Linux Kernel Signature Verification Code Adds FIPS Compliance (phoