Skip to content

Conversation

@jan-cerny
Copy link
Collaborator

We will remove rule sshd_use_strong_kex from RHEL 8, 9 and 10 CIS profiles.

The reason for RHEL 8 and 9 is the CIS Benchmark recommends using system-wide crypto policies to disable the weak SHA1 key exchange algorithms instead of configuring KexAlgorithms in sshd configuration. This is already fully covered in our profiles by
configure_custom_crypto_policy_cis.

The reason for RHEL 10 is different. This CIS requirement shall be notapplicable on RHEL 10. The CIS Benchmark requires disabling the weak SHA1 key exchange algorithms, but RHEL 10 doesn't provide these algorithms. Consequently, the rule configure_custom_crypto_policy_cis doesn't disable them and selecting it would make no difference.

This change is done according to these CIS Benchmarks:

  • CIS RHEL 8 v4.0.0
  • CIS RHEL 9 v2.0.0
  • CIS RHEL 10 v1.0.1

Resolves: https://issues.redhat.com/browse/RHEL-62941

@jan-cerny jan-cerny added this to the 0.1.80 milestone Dec 28, 2025
@jan-cerny jan-cerny added RHEL9 Red Hat Enterprise Linux 9 product related. RHEL8 Red Hat Enterprise Linux 8 product related. CIS CIS Benchmark related. RHEL10 Red Hat Enterprise Linux 10 product related. labels Dec 28, 2025
@github-actions
Copy link

github-actions bot commented Dec 28, 2025

ATEX Test Results

Test artifacts have been submitted to Testing Farm.

Results: View Test Results
Workflow Run: View Workflow Details

This comment was automatically generated by the ATEX workflow.

We will remove rule sshd_use_strong_kex from RHEL 8, 9 and 10
CIS profiles.

The reason for RHEL 8 and 9 is the CIS Benchmark recommends using
system-wide crypto policies to disable the weak SHA1 key exchange
algorithms instead of configuring KexAlgorithms in sshd configuration.
This is already fully covered in our profiles by
configure_custom_crypto_policy_cis.

The reason for RHEL 10 is different. This CIS requirement shall be
notapplicable on RHEL 10. The CIS Benchmark requires disabling the weak
SHA1 key exchange algorithms, but RHEL 10 doesn't provide these
algorithms. Consequently, the rule configure_custom_crypto_policy_cis
doesn't disable them and selecting it would make no difference.

This change is done according to these CIS Benchmarks:
- CIS RHEL 8 v4.0.0
- CIS RHEL 9 v2.0.0
- CIS RHEL 10 v1.0.1

Resolves: https://issues.redhat.com/browse/RHEL-62941
@jan-cerny jan-cerny added the Update Profile Issues or pull requests related to Profiles updates. label Dec 28, 2025
@openshift-ci
Copy link

openshift-ci bot commented Dec 28, 2025

@jan-cerny: The following tests failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/4.14-images 9c20016 link true /test 4.14-images
ci/prow/4.12-images 9c20016 link true /test 4.12-images
ci/prow/4.18-images 9c20016 link true /test 4.18-images
ci/prow/4.16-images 9c20016 link true /test 4.16-images
ci/prow/4.17-images 9c20016 link true /test 4.17-images
ci/prow/4.19-images 9c20016 link true /test 4.19-images
ci/prow/e2e-aws-openshift-platform-compliance 9c20016 link true /test e2e-aws-openshift-platform-compliance
ci/prow/images 9c20016 link true /test images
ci/prow/e2e-aws-openshift-node-compliance 9c20016 link true /test e2e-aws-openshift-node-compliance

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

CIS CIS Benchmark related. RHEL8 Red Hat Enterprise Linux 8 product related. RHEL9 Red Hat Enterprise Linux 9 product related. RHEL10 Red Hat Enterprise Linux 10 product related. Update Profile Issues or pull requests related to Profiles updates.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant