-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cloudstack v4.20 RPM installation fails on AlmaLinux9 when GPG verification is enabled due to SHA-1 deprecation #10133
Comments
Thanks for opening your first issue here! Be sure to follow the issue template! |
The update-crypto-policies workaround is good enough for now, but it does look like RedHat is pushing for better crypto, so switching to a new SHA-256 GPG key would be a good move, but certainly not urgent. |
This is likely to become an increasingly urgent problem, for what it's worth, as any libraries that use OpenSSL 3.x for GPG signature verification instead of GnuTLS (like RPM/DNF does) may face issues soon; OpenSSL 3.0 deprecated all SHA1 digest functions, with clearly stated intent to remove them. I should note this isn't the signature of the RPM itself, it's the signature on the key used to sign (the RPM signatures themselves are SHA256, the self-sig on the If you're using custom crypto policies on EL and/or prefer a scalpel instead of a sledgehammer compared to the above workaround, there unfortunately isn't a crypto-policy scope explicitly for RPM signature verification (yet) but it can at least be scoped explicitly to verifying hashes in OpenSSL (the exact context
When this is fixed, I also recommend using the Note that RPMs are still being signed by the latter:
Is there any particular reason the RPMs are signed with a completely different, seemingly personal, key? If generating a new key, I recommend using EdDSA/ed25519/curve25519/ECC for the key (both sign and crypt). It is supported in GnuPG 2.1.0/2.2 (released Nov. 6, 2014) and onwards (and is even the default in newer versions), and to use SHA512 as the default digest algorithm (also the default most-preferred digest in recent versions). This will future-proof for quite some time while keeping compatibility with all supported Linux distributions. |
ISSUE TYPE
COMPONENT NAME
CLOUDSTACK VERSION
CONFIGURATION
N/A
OS / ENVIRONMENT
AlmaLinux 9.5
SUMMARY
When installing from the community repo with GPG checking enabled,
dnf
fails and reports that the Cloudstack package is using a SHA-1 checksum.STEPS TO REPRODUCE
sudo dnf install cloudstack-management
fails - see belowI recognize that this is a community repo and not necessarily directly supported by the project. I'm new here, and I wasn't sure where else to send this report. The repos are listed on the official website and installation guide, so I figured this may be a reasonable place to start.
This failure is in line with Red Hat's upstream deprecation of the SHA-1 package hash: https://www.redhat.com/en/blog/rhel-security-sha-1-package-signatures-distrusted-rhel-9. Following the pattern of other repos, I inferred that the presence of a GPG key meant that GPG signatures were available and supported.
EXPECTED RESULTS
Installing Cloudstack via DNF does not yield a deprecated checksum
ACTUAL RESULTS
/etc/yum.repos.d/cloudstack.repo
:Installation attempt:
WORKAROUND RESULTS
Setting
gpgcheck=0
orsudo update-crypto-policies --set DEFAULT:SHA1
bypasses the security protocol and allows installation.The text was updated successfully, but these errors were encountered: