RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 1014284 - [FIPS140] dracut-fip updates needed for certification
Summary: [FIPS140] dracut-fip updates needed for certification
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: dracut
Version: 7.0
Hardware: Unspecified
OS: Unspecified
urgent
high
Target Milestone: rc
: ---
Assignee: dracut-maint
QA Contact: Release Test Team
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2013-10-01 15:49 UTC by Steve Grubb
Modified: 2014-06-18 03:56 UTC (History)
9 users (show)

Fixed In Version: dracut-033-4.el7
Doc Type: Bug Fix
Doc Text:
Clone Of: 1012626
Environment:
Last Closed: 2014-06-13 11:38:41 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)

Description Steve Grubb 2013-10-01 15:49:31 UTC
+++ This bug was initially created as a clone of Bug #1012626 +++

Description of problem:
The current FIPS-140 certification needs some updates so that we can continue the certification.

We need have a stable file location for fips product determination. NIST has new requirements that causes us to need to define the FIPS module as the crypto system + the dracut-fips package. Libraries and applications will need to look for the presence of the file to know that this is a FIPS product rather than an ordinary product. On RHEL6 & 7 the dracut-fips files moved around a lot. So, its hard to have a solution for both OS.

Comment 4 Harald Hoyer 2013-10-02 10:07:34 UTC
dracut-033-4.el7

changed the file from /etc/redhat-fips to /etc/system-fips

Comment 6 Ladislav Jozsa 2014-03-24 11:58:21 UTC
Verified with dracut-033-150.el7, RHEL-7.0-20140320.0.

(In reply to Steve Grubb from comment #3)
> Based on the problem description
> 
> 1) a file is being added at /etc/redhat-fips. We just need to make sure its
> there.

/etc/system-fips present, see c#4.

> 2) is a no-op. dracut already uses sha512hmac.
> 3) need to ensure the kernel modules in comment #1 are being loaded. This
> can be done by inspecting an initramfs built by the new dracut to see if the
> modules are present and the script loads them.

I did inspection inside the running initramfs with the following results.

gcm modules:
gcm(aes)
gcm(aes-aesni)
# cat /proc/modules | grep -w gcm
gcm 23457 0 - Live 0xffffffffa0257000

# dmesg | grep -w gcm
[   13.047514] alg: self-tests for gcm_base(ctr(aes-asm),ghash-generic) (gcm(aes)) passed
[   13.047873] alg: self-tests for gcm(aes) (gcm(aes)) passed

cts modules:
cts(cbc(aes)
cts(cbc(aes-aesni))

# cat /proc/modules | grep -w cts
cts 12854 0 - Live 0xffffffffa022d000

no match for cts in dmesg | grep -w cts

ctr module:
ctr(aes-aesni)

no module named ctr, however dmesg | grep -w ctr reveals:

[   13.015579] alg: self-tests for ctr(aes-asm) (ctr(aes)) passed
[   13.015866] alg: self-tests for ctr(aes) (ctr(aes)) passed
[   13.035801] alg: self-tests for rfc3686(ctr(aes-asm)) (rfc3686(ctr(aes))) passed
[   13.036102] alg: self-tests for rfc3686(ctr(aes)) (rfc3686(ctr(aes))) passed
[   13.047514] alg: self-tests for gcm_base(ctr(aes-asm),ghash-generic) (gcm(aes)) passed
[   13.058113] alg: self-tests for ccm_base(ctr(aes-asm),aes-asm) (ccm(aes)) passed
[   13.079691] alg: self-tests for rfc4309(ccm_base(ctr(aes-asm),aes-asm)) (rfc4309(ccm(aes))) passed

Steve, is it ok?

Comment 7 Steve Grubb 2014-03-27 00:12:51 UTC
As best as I can tell, it looks OK. If we have any more changes, we'll address it on RHEL 7.1. Thanks.

Comment 8 Ludek Smid 2014-06-13 11:38:41 UTC
This request was resolved in Red Hat Enterprise Linux 7.0.

Contact your manager or support representative in case you have further questions about the request.


Note You need to log in before you can comment on or make changes to this bug.