RHEL 9 system-wide crypto policies aim at eventual removal of SHA-1 use.
Due to bootstrapping process, force explicitly supported encryption types in kdc.conf or we may end up with AES128-CTS and AES256-CTS only in FIPS mode at bootstrap time which then fails to initialize kadmin principals requiring use of AES256-SHA2 and AES128-SHA2.
Camellia ciphers must be filtered out in FIPS mode, we do that already in the kerberos.ldif but if supported_enctypes is to be set explicitly, they need to be removed here as well.
supported_enctypes
PR: https://github.com/freeipa/freeipa/pull/6197
Note that switching master key to aes256-sha2 is not possible as we don't know in case of a replica what would be a master key encryption type on the master before creating the configuration files.
aes256-sha2
A process to upgrade master key encryption type is described at http://web.mit.edu/kerberos/krb5-latest/doc/admin/advanced/retiring-des.html (replace DES by any other encryption type) and is multi-step and non-trivial. We would need to make it easier before attempting to switch to the aes256-sha2 directly.
master:
ipa-4-9:
Metadata Update from @frenaud: - Issue close_status updated to: fixed - Issue status updated to: Closed (was: Open)
Metadata Update from @frenaud: - Issue status updated to: Open (was: Closed)
Issue linked to bug https://bugzilla.redhat.com/show_bug.cgi?id=2057471
Metadata Update from @frenaud: - Custom field rhbz adjusted to https://bugzilla.redhat.com/show_bug.cgi?id=2057471
Metadata Update from @abbra: - Issue close_status updated to: fixed - Issue status updated to: Closed (was: Open)
Login to comment on this ticket.