Documentation for a newer release is available. View Latest

Veiligheid

Updated cryptography settings

With this update, the default Fedora policy regarding cryptographic components has been updated to disallow the use of algorithms that are no longer considered secure. Specifically, the changes involve:

  • Require RSA of 2048 bits or more

  • Disable DSA

Libcurl switches from libssh2 to libssh

With this update, the libcurl library switches from using libssh2 to implement the SSH layer of SCP and SFTP protocols to libssh. The reason for the change is that the libssh2 library uses outdated cryptographic algorithms and lacks important features, such as GSS-API authentication. The newly used libssh library is more secure, feature-complete, and with more active upstream community.

NSS uses SQL as default file format

In Fedora 28, the default file format used by the NSS library is changed to SQL.

The Network Security Services (NSS) library, which is used by Mozilla Firefox, Gnome Evolution, Mozilla Thunderbird, and other applications, changed its default database format for storing keys, certificates, and trust information. The new database format is based on SQlite and uses the filenames cert9.db, key4.db, and pkcs11.txt. The previous database format used Berkeyley DB (DBM) and filenames cert8.db, key3.db, and secmod.db.

The primary benefit of the SQlite storage is support for concurrent access by multiple applications. When using the previous default file format based on DBM, accidental concurrent access could result in corrupted storage.

Unless an application explicitly requests either the DBM or SQL format, the NSS library will automatically migrate the application’s NSS database from the old to the new format. The old database files will not be updated further. Most users should not experience differences in operation. Applications that perform many NSS read/write operations may experience a minor performance decrease. Use the following command to trigger an explicit migration:

certutil -d sql:</path/to/database> -N -f </path/to/database/password/file> \
                                       -@ </path/to/database/password/file>

Users who store their system home or application data directory on a network filesystem are advised to set the NSS_SDB_USE_CACHE=yes environment variable prior to starting applications that use NSS. Without setting this environment variable, users of network filesystems may experience a major slowdown with some applications, such as Firefox. The environment variable enables the use of a caching strategy in NSS that works around the slowness of network filesystems. Because this caching strategy causes a performance decrease on fast filesystems.

Additional technical details can be found in the Fedora Wiki: https://fedoraproject.org/wiki/Changes/NSSDefaultFileFormatSql.

Deprecate TCP wrappers

Fedora 28 removes support for tcp_wrappers (aka /etc/hosts.deny access files) by default from all the network daemons and tools. The preferred replacements are software firewalld, nftables rules or software specific access rules for more complex filtering. If your system security depends on tcp_wrappers rules, convert them to firewall rules, or set up tcpd to do the same job for you.

OpenLDAP switches from NSS to OpenSSL

With this update, the OpenLDAP distribution in Fedora changed from using the NSS (or MozNSS) library to the OpenSSL library for providing cryptographic functions. The switch promises better support from OpenLDAP upstream, which had ceased maintaining the NSS support layer.

OpenLDAP defaults to use only Shared System Certificates

OpenLDAP clients and server now use the system-wide certificate store by default, instead of /etc/openldap/certs.

OpenLDAP drops TCP wrappers support

Fedora has deprecated the use of TCP wrappers. The OpenLDAP project also discourages their use and recommends that an IP firewall is used instead. With this update, OpenLDAP will not be configured with --enable-wrappers and so any TCP wrappers configuration will have no effect on OpenLDAP. Other means should be used to protect the OpenLDAP server.

Replace authconfig with authselect

Fedora 28 replaces authconfig with authselect as the default tool for generating PAM configuration files and nsswitch.conf. On new installations, authselect, together with an authconfig compatibility tool, will be installed by default instead of authconfig. On upgraded installations, authconfig will be replaced with authselect and the compatibility tool but the configuration generated by authconfig will be left intact. The authconfig compatibility tool will be removed from Fedora in a future release. The authselect-migration(7) man page explains how to migrate from authconfig to authselect.