Files
freeipa/install/share
Alexander Bokovoy d38dd2680f KRB instance: make provision to work with crypto policy without SHA-1 HMAC types
RHEL 9 system-wide crypto policies aim at eventual removal of SHA-1 use.

Due to bootstrapping process, force explicitly supported encryption
types in kdc.conf or we may end up with AES128-SHA1 and AES256-SHA2 only
in FIPS mode at bootstrap time which then fails to initialize kadmin
principals requiring use of AES256-SHA2 and AES128-SHA2.

Camellia ciphers must be filtered out in FIPS mode, we do that already
in the kerberos.ldif.

At this point we are not changing the master key encryption type to
AES256-SHA2 because upgrading existing deployments is complicated and
at the time when a replica configuration is deployed, we don't know what
is the encryption type of the master key of the original server as well.

Fixes: https://pagure.io/freeipa/issue/9119

Signed-off-by: Alexander Bokovoy <abokovoy@redhat.com>
Reviewed-By: Julien Rische <jrische@redhat.com>
Reviewed-By: Francisco Trivino <ftrivino@redhat.com>
2022-03-08 12:54:47 +01:00
..
2013-11-18 16:54:21 +01:00
2021-07-09 09:47:30 -04:00
2016-06-15 07:13:38 +02:00
2014-10-21 12:23:03 +02:00
2014-07-01 13:57:06 +02:00
2015-05-26 11:59:47 +00:00
2021-07-09 09:47:30 -04:00
2021-06-16 10:28:17 -04:00
2019-01-15 14:29:22 -05:00
2015-05-26 11:59:47 +00:00
2017-02-15 07:13:37 +01:00
2019-04-10 13:43:23 +02:00
2015-05-26 11:59:47 +00:00
2021-07-09 09:47:30 -04:00
2017-02-15 07:13:37 +01:00
2020-07-30 11:38:25 +02:00
2015-09-17 14:55:54 +02:00
2021-04-07 11:43:23 +03:00