You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
[Ensure that the correct crypto policy configuration exists in /etc/crypto-policies/local.d/opensslcnf-ospp.config](enables Chacha20Poly1305). If the ospp in the path is an indication of FIPS:OSPP being the poor policy being 'hardened', the line actually relaxes it
to enable an algorithm that's not even FIPS-certified!
Please investigate and get rid of this and any similar rules that modify files in /etc/crypto-policies/back-ends. Custom policies or subpolicies should be used to achieve the desired effect instead; worst case it could be local.d dropins, but not carving live files.
The text was updated successfully, but these errors were encountered:
Fortunately, the rule harden_openssl_crypto_policy isn't a part of any existing profile. The rule was used in history but we can't remove existing rules because of backwards compatibility. Unless users explicitly opt-in for this rule they don't use it.
I think we should at least add a warning text to this rule.
A harden_openssl_crypto_policy has been brought to my attention, and I couldn't help but note it does several things it outright shouldn't:
ospp
in the path is an indication of FIPS:OSPP being the poor policy being 'hardened', the line actually relaxes itPlease investigate and get rid of this and any similar rules that modify files in /etc/crypto-policies/back-ends. Custom policies or subpolicies should be used to achieve the desired effect instead; worst case it could be local.d dropins, but not carving live files.
The text was updated successfully, but these errors were encountered: