Script 'mail_helper' called by obssrc
Hello community,
here is the log from the commit of package crypto-policies for openSUSE:Factory
checked in at 2026-05-21 18:26:02
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/crypto-policies (Old)
and /work/SRC/openSUSE:Factory/.crypto-policies.new.2084 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "crypto-policies"
Thu May 21 18:26:02 2026 rev:16 rq:1354219 version:20250714.cd6043a
Changes:
--------
--- /work/SRC/openSUSE:Factory/crypto-policies/crypto-policies.changes
2026-04-25 21:35:05.904222327 +0200
+++
/work/SRC/openSUSE:Factory/.crypto-policies.new.2084/crypto-policies.changes
2026-05-21 18:27:21.702616415 +0200
@@ -1,0 +2,15 @@
+Wed May 20 09:26:21 UTC 2026 - Pedro Monreal <[email protected]>
+
+- Remove crypto-policies-Allow-sshd-in-FIPS-mode-using-DEFAULT.patch
+ to allow X25519 as required for [email protected]
+ and sntrup761x25519-sha512 in the DEFAULT policy. (bsc#1259825)
+ Rebase crypto-policies-Allow-openssl-other-policies-in-FIPS-mode.patch
+
+-------------------------------------------------------------------
+Mon May 4 11:24:37 UTC 2026 - Pedro Monreal <[email protected]>
+
+- Add PQC support for OpenSSH (bsc#1258311, bsc#1259825)
+ * Enable sntrup761x25519-sha512 for OpenSSH by default
+ * Add crypto-policies-OpenSSH-PQC.patch
+
+-------------------------------------------------------------------
Old:
----
crypto-policies-Allow-sshd-in-FIPS-mode-using-DEFAULT.patch
New:
----
crypto-policies-OpenSSH-PQC.patch
----------(Old B)----------
Old:
- Remove crypto-policies-Allow-sshd-in-FIPS-mode-using-DEFAULT.patch
to allow X25519 as required for [email protected]
----------(Old E)----------
----------(New B)----------
New: * Enable sntrup761x25519-sha512 for OpenSSH by default
* Add crypto-policies-OpenSSH-PQC.patch
----------(New E)----------
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ crypto-policies.spec ++++++
--- /var/tmp/diff_new_pack.dooXVy/_old 2026-05-21 18:27:22.566651911 +0200
+++ /var/tmp/diff_new_pack.dooXVy/_new 2026-05-21 18:27:22.570652076 +0200
@@ -49,14 +49,14 @@
Patch3: crypto-policies-nss.patch
#PATCH-FIX-OPENSUSE enable SHA1 sigver in DEFAULT
Patch4: crypto-policies-enable-SHA1-sigver-in-DEFAULT.patch
-#PATCH-FIX-OPENSUSE Allow sshd in FIPS mode when using the DEFAULT policy
[bsc#1227370]
-Patch5: crypto-policies-Allow-sshd-in-FIPS-mode-using-DEFAULT.patch
#PATCH-FIX-OPENSUSE Fix the output comments around setting the FIPS mode
-Patch6: crypto-policies-FIPS-output.patch
+Patch5: crypto-policies-FIPS-output.patch
#PATCH-FIX-OPENSUSE Adapt the manpages to SUSE/openSUSE
-Patch7: crypto-policies-SUSE-manpages.patch
+Patch6: crypto-policies-SUSE-manpages.patch
#PATCH-FIX-OPENSUSE Allow openssl to load when using any policy in FIPS mode
[bsc#1243830, bsc#1242233]
-Patch8: crypto-policies-Allow-openssl-other-policies-in-FIPS-mode.patch
+Patch7: crypto-policies-Allow-openssl-other-policies-in-FIPS-mode.patch
+#PATCH-FIX-UPSTREAM Add PQC support for OpenSSH (bsc#1258311, bsc#1259825)
+Patch8: crypto-policies-OpenSSH-PQC.patch
BuildRequires: python3-base >= 3.11
%if %{with manbuild}
BuildRequires: asciidoc
++++++ crypto-policies-Allow-openssl-other-policies-in-FIPS-mode.patch ++++++
--- /var/tmp/diff_new_pack.dooXVy/_old 2026-05-21 18:27:22.646655198 +0200
+++ /var/tmp/diff_new_pack.dooXVy/_new 2026-05-21 18:27:22.650655362 +0200
@@ -62,12 +62,11 @@
===================================================================
---
fedora-crypto-policies-20250714.cd6043a.orig/tests/outputs/DEFAULT-openssh.txt
+++ fedora-crypto-policies-20250714.cd6043a/tests/outputs/DEFAULT-openssh.txt
-@@ -1,8 +1,7 @@
- Ciphers [email protected],aes256-ctr,[email protected],aes128-ctr
- MACs
[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha1,hmac-sha2-512
+@@ -1,7 +1,7 @@
+ Ciphers
[email protected],[email protected],aes256-ctr,[email protected],aes128-ctr
+ MACs
[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha1,[email protected],hmac-sha2-512
-GSSAPIKexAlgorithms
gss-curve25519-sha256-,gss-nistp256-sha256-,gss-group14-sha256-,gss-group16-sha512-
-KexAlgorithms
mlkem768x25519-sha256,curve25519-sha256,[email protected],ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512
--HostKeyAlgorithms
ecdsa-sha2-nistp256,[email protected],[email protected],[email protected],ecdsa-sha2-nistp384,[email protected],ecdsa-sha2-nistp521,[email protected],ssh-ed25519,[email protected],[email protected],[email protected],rsa-sha2-256,[email protected],rsa-sha2-512,[email protected]
+GSSAPIKexAlgorithms
gss-nistp256-sha256-,gss-group14-sha256-,gss-group16-sha512-
+KexAlgorithms
mlkem768x25519-sha256,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512
PubkeyAcceptedAlgorithms
ecdsa-sha2-nistp256,[email protected],[email protected],[email protected],ecdsa-sha2-nistp384,[email protected],ecdsa-sha2-nistp521,[email protected],ssh-ed25519,[email protected],[email protected],[email protected],rsa-sha2-256,[email protected],rsa-sha2-512,[email protected]
@@ -78,11 +77,10 @@
---
fedora-crypto-policies-20250714.cd6043a.orig/tests/outputs/DEFAULT-opensshserver.txt
+++
fedora-crypto-policies-20250714.cd6043a/tests/outputs/DEFAULT-opensshserver.txt
@@ -1,7 +1,7 @@
- Ciphers [email protected],aes256-ctr,[email protected],aes128-ctr
- MACs
[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha1,hmac-sha2-512
--GSSAPIKexAlgorithms
gss-curve25519-sha256-,gss-nistp256-sha256-,gss-group14-sha256-,gss-group16-sha512-
+ Ciphers
[email protected],[email protected],aes256-ctr,[email protected],aes128-ctr
+ MACs
[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha1,[email protected],hmac-sha2-512
+ GSSAPIKexAlgorithms
gss-curve25519-sha256-,gss-nistp256-sha256-,gss-group14-sha256-,gss-group16-sha512-
-KexAlgorithms
mlkem768x25519-sha256,curve25519-sha256,[email protected],ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512
-+GSSAPIKexAlgorithms
gss-nistp256-sha256-,gss-group14-sha256-,gss-group16-sha512-
+KexAlgorithms
mlkem768x25519-sha256,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512
HostKeyAlgorithms
ecdsa-sha2-nistp256,[email protected],[email protected],[email protected],ecdsa-sha2-nistp384,[email protected],ecdsa-sha2-nistp521,[email protected],ssh-ed25519,[email protected],[email protected],[email protected],rsa-sha2-256,[email protected],rsa-sha2-512,[email protected]
PubkeyAcceptedAlgorithms
ecdsa-sha2-nistp256,[email protected],[email protected],[email protected],ecdsa-sha2-nistp384,[email protected],ecdsa-sha2-nistp521,[email protected],ssh-ed25519,[email protected],[email protected],[email protected],rsa-sha2-256,[email protected],rsa-sha2-512,[email protected]
++++++ crypto-policies-OpenSSH-PQC.patch ++++++
Index: fedora-crypto-policies-20250714.cd6043a/policies/DEFAULT.pol
===================================================================
--- fedora-crypto-policies-20250714.cd6043a.orig/policies/DEFAULT.pol
+++ fedora-crypto-policies-20250714.cd6043a/policies/DEFAULT.pol
@@ -65,6 +65,9 @@ cipher@SSH = AES-256-GCM AES-256-CCM CAM
# interoperability issues in TLS.
key_exchange = KEM-ECDH ECDHE RSA DHE DHE-RSA PSK DHE-PSK ECDHE-PSK RSA-PSK
ECDHE-GSS DHE-GSS
+# Enable SNTRUP by default for OpenSSH
+key_exchange@ssh = +SNTRUP
+
protocol@TLS = TLS1.3 TLS1.2 DTLS1.2
protocol@IKE = IKEv2
Index: fedora-crypto-policies-20250714.cd6043a/policies/FUTURE.pol
===================================================================
--- fedora-crypto-policies-20250714.cd6043a.orig/policies/FUTURE.pol
+++ fedora-crypto-policies-20250714.cd6043a/policies/FUTURE.pol
@@ -54,6 +54,9 @@ cipher@SSH = -*-CBC
key_exchange = KEM-ECDH ECDHE DHE DHE-RSA PSK DHE-PSK ECDHE-PSK ECDHE-GSS
DHE-GSS
+# Enable SNTRUP by default for OpenSSH
+key_exchange@ssh = +SNTRUP
+
protocol@TLS = TLS1.3 TLS1.2 DTLS1.2
protocol@IKE = IKEv2
Index: fedora-crypto-policies-20250714.cd6043a/policies/LEGACY.pol
===================================================================
--- fedora-crypto-policies-20250714.cd6043a.orig/policies/LEGACY.pol
+++ fedora-crypto-policies-20250714.cd6043a/policies/LEGACY.pol
@@ -66,6 +66,9 @@ cipher@{sequoia,RPM} = AES-256-CFB AES-2
# interoperability issues in TLS.
key_exchange = KEM-ECDH ECDHE RSA DHE DHE-RSA DHE-DSS PSK DHE-PSK ECDHE-PSK
RSA-PSK ECDHE-GSS DHE-GSS
+# Enable SNTRUP by default for OpenSSH
+key_exchange@ssh = +SNTRUP
+
protocol@TLS = TLS1.3 TLS1.2 TLS1.1 TLS1.0 DTLS1.2 DTLS1.0
protocol@IKE = IKEv2