Skip to content

Commit f113ed2

Browse files
committed
corrections from checking output
1 parent c79575b commit f113ed2

1 file changed

Lines changed: 38 additions & 41 deletions

File tree

xml/security_cryptopolicy.xml

Lines changed: 38 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
xmlns:xi="http://www.w3.org/2001/XInclude"
99
xmlns:xlink="http://www.w3.org/1999/xlink"
1010
version="5.0"
11-
xml:id="cha-security-cryptopolicy">
11+
xml:id="cha-security-cryptopolicies">
1212
<!--taroth 2023-04-28
1313
Main ToDos (based on https://bugzilla.suse.com/show_bug.cgi?id=1209998#c7)
1414
* add new chapter to Security Guide, describe also integration
@@ -20,19 +20,19 @@
2020
<info>
2121
<abstract>
2222
<para>
23-
bla
23+
TODO
2424
</para>
2525
</abstract>
2626
<dm:docmanager xmlns:dm="urn:x-suse:ns:docmanager">
2727
<dm:bugtracker></dm:bugtracker>
2828
<dm:translation>yes</dm:translation>
2929
</dm:docmanager>
3030
</info>
31-
<sect1 xml:id="sec-security-cryptopolicy-oview">
32-
<title>Conceptual overview</title>
31+
<sect1 xml:id="sec-security-cryptopolicies-concept">
32+
<title>The <command>crypto-policies</command> concept</title>
3333

3434
<para>
35-
The <package>crypto-policies</package> RPM package provides pre-built
35+
The <package>crypto-policies</package> RPM package provides predefined
3636
configuration files with cryptographic policies for cryptographic
3737
back-ends, such as SSL/TLS libraries. This package allows to set the
3838
cryptographic security level for all applications that use a
@@ -43,16 +43,16 @@
4343
Crypto-policies apply to the configuration of the core cryptographic
4444
subsystems. They cover the supported secure communications protocols on
4545
the base operating system, such as TLS, IKE, IPSec, DNSSec and Kerberos
46-
protocols. Having crypto-policies allows to easily handle the deprecation
47-
of algorithms or protocols system-wide and in a transparent manner.
46+
protocols. Crypto-policies allow to handle the deprecation of algorithms
47+
or protocols system-wide and in a transparent manner.
4848
</para>
4949
</sect1>
50-
<sect1>
51-
<title>Predefined policy levels</title>
50+
<sect1 xml:id="sec-security-cryptopolicies-predefined">
51+
<title>Predefined cryptographic policies</title>
5252

5353
<para>
5454
The <package>crypto-policies</package> package comes with the following
55-
predefined policy levels:
55+
predefined policies that can be applied system-wide:
5656
</para>
5757

5858
<variablelist>
@@ -118,20 +118,21 @@
118118
and are read-only.
119119
</para>
120120
</sect1>
121-
<sect1>
122-
<title>Switching to a different crypto-policy level</title>
121+
<sect1 xml:id="sec-security-cryptopolicies-switch">
122+
<title>Switching to a different crypto-policy</title>
123123

124124
<para>
125-
Use the <command>update-crypto-policies</command> to set the policy level
126-
which is applied to the cryptographic back-ends. It is the default policy
127-
used by these back-ends unless the application user configures them
125+
Use the <command>update-crypto-policies</command> command to view and set
126+
the policy which is applied system-wide to the cryptographic back-ends.
127+
The policy which has been set with this command is used by these
128+
back-ends by default unless the application user configures them
128129
otherwise.
129130
</para>
130131

131132
<procedure>
132133
<step>
133134
<para>
134-
To check the crypto-policy level that is currently in use:
135+
To check the crypto-policy that is currently in use:
135136
</para>
136137
<screen>&prompt.root;<command>update-crypto-policies --show</command></screen>
137138
</step>
@@ -140,28 +141,28 @@
140141
To switch to a different policy level, use the <option>--set</option>
141142
option:
142143
</para>
143-
<screen>update-crypto-policies --set <replaceable>POLICY</replaceable></screen>
144144
<remark>taroth 2023-07-04: do we need a word of caution here for LEGACY and FIPS?
145145
and can we tell that switching to 'LEGACY' enables compatibility with a specific
146146
older SLE version, like SLE 12 SP5 or so?
147147
</remark>
148148
<important>
149-
<title>LEGACY crypto-policy level is less secure</title>
149+
<title>LEGACY crypto-policy is less secure</title>
150150
<para>
151-
Switching to a LEGACY crypto-policy level makes your system and
151+
Switching to a LEGACY crypto-policy makes your system and
152152
applications less secure.
153153
</para>
154154
</important>
155155
</step>
156156
<step>
157157
<para>
158-
After switching to a different policy level restart the system to
159-
apply the changes to the applications.
158+
After switching to a different policy reboot the machine to apply the
159+
changes to the applications:
160160
</para>
161+
<screen>&prompt.root;<command>reboot</command></screen>
161162
</step>
162163
</procedure>
163164
</sect1>
164-
<sect1>
165+
<sect1 xml:id="sec-security-cryptopolicies-subpolicies">
165166
<title>Customizing existing crypto-policies</title>
166167

167168
<para>
@@ -178,10 +179,10 @@
178179
<filename>/usr/share/crypto-policies/policies/modules</filename>.
179180
However, your own subpolicies need to be stored in
180181
<filename>/etc/crypto-policies/policies/modules</filename> (unless they
181-
are packaged). The name of the subpolicy file must be
182+
are packaged). Name the subpolicy file
182183
<filename><replaceable>MODULE</replaceable>.pmod</filename>, where
183-
<replaceable>MODULE</replaceable> is the name of the subpolicy. It needs
184-
to be spelled in uppercase letters and without spaces.
184+
<replaceable>MODULE</replaceable> is the name of the subpolicy. The file
185+
name needs to be spelled in uppercase letters and without spaces.
185186
</para>
186187

187188
<example xml:id="ex-crypto-policy-subpolicy">
@@ -200,10 +201,11 @@
200201
In <filename>/etc/crypto-policies/policies/modules/</filename>
201202
create a new file, named <filename>NO-RSA-PSK.pmod</filename>.
202203
</para>
204+
<screen>&prompt.root;<command>touch</command> /etc/crypto-policies/policies/modules/NO-RSA-PSK.pmod</screen>
203205
</step>
204206
<step>
205207
<para>
206-
Add the following line and save the file afterwards:
208+
Add the following line to the file and save it afterwards:
207209
</para>
208210
<screen>key_exchange = -RSA -PSK</screen>
209211
<para>
@@ -224,13 +226,13 @@
224226
Double-check if the subpolicy has been added to
225227
<literal>DEFAULT</literal>:
226228
</para>
227-
<screen><command>update-crypto-policies --show</command>
229+
<screen>&prompt.root;<command>update-crypto-policies --show</command>
228230
DEFAULT:NO-RSA-PSK</screen>
229231
</step>
230232
<step>
231233
<para>
232-
Reboot the system to apply the system-wide policy adjustment to the
233-
applications:
234+
Reboot the machine to apply the system-wide policy adjustment to
235+
the applications:
234236
</para>
235237
<screen>&prompt.root;<command>reboot</command></screen>
236238
</step>
@@ -249,7 +251,8 @@ DEFAULT:NO-RSA-PSK</screen>
249251
<filename>/etc/crypto-policies/policies/</filename>. Name your file
250252
<filename><replaceable>MY_POLICY</replaceable>.pol</filename>, where
251253
<replaceable>MY_POLICY</replaceable> is the name of the policy. Make sure
252-
it is owned by &rootuser; and is not writable by non-privileged users.
254+
the policy file is owned by &rootuser; and is not writable by
255+
non-privileged users.
253256
</para>
254257

255258
<example xml:id="ex-crypto-policy-custom">
@@ -264,7 +267,7 @@ DEFAULT:NO-RSA-PSK</screen>
264267
Copy the <literal>DEFAULT</literal> policy to
265268
<filename>/etc/crypto-policies/policies/</filename> and rename it:
266269
</para>
267-
<screen>cp /usr/share/crypto-policies/policies/DEFAULT.pol /etc/crypto-policies/policies/<replaceable>MY_POLICY</replaceable>.pol</screen>
270+
<screen>&prompt.root;<command>cp</command> /usr/share/crypto-policies/policies/DEFAULT.pol /etc/crypto-policies/policies/<replaceable>MY_POLICY</replaceable>.pol</screen>
268271
</step>
269272
<step>
270273
<para>
@@ -275,28 +278,22 @@ DEFAULT:NO-RSA-PSK</screen>
275278
<para>
276279
Switch the system to the new policy:
277280
</para>
278-
<screen>&prompt.root;<command>update-crypto-policies --set MY_POLICY</command></screen>
281+
<screen>&prompt.root;<command>update-crypto-policies --set</command> MY_POLICY</screen>
279282
</step>
280283
<step>
281284
<para>
282-
Reboot the system to apply the new policy to the
283-
applications and running services:
285+
Reboot the machine to apply the new policy to the applications and
286+
running services:
284287
</para>
285288
<screen>&prompt.root;<command>reboot</command></screen>
286289
</step>
287290
<step>
288291
<para>
289292
Double-check if the policy is active:
290293
</para>
291-
<screen><command>update-crypto-policies --show</command>
294+
<screen>&prompt.root;<command>update-crypto-policies --show</command>
292295
MY_POLICY</screen>
293296
</step>
294-
<step>
295-
<para>
296-
Reboot the system to apply the system-wide policy adjustment to the
297-
applications.
298-
</para>
299-
</step>
300297
</procedure>
301298
</example>
302299
</sect1>

0 commit comments

Comments
 (0)