Skip to content

Commit caab56f

Browse files
authored
Merge pull request #176 from sej7278/esu96
Updated ESU and Essential instructions for 9.6
2 parents 40ebe78 + 360b317 commit caab56f

File tree

2 files changed

+50
-15
lines changed

2 files changed

+50
-15
lines changed

docs/enterprise-support-for-almalinux/README.md

Lines changed: 33 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ AlmaLinux provides a 10-year lifecycle with a new minor release arriving every 6
2626

2727
ESU delivers an extended period of security fixes for critical and high-risk vulnerabilities for select AlmaLinux minor versions, as well as the full suite of five FIPS-validated modules (kernel, openssl, libcrypt, nss and gnutls) and FIPS-compliant security patches for FIPS-certified AlmaLinux deployments. The product also unlocks commercial use of the FIPS-validated packages.
2828

29-
Extended Security Updates are currently available for AlmaLinux 9.2 and have planned support for AlmaLinux 9.6 and 9.10. This provision ensures that a given minor release continues to receive essential updates, allowing customers to avoid upgrading every six months and test/certify their applications against the next minor version at their own pace.
29+
Extended Security Updates are currently available for AlmaLinux 9.2 and 9.6 with planned support for 9.10. This provision ensures that a given minor release continues to receive essential updates, allowing customers to avoid upgrading every six months and test/certify their applications against the next minor version at their own pace.
3030

3131
![esu lifecycle](/images/esu_lifecycle_graph2.png)
3232

@@ -41,7 +41,7 @@ ESU provides security patches for High and Critical vulnerabilities (with a 7+ C
4141

4242
### FIPS-compliant security patches
4343

44-
ESU enables continuous security for FIPS-certified AlmaLinux 9.2 deployments by offering FIPS-compliant security patches for the FIPS-validated [kernel, openssl, libcrypt, nss and gnutls packages](https://tuxcare.com/fips-for-almalinux/). These patches [do not change the validated cryptography](https://tuxcare.com/blog/the-dilemmas-of-fips-140-3-compliance/). They are suitable for organizations that don't require strict FIPS-certified implementations that are static and never patched (i.e. military or intelligence agencies). In case of a cryptographic vulnerability that will require a security patch that changes the validated cryptography, we will fix it by delivering a new packaged module. This module will undergo an expedited FIPS 140-3 re-validation to ensure it is attested to conform to FIPS 140-3 requirements.
44+
ESU enables continuous security for FIPS-certified AlmaLinux 9 deployments by offering FIPS-compliant security patches for the FIPS-validated [kernel, openssl, libcrypt, nss and gnutls packages](https://tuxcare.com/fips-for-almalinux/). These patches [do not change the validated cryptography](https://tuxcare.com/blog/the-dilemmas-of-fips-140-3-compliance/). They are suitable for organizations that don't require strict FIPS-certified implementations that are static and never patched (i.e. military or intelligence agencies). In case of a cryptographic vulnerability that will require a security patch that changes the validated cryptography, we will fix it by delivering a new packaged module. This module will undergo an expedited FIPS 140-3 re-validation to ensure it is attested to conform to FIPS 140-3 requirements.
4545

4646
### Target response times
4747

@@ -50,7 +50,7 @@ We aim to deliver security patches for Critical and High-risk vulnerabilities (C
5050

5151
### Supported packages
5252

53-
ESU provides updates for a comprehensive list of packages integral to server operations - the complete list of about 6,000 packages in BaseOS and AppStream, plus a few more - thus providing maximum security for your operating system. You can view the full list of supported packages, as well as get detailed information on the patched CVEs, here: [https://cve.tuxcare.com/](https://cve.tuxcare.com/)
53+
ESU provides updates for a comprehensive list of packages integral to server operations - the complete list of over 6,000 packages in BaseOS and AppStream, plus a few more - thus providing maximum security for your operating system. You can view the full list of supported packages, as well as get detailed information on the patched CVEs, here: [https://cve.tuxcare.com/](https://cve.tuxcare.com/)
5454

5555
Support for additional packages can be provided on request.
5656

@@ -63,15 +63,16 @@ ESU provides qualified security and selected bug-fix errata advisories across al
6363
Leveraging Open Vulnerability and Assessment Language (OVAL) patch definitions with OVAL-compatible tools, e.g. OpenSCAP, users can accurately check their systems for the presence of vulnerabilities:
6464

6565
* ESU 9.2 OVAL: [https://repo.tuxcare.com/tuxcare/9.2/almalinux9.2-esu-oval.xml](https://repo.tuxcare.com/tuxcare/9.2/almalinux9.2-esu-oval.xml)
66+
* ESU 9.6 OVAL: [https://repo.tuxcare.com/tuxcare/9.6/almalinux9.6-esu-oval.xml](https://repo.tuxcare.com/tuxcare/9.6/almalinux9.6-esu-oval.xml)
6667

6768
### CSAF data
6869

6970
Vulnerability scanner vendors may prefer the Common Security Advisory Framework (CSAF) 2.0 machine-readable format:
7071

