New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Remove MD5 certificate fingerprints #482
Conversation
|
In service.py the error isn't wrapped in _(). You should use the same message in both. Given the different messages I'm surprised this didn't pop up as a test failure. |
|
I don't think that this is a good way how to handle backward compatibility. With FIPS mode enabled there is no md5 backward compatibility and users should adapt their automation. In case that IPA API is used directly it will contain a garbage and it may not be catched fast enough by any automation on user side. We should not provide anything related to md5 under FIPS mode and let any possible automation using IPA API to fail early on missing values. |
|
@rcritten Currently, the tests fail because we need #437 merged. It would be caught. @MartinBasti The only other option I see is to provide |
|
I am fine with not providing |
|
Actually, we don't need to provide |
MD5 is a grandpa and FIPS does not like it at all. https://fedorahosted.org/freeipa/ticket/5695
|
@rcritten thanks for noticing the discrepancy in the previous version of the commit, it was a leftover from previous implementation. |
|
@stlaz I think it'd be good to discuss this change on freeipa-devel. Also, since we're removing md5, I'd consider adding sha256. |
|
+1 for sha256 |
|
Btw, I think sha256 can be added in a separate PR. Let's just wait if there are any concerns about removing md5 on the freeipa-devel. |
|
I don't have a problem adding it in this PR, it needs to be resolved according to the outcome of the freeipa-devel thread anyway.
… On 21 Feb 2017, at 18:54, Tomas Krizek ***@***.***> wrote:
Btw, I think sha256 can be added in a separate PR. Let's just wait if there are any concerns about removing md5 on the freeipa-devel.
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub, or mute the thread.
|
|
ACK, there is no disagreement on the freeipa-devel. I'm already working on replacing SHA1 with SHA256 given the recent events. |
|
Fixed upstream |
To be "backward compatible" we cannot remove
md5_fingerprintso we at least supply the reason why it can't be counted.https://fedorahosted.org/freeipa/ticket/5695
edit: For this to work #437 needs to be pushed first.