Bug 1222718 - security:tls/crypto-policies: Bug
Summary: security:tls/crypto-policies: Bug
Status: NEW
Alias: None
Product: openSUSE.org
Classification: openSUSE
Component: 3rd party software (show other bugs)
Version: unspecified
Hardware: Other Other
: P5 - None : Normal (vote)
Target Milestone: ---
Assignee: Pedro Monreal Gonzalez
QA Contact: E-mail List
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2024-04-12 09:25 UTC by Dirk Stoecker
Modified: 2024-04-12 09:25 UTC (History)
1 user (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Dirk Stoecker 2024-04-12 09:25:34 UTC
The file /etc/crypto-policies/back-ends/java.config contains plain SHA1 in the line jdk.certpath.disabledAlgorithms. While that's in principle a good idea in this special case it's bad.

The Java settings still allow SHA1 for older CA certs (like Webbrowsers do) when it is used for the self-signing of CAs. Please adapt the line, as there are still many servers out there which use CAs which are created with SHA1 signatures. That's no security issues, as this self-signed part of the signature of an CA anyway has no real importance.

In /usr/lib64/jvm/java-21-openjdk-21/conf/security/java.security it is:

MD2, MD5, SHA1 jdkCA & usage TLSServer, RSA keySize < 1024, DSA keySize < 1024, EC keySize < 224, SHA1 usage SignedJAR & denyAfter 2019-01-01

That's a much better setting than what's currently used in crypto-policies package.

That would be important, as the crpyto-policies overrides the java setting by default.