7172
* ESU 9.2 CSAF advisories: [https://security.tuxcare.com/csaf/v2/els_os/almalinux9.2esu/advisories/](https://security.tuxcare.com/csaf/v2/els_os/almalinux9.2esu/advisories/)
72-
7373
* ESU 9.2 CSAF VEX documents: [https://security.tuxcare.com/csaf/v2/els_os/almalinux9.2esu/vex/](https://security.tuxcare.com/csaf/v2/els_os/almalinux9.2esu/vex/)
74-
74+
* ESU 9.6 CSAF advisories: [https://security.tuxcare.com/csaf/v2/els_os/almalinux9.6esu/advisories/](https://security.tuxcare.com/csaf/v2/els_os/almalinux9.6esu/advisories/)
75+
* ESU 9.6 CSAF VEX documents: [https://security.tuxcare.com/csaf/v2/els_os/almalinux9.6esu/vex/](https://security.tuxcare.com/csaf/v2/els_os/almalinux9.6esu/vex/)
7576
* Provider metadata: [https://csaf.data.security.tuxcare.com/](https://csaf.data.security.tuxcare.com/)
7677

7778
### Secure Bill Of Materials
@@ -80,11 +81,14 @@ You will need a tokenised URL to access the SBOM data, simply replace `<TOKEN>`
8081

8182
```text
8283
https://repo.tuxcare.com/tuxcare/9.2/<TOKEN>/esu/x86_64/spdx-reports/tuxcare92-esu-x86_64-esu.zip
84+
85+
https://repo.tuxcare.com/tuxcare/9.6/<TOKEN>/esu/x86_64/spdx-reports/tuxcare96-esu-x86_64-esu.zip
8386
```
8487

8588
### RSS releases feeds
8689

8790
* AlmaLinux 9.2 ESU: [https://cve.tuxcare.com/rss_feed/releases/almalinux9.2esu](https://cve.tuxcare.com/rss_feed/releases/almalinux9.2esu)
91+
* AlmaLinux 9.6 ESU: [https://cve.tuxcare.com/rss_feed/releases/almalinux9.6esu](https://cve.tuxcare.com/rss_feed/releases/almalinux9.6esu)
8892

8993
### Technical support
9094

@@ -111,17 +115,25 @@ The TuxCare ESU/FIPS packages and repositories are cryptographically signed with
111115

112116
**Requirements**
113117

114-
* AlmaLinux 9.2 operating system (download images from [here](https://tuxcare.com/almalinux-enterprise-support/get-almalinux/))
118+
* AlmaLinux 9.2 or 9.6 operating system (download images from [here](https://tuxcare.com/almalinux-enterprise-support/get-almalinux/))
115119
* x86_64 or aarch64 architecture
116120
* Extended Security Updates license key (should be obtained from [portal.tuxcare.com](https://portal.tuxcare.com))
117121
* Internet access
118122

119-
`tuxctl` is the setup tool for TuxCare's Enterprise Support for AlmaLinux, which will configure your system to receive patches from the TuxCare repositories. To install `tuxctl` you need to install the `tuxcare-release` package first. This package contains the TuxCare repo definitions, TuxCare GPG key and the `tuxctl` setup tool. Run the following as root:
123+
`tuxctl` is the setup tool for TuxCare's Enterprise Support for AlmaLinux, which will configure your system to receive patches from the TuxCare repositories. To install `tuxctl` you need to install the `tuxcare-release` package first. This package contains the TuxCare repo definitions, TuxCare GPG key and the `tuxctl` setup tool. Run one of the following as root:
124+
125+
For 9.2:
120126

121127
```text
122128
# dnf -y install https://repo.tuxcare.com/tuxcare/tuxcare-release-latest-9.2.noarch.rpm
123129
```
124130

131+
For 9.6:
132+
133+
```text
134+
# dnf -y install https://repo.tuxcare.com/tuxcare/tuxcare-release-latest-9.6.noarch.rpm
135+
```
136+
125137
The second step is to activate your license on the system. You should run the `tuxctl` tool as root with your ESU license key provided as a command line argument like so:
126138

127139
```text
@@ -162,6 +174,15 @@ Then you will have to run `tuxctl` like this:
162174

163175
:::
164176

177+
**Upgrading**
178+
179+
ESU customers can upgrade between ESU releases, for example from 9.2 to 9.6 by editing the /etc/dnf/vars/tuxcare_releasever file to specify the new version, like so:
180+
181+
```text
182+
# echo 9.6 > /etc/dnf/vars/tuxcare_releasever
183+
# dnf upgrade
184+
```
185+
165186
### Enabling FIPS 140-3 mode
166187

167188
First please ensure you have installed the `tuxcare-release` package as described above. If you haven't already registered your ESU license using `tuxctl` the next step will also do that for you.
@@ -174,20 +195,20 @@ To install the FIPS 140-3 validated ESU packages over the default ones and enabl
174195
# reboot
175196
```
176197

177-
If you wish to only boot into the FIPS-validated kernel (see [version table](https://tuxcare.com/fips-for-almalinux/)) and not the security patched kernels or updates under CMVP review (only required in very high classification environments) you can use grubby like so:
198+
If you wish to only boot into the Active FIPS-validated kernel and not the security patched kernels or updates under CMVP review (only required in very high classification environments) you can use grubby like so:
178199

179200
```text
180201
# dnf -y install kernel-5.14.0-284.11.1.el9_2.tuxcare.6
181202
# grubby --set-default=/boot/vmlinuz-5.14.0-284.11.1.el9_2.tuxcare.6.$(uname -i)
182203
```
183204

184205
:::warning
185-
Note the aarch64 platform doesn't currently have FIPS-validated gnutls/libgcrypt/nss packages, only kernel and openssl.
206+
Note the aarch64 platform doesn't currently have FIPS-validated gnutls/libgcrypt/nss packages, only kernel and openssl for AlmaLinux 9.2
186207

187208
We also provide multilib i686 packages of the userspace modules in the x86_64 repo for backwards compatibility, note that these are not FIPS-validated but are built from the same source.
188209
:::
189210

190-
Once you've logged in after the reboot, you can run these commands to confirm it worked (note the versions may be slightly different by the time you read this):
211+
Once you've logged in after the reboot, you can run these commands to confirm it worked (note the versions may be slightly different by the time you read this, see [version table](https://tuxcare.com/fips-for-almalinux/)):
191212

192213
```text
193214
$ fips-mode-setup --check
@@ -231,7 +252,7 @@ To uninstall tuxctl, disable the ESU/FIPS functionality and revert to AlmaLinux
231252
```
232253

233254
:::warning
234-
Note that by disabling ESU, you will revert to tracking major version releases instead of sticking to a specific minor version, so you may be upgraded from 9.2 to 9.5 for example - a process you cannot undo.
255+
Note that by disabling ESU, you will revert to tracking major version releases instead of sticking to a specific minor version, so you may be upgraded from 9.2 to 9.6 for example - a process you cannot undo.
235256
:::
236257

237258
To completely remove the TuxCare packages, after following the above steps, run the following as root:
@@ -406,7 +427,7 @@ TuxCare Technical Support is designed for enterprise clients with trained IT sta
406427
* New tickets may be created by simply emailing the support desk: [[email protected]]([email protected])
407428

408429
:::warning
409-
If you are a user of our SaaS product on AWS Marketplace, before you contact support, you should have your AWS accountId to hand, there are various ways to find it.
430+
If you are a user of our server product AMI's on AWS Marketplace, before you contact support, you should have your AWS accountId to hand, there are various ways to find it.
410431

411432
If you have the aws cli tool installed on your computer, you can run:
412433

docs/enterprise-support-for-almalinux/fips/README.md

Lines changed: 17 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,16 @@
1+
<!-- markdownlint-disable MD059 -->
2+
13
# FIPS packages for AlmaLinux Community
24

3-
Below are the instructions for installing the TuxCare FIPS 140-3 validated modules for AlmaLinux 9.2, they should be run as root.
5+
Below are the instructions for installing the TuxCare FIPS 140-3 validated modules for AlmaLinux 9.6, they should be run as root.
46

57
**For commercial customers of our ESU product, please use the instructions [here](/enterprise-support-for-almalinux/#enabling-fips-140-3-mode) instead.**
68

79
By installing this software, you agree to be bound by the terms of the [TuxCare Community EULA](https://tuxcare.com/wp-content/uploads/2023/09/COMMUNITY-EULA.txt).
810

911
```text
1012
# dnf -y install https://repo.tuxcare.com/fips/tuxcare-fips-release-latest-9.noarch.rpm
11-
# dnf -y install openssl-3.0.7-20.el9_2.tuxcare.1 kernel-5.14.0-284.11.1.el9_2.tuxcare.5
13+
# dnf -y install openssl-3.2.2-6.el9_6.1.tuxcare.6 kernel-5.14.0-570.21.1.el9_6.tuxcare.1
1214
# fips-mode-setup --enable
1315
# reboot
1416
```
@@ -20,7 +22,7 @@ $ fips-mode-setup --check
2022
FIPS mode is enabled.
2123
2224
$ uname -r
23-
5.14.0-284.11.1.el9_2.tuxcare.5.x86_64
25+
5.14.0-570.21.1.el9_6.tuxcare.1.x86_64
2426
```
2527

2628
If you wish to stay on the FIPS validated kernel/openssl packages when a newer AlmaLinux package is available, you can use `dnf versionlock` like so:
@@ -35,3 +37,15 @@ To revert to the previous behaviour of getting updated kernel/openssl packages f
3537
```text
3638
# dnf versionlock delete openssl*tuxcare* kernel*tuxcare*
3739
```
40+
41+
Alternatively you could set the `priority` level on the tuxcare repo to prefer the TuxCare packages:
42+
43+
```text
44+
# dnf config-manager --save --setopt="tuxcare-fips-community.priority=1"
45+
```
46+
47+
And to revert:
48+
49+
```text
50+
# dnf config-manager --save --setopt="tuxcare-fips-community.priority="
51+
```

0 commit comments

Comments
 (0)