=== ChanServ changed the topic of #ubuntu-security to: Twitter: @ubuntu_sec || https://usn.ubuntu.com || https://wiki.ubuntu.com/SecurityTeam || https://wiki.ubuntu.com/Security/Features || Community: sarnold [20:37] ok, starting to understand how src:crypto-policies work. In kinetic: https://pastebin.ubuntu.com/p/jmdfDbqBqH/ [20:38] oh wow that' [20:39] that's way more promising than I expected [20:39] oh, not out of the box, not yet [20:39] ahhhhh there we go [20:39] but the amount of changes is less than I expected [20:39] https://bugs.launchpad.net/ubuntu/+source/crypto-policies/+bug/1926664 gave me the impression it didn't work at all :( [20:39] Launchpad bug 1926664 in crypto-policies (Ubuntu) "Package has no effect on system crypto policy" [Undecided, New] [20:39] most of the time it boils down to include a config snippet, i.e., add some sort of "include /foo/bar/*.conf" in the main config [20:39] which many packages already have [20:40] so it's just a matter of placing the extra snipped in the right place [20:40] it gets trickier with openssl, of course, and its section-hell of openssl.cnf [20:40] nice nice nice :D it really would be nice to have a good handle on all the "but my ancient $tool requires $gross_crypto" bug reports [20:40] this is promising [20:41] there is support for bind, gnutls, java, krb5, libreswan, libssh, nss, openssh and openssl [20:41] I will concentrate my experiments in a ppa, https://launchpad.net/~ahasenack/+archive/ubuntu/crypto-policy/ [20:44] so that bug is kind of invalid. The way crypto-policy works, is that it generates config file snippets for each supported app/library [20:44] and then it's up to each app/library to include this config snippet [20:44] hrm :( I think I misunderstood what it provided us, too :( [20:45] for openssl to use it, for example, we have to add this somewhere in openssl.cnf: [20:45] .include = /etc/crypto-policies/back-ends/opensslcnf.config [20:45] that opensslcnf.config file is generated by the policy, and maps to the level that was chosen (LEGACY, DEFAULT, FUTURE, NEXT, etc) [21:13] sarnold: do you remember that other bug we had requesting to implement system-wide crypto policies? I think it even had a few tasks [21:13] but I forget against which package it was [21:27] ahasenack: hrm :( I can't recall that bug off-hand, sorry [21:27] while I have you [21:27] can you check if lftp https://ubuntu.com works for you? [21:27] it doesn't for me [21:32] ahasenack: fails on focal and bionic [21:33] sarnold: sergiodj found this: https://github.com/lavv17/lftp/issues/641 [21:33] Issue 641 in lavv17/lftp "gnutls integration code manually tries to verify chain, can't handle cross-signed CA" [Closed] [21:34] "Which is why now lftp won't work against default LetsEncrypt chains anymore" [21:34] apparently they are/were using their own code to do some validation (!) [21:34] wow [21:34] that might have made sense in ye olden dayes [21:37] I filed a bug [21:38] nice [21:38] tbh I didn't know lftp did https :) I figured it was ftp and ftps only [21:47] sarnold: found the bug: https://bugs.launchpad.net/ubuntu/+source/ca-certificates/+bug/1647285 [21:47] Launchpad bug 1647285 in nss (Ubuntu) "SSL trust not system-wide" [Wishlist, Confirmed] [21:48] oh yeah! you're reaching back through time a ways there :) hehe