__pycache__/cryptopolicies.cpython-36.opt-1.pyc
/usr/share/crypto-policies/python/cryptopolicies/__pycache__/cryptopolicies.cpython-36.pyc
/usr/share/crypto-policies/python/cryptopolicies/alg_lists.py
/usr/share/crypto-policies/python/cryptopolicies/cryptopolicies.py
/usr/share/crypto-policies/python/cryptopolicies/validation
/usr/share/crypto-policies/python/cryptopolicies/validation/__init__.py
/usr/share/crypto-policies/python/cryptopolicies/validation/__pycache__
/usr/share/crypto-policies/python/cryptopolicies/validation/__pycache__/__init__.cpython-36.opt-1.pyc
/usr/share/crypto-policies/python/cryptopolicies/validation/__pycache__/__init__.cpython-36.pyc
/usr/share/crypto-policies/python/cryptopolicies/validation/__pycache__/alg_lists.cpython-36.opt-1.pyc
/usr/share/crypto-policies/python/cryptopolicies/validation/__pycache__/alg_lists.cpython-36.pyc
/usr/share/crypto-policies/python/cryptopolicies/validation/__pycache__/general.cpython-36.opt-1.pyc
/usr/share/crypto-policies/python/cryptopolicies/validation/__pycache__/general.cpython-36.pyc
/usr/share/crypto-policies/python/cryptopolicies/validation/__pycache__/rules.cpython-36.opt-1.pyc
/usr/share/crypto-policies/python/cryptopolicies/validation/__pycache__/rules.cpython-36.pyc
/usr/share/crypto-policies/python/cryptopolicies/validation/__pycache__/scope.cpython-36.opt-1.pyc
/usr/share/crypto-policies/python/cryptopolicies/validation/__pycache__/scope.cpython-36.pyc
/usr/share/crypto-policies/python/cryptopolicies/validation/alg_lists.py
/usr/share/crypto-policies/python/cryptopolicies/validation/general.py
/usr/share/crypto-policies/python/cryptopolicies/validation/rules.py
/usr/share/crypto-policies/python/cryptopolicies/validation/scope.py
/usr/share/crypto-policies/python/policygenerators
/usr/share/crypto-policies/python/policygenerators/__init__.py
/usr/share/crypto-policies/python/policygenerators/__pycache__
/usr/share/crypto-policies/python/policygenerators/__pycache__/__init__.cpython-36.opt-1.pyc
/usr/share/crypto-policies/python/policygenerators/__pycache__/__init__.cpython-36.pyc
/usr/share/crypto-policies/python/policygenerators/__pycache__/bind.cpython-36.opt-1.pyc
/usr/share/crypto-policies/python/policygenerators/__pycache__/bind.cpython-36.pyc
/usr/share/crypto-policies/python/policygenerators/__pycache__/configgenerator.cpython-36.opt-1.pyc
/usr/share/crypto-policies/python/policygenerators/__pycache__/configgenerator.cpython-36.pyc
/usr/share/crypto-policies/python/policygenerators/__pycache__/gnutls.cpython-36.opt-1.pyc
/usr/share/crypto-policies/python/policygenerators/__pycache__/gnutls.cpython-36.pyc
/usr/share/crypto-policies/python/policygenerators/__pycache__/java.cpython-36.opt-1.pyc
... and 27 more


گزارش تغییرات

تاریخ آخرین تغییر جزئیات
2022-12-15

bind: expand the list of disableable algorithms
tests/java: fix java.security.disableSystemPropertiesFile=true
stop accidentally creating /etc/crypto-policies/back-ends/.config symlink

2021-11-16

fips-mode-setup, fips-finish-install: call zipl more often (s390x-specific)
libssh: enable diffie-hellman-group14-sha256 support
openssl: fix disabling ChaCha20

2021-06-17

implement scoped policies, e.g., cipher@SSH = ... (#1960266)
deprecate derived properties:
deprecate sha1_in_dnssec property
deprecate unscoped form of protocol property
update documentation
expand upstream test coverage
openssl: set MinProtocol / MaxProtocol separately for TLS and DTLS (#1946522)
support AES-192 ciphers in custom policies for non-TLS scenarios (#1876846)
stop claiming Camellia is disabled (#1925104)
disable CBC ciphers in FUTURE for everything but Kerberos (#1933016)
drop SHA224 from signature algorithms in FIPS:OSPP (#1934755)
condition ecdh-sha2-nistp384 on SECP384R1

2021-02-09

OSPP subpolicy: tweak for RHEL-8.3+
libssh: respect ssh_certs

2020-07-13

OSPP subpolicy: remove AES-CCM
openssl: handle the AES-CCM removal properly

2020-07-01

disallow X448/ED448 in FIPS policy with gnutls >= 3.6.12
add AD-SUPPORT policy module

2020-06-10

fallback to FIPS policy instead of the default-config in FIPS mode
java: Document properly how to override the crypto policy
krb5: No support for 3des anymore
reorder the signature algorithms to follow the order in default openssl list

2020-06-09

make the post script work in environments where /proc/sys is not available

2020-05-29

automatically set up FIPS policy in FIPS mode on first install

2020-05-28

explicitly enable DHE-DSS in gnutls config if enabled in policy
use grubby with --update-kernel=ALL to avoid breaking kernelopts
OSPP subpolicy: Allow GCM for SSH protocol
openssh: Support newly standardized ECDHE-GSS and DHE-GSS key exchanges
if the policy in FIPS mode is not a FIPS policy print a message
openssl: Add SignatureAlgorithms support
custom crypto policies: enable completely overriding contents of the list
added ECDHE-ONLY.pmod policy module example
openssh: make LEGACY policy to prefer strong public key algorithms
various python code cleanups
update-crypto-policies: dump the current policy to
policies/state/CURRENT.pol
split scripts into their own subpackage

2019-12-16

move the pre-built .config files to /usr/share/crypto-policies/back-ends

2019-11-29

fips-mode-setup: compatibility with RHCOS

2019-11-28

add FIPS subpolicy for OSPP

2019-10-29

custom crypto policies support
update-crypto-policies: fix handling of list operations in policy modules
update-crypto-policies: fix updating of the current policy marker
fips-mode-setup: fixes related to containers and non-root execution
make it possible to use fips-mode-setup --check without dracut
add .config symlinks so a crypto policy can be set with read-only
mounting /usr/share/crypto-policies/<policy> to
policies/back-ends
run the update-crypto-policies in posttrans

2019-08-07

gnutls: enable TLS-1.3 in the FIPS policy

2019-08-05

fix ownership of policy directories
nss: enable X25519 in appropriate policies and conflict with old nss
openssh: conflict with old incompatible openssh version