-
Notifications
You must be signed in to change notification settings - Fork 426
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Alma repos are unavailable when crypto policies are FUTURE #369
Comments
Looking into how we can best address this. Even if we fix the mirrorlist itself most mirrors are using LE certs which are signed with a 2048-bit CA. |
You can add a parameter that asks for 4096 key size however or go as far and request a ec-384 ecc key to serve as a second option. |
Yes LE will provide 4096-bit certs but their CA is still only 2048 so the error will remain. EC may be an option but AWS doesn't play nice with LE EC certs. |
There is a temporary fix/cert in place for this so you should not get the errors now. We'll keep this issue open until we decide how we'll solve this permanently. |
Great thanks for looking into and addressing so quickly. |
Renewed cert. |
The FUTURE crypto-policy has this issue with mirrors using LE certs. A policy that might work with your mirrors is FIPS: # update-crypto-policies --set FIPS If Federal Information Processing Standard is not your thing, try the custom policy below.
|
FYI: We upgraded the certificates to Let’s Encrypt's E1 Intermediate on June 23, 2022 The Current TLS full chain is:
It's tested and working on all crypto policies of AlmaLinux 8 and 9. |
Those crypto policies depend on weak elliptic curves (NIST). See http://safecurves.cr.yp.to/ |
Yes. Because It's strongest and most recent security policy ( I have been closely tracking the status of the available security policies. Once new and stronger one available we will upgrade too. Thanks for the helpful information! Footnotes |
Security note: system-wide crypto policies imply the same key exchange setting is used for TLS and SSH. ECDHE is not needed for SSH, therefore you might want to tune /etc/sysconfig/sshd |
A mirror service that is accessible with crypto-policy FUTURE. Locations: https://xtom.com/mirrors/ # almalinux.repo
[baseos]
name=AlmaLinux $releasever - BaseOS
baseurl=https://mirrors.xtom.nl/almalinux/$releasever/BaseOS/$basearch/os/
enabled=1
gpgcheck=1
countme=1
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-AlmaLinux
[appstream]
name=AlmaLinux $releasever - AppStream
baseurl=https://mirrors.xtom.nl/almalinux/$releasever/AppStream/$basearch/os/
enabled=1
gpgcheck=1
countme=1
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-AlmaLinux
[extras]
name=AlmaLinux $releasever - Extras
baseurl=https://mirrors.xtom.nl/almalinux/$releasever/extras/$basearch/os/
enabled=1
gpgcheck=1
countme=1
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-AlmaLinux |
To apply for Let's encrypt ECDSA: https://community.letsencrypt.org/t/ecdsa-availability-in-production-environment/150679 |
Same issue as here https://access.redhat.com/discussions/4524081
It looks like when the crypto policy is to FUTURE we are unable to connect to the Alma Linux repos with the following error:
Error: Error downloading packages:
Curl error (60): Peer certificate cannot be authenticated with given CA certificates for https://mirrors.almalinux.org/mirrorlist/8/baseos [SSL certificate problem: EE certificate key too weak]
The text was updated successfully, but these errors were encountered: