Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

The use of ed25519 is disabled via HostKeyAlgorithms in FIPS crypto policy. #4723

Merged
merged 1 commit into from
Aug 14, 2019

Conversation

adelton
Copy link
Collaborator

@adelton adelton commented Aug 14, 2019

Description:

  • No need to control the use of keys based on key filenames.

Rationale:

  • The use of ed25519 is disabled via HostKeyAlgorithms in FIPS crypto policy.

@adelton adelton changed the title The use of ed25519 is disable via HostKeyAlgorithms in FIPS crypto policy. The use of ed25519 is disabled via HostKeyAlgorithms in FIPS crypto policy. Aug 14, 2019
@matejak
Copy link
Member

matejak commented Aug 14, 2019

I see that it is disabled for gnutls in the crypto policy, but what indicates that it is disabled for SSH?

@adelton
Copy link
Collaborator Author

adelton commented Aug 14, 2019

# sed 's/ /\n/g' /usr/share/crypto-policies/FIPS/opensshserver.txt | grep HostKeyAlgorithms | wc -l
1
# sed 's/ /\n/g' /usr/share/crypto-policies/FIPS/opensshserver.txt | grep ed25519 | wc -l
0

Comparing to /usr/share/crypto-policies/DEFAULT/opensshserver.txt, the ed25519 is missing.

@matejak
Copy link
Member

matejak commented Aug 14, 2019

OK, I can confirm that. Thank you for the PR!

@matejak matejak merged commit fde974c into ComplianceAsCode:master Aug 14, 2019
@matejak matejak mentioned this pull request Aug 15, 2019
@yuumasato yuumasato added this to the 0.1.46 milestone Aug 15, 2019
This pull request was closed.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants