Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

FIPS compliant libraries #357

Open
lukehinds opened this issue Jul 7, 2021 · 5 comments
Open

FIPS compliant libraries #357

lukehinds opened this issue Jul 7, 2021 · 5 comments

Comments

@lukehinds
Copy link
Member

We currently have two non FIPS compliant modules in use:

./pkg/pki/ssh/sign.go:	"golang.org/x/crypto/ssh"
./pkg/pki/ssh/ssh.go:	"golang.org/x/crypto/ssh"
./pkg/pki/ssh/verify.go:	"golang.org/x/crypto/ssh"
./pkg/pki/pgp/pgp.go:	"golang.org/x/crypto/openpgp/armor"
./pkg/pki/pgp/pgp.go:	"golang.org/x/crypto/openpgp/packet"
./pkg/pki/pgp/pgp.go:	"golang.org/x/crypto/openpgp"

We should port to FIPS compliant modules, as being non FIPS will make it a challenge for operators to deploy rekor into government / military / FSI etc

@bobcallaway
Copy link
Member

note that #286 found that we can't swap for the proton mail openpgp port due to lack of support for RPM signatures (which require pgp v3 packets)

@lukehinds
Copy link
Member Author

is it viable / extensive to get that work upstream (note to self, is proton mail openpgp even FIPs)?

@cpanato cpanato modified the milestone: 0.3.0 Jul 8, 2021
@haydentherapper
Copy link
Contributor

Can we close this? Golang's crypto library isn't FIPS compliant without being recompiled and using boringssl instead, and that seems like a risky change to take on

@sunstonesecure-robert
Copy link

how risky? it would open up much more use across gov and healthcare. having built and validagted FIPS hardware and software happy to help

@jtcarnes
Copy link

I would be interested as well. What are the current blockers?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

6 participants