On Fri, Aug 27, 2021 at 6:28 PM przemek klosowski via devel
wrote:
>
>
> On 8/25/21 4:54 AM, Alexander Sosedkin wrote:
>
> It's not ideal if one obsolete website forces downgrading the security
> potentially for all the connections. I hope 5) is addressing that.
>
> That's something apps and only
On 8/25/21 4:54 AM, Alexander Sosedkin wrote:
It's not ideal if one obsolete website forces downgrading the security
potentially for all the connections. I hope 5) is addressing that.
That's something apps and only apps can handle.
Well, but if the system policy says that TLS1.0 is banned,
On Tue, Aug 24, 2021 at 8:57 PM przemek klosowski via devel
wrote:
>
>
> On 8/23/21 5:49 AM, Alexander Sosedkin wrote:
> > Sure. Crypto-policies are there to give you control of what's enabled,
> > ideally what's enabled by default.
> >
> > 1) There's a blanket `update-crypto-policies --set
On 8/23/21 5:49 AM, Alexander Sosedkin wrote:
Sure. Crypto-policies are there to give you control of what's enabled,
ideally what's enabled by default.
1) There's a blanket `update-crypto-policies --set LEGACY`
2) There's a possibility to reenable disabled algorithms with custom policies,
On Tue, Aug 24, 2021 at 12:07 AM Chris Adams wrote:
>
> Once upon a time, Alexander Sosedkin said:
> > Sure. Crypto-policies are there to give you control of what's enabled,
> > ideally what's enabled by default.
> >
> > 1) There's a blanket `update-crypto-policies --set LEGACY`
> > 2) There's a
On 24/08/2021 00:06, Chris Adams wrote:
Missing #4 is what makes a lot of this not as useful. I understand the
effort that has gone into this and appreciate stepping up security,
but... what matters as a user is "can I get to this site in Firefox",
"does this VPN work"
It's Cisco's problem if
Once upon a time, Alexander Sosedkin said:
> Sure. Crypto-policies are there to give you control of what's enabled,
> ideally what's enabled by default.
>
> 1) There's a blanket `update-crypto-policies --set LEGACY`
> 2) There's a possibility to reenable disabled algorithms with custom policies,
On Sun, Aug 22, 2021 at 11:00 PM Chris Adams wrote:
>
> Once upon a time, Dan Čermák said:
> > #2659 Arbitration request: Crypto policy prevents VPN connections
> > https://pagure.io/fesco/issue/2659
>
> VPN requirements are a problem for increasing the encryption strength.
> I have to connect
Once upon a time, Dan Čermák said:
> #2659 Arbitration request: Crypto policy prevents VPN connections
> https://pagure.io/fesco/issue/2659
VPN requirements are a problem for increasing the encryption strength.
I have to connect to Cisco Meraki VPNs for work, and Libreswan has
disabled the
Following is the list of topics that will be discussed in the
FESCo meeting Monday at 19:00UTC in #fedora-meeting on
irc.libera.chat.
To convert UTC to your local time, take a look at
http://fedoraproject.org/wiki/UTCHowto
or run:
date -d '2021-08-23 19:00 UTC'
Links to all issues to be
10 matches
Mail list logo