Note: This is a public test instance of Red Hat Bugzilla. The data contained within is a snapshot of the live data so any changes you make will not be reflected in the production Bugzilla. Email is disabled so feel free to test any aspect of the site that you want. File any problems you find or give feedback at bugzilla.redhat.com.
Bug 1179275 - Utilize system-wide crypto-policies
Summary: Utilize system-wide crypto-policies
Keywords:
Status: CLOSED WORKSFORME
Alias: None
Product: Fedora
Classification: Fedora
Component: aqbanking
Version: 21
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Bill Nottingham
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard:
Depends On:
Blocks: fedora-crypto-policies
TreeView+ depends on / blocked
 
Reported: 2015-01-06 14:24 UTC by Nikos Mavrogiannopoulos
Modified: 2015-06-30 03:40 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2015-06-30 03:40:54 UTC
Type: Bug
Embargoed:


Attachments (Terms of Use)

Description Nikos Mavrogiannopoulos 2015-01-06 14:24:41 UTC
Please convert to use the system's crypto policy for SSL and TLS:
https://fedoraproject.org/wiki/Packaging:CryptoPolicies

If this program is compiled against gnutls, change the default priority string to be "@SYSTEM" or to use gnutls_set_default_priority().

If this program is compiled against openssl, and there is no default cipher list specified, you don't need to modify it. Otherwise replace the default cipher list with "PROFILE=SYSTEM".

In both cases please verify that the application uses the system's crypto policies.

If the package is already using the system-wide crypto policies, or it does not use SSL or TLS, no action is required, the bug can simply be closed.

Comment 1 Robert Scheck 2015-03-23 21:47:31 UTC
In latest aqbanking-5.5.1-1.fc23 package neither SSL_CTX_set_cipher_list nor
gnutls_priority_set_direct, gnutls_priority_init or gnutls_set_default_priority
are present. According to the spec file neither OpenSSL nor GnuTLS are directly
consumed, but xmlsec1-gnutls-devel.

Looking however to gwenhywfar, gnutls_set_default_priority() is being called
before gnutls_protocol_set_priority().

Comment 2 Nikos Mavrogiannopoulos 2015-03-24 07:16:32 UTC
(In reply to Robert Scheck from comment #1)

> Looking however to gwenhywfar, gnutls_set_default_priority() is being called
> before gnutls_protocol_set_priority().

In that case, the gnutls_set_default_priority() is not used at all. It is overriden by the second call, so you may need to apply the default policies by removing the second call, or by the other methods indicated.

Comment 3 Bill Nottingham 2015-03-25 02:10:21 UTC
From following the code, AFAICT (removing lots of extraneous lines)

...
#if 1 /* old code */
  rv=gnutls_set_default_priority(xio->session);
  if (rv) {
    gnutls_deinit(xio->session);
    return GWEN_ERROR_GENERIC;
  }

  /* possibly force protocol priority */
  if (lflags & GWEN_SYNCIO_TLS_FLAGS_FORCE_SSL_V3) {
    const int proto_prio[2] = { GNUTLS_SSL3, 0 };

    rv=gnutls_protocol_set_priority(xio->session, proto_prio);
    if (rv) {
      gnutls_deinit(xio->session);
      return GWEN_ERROR_GENERIC;
    }
  }
#else /* new code */
... lots of other stuff ...
#endif

So, for now, it looks like we do the right thing out of the box. GWEN_SYNCIO_TLS_FLAGS_FORCE_SSL_V3 is a caller-set flag, that is plumbed through aqbanking as an account specific setting. It's not on by default.

Comment 4 Bill Nottingham 2015-06-30 03:40:54 UTC
Closing as WORKSFORME - AFAICT it's doing the right thing.


Note You need to log in before you can comment on or make changes to this bug.