88 xmlns : xi =" http://www.w3.org/2001/XInclude"
99 xmlns : xlink =" http://www.w3.org/1999/xlink"
1010 version =" 5.0"
11- xml : id =" cha-security-cryptopolicy " >
11+ xml : id =" cha-security-cryptopolicies " >
1212 <!-- taroth 2023-04-28
1313 Main ToDos (based on https://bugzilla.suse.com/show_bug.cgi?id=1209998#c7)
1414 * add new chapter to Security Guide, describe also integration
2020 <info >
2121 <abstract >
2222 <para >
23- bla
23+ TODO
2424 </para >
2525 </abstract >
2626 <dm : docmanager xmlns : dm =" urn:x-suse:ns:docmanager" >
2727 <dm : bugtracker ></dm : bugtracker >
2828 <dm : translation >yes</dm : translation >
2929 </dm : docmanager >
3030 </info >
31- <sect1 xml : id =" sec-security-cryptopolicy-oview " >
32- <title >Conceptual overview </title >
31+ <sect1 xml : id =" sec-security-cryptopolicies-concept " >
32+ <title >The < command >crypto-policies</ command > concept </title >
3333
3434 <para >
35- The <package >crypto-policies</package > RPM package provides pre-built
35+ The <package >crypto-policies</package > RPM package provides predefined
3636 configuration files with cryptographic policies for cryptographic
3737 back-ends, such as SSL/TLS libraries. This package allows to set the
3838 cryptographic security level for all applications that use a
4343 Crypto-policies apply to the configuration of the core cryptographic
4444 subsystems. They cover the supported secure communications protocols on
4545 the base operating system, such as TLS, IKE, IPSec, DNSSec and Kerberos
46- protocols. Having crypto -policies allows to easily handle the deprecation
47- of algorithms or protocols system-wide and in a transparent manner.
46+ protocols. Crypto -policies allow to handle the deprecation of algorithms
47+ or protocols system-wide and in a transparent manner.
4848 </para >
4949 </sect1 >
50- <sect1 >
51- <title >Predefined policy levels </title >
50+ <sect1 xml : id = " sec-security-cryptopolicies-predefined " >
51+ <title >Predefined cryptographic policies </title >
5252
5353 <para >
5454 The <package >crypto-policies</package > package comes with the following
55- predefined policy levels :
55+ predefined policies that can be applied system-wide :
5656 </para >
5757
5858 <variablelist >
118118 and are read-only.
119119 </para >
120120 </sect1 >
121- <sect1 >
122- <title >Switching to a different crypto-policy level </title >
121+ <sect1 xml : id = " sec-security-cryptopolicies-switch " >
122+ <title >Switching to a different crypto-policy</title >
123123
124124 <para >
125- Use the <command >update-crypto-policies</command > to set the policy level
126- which is applied to the cryptographic back-ends. It is the default policy
127- used by these back-ends unless the application user configures them
125+ Use the <command >update-crypto-policies</command > command to view and set
126+ the policy which is applied system-wide to the cryptographic back-ends.
127+ The policy which has been set with this command is used by these
128+ back-ends by default unless the application user configures them
128129 otherwise.
129130 </para >
130131
131132 <procedure >
132133 <step >
133134 <para >
134- To check the crypto-policy level that is currently in use:
135+ To check the crypto-policy that is currently in use:
135136 </para >
136137<screen >&prompt.root; <command >update-crypto-policies --show</command ></screen >
137138 </step >
140141 To switch to a different policy level, use the <option >--set</option >
141142 option:
142143 </para >
143- <screen >update-crypto-policies --set <replaceable >POLICY</replaceable ></screen >
144144 <remark >taroth 2023-07-04: do we need a word of caution here for LEGACY and FIPS?
145145 and can we tell that switching to 'LEGACY' enables compatibility with a specific
146146 older SLE version, like SLE 12 SP5 or so?
147147 </remark >
148148 <important >
149- <title >LEGACY crypto-policy level is less secure</title >
149+ <title >LEGACY crypto-policy is less secure</title >
150150 <para >
151- Switching to a LEGACY crypto-policy level makes your system and
151+ Switching to a LEGACY crypto-policy makes your system and
152152 applications less secure.
153153 </para >
154154 </important >
155155 </step >
156156 <step >
157157 <para >
158- After switching to a different policy level restart the system to
159- apply the changes to the applications.
158+ After switching to a different policy reboot the machine to apply the
159+ changes to the applications:
160160 </para >
161+ <screen >&prompt.root; <command >reboot</command ></screen >
161162 </step >
162163 </procedure >
163164 </sect1 >
164- <sect1 >
165+ <sect1 xml : id = " sec-security-cryptopolicies-subpolicies " >
165166 <title >Customizing existing crypto-policies</title >
166167
167168 <para >
178179 <filename >/usr/share/crypto-policies/policies/modules</filename >.
179180 However, your own subpolicies need to be stored in
180181 <filename >/etc/crypto-policies/policies/modules</filename > (unless they
181- are packaged). The name of the subpolicy file must be
182+ are packaged). Name the subpolicy file
182183 <filename ><replaceable >MODULE</replaceable >.pmod</filename >, where
183- <replaceable >MODULE</replaceable > is the name of the subpolicy. It needs
184- to be spelled in uppercase letters and without spaces.
184+ <replaceable >MODULE</replaceable > is the name of the subpolicy. The file
185+ name needs to be spelled in uppercase letters and without spaces.
185186 </para >
186187
187188 <example xml : id =" ex-crypto-policy-subpolicy" >
200201 In <filename >/etc/crypto-policies/policies/modules/</filename >
201202 create a new file, named <filename >NO-RSA-PSK.pmod</filename >.
202203 </para >
204+ <screen >&prompt.root; <command >touch</command > /etc/crypto-policies/policies/modules/NO-RSA-PSK.pmod</screen >
203205 </step >
204206 <step >
205207 <para >
206- Add the following line and save the file afterwards:
208+ Add the following line to the file and save it afterwards:
207209 </para >
208210<screen >key_exchange = -RSA -PSK</screen >
209211 <para >
224226 Double-check if the subpolicy has been added to
225227 <literal >DEFAULT</literal >:
226228 </para >
227- <screen ><command >update-crypto-policies --show</command >
229+ <screen >&prompt.root; <command >update-crypto-policies --show</command >
228230DEFAULT:NO-RSA-PSK</screen >
229231 </step >
230232 <step >
231233 <para >
232- Reboot the system to apply the system-wide policy adjustment to the
233- applications:
234+ Reboot the machine to apply the system-wide policy adjustment to
235+ the applications:
234236 </para >
235237<screen >&prompt.root; <command >reboot</command ></screen >
236238 </step >
@@ -249,7 +251,8 @@ DEFAULT:NO-RSA-PSK</screen>
249251 <filename >/etc/crypto-policies/policies/</filename >. Name your file
250252 <filename ><replaceable >MY_POLICY</replaceable >.pol</filename >, where
251253 <replaceable >MY_POLICY</replaceable > is the name of the policy. Make sure
252- it is owned by &rootuser; and is not writable by non-privileged users.
254+ the policy file is owned by &rootuser; and is not writable by
255+ non-privileged users.
253256 </para >
254257
255258 <example xml : id =" ex-crypto-policy-custom" >
@@ -264,7 +267,7 @@ DEFAULT:NO-RSA-PSK</screen>
264267 Copy the <literal >DEFAULT</literal > policy to
265268 <filename >/etc/crypto-policies/policies/</filename > and rename it:
266269 </para >
267- <screen >cp /usr/share/crypto-policies/policies/DEFAULT.pol /etc/crypto-policies/policies/<replaceable >MY_POLICY</replaceable >.pol</screen >
270+ <screen >&prompt.root; < command >cp</ command > /usr/share/crypto-policies/policies/DEFAULT.pol /etc/crypto-policies/policies/<replaceable >MY_POLICY</replaceable >.pol</screen >
268271 </step >
269272 <step >
270273 <para >
@@ -275,28 +278,22 @@ DEFAULT:NO-RSA-PSK</screen>
275278 <para >
276279 Switch the system to the new policy:
277280 </para >
278- <screen >&prompt.root; <command >update-crypto-policies --set MY_POLICY </command ></screen >
281+ <screen >&prompt.root; <command >update-crypto-policies --set</command > MY_POLICY </screen >
279282 </step >
280283 <step >
281284 <para >
282- Reboot the system to apply the new policy to the
283- applications and running services:
285+ Reboot the machine to apply the new policy to the applications and
286+ running services:
284287 </para >
285288<screen >&prompt.root; <command >reboot</command ></screen >
286289 </step >
287290 <step >
288291 <para >
289292 Double-check if the policy is active:
290293 </para >
291- <screen ><command >update-crypto-policies --show</command >
294+ <screen >&prompt.root; <command >update-crypto-policies --show</command >
292295MY_POLICY</screen >
293296 </step >
294- <step >
295- <para >
296- Reboot the system to apply the system-wide policy adjustment to the
297- applications.
298- </para >
299- </step >
300297 </procedure >
301298 </example >
302299 </sect1 >
0 commit comments