Bug 2102541

Summary: [FIPS lab review] RAND tuning
Product: Red Hat Enterprise Linux 9 Reporter: Dmitry Belyavskiy <dbelyavs>
Component: opensslAssignee: Dmitry Belyavskiy <dbelyavs>
Status: CLOSED CURRENTRELEASE QA Contact: Alicja Kario <hkario>
Severity: medium Docs Contact:
Priority: high    
Version: 9.0CC: cllang, hkario, ssorce
Target Milestone: rcKeywords: Triaged, ZStream
Target Release: ---Flags: pm-rhel: mirror+
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: openssl-3.0.1-43.el9_0 Doc Type: No Doc Update
Doc Text:
Story Points: ---
Clone Of:
: 2115859 (view as bug list) Environment:
Last Closed: 2023-06-05 15:58:06 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 2115859    

Description Dmitry Belyavskiy 2022-06-30 07:38:50 UTC
- crypto/rand

	- PRIMARY_RESEED_* vs SECONDARY_RESEED_* and RAND_get0_public / RAND_get0_private: It looks like that there are 2 DRBGs chained. Although this currently is of no concern, please note that the SP800-90C draft does not allow it. We are working with NIST to allow chained DRBGs though. Yet, please keep a close eye on how things are developing and have plans ready in case chaining is not allowed with the final 90C.

- providers/implementation/drbg

	- ossl_crngt_get_entropy: the yet draft SP800-90C requires requested entropy + 128 bits during initial seeding

	- ossl_rand_get_entropy: It looks like OpenSSL still implements an internal entropy pool of some size that is hashed to get seed data. Note that this is a conditioning step for which SP800-90C requires 64 additional bits from the entropy source to claim the requested amount of entropy.
Dima: Doesn’t look so for me: in this case we have a temporary object using secure memory to return buffer.

Comment 6 Clemens Lang 2023-06-05 15:58:06 UTC
RHEL 9.1 contains openssl-3.0.1-43.el9_0.