You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/enterprise-support-for-almalinux/README.md
+45-25Lines changed: 45 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,7 +41,7 @@ ESU provides security patches for High and Critical vulnerabilities (with a 7+ C
41
41
42
42
### FIPS-compliant security patches
43
43
44
-
ESU enables continuous security for FIPS-certified AlmaLinux 9.2 deployments by offering FIPS-compliant security patches for the FIPS-validated [kernel, openssl, libcrypt, nss and gnutls packages](https://docs.tuxcare.com/enterprise-support-for-almalinux/#enabling-fips-140-3-mode). These patches [do not change the validated cryptography](https://tuxcare.com/blog/the-dilemmas-of-fips-140-3-compliance/). They are suitable for organizations that don't require strict FIPS-certified implementations that are static and never patched (i.e. military or intelligence agencies). In case of a cryptographic vulnerability that will require a security patch that changes the validated cryptography, we will fix it by delivering a new packaged module. This module will undergo an expedited FIPS 140-3 recertification to ensure it is attested to conform to FIPS 140-3 requirements.
44
+
ESU enables continuous security for FIPS-certified AlmaLinux 9.2 deployments by offering FIPS-compliant security patches for the FIPS-validated [kernel, openssl, libcrypt, nss and gnutls packages](https://tuxcare.com/fips-for-almalinux/). These patches [do not change the validated cryptography](https://tuxcare.com/blog/the-dilemmas-of-fips-140-3-compliance/). They are suitable for organizations that don't require strict FIPS-certified implementations that are static and never patched (i.e. military or intelligence agencies). In case of a cryptographic vulnerability that will require a security patch that changes the validated cryptography, we will fix it by delivering a new packaged module. This module will undergo an expedited FIPS 140-3 re-validation to ensure it is attested to conform to FIPS 140-3 requirements.
45
45
46
46
### Target response times
47
47
@@ -60,12 +60,12 @@ ESU provides qualified security and selected bug-fix errata advisories across al
60
60
61
61
Leveraging Open Vulnerability and Assessment Language (OVAL) patch definitions with OVAL-compatible tools, e.g. OpenSCAP, users can accurately check their systems for the presence of vulnerabilities:
@@ -93,15 +93,15 @@ The TuxCare ESU/FIPS packages and repositories are cryptographically signed with
93
93
94
94
**Requirements**
95
95
96
-
* AlmaLinux 9.2 operating system
96
+
* AlmaLinux 9.2 operating system (download images from [here](https://tuxcare.com/almalinux-enterprise-support/get-almalinux/))
97
97
* x86_64 or aarch64 architecture
98
98
* Extended Security Updates license key (should be obtained from [portal.tuxcare.com](https://portal.tuxcare.com))
99
99
* Internet access
100
100
101
101
`tuxctl` is the setup tool for TuxCare's Enterprise Support for AlmaLinux, which will configure your system to receive patches from the TuxCare repositories. To install `tuxctl` you need to install the `tuxcare-release` package first. This package contains the TuxCare repo definitions, TuxCare GPG key and the `tuxctl` setup tool. Run the following as root:
The second step is to activate your license on the system. You should run the `tuxctl` tool as root with your ESU license key provided as a command line argument like so:
@@ -148,31 +148,41 @@ Then you will have to run `tuxctl` like this:
148
148
149
149
First please ensure you have installed the `tuxcare-release` package as described above. If you haven't already registered your ESU license using `tuxctl` the next step will also do that for you.
150
150
151
-
To enable the FIPS repo, install the FIPS 140-3 validated packages, enable FIPS mode and configure grub to boot into the FIPS-validated kernel, please run these commands as root, substituting in your license key:
151
+
To install the FIPS 140-3 validated ESU packages over the default ones and enable FIPS mode, please run these commands as root:
If you wish to only boot into the FIPS-validated kernel (see [version table](https://tuxcare.com/fips-for-almalinux/)) and not the security patched kernels or updates under CMVP review (only required in very high classification environments) you can use grubby like so:
Note the aarch64 platform doesn't currently have FIPS-validated gnutls/libgcrypt/nss packages, so ARM users should only run the first `dnf` command to install the openssl and kernel packages.
167
+
Note the aarch64 platform doesn't currently have FIPS-validated gnutls/libgcrypt/nss packages, only kernel and openssl.
164
168
165
169
We also provide multilib i686 packages of the userspace modules in the x86_64 repo for backwards compatibility, note that these are not FIPS-validated but are built from the same source.
166
170
:::
167
171
168
-
Once you've logged in after the reboot, run these commands and check the output matches to confirm it worked:
172
+
Once you've logged in after the reboot, you can run these commands to confirm it worked (note the versions may be slightly different by the time you read this):
169
173
170
174
```text
171
175
$ fips-mode-setup --check
172
176
FIPS mode is enabled.
173
177
178
+
$ $update-crypto-policies --show
179
+
FIPS
180
+
181
+
$ update-crypto-policies --check
182
+
The configured policy matches the generated policy
183
+
174
184
$ uname -r
175
-
5.14.0-284.11.1.el9_2.tuxcare.6.x86_64
185
+
5.14.0-284.1101.el9_2.tuxcare.7.x86_64
176
186
177
187
$ openssl list -providers | grep -A3 fips
178
188
fips
@@ -186,7 +196,7 @@ $ openssl list -providers | grep -A3 fips
186
196
To uninstall tuxctl, disable the ESU/FIPS functionality and revert to AlmaLinux community repo's, you can run the following as root:
187
197
188
198
```text
189
-
# dnf -y remove almacare-release tuxcare-release
199
+
# dnf -y remove tuxcare-release
190
200
191
201
# fips-mode-setup --disable
192
202
@@ -195,7 +205,6 @@ To uninstall tuxctl, disable the ESU/FIPS functionality and revert to AlmaLinux
@@ -204,7 +213,7 @@ To uninstall tuxctl, disable the ESU/FIPS functionality and revert to AlmaLinux
204
213
```
205
214
206
215
:::warning
207
-
Note that by disabling ESU, you will revert to tracking major version releases instead of sticking to a specific minor version, so you may be upgraded from 9.2 to 9.4 for example - a process you cannot undo.
216
+
Note that by disabling ESU, you will revert to tracking major version releases instead of sticking to a specific minor version, so you may be upgraded from 9.2 to 9.5 for example - a process you cannot undo.
208
217
:::
209
218
210
219
To completely remove the TuxCare packages, after following the above steps, run the following as root:
@@ -303,9 +312,8 @@ sed -i '/^exclude=.*/d' /etc/yum.conf /etc/dnf/dnf.conf
@@ -468,7 +476,7 @@ Technical support covered by any of the TuxCare Support Programs shall not be pr
468
476
469
477
### Installing tuxctl (Essential Support)
470
478
471
-
Similarly to the ESU instructions [above](/enterprise-support-for-almalinux/#installing-tuxctl), Essential Support customers should install tuxcare-release and register their server using tuxctl. The main difference is the choice of OS version - you must install the RPM specifically for your AlmaLinux version, currently 8.8, 8.10, 9.2and 9.4 are supported.
479
+
Similarly to the ESU instructions [above](/enterprise-support-for-almalinux/#installing-tuxctl), Essential Support customers should install tuxcare-release and register their server using tuxctl. The main difference is the choice of OS version - you must install the RPM specifically for your AlmaLinux version, currently 8.8, 8.10, 9.2, 9.4 and 9.5 are supported.
472
480
473
481
If you are unsure, run this to find your exact OS version:
You can browse [https://repo.tuxcare.com/tuxcare/](https://repo.tuxcare.com/tuxcare/) and find the correct RPM, or you can figure it out by substituting the version number (8.8, 8.10, 9.2or 9.4) then install it as root, for example:
489
+
You can browse [https://repo.tuxcare.com/tuxcare/](https://repo.tuxcare.com/tuxcare/) and find the correct RPM, or you can figure it out by substituting the version number (8.8, 8.10, 9.2, 9.4 or 9.5) then install it as root, for example:
Essential Support customers can upgrade to a new minor version, for example from 9.2 to 9.4 by editing the /etc/dnf/vars/tuxcare_releasever file to specify the new version, like so:
505
+
Essential Support customers can upgrade to a new minor version, for example from 9.4 to 9.5 by editing the /etc/dnf/vars/tuxcare_releasever file to specify the new version, like so:
498
506
499
507
```text
500
-
# echo 9.4 > /etc/dnf/vars/tuxcare_releasever
508
+
# echo 9.5 > /etc/dnf/vars/tuxcare_releasever
501
509
# dnf upgrade
502
510
```
503
511
504
512
:::warning
505
-
Note that if you upgrade past 9.2 you won't be able to upgrade to ESU without a reinstall. ESU customers can find instructions [above](/enterprise-support-for-almalinux/#installing-tuxctl)
513
+
If you get a status code 403:
514
+
515
+
```text
516
+
Errors during downloading metadata for repository 'tuxcare-esu'
517
+
```
518
+
519
+
Then you are using an ESA license key for an ESU release (9.2, 9.6 or 9.10) and can disable the ESU repository using:
520
+
521
+
```text
522
+
dnf config-manager --set-disabled tuxcare-esu
523
+
```
524
+
525
+
ESU customers can find instructions [above](/enterprise-support-for-almalinux/#installing-tuxctl)
0 commit comments