Security

System-wide crypto policy in RHEL 8

In the Enterprise IT, the security landscape is constantly evolving. Without robust cryptographic integrity protections, information can be altered by unauthorized users without detection. With Red Hat Enterprise Linux 8.0 the system-wide crypto policy was introduced. This component configures the core cryptographic subsystems, covering TLS, IPSec, DNSSec, Kerberos, and secure communication protocols. This allows to apply a consistent cryptographic policy at scale. The predefined policies are DEFAULT, LEGACY, FUTURE, FIPS. The default system-wide crypto policy is set to DEFAULT by Red Hat. Beside the vendor-specific policies, it is possible to specify customized crypto policies.

More information here: System-wide crypto policiesopen in new window

Swisscom crypto policy in RHEL 8

On Managed RHEL 8 VMs, the SWISSCOM customized crypto policy is enabled and enforced with Puppet. You can check the enabled crypto policy by using the update-crypto-policies tool:

$ update-crypto-policies --show
SWISSCOM

The table below shows the relevant differences between the SWISSCOM and the vendor-specific DEFAULT crypto policy. The enabled SWISSCOM crypto policy is a conservative policy for today’s security standards. It allows the TLS 1.2 and 1.3 protocols, as well as IKEv2 and SSH2. The RSA and Diffie-Hellman parameters are accepted if larger than 2047 respectively 3071 bits. The policy provides at least 128-bit security, except for SHA-1 signatures needed for DNSSec and other still prevalent legacy use of SHA-1 signatures.

SWISSCOM PolicyDEFAULT Policy
TLS v1.0nono
TLS v1.1nono
TLS v1.2yesyes
TLS v1.3yesyes
Internet Key Exchange (IKE) v1nono
Internet Key Exchange (IKE) v2yesyes
Diffie-Hellman (DH) key sizemin. 2048-bitmin. 2048-bit
DSA key sizemin. 3072-bitmin. 2048-bit
RSA key sizemin. 3072-bitmin. 2048-bit
SHA-1 in digital signaturesyesyes
OpenSSH certificate authenticationyesyes
OpenSSH EtM (encrypt-then-mac) extensionyesyes
Message Authentication Code (MAC)all HMAC with SHA-256 or betterall HMAC with SHA-1 or better
Cryptographic hashall with SHA-256 hash or betterall with SHA-1 hash or better
Signature algorithmall with SHA-256 hash or better (no DSA)all with SHA-1 hash or better (no DSA)
Key exchange algorithmECDHE, RSA, DHE, DHE-RSAECDHE, RSA, DHE, DHE-RSA, PSK, DHE-PSK, ECDHE-PSK, ECDHE-GSS, DHE-GSS
TLS ciphersmin. 256-bit key, min. 128-bit block, including AES, ChaCha20, AES-CBCmin. 128-bit key, min. 128-bit block, including AES, ChaCha20, AES-CBC
Non-TLS cipherssame as TLS ciphers with added Camelliasame as TLS ciphers with added Camellia
Groups or elliptic curvesall prime >= 255 bits (including Bernstein curves)all prime >= 255 bits (including Bernstein curves)
Last Updated: