Use crypto-policies to configure RHEL8 sshd algorithms#4676
Use crypto-policies to configure RHEL8 sshd algorithms#4676matusmarhefka merged 1 commit intoComplianceAsCode:masterfrom
Conversation
|
See also: #3677 |
|
@vojtapolasek can you review this one? :) |
shawndwells
left a comment
There was a problem hiding this comment.
Seems like more is needed. For example, how do we ensure the running system is using the FIPS ciphers? What provides assurance sshd is using crypto-policies?
@shawndwells I'm not sure what kind of assurance you are looking for. From Chapter 3. Using system-wide cryptographic policies: |
|
LGTM |
Description:
Rationale:
harden_sshd_crypto_policyHarden sshd crypto policy #4663