Bug 2160733
Summary: | In FIPS mode, openssl KDFs should only allow selected hash algorithms | |||
---|---|---|---|---|
Product: | Red Hat Enterprise Linux 9 | Reporter: | Clemens Lang <cllang> | |
Component: | openssl | Assignee: | Clemens Lang <cllang> | |
Status: | CLOSED ERRATA | QA Contact: | Alicja Kario <hkario> | |
Severity: | high | Docs Contact: | ||
Priority: | high | |||
Version: | 9.0 | CC: | cllang, dbelyavs, hkario, ssorce | |
Target Milestone: | rc | Keywords: | Triaged, ZStream | |
Target Release: | --- | |||
Hardware: | x86_64 | |||
OS: | Linux | |||
Whiteboard: | ||||
Fixed In Version: | openssl-3.0.7-17.el9 | Doc Type: | No Doc Update | |
Doc Text: | Story Points: | --- | ||
Clone Of: | ||||
: | 2175860 2175861 2175862 (view as bug list) | Environment: | ||
Last Closed: | 2023-11-07 08:52:59 UTC | Type: | Bug | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | --- | Target Upstream Version: | ||
Embargoed: | ||||
Bug Depends On: | ||||
Bug Blocks: | 2175860, 2175861, 2175862 | |||
Attachments: |
Description
Clemens Lang
2023-01-13 14:12:50 UTC
As a clarification: - for X9.63 KDF, SHA-1 is not approved, i.e. SHA-224, SHA-256, SHA-384, and SHA-512 only - KBKDF: all except SHAKE - HKDF: all except SHAKE - SSKDF: all except SHAKE - TLS1.3PRF: SHA-256 and SHA-384 only Further clarification from NIST is available that says FIPS 180-4 or FIPS 202 hash functions are permissible where FIPS 180-3 is referenced, and can be vendor-affirmed where testing by ACVP is not yet available. This means that the only limitations now are on hash functions approved for specific applications (TLS1PRF, TLS1.3PRF, SSHKDF) and on the use of SHAKE. In summary: - X9.63, X9.42, KBKDF, HKDF, SSKDF: all except SHAKE - TLS1PRF: SHA-256, SHA-384, and SHA-512 only - TLS1.3PRF: SHA-256 and SHA-384 only - SSHKDF: SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512 only Created attachment 1944757 [details]
Reproducer for arbitrary KDFs (now queries indicator after EVP_KDF_derive and supports PBKDF2)
Further further clarification from the lab and NIST (https://github.com/usnistgov/ACVP/issues/1403#issuecomment-1435300395) now says that SHA-1 in X9.63 is not approved, but the same implementation with a different order of fields that are concatenated to be hashed is SSKDF are approved, so X9.63 needs to set the indicator to unapproved when SHA-1 is used. Created attachment 1951291 [details]
Reproducer for arbitrary KDFs (now queries indicator after EVP_KDF_derive and supports PBKDF2, TLS1PRF, TLS13KDF)
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (openssl bug fix and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2023:6627 |