Fedora EPEL 7 updates-testing report

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



The following builds have been pushed to Fedora EPEL 7 updates-testing

    rpki-client-8.3-1.el7

Details about builds:


================================================================================
 rpki-client-8.3-1.el7 (FEDORA-EPEL-2023-7dcf3ac3b1)
 OpenBSD RPKI validator to support BGP Origin Validation
--------------------------------------------------------------------------------
Update Information:

# rpki-client 8.3    - The `expires` key in the JSON/CSV/OpenBGPD output formats
is now calculated with more accuracy. The calculation takes into account the
nextUpdate value of all intermediate CRLs in the signature path towards the
trust anchor, in addition to the expiry moment of the leaf-CRL and CAs.   -
Handling of CRLs and Manifests in the face of inconsistent RRDP delta
publications has been improved. A copy of an alternative version of the
applicable CRL is kept in the staging area of the cache directory, in order to
increase the potential for establishing a complete publication point, in cases
where a single publication point update was smeared across multiple RRDP delta
files.   - The OpenBGPD configuration output now includes validated Autonomous
System Provider Authorization (ASPA) payloads as an `aspa-set {}` configuration
block.   - When rpki-client is invoked with increased verbosity (`-v`), the
current RRDP Serial & Session ID are shown to aid debugging.   - Self-signed
X.509 certificates (such as Trust Anchor certificates) now are considered
invalid if they contain an X.509 `AuthorityInfoAccess` extension.   - Signed
Objects where the CMS signing-time attribute contains a timestamp later then the
X.509 certificate's `notAfter` timestamp are considered invalid.   - Manifests
where the CMS signing-time attribute contains a timestamp later then the
Manifest eContent `nextUpdate` timestamp are considered invalid.   - Any objects
whose CRL Distribution Points extension contains a CRLIssuer, CRL Reasons, or
`nameRelativeToCRLIssuer` field are considered invalid in accordance with RFC
6487 section 4.8.6.   - For every X.509 certificate the SHA-1 of the Subject
Public Key is calculated and compared to the Subject Key Identifier (SKI), if a
mismatch is found the certificate is not trusted.   - Require the outside-TBS
signature OID for every X.509 intermediate CA certificate and CRL to be
`sha256WithRSAEncryption`.   - Require the RSA key pair modulus and public
exponent parameters to strictly conform to the RFC 7935 profile.   - Ensure
there is no trailing garbage present in Signed Objects beyond the self-embedded
length field.   - Require RRDP Session IDs to strictly be version 4 UUIDs.   -
When decoding and validating an individual RPKI file using filemode (`rpki-
client -f file`), display the signature path towards the trust anchor, and the
timestamp when the signature path will expire.   - When decoding and validating
an individual RPKI file using filemode (`rpki-client -f file`), display the
optional CMS signing-time, and non-optional X.509 notBefore, and X.509 notAfter
timestamps.
--------------------------------------------------------------------------------
ChangeLog:

* Sun Mar 19 2023 Robert Scheck <robert@xxxxxxxxxxxxxxxxx> 8.3-1
- Upgrade to 8.3 (#2179641)
* Fri Jan 20 2023 Fedora Release Engineering <releng@xxxxxxxxxxxxxxxxx> - 8.2-4
- Rebuilt for https://fedoraproject.org/wiki/Fedora_38_Mass_Rebuild
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #2179641 - rpki-client-8.3 is available
        https://bugzilla.redhat.com/show_bug.cgi?id=2179641
--------------------------------------------------------------------------------

_______________________________________________
epel-devel mailing list -- epel-devel@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to epel-devel-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/epel-devel@xxxxxxxxxxxxxxxxxxxxxxx
Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue




[Index of Archives]     [Fedora Announce]     [Fedora News]     [Fedora Cloud]     [Fedora Advisory Board]     [Fedora Education]     [Fedora Security]     [Fedora Scitech]     [Fedora Robotics]     [Fedora Maintainers]     [Fedora Infrastructure]     [Fedora Websites]     [Anaconda Devel]     [Fedora Devel Java]     [Fedora Legacy]     [Fedora Desktop]     [Fedora Fonts]     [ATA RAID]     [Fedora Marketing]     [Fedora Management Tools]     [Fedora Mentors]     [Fedora Package Announce]     [SSH]     [Fedora Package Review]     [Fedora R Devel]     [Fedora PHP Devel]     [Kickstart]     [Fedora Music]     [Fedora Packaging]     [Centos]     [Fedora SELinux]     [Fedora Legal]     [Fedora Kernel]     [Fedora QA]     [Fedora Triage]     [Fedora OCaml]     [Coolkey]     [Virtualization Tools]     [ET Management Tools]     [Yum Users]     [Tux]     [Yosemite News]     [Linux Apps]     [Gnome Users]     [KDE Users]     [Fedora Tools]     [Fedora Art]     [Fedora Docs]     [Maemo Users]     [Asterisk PBX]     [Fedora Sparc]     [Fedora Universal Network Connector]     [Fedora ARM]

  Powered by Linux