We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
EL 9 (RHEL / Alma / ...) DEFAULT crypto policy only uses SHA1 for HMAC where safe https://access.redhat.com/articles/6846411 https://gitlab.com/redhat-crypto/fedora-crypto-policies/-/blob/rhel9/policies/DEFAULT.pol https://gitlab.com/redhat-crypto/fedora-crypto-policies/-/blob/rhel9/policies/modules/NO-SHA1.pmod
we direct users to use DEFAULT:NO-SHA1 but it's not needed
DEFAULT:NO-SHA1
Do not fail checks when user is using DEFAULT DEFAULT:NO-SHA1 doesn't change anything compared to DEFAULT on EL 9
DEFAULT
The text was updated successfully, but these errors were encountered:
No branches or pull requests
Share the context
EL 9 (RHEL / Alma / ...) DEFAULT crypto policy only uses SHA1 for HMAC where safe
https://access.redhat.com/articles/6846411
https://gitlab.com/redhat-crypto/fedora-crypto-policies/-/blob/rhel9/policies/DEFAULT.pol
https://gitlab.com/redhat-crypto/fedora-crypto-policies/-/blob/rhel9/policies/modules/NO-SHA1.pmod
Description of problem:
we direct users to use
DEFAULT:NO-SHA1
but it's not neededProposed change:
Do not fail checks when user is using
DEFAULT
DEFAULT:NO-SHA1
doesn't change anything compared toDEFAULT
on EL 9The text was updated successfully, but these errors were encountered: