Skip to content

Commit b6e76a0

Browse files
authored
Merge pull request #138 from sej7278/esu-repo-merge
Updated instructions for ESU repo merge, new kernel etc.
2 parents e834663 + e03dd08 commit b6e76a0

File tree

1 file changed

+45
-25
lines changed
  • docs/enterprise-support-for-almalinux

1 file changed

+45
-25
lines changed

docs/enterprise-support-for-almalinux/README.md

Lines changed: 45 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ ESU provides security patches for High and Critical vulnerabilities (with a 7+ C
4141

4242
### FIPS-compliant security patches
4343

44-
ESU enables continuous security for FIPS-certified AlmaLinux 9.2 deployments by offering FIPS-compliant security patches for the FIPS-validated [kernel, openssl, libcrypt, nss and gnutls packages](https://docs.tuxcare.com/enterprise-support-for-almalinux/#enabling-fips-140-3-mode). These patches [do not change the validated cryptography](https://tuxcare.com/blog/the-dilemmas-of-fips-140-3-compliance/). They are suitable for organizations that don't require strict FIPS-certified implementations that are static and never patched (i.e. military or intelligence agencies). In case of a cryptographic vulnerability that will require a security patch that changes the validated cryptography, we will fix it by delivering a new packaged module. This module will undergo an expedited FIPS 140-3 recertification to ensure it is attested to conform to FIPS 140-3 requirements.
44+
ESU enables continuous security for FIPS-certified AlmaLinux 9.2 deployments by offering FIPS-compliant security patches for the FIPS-validated [kernel, openssl, libcrypt, nss and gnutls packages](https://tuxcare.com/fips-for-almalinux/). These patches [do not change the validated cryptography](https://tuxcare.com/blog/the-dilemmas-of-fips-140-3-compliance/). They are suitable for organizations that don't require strict FIPS-certified implementations that are static and never patched (i.e. military or intelligence agencies). In case of a cryptographic vulnerability that will require a security patch that changes the validated cryptography, we will fix it by delivering a new packaged module. This module will undergo an expedited FIPS 140-3 re-validation to ensure it is attested to conform to FIPS 140-3 requirements.
4545

4646
### Target response times
4747

@@ -60,12 +60,12 @@ ESU provides qualified security and selected bug-fix errata advisories across al
6060

6161
Leveraging Open Vulnerability and Assessment Language (OVAL) patch definitions with OVAL-compatible tools, e.g. OpenSCAP, users can accurately check their systems for the presence of vulnerabilities:
6262

63-
* AlmaLinux 9.2 FIPS: [https://repo.tuxcare.com/tuxcare/9.2/almalinux9.2-fips-oval.xml](https://repo.tuxcare.com/tuxcare/9.2/almalinux9.2-fips-oval.xml)
6463
* AlmaLinux 9.2 ESU: [https://repo.tuxcare.com/tuxcare/9.2/almalinux9.2-esu-oval.xml](https://repo.tuxcare.com/tuxcare/9.2/almalinux9.2-esu-oval.xml)
6564

65+
Ask your Account Manager about SBOM access.
66+
6667
### RSS releases feeds
6768

68-
* AlmaLinux 9.2 FIPS: [https://cve.tuxcare.com/rss_feed/releases/almalinux9.2fips](https://cve.tuxcare.com/rss_feed/releases/almalinux9.2fips)
6969
* AlmaLinux 9.2 ESU: [https://cve.tuxcare.com/rss_feed/releases/almalinux9.2esu](https://cve.tuxcare.com/rss_feed/releases/almalinux9.2esu)
7070

7171
### Technical support
@@ -93,15 +93,15 @@ The TuxCare ESU/FIPS packages and repositories are cryptographically signed with
9393

9494
**Requirements**
9595

96-
* AlmaLinux 9.2 operating system
96+
* AlmaLinux 9.2 operating system (download images from [here](https://tuxcare.com/almalinux-enterprise-support/get-almalinux/))
9797
* x86_64 or aarch64 architecture
9898
* Extended Security Updates license key (should be obtained from [portal.tuxcare.com](https://portal.tuxcare.com))
9999
* Internet access
100100

101101
`tuxctl` is the setup tool for TuxCare's Enterprise Support for AlmaLinux, which will configure your system to receive patches from the TuxCare repositories. To install `tuxctl` you need to install the `tuxcare-release` package first. This package contains the TuxCare repo definitions, TuxCare GPG key and the `tuxctl` setup tool. Run the following as root:
102102

103103
```text
104-
# dnf -y install https://repo.tuxcare.com/tuxcare/tuxcare-release-latest-9.2.$(uname -i).rpm
104+
# dnf -y install https://repo.tuxcare.com/tuxcare/tuxcare-release-latest-9.2.noarch.rpm
105105
```
106106

107107
The second step is to activate your license on the system. You should run the `tuxctl` tool as root with your ESU license key provided as a command line argument like so:
@@ -148,31 +148,41 @@ Then you will have to run `tuxctl` like this:
148148

149149
First please ensure you have installed the `tuxcare-release` package as described above. If you haven't already registered your ESU license using `tuxctl` the next step will also do that for you.
150150

151-
To enable the FIPS repo, install the FIPS 140-3 validated packages, enable FIPS mode and configure grub to boot into the FIPS-validated kernel, please run these commands as root, substituting in your license key:
151+
To install the FIPS 140-3 validated ESU packages over the default ones and enable FIPS mode, please run these commands as root:
152152

153153
```text
154-
# tuxctl --fips -l ESU-XXXXXXXXXXXXXXXXXXXXXXXX
155-
# dnf -y install openssl-3.0.7-20.el9_2.tuxcare.1 kernel-5.14.0-284.11.1.el9_2.tuxcare.6
156-
# dnf -y install gnutls-3.7.6-23.el9_2.tuxcare.3 nettle-3.8-3.el9_2.tuxcare.1 libgcrypt-1.10.0-10.el9_2.tuxcare.3 nss-3.90.0-6.el9_2.tuxcare.1
157-
# grubby --set-default=/boot/vmlinuz-5.14.0-284.11.1.el9_2.tuxcare.6.$(uname -i)
154+
# dnf -y upgrade
158155
# fips-mode-setup --enable
159156
# reboot
160157
```
161158

159+
If you wish to only boot into the FIPS-validated kernel (see [version table](https://tuxcare.com/fips-for-almalinux/)) and not the security patched kernels or updates under CMVP review (only required in very high classification environments) you can use grubby like so:
160+
161+
```text
162+
# dnf -y install kernel-5.14.0-284.11.1.el9_2.tuxcare.6
163+
# grubby --set-default=/boot/vmlinuz-5.14.0-284.11.1.el9_2.tuxcare.6.$(uname -i)
164+
```
165+
162166
:::warning
163-
Note the aarch64 platform doesn't currently have FIPS-validated gnutls/libgcrypt/nss packages, so ARM users should only run the first `dnf` command to install the openssl and kernel packages.
167+
Note the aarch64 platform doesn't currently have FIPS-validated gnutls/libgcrypt/nss packages, only kernel and openssl.
164168

165169
We also provide multilib i686 packages of the userspace modules in the x86_64 repo for backwards compatibility, note that these are not FIPS-validated but are built from the same source.
166170
:::
167171

168-
Once you've logged in after the reboot, run these commands and check the output matches to confirm it worked:
172+
Once you've logged in after the reboot, you can run these commands to confirm it worked (note the versions may be slightly different by the time you read this):
169173

170174
```text
171175
$ fips-mode-setup --check
172176
FIPS mode is enabled.
173177
178+
$ $update-crypto-policies --show
179+
FIPS
180+
181+
$ update-crypto-policies --check
182+
The configured policy matches the generated policy
183+
174184
$ uname -r
175-
5.14.0-284.11.1.el9_2.tuxcare.6.x86_64
185+
5.14.0-284.1101.el9_2.tuxcare.7.x86_64
176186
177187
$ openssl list -providers | grep -A3 fips
178188
fips
@@ -186,7 +196,7 @@ $ openssl list -providers | grep -A3 fips
186196
To uninstall tuxctl, disable the ESU/FIPS functionality and revert to AlmaLinux community repo's, you can run the following as root:
187197

188198
```text
189-
# dnf -y remove almacare-release tuxcare-release
199+
# dnf -y remove tuxcare-release
190200
191201
# fips-mode-setup --disable
192202
@@ -195,7 +205,6 @@ To uninstall tuxctl, disable the ESU/FIPS functionality and revert to AlmaLinux
195205
-e 's|^# mirrorlist|mirrorlist|' \
196206
-e 's|^baseurl|# baseurl|' \
197207
-e 's|$tuxcare_releasever/$tuxcare_token|$releasever|g' \
198-
-e 's|almacare|tuxcare|g' \
199208
-e 's|$tuxcare_releasever|$releasever|g' \
200209
-e '/^exclude/d' \
201210
/etc/yum.repos.d/almalinux*.repo
@@ -204,7 +213,7 @@ To uninstall tuxctl, disable the ESU/FIPS functionality and revert to AlmaLinux
204213
```
205214

206215
:::warning
207-
Note that by disabling ESU, you will revert to tracking major version releases instead of sticking to a specific minor version, so you may be upgraded from 9.2 to 9.4 for example - a process you cannot undo.
216+
Note that by disabling ESU, you will revert to tracking major version releases instead of sticking to a specific minor version, so you may be upgraded from 9.2 to 9.5 for example - a process you cannot undo.
208217
:::
209218

210219
To completely remove the TuxCare packages, after following the above steps, run the following as root:
@@ -303,9 +312,8 @@ sed -i '/^exclude=.*/d' /etc/yum.conf /etc/dnf/dnf.conf
303312
dnf -y remove *leapp* elevate-release kernel-*.el8*
304313
305314
# enable esu+fips
306-
dnf -y install https://repo.tuxcare.com/tuxcare/tuxcare-release-latest-9.2.$(uname -i).rpm
307-
tuxctl --fips --license-key ESU-xxxxxxxxxxxxxxx
308-
dnf -y install kernel-5.14.0-284.11*
315+
dnf -y install https://repo.tuxcare.com/tuxcare/tuxcare-release-latest-9.2.noarch.rpm
316+
tuxctl --license-key ESU-xxxxxxxxxxxxxxx
309317
dnf -y upgrade
310318
fips-mode-setup --enable
311319
reboot
@@ -468,7 +476,7 @@ Technical support covered by any of the TuxCare Support Programs shall not be pr
468476

469477
### Installing tuxctl (Essential Support)
470478

471-
Similarly to the ESU instructions [above](/enterprise-support-for-almalinux/#installing-tuxctl), Essential Support customers should install tuxcare-release and register their server using tuxctl. The main difference is the choice of OS version - you must install the RPM specifically for your AlmaLinux version, currently 8.8, 8.10, 9.2 and 9.4 are supported.
479+
Similarly to the ESU instructions [above](/enterprise-support-for-almalinux/#installing-tuxctl), Essential Support customers should install tuxcare-release and register their server using tuxctl. The main difference is the choice of OS version - you must install the RPM specifically for your AlmaLinux version, currently 8.8, 8.10, 9.2, 9.4 and 9.5 are supported.
472480

473481
If you are unsure, run this to find your exact OS version:
474482

@@ -478,10 +486,10 @@ $ cat /etc/almalinux-release
478486
AlmaLinux release 8.10 (Cerulean Leopard)
479487
```
480488

481-
You can browse [https://repo.tuxcare.com/tuxcare/](https://repo.tuxcare.com/tuxcare/) and find the correct RPM, or you can figure it out by substituting the version number (8.8, 8.10, 9.2 or 9.4) then install it as root, for example:
489+
You can browse [https://repo.tuxcare.com/tuxcare/](https://repo.tuxcare.com/tuxcare/) and find the correct RPM, or you can figure it out by substituting the version number (8.8, 8.10, 9.2, 9.4 or 9.5) then install it as root, for example:
482490

483491
```text
484-
# dnf -y install https://repo.tuxcare.com/tuxcare/tuxcare-release-latest-8.10.$(uname -i).rpm
492+
# dnf -y install https://repo.tuxcare.com/tuxcare/tuxcare-release-latest-8.10.noarch.rpm
485493
```
486494

487495
:::warning
@@ -494,13 +502,25 @@ The second step is to activate your license on the system. You should run the `t
494502
# tuxctl --license-key ESA-XXXXXXXXXXXXXXXXXXXXXXXX
495503
```
496504

497-
Essential Support customers can upgrade to a new minor version, for example from 9.2 to 9.4 by editing the /etc/dnf/vars/tuxcare_releasever file to specify the new version, like so:
505+
Essential Support customers can upgrade to a new minor version, for example from 9.4 to 9.5 by editing the /etc/dnf/vars/tuxcare_releasever file to specify the new version, like so:
498506

499507
```text
500-
# echo 9.4 > /etc/dnf/vars/tuxcare_releasever
508+
# echo 9.5 > /etc/dnf/vars/tuxcare_releasever
501509
# dnf upgrade
502510
```
503511

504512
:::warning
505-
Note that if you upgrade past 9.2 you won't be able to upgrade to ESU without a reinstall. ESU customers can find instructions [above](/enterprise-support-for-almalinux/#installing-tuxctl)
513+
If you get a status code 403:
514+
515+
```text
516+
Errors during downloading metadata for repository 'tuxcare-esu'
517+
```
518+
519+
Then you are using an ESA license key for an ESU release (9.2, 9.6 or 9.10) and can disable the ESU repository using:
520+
521+
```text
522+
dnf config-manager --set-disabled tuxcare-esu
523+
```
524+
525+
ESU customers can find instructions [above](/enterprise-support-for-almalinux/#installing-tuxctl)
506526
:::

0 commit comments

Comments
 (0)