Uploaded image for project: 'Satellite'
  1. Satellite
  2. SAT-36399

Configure foreman-proxy to respect crypto-polices

XMLWordPrintable

    • Icon: Epic Epic
    • Resolution: Unresolved
    • Icon: Undefined Undefined
    • None
    • None
    • Foreman Proxy
    • None
    • foreman-proxy crypto-policies
    • To Do
    • False
    • sat-endeavour
    • None
    • None
    • None

      Goal:

      The Satellite stack has been migrating to have all configuration done through system-wide cryptographic policies. See https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/security_hardening/using-the-system-wide-cryptographic-policies_security-hardening. Today the foreman-proxy process doesn't use those while it is exposed to client systems.

      Acceptance Criteria:

      • Users can use RHEL's crypto-policies to change the security profile for the foreman-proxy process

      Context:

      Currently a hardcoded list of ciphers is used (https://github.com/theforeman/smart-proxy/blob/5a2e3da93dbb924ac9cf2ae60c1e4b3ba9f937db/lib/launcher.rb#L7-L9). In addition, it disables some SSL/TLS versions (anything lower than 1.2, see https://github.com/theforeman/smart-proxy/blob/5a2e3da93dbb924ac9cf2ae60c1e4b3ba9f937db/lib/launcher.rb#L72-L75). Users have the option to disable some of those (https://github.com/theforeman/smart-proxy/blob/5a2e3da93dbb924ac9cf2ae60c1e4b3ba9f937db/config/settings.yml.example#L10-L19), but they can't add anything or override it.

      On Red Hat's OpenSSL build it is possible to set the TLS protocols and ciphers to PROFILE=SYSTEM to use the system-wide policy. Those are Red Hat patches and not upstream so care must be taken to maintain compatibility with other systems.

              Unassigned Unassigned
              ekohlvan@redhat.com Ewoud Kohl van Wijngaarden
              Votes:
              0 Vote for this issue
              Watchers:
              1 Start watching this issue

                Created:
                Updated: