Blame SOURCES/crypto-policies.7

99b432
'\" t
99b432
.\"     Title: crypto-policies
99b432
.\"    Author: [see the "AUTHOR" section]
99b432
.\" Generator: DocBook XSL Stylesheets vsnapshot <http://docbook.sf.net/>
99b432
.\"      Date: 02/08/2019
99b432
.\"    Manual: \ \&
99b432
.\"    Source: crypto-policies
99b432
.\"  Language: English
99b432
.\"
99b432
.TH "CRYPTO\-POLICIES" "7" "02/08/2019" "crypto\-policies" "\ \&"
99b432
.\" -----------------------------------------------------------------
99b432
.\" * Define some portability stuff
99b432
.\" -----------------------------------------------------------------
99b432
.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
99b432
.\" http://bugs.debian.org/507673
99b432
.\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html
99b432
.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
99b432
.ie \n(.g .ds Aq \(aq
99b432
.el       .ds Aq '
99b432
.\" -----------------------------------------------------------------
99b432
.\" * set default formatting
99b432
.\" -----------------------------------------------------------------
99b432
.\" disable hyphenation
99b432
.nh
99b432
.\" disable justification (adjust text to left margin only)
99b432
.ad l
99b432
.\" -----------------------------------------------------------------
99b432
.\" * MAIN CONTENT STARTS HERE *
99b432
.\" -----------------------------------------------------------------
99b432
.SH "NAME"
99b432
crypto-policies \- system\-wide crypto policies overview
99b432
.SH "DESCRIPTION"
99b432
.sp
99b432
The security of cryptographic components of the operating system does not remain constant over time\&. Algorithms, such as cryptographic hashing and encryption, typically have a lifetime, after which they are considered either too risky to use or plain insecure\&. That means, we need to phase out such algorithms from the default settings or completely disable them if they could cause an irreparable problem\&.
99b432
.sp
99b432
While in the past the algorithms were not disabled in a consistent way and different applications applied different policies, the system\-wide crypto\-policies followed by the crypto core components allow consistently deprecating and disabling algorithms system\-wide\&.
99b432
.sp
99b432
The individual policy levels (\fBDEFAULT\fR, \fBLEGACY\fR, \fBFUTURE\fR, and \fBFIPS\fR) are included in the \fBcrypto\-policies(7)\fR package\&. In the future, there will be also a mechanism for easy creation and deployment of policies defined by the system administrator or a third party vendor\&.
99b432
.sp
99b432
For rationale, see \fBRFC 7457\fR for a list of attacks taking advantage of legacy crypto algorithms\&.
99b432
.SH "COVERED APPLICATIONS"
99b432
.sp
99b432
Crypto\-policies apply to the configuration of the core cryptographic subsystems, covering \fBTLS\fR, \fBIKE\fR, \fBIPSec\fR, \fBDNSSec\fR, and \fBKerberos\fR protocols; i\&.e\&., the supported secure communications protocols on the base operating system\&.
99b432
.sp
99b432
Once an application runs in the operating system, it follows the default or selected policy and refuses to fall back to algorithms and protocols not within the policy, unless the user has explicitly requested the application to do so\&. That is, the policy applies to the default behavior of applications when running with the system\-provided configuration but the user can override it on an application\-specific basis\&.
99b432
.sp
99b432
The policies currently provide settings for these applications and libraries:
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
\fBBIND\fR
99b432
DNS name server daemon
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
\fBGnuTLS\fR
99b432
TLS library
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
\fBOpenJDK\fR
99b432
runtime environment
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
\fBKerberos 5\fR
99b432
library
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
\fBLibreswan\fR
99b432
IPsec and IKE protocol implementation
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
\fBNSS\fR
99b432
TLS library
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
\fBOpenSSH\fR
99b432
SSH2 protocol implementation
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
\fBOpenSSL\fR
99b432
TLS library
99b432
.RE
99b432
.sp
99b432
Applications using the above libraries and tools are covered by the cryptographic policies unless they are explicitly configured not to be so\&.
99b432
.SH "PROVIDED POLICY LEVELS"
99b432
.PP
99b432
\fBLEGACY\fR
99b432
.RS 4
99b432
This policy ensures maximum compatibility with legacy systems; it is less secure and it includes support for
99b432
\fBTLS 1\&.0\fR,
99b432
\fBTLS 1\&.1\fR, and
99b432
\fBSSH2\fR
99b432
protocols or later\&. The algorithms
99b432
\fBDSA\fR,
99b432
\fB3DES\fR, and
99b432
\fBRC4\fR
99b432
are allowed, while
99b432
\fBRSA\fR
99b432
and
99b432
\fBDiffie\-Hellman\fR
99b432
parameters are accepted if larger than 1023 bits\&. The level provides at least 64\-bit security\&.
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
MACs: all
99b432
\fBHMAC\fR
99b432
with
99b432
\fBSHA\-1\fR
99b432
or better + all modern MACs (\fBPoly1305\fR
99b432
etc\&.)
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
Curves: all prime >= 255 bits (including Bernstein curves)
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
Signature algorithms: with
99b432
\fBSHA1\fR
99b432
hash or better (\fBDSA\fR
99b432
allowed)
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
\fBTLS\fR
99b432
Ciphers: all available >= 112\-bit key, >= 128\-bit block (including
99b432
\fBRC4\fR
99b432
and
99b432
\fB3DES\fR)
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
Non\-TLS Ciphers: same as
99b432
\fBTLS\fR
99b432
ciphers with added
99b432
\fBCamellia\fR
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
Key exchange:
99b432
\fBECDHE\fR,
99b432
\fBRSA\fR,
99b432
\fBDHE\fR
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
\fBDH\fR
99b432
params size: >= 1023
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
\fBRSA\fR
99b432
keys size: >= 1023
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
\fBDSA\fR
99b432
params size: >= 1023
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
\fBTLS\fR
99b432
protocols:
99b432
\fBTLS\fR
99b432
>= 1\&.0,
99b432
\fBDTLS\fR
99b432
>= 1\&.0
99b432
.RE
99b432
.RE
99b432
.PP
99b432
\fBDEFAULT\fR
99b432
.RS 4
99b432
The
99b432
\fBDEFAULT\fR
99b432
policy is a reasonable default policy for today\(cqs standards, compatible with
99b432
\fBPCI\-DSS\fR
99b432
requirements\&. It allows the
99b432
\fBTLS 1\&.2\fR
99b432
and
99b432
\fBTLS 1\&.3\fR
99b432
protocols, as well as
99b432
\fBIKEv2\fR
99b432
and
99b432
\fBSSH2\fR\&. The
99b432
\fBRSA\fR
99b432
and
99b432
\fBDiffie\-Hellman\fR
99b432
parameters are accepted if larger than 2047 bits\&. The level provides at least 112\-bit security with the exception of
99b432
\fBSHA\-1\fR
99b432
signatures needed for
99b432
\fBDNSSec\fR
99b432
and other still prevalent legacy use of
99b432
\fBSHA\-1\fR
99b432
signatures\&.
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
MACs: all
99b432
\fBHMAC\fR
99b432
with
99b432
\fBSHA\-1\fR
99b432
or better + all modern MACs (\fBPoly1305\fR
99b432
etc\&.)
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
Curves: all prime >= 255 bits (including Bernstein curves)
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
Signature algorithms: with
99b432
\fBSHA\-1\fR
99b432
hash or better (no
99b432
\fBDSA\fR)
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
\fBTLS\fR
99b432
Ciphers: >= 128\-bit key, >= 128\-bit block (\fBAES\fR,
99b432
\fBChaCha20\fR, including
99b432
\fBAES\-CBC\fR)
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
non\-TLS Ciphers: as
99b432
\fBTLS\fR
99b432
Ciphers with added
99b432
\fBCamellia\fR
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
key exchange:
99b432
\fBECDHE\fR,
99b432
\fBRSA\fR,
99b432
\fBDHE\fR
99b432
(no
99b432
\fBDHE\-DSS\fR)
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
\fBDH\fR
99b432
params size: >= 2048
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
\fBRSA\fR
99b432
keys size: >= 2048
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
\fBTLS\fR
99b432
protocols:
99b432
\fBTLS\fR
99b432
>= 1\&.2,
99b432
\fBDTLS\fR
99b432
>= 1\&.2
99b432
.RE
99b432
.RE
99b432
.PP
99b432
\fBFUTURE\fR
99b432
.RS 4
99b432
A conservative security level that is believed to withstand any near\-term future attacks\&. This level does not allow the use of
99b432
\fBSHA\-1\fR
99b432
in signature algorithms\&. The level also provides some (not complete) preparation for post\-quantum encryption support in form of 256\-bit symmetric encryption requirement\&. The
99b432
\fBRSA\fR
99b432
and
99b432
\fBDiffie\-Hellman\fR
99b432
parameters are accepted if larger than 3071 bits\&. The level provides at least 128\-bit security\&.
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
MACs: all
99b432
\fBHMAC\fR
99b432
with
99b432
\fBSHA\-256\fR
99b432
or better + all modern MACs (\fBPoly1305\fR
99b432
etc\&.)
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
Curves: all prime >= 255 bits (including Bernstein curves)
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
Signature algorithms: with
99b432
\fBSHA\-256\fR
99b432
hash or better (no
99b432
\fBDSA\fR)
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
\fBTLS\fR
99b432
Ciphers: >= 256\-bit key, >= 128\-bit block, only Authenticated Encryption (AE) ciphers
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
non\-TLS Ciphers: same as
99b432
\fBTLS\fR
99b432
ciphers with added non AE ciphers and
99b432
\fBCamellia\fR
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
key exchange:
99b432
\fBECDHE\fR,
99b432
\fBDHE\fR
99b432
(no
99b432
\fBDHE\-DSS\fR, no
99b432
\fBRSA\fR)
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
\fBDH\fR
99b432
params size: >= 3072
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
\fBRSA\fR
99b432
keys size: >= 3072
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
\fBTLS\fR
99b432
protocols:
99b432
\fBTLS\fR
99b432
>= 1\&.2,
99b432
\fBDTLS\fR
99b432
>= 1\&.2
99b432
.RE
99b432
.RE
99b432
.PP
99b432
\fBFIPS\fR
99b432
.RS 4
99b432
A level that conforms to the
99b432
\fBFIPS 140\-2\fR
99b432
requirements\&. This policy is used internally by the
99b432
\fBfips\-mode\-setup(8)\fR
99b432
tool which can switch the system into the
99b432
\fBFIPS 140\-2\fR
99b432
compliance mode\&. The level provides at least 112\-bit security\&.
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
MACs: all
99b432
\fBHMAC\fR
99b432
with
99b432
\fBSHA1\fR
99b432
or better
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
Curves: all prime >= 256 bits
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
Signature algorithms: with
99b432
\fBSHA\-256\fR
99b432
hash or better (no
99b432
\fBDSA\fR)
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
\fBTLS\fR
99b432
Ciphers: >= 128\-bit key, >= 128\-bit block (\fBAES\fR, including
99b432
\fBAES\-CBC\fR)
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
non\-TLS Ciphers: same as
99b432
\fBTLS\fR
99b432
Ciphers
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
key exchange:
99b432
\fBECDHE\fR,
99b432
\fBDHE\fR
99b432
(no
99b432
\fBDHE\-DSS\fR, no
99b432
\fBRSA\fR)
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
\fBDH\fR
99b432
params size: >= 2048
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
\fBRSA\fR
99b432
params size: >= 2048
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
\fBTLS\fR
99b432
protocols:
99b432
\fBTLS\fR
99b432
>= 1\&.2,
99b432
\fBDTLS\fR
99b432
>= 1\&.2
99b432
.RE
99b432
.RE
99b432
.PP
99b432
\fBEMPTY\fR
99b432
.RS 4
99b432
All cryptographic algorithms are disabled (used for debugging only, do not use)\&.
99b432
.RE
99b432
.SH "COMMANDS"
99b432
.PP
99b432
\fBupdate\-crypto\-policies(8)\fR
99b432
.RS 4
99b432
This command manages the policies available to the various cryptographic back ends and allows the system administrator to change the active cryptographic policy level\&.
99b432
.RE
99b432
.PP
99b432
\fBfips\-mode\-setup(8)\fR
99b432
.RS 4
99b432
This command allows the system administrator to enable, or disable the system FIPS mode and also apply the
99b432
\fBFIPS\fR
99b432
cryptographic policy level which limits the allowed algorithms and protocols to these allowed by the FIPS 140\-2 requirements\&.
99b432
.RE
99b432
.SH "NOTES"
99b432
.sp
99b432
\fBExceptions:\fR
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
\fBGo\-language\fR
99b432
applications do not yet follow the system\-wide policy\&.
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
\fBLibssh\fR
99b432
applications do not yet follow the system\-wide policy\&.
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
\fBGnuPG\-2\fR
99b432
application does not follow the system\-wide policy\&.
99b432
.RE
99b432
.sp
99b432
In general only the data\-in\-transit is currently covered by the system\-wide policy\&.
99b432
.sp
99b432
If the system administrator changes the system\-wide policy level with the \fBupdate\-crypto\-policies(8)\fR command it is advisable to restart the system as the individual back\-end libraries read the configuration files usually during their initialization\&. The changes in the policy level thus take place in most cases only when the applications using the back\-end libraries are restarted\&.
99b432
.sp
99b432
\fBRemoved cipher suites and protocols\fR
99b432
.sp
99b432
The following cipher suites and protocols are completely removed from the core cryptographic libraries listed above:
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
\fBDES\fR
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
All export grade cipher suites
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
\fBMD5\fR
99b432
in signatures
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
\fBSSLv2\fR
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
\fBSSLv3\fR
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
All
99b432
\fBECC\fR
99b432
curves smaller than 224 bits
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
All binary field
99b432
\fBECC\fR
99b432
curves
99b432
.RE
99b432
.sp
99b432
\fBCipher suites and protocols disabled in all policy levels\fR
99b432
.sp
99b432
The following ciphersuites and protocols are available but disabled in all crypto policy levels\&. They can be enabled only by explicit configuration of individual applications:
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
\fBDH\fR
99b432
with parameters < 1024 bits
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
\fBRSA\fR
99b432
with key size < 1024 bits
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
\fBCamellia\fR
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
\fBARIA\fR
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
\fBSEED\fR
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
\fBIDEA\fR
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
Integrity only ciphersuites
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
\fBTLS\fR
99b432
\fBCBC mode\fR
99b432
ciphersuites using
99b432
\fBSHA\-384\fR
99b432
HMAC
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
\fBAES\-CCM8\fR
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
all
99b432
\fBECC\fR
99b432
curves incompatible with
99b432
\fBTLS 1\&.3\fR, including secp256k1
99b432
.RE
99b432
.sp
99b432
.RS 4
99b432
.ie n \{\
99b432
\h'-04'\(bu\h'+03'\c
99b432
.\}
99b432
.el \{\
99b432
.sp -1
99b432
.IP \(bu 2.3
99b432
.\}
99b432
\fBIKEv1\fR
99b432
.RE
99b432
.SH "FILES"
99b432
.PP
99b432
/etc/crypto\-policies/back\-ends
99b432
.RS 4
99b432
The individual cryptographical back\-end configuration files\&. Usually linked to the configuration shipped in the crypto\-policies package unless a configuration from
99b432
\fBlocal\&.d\fR
99b432
is added\&.
99b432
.RE
99b432
.PP
99b432
/etc/crypto\-policies/config
99b432
.RS 4
99b432
The active crypto\-policies level set on the system\&.
99b432
.RE
99b432
.PP
99b432
/etc/crypto\-policies/local\&.d
99b432
.RS 4
99b432
Additional configuration shipped by other packages or created by the system administrator\&. The contents of the
99b432
\fB<back\-end>\-file\&.config\fR
99b432
is appended to the configuration from the policy back end as shipped in the crypto\-policies package\&.
99b432
.RE
99b432
.SH "SEE ALSO"
99b432
.sp
99b432
update\-crypto\-policies(8), fips\-mode\-setup(8)
99b432
.SH "AUTHOR"
99b432
.sp
99b432
Written by Tomáš Mráz\&.