-
Notifications
You must be signed in to change notification settings - Fork 198
RHEL/CentOS 8 requires removal or editing of /etc/crypto-policies/back-ends/openssh*.config #275
Comments
Thanks for this, I did not know that this exists. More information: https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/security_hardening/using-the-system-wide-cryptographic-policies_security-hardening We'll have to decide what to support and use. |
While not a bug, it would seem that the client configurations also don't disallow host key types for use. I'm not sure how to best accomplish this but it would be nice if we could also figure out how to enforce SSH client configuration for allowed HostKeyTypes. 'HostKeyAlgorithms' can (should 🤔 ) be defined to also limit client Host Key Types.
|
The openssh-server side of this issue is fixed by #309. |
the crypto policy for ssh client is activated by an include |
This is possible to check via |
just submittet a PR to our baseline (dev-sec/ssh-baseline#177) |
Describe the bug
OpenSSH server configuration is handled by 'update-crypto-policy' which provides
/etc/crypto-policies/back-ends/openssh.config
and
/etc/crypto-policies/back-ends/opensshserver.config.bak
These files must be removed or altered in to function correctly.
Expected behavior
OpenSSH policies for Key Exchanges, MACs and Ciphers as defined by the Ansible module work.
Actual behavior
OpenSSH policies for Key Exchanges, MACs and Ciphers as defined by the Ansible module are ignored.
Example Playbook
OS / Environment
CentOS Linux release 8.1.1911 (Core)
Ansible Version
Role Version
Additional context
None
The text was updated successfully, but these errors were encountered: