Note: This bug is displayed in read-only format because the product is no longer active in Red Hat Bugzilla.
RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.

Bug 2144561

Summary: In FIPS mode, openssl should reject RSA keys < 2048 bits when using EVP_PKEY_decapsulate, or provide an indicator
Product: Red Hat Enterprise Linux 9 Reporter: Clemens Lang <cllang>
Component: opensslAssignee: Dmitry Belyavskiy <dbelyavs>
Status: CLOSED ERRATA QA Contact: Alicja Kario <hkario>
Severity: high Docs Contact:
Priority: high    
Version: 9.0CC: cllang, hkario, ssorce
Target Milestone: rcKeywords: Triaged, ZStream
Target Release: ---Flags: pm-rhel: mirror+
Hardware: x86_64   
OS: Linux   
Whiteboard:
Fixed In Version: openssl-3.0.7-2.el9 Doc Type: No Doc Update
Doc Text:
Story Points: ---
Clone Of:
: 2145170 2145171 (view as bug list) Environment:
Last Closed: 2023-05-09 08:20:56 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 2145170, 2145171    
Attachments:
Description Flags
Reproducer program that uses EVP_PKEY_encapsulate() and EVP_PKEY_decapsulate() none

Description Clemens Lang 2022-11-21 16:41:25 UTC
Created attachment 1926129 [details]
Reproducer program that uses EVP_PKEY_encapsulate() and EVP_PKEY_decapsulate()

Description of problem:
NIST SP 800-131Ar2 table 5 "Approval Status for the RSA-based Key Agreement and Key Transport Schemes" lists a minimum RSA key length of 2048 bits for SP 800-56B Key Agreement and Key Transport schemes, which is what OpenSSL implements in EVP_KEM-RSA (https://www.openssl.org/docs/man3.0/man7/EVP_KEM-RSA.html) to be used with EVP_PKEY_encapsulate() and EVP_PKEY_decapsulate().

While encapsulation correctly fails when invoked with short key lengths, decapsulation still accepts keys >= 1024 bits.

Version-Release number of selected component (if applicable):
3.0.1-44.el9 (!)

How reproducible:
Run the attached reproducer

Steps to Reproduce:
1. cc -std=c99 -Wall -Werror -pedantic -D_XOPEN_SOURCE=600 -o rsakem rsakem.c -lcrypto
2. ./rsakem 1536  # fails as expected
3. ./rsakem 1536 '?fips!=yes' ''  # succeeds, but should not when the ?fips!=yes property query only applies to encapsulation

Actual results:
$> $(head -1 rsakem.c | sed -E 's#^// ##g') && ./rsakem 1536
ERR EVP_PKEY_encapsulate_init(ctx, {OSSL_KEM_PARAM_OPERATION: RSASVE}): error:1C800069:Provider routines::invalid key length (in function ossl_rsa_check_key in providers/common/securitycheck.c:67): operation: 4096
$> $(head -1 rsakem.c | sed -E 's#^// ##g') && ./rsakem 1536 '?fips!=yes' ''
OK     recovered secret: 0x755bcab13bcf07294658ba7877e42385313fddcedce87f72f2af5fdc19f8503aa88ec61b3140eccb8a5726454f4f079aadc6f84598fc4b04d24151ca3fe63d6428c0b86c066e879d5a4a7c54f713451d9b2d6c97d6061bc5b37bb3cd670934b08e90d5a1283ffa312cdc9b1f2717535004e112a7ea770dd7012546e2c7dd80ce2311b908dc738c7e5ab31c7586b6c59bdfadc3926d130b7a0e1d2ac61453b73b6278b160ba186db6bbf8a2c387103ed6af43156defa4715ade9f4e050bb08cae
OK      original secret: 0x755bcab13bcf07294658ba7877e42385313fddcedce87f72f2af5fdc19f8503aa88ec61b3140eccb8a5726454f4f079aadc6f84598fc4b04d24151ca3fe63d6428c0b86c066e879d5a4a7c54f713451d9b2d6c97d6061bc5b37bb3cd670934b08e90d5a1283ffa312cdc9b1f2717535004e112a7ea770dd7012546e2c7dd80ce2311b908dc738c7e5ab31c7586b6c59bdfadc3926d130b7a0e1d2ac61453b73b6278b160ba186db6bbf8a2c387103ed6af43156defa4715ade9f4e050bb08cae

Expected results:
$> $(head -1 rsakem.c | sed -E 's#^// ##g') && ./rsakem 1536
ERR EVP_PKEY_encapsulate_init(ctx, {OSSL_KEM_PARAM_OPERATION: RSASVE}): error:1C800069:Provider routines::invalid key length (in function ossl_rsa_check_key in providers/common/securitycheck.c:67): operation: 4096
$> $(head -1 rsakem.c | sed -E 's#^// ##g') && ./rsakem 1536 '?fips!=yes' ''
ERR EVP_PKEY_decapsulate_init(ctx, {OSSL_KEM_PARAM_OPERATION: RSASVE}): error:1C800069:Provider routines::invalid key length (in function ossl_rsa_check_key in providers/common/securitycheck.c:67): operation: 4096


Additional info:
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar2.pdf for the limitation
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Br2.pdf section 7.2.1 for RSASVE

Comment 10 errata-xmlrpc 2023-05-09 08:20:56 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Low: openssl security and bug fix update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2023:2523