Skip to content

Commit 8516ab3

Browse files
committed
Revert RL9 crypto policy to DEFAULT
This should resolve SSH issues with some modern key types such as ed25519.
1 parent 840924f commit 8516ab3

File tree

3 files changed

+10
-3
lines changed

3 files changed

+10
-3
lines changed

etc/kayobe/ansible/maintenance/cis.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@
1212
that:
1313
- ssh_key_type != 'ed25519'
1414
fail_msg: FIPS policy does not currently support ed25519 SSH keys on RHEL family systems
15-
when: ansible_facts.os_family == 'RedHat'
15+
when: ansible_facts.os_family == 'RedHat' and rhel9cis_crypto_policy == 'FIPS'
1616

1717
- name: Ensure the cron package is installed on ubuntu
1818
ansible.builtin.package:

etc/kayobe/inventory/group_vars/cis-hardening/cis

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,8 +26,9 @@ rhel9cis_rule_3_4_1_2: false
2626
# Don't configure selinux
2727
rhel9cis_selinux_disable: true
2828

29-
# NOTE: FUTURE breaks wazuh agent repo metadata download
30-
rhel9cis_crypto_policy: FIPS
29+
# NOTE: Using DEFAULT crypto policy. FIPS breaks ed25519 SSH keys, and FUTURE
30+
# breaks wazuh agent repo metadata download.
31+
rhel9cis_crypto_policy: DEFAULT
3132

3233
# Skip package updates
3334
rhel9cis_rule_1_9: false
Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
---
2+
security:
3+
- |
4+
Updates the default CIS hardening configuration to set
5+
``rhel9cis_crypto_policy`` to ``DEFAULT`` instead of ``FIPS``. This
6+
resolves SSH issues with some modern key types such as ``ed25519``.

0 commit comments

Comments
 (0)