Skip to content

Conversation

@ekohl
Copy link
Member

@ekohl ekohl commented Apr 24, 2023

EL 8.2 introduced support for specifying key-algorithm in omshell and Debian stable also supports this. If unspecified, it defaults to the insecure HMAC-MD5. Especially on FIPS (where MD5 is forbidden) this is problematic.

attr_reader :omapi_port, :key_name, :key_secret

def initialize(server, omapi_port, subnets = nil, key_name = nil, key_secret = nil, service = nil, free_ips_service = nil)
def initialize(server, omapi_port, subnets = nil, key_name = nil, key_secret = nil, service = nil, free_ips_service = nil, key_algorithm = nil)
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We should really refactor this to keyword arguments, but I wanted to stay compatible.

EL 8.2 introduced support for specifying key-algorithm in omshell[1]
and Debian stable also supports this. If unspecified, it defaults to the
insecure HMAC-MD5. Especially on FIPS (where MD5 is forbidden) this is
problematic.

[1]: https://access.redhat.com/errata/RHBA-2021:1623
@ekohl ekohl force-pushed the 36325-key-algorithm branch from ab05d6e to 09335a7 Compare April 23, 2025 09:56
@ekohl ekohl marked this pull request as ready for review April 23, 2025 09:56
@ekohl ekohl merged commit 9877f80 into theforeman:develop Jul 7, 2025
6 of 7 checks passed
@ekohl ekohl deleted the 36325-key-algorithm branch July 7, 2025 12:07
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants