/srv/irclogs.ubuntu.com/2022/06/06/#ubuntu-security.txt

=== ChanServ changed the topic of #ubuntu-security to: Twitter: @ubuntu_sec || https://usn.ubuntu.com || https://wiki.ubuntu.com/SecurityTeam || https://wiki.ubuntu.com/Security/Features || Community: sarnold
ahasenackok, starting to understand how src:crypto-policies work. In kinetic: https://pastebin.ubuntu.com/p/jmdfDbqBqH/20:37
sarnoldoh wow that'20:38
sarnoldthat's way more promising than I expected20:39
ahasenackoh, not out of the box, not yet20:39
sarnoldahhhhh there we go20:39
ahasenackbut the amount of changes is less than I expected20:39
sarnoldhttps://bugs.launchpad.net/ubuntu/+source/crypto-policies/+bug/1926664 gave me the impression it didn't work at all :(20:39
ubottuLaunchpad bug 1926664 in crypto-policies (Ubuntu) "Package has no effect on system crypto policy" [Undecided, New]20:39
ahasenackmost of the time it boils down to include a config snippet, i.e., add some sort of "include /foo/bar/*.conf" in the main config20:39
ahasenackwhich many packages already have20:39
ahasenackso it's just a matter of placing the extra snipped in the right place20:40
ahasenackit gets trickier with openssl, of course, and its section-hell of openssl.cnf20:40
sarnoldnice nice nice :D it really would be nice to have a good handle on all the "but my ancient $tool requires $gross_crypto" bug reports20:40
ahasenackthis is promising20:40
ahasenackthere is support for bind, gnutls, java, krb5, libreswan, libssh, nss, openssh and openssl20:41
ahasenackI will concentrate my experiments in a ppa, https://launchpad.net/~ahasenack/+archive/ubuntu/crypto-policy/20:41
ahasenackso that bug is kind of invalid. The way crypto-policy works, is that it generates config file snippets for each supported app/library20:44
ahasenackand then it's up to each app/library to include this config snippet20:44
sarnoldhrm :( I think I misunderstood what it provided us, too :(20:44
ahasenackfor openssl to use it, for example, we have to add this somewhere in openssl.cnf:20:45
ahasenack.include = /etc/crypto-policies/back-ends/opensslcnf.config20:45
ahasenackthat opensslcnf.config file is generated by the policy, and maps to the level that was chosen (LEGACY, DEFAULT, FUTURE, NEXT, etc)20:45
ahasenacksarnold: do you remember that other bug we had requesting to implement system-wide crypto policies? I think it even had a few tasks21:13
ahasenackbut I forget against which package it was21:13
sarnoldahasenack: hrm :( I can't recall that bug off-hand, sorry21:27
ahasenackwhile I have you21:27
ahasenackcan you check if lftp https://ubuntu.com works for you?21:27
ahasenackit doesn't for me21:27
sarnoldahasenack: fails on focal and bionic21:32
ahasenacksarnold: sergiodj found this: https://github.com/lavv17/lftp/issues/64121:33
ubottuIssue 641 in lavv17/lftp "gnutls integration code manually tries to verify chain, can't handle cross-signed CA" [Closed]21:33
ahasenack"Which is why now lftp won't work against default LetsEncrypt chains anymore"21:34
ahasenackapparently they are/were using their own code to do some validation (!)21:34
sarnoldwow21:34
sarnoldthat might have made sense in ye olden dayes21:34
ahasenackI filed a bug21:37
sarnoldnice21:38
sarnoldtbh I didn't know lftp did https :) I figured it was ftp and ftps only21:38
ahasenacksarnold: found the bug: https://bugs.launchpad.net/ubuntu/+source/ca-certificates/+bug/164728521:47
ubottuLaunchpad bug 1647285 in nss (Ubuntu) "SSL trust not system-wide" [Wishlist, Confirmed]21:47
sarnoldoh yeah! you're reaching back through time a ways there :) hehe21:48

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!