-
Notifications
You must be signed in to change notification settings - Fork 71
Add disallowed_signing_algorithms, avoid ecschnorr #1034
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add disallowed_signing_algorithms, avoid ecschnorr #1034
Conversation
0473f96 to
167a222
Compare
|
/packit retest-failed |
1 similar comment
|
/packit retest-failed |
Codecov ReportAttention: Patch coverage is
Additional details and impacted files
Flags with carried forward coverage won't be shown. Click here to find out more.
🚀 New features to boost your workflow:
|
|
@ansasaki, @sergio-correia : Please, forget about coverity data. If I run it locally with |
|
/packit retest-failed |
167a222 to
0bbb317
Compare
3050ce2 to
ec559f7
Compare
|
In my opinion, the wording should be changed from Another option is to introduce something like |
Sure. I will change it.
At this particular moment, I prefer to keep the "disabled" option, but I opened an issue to track this change |
ec559f7 to
6e5b25f
Compare
3d8a8c9 to
3283a71
Compare
Signed-off-by: Sergio Arroutbi <sarroutb@redhat.com>
3283a71 to
2c49f95
Compare

This change introduces a new configuration option, disabled_signing_algorithms, to prevent the agent from using certain signing schemes, even if they are reported as supported by the TPM.
The primary motivation is to avoid issues with the
ecschnorralgorithm, which, while technically supported by some TPMs, has been observed to cause rejection from Verifier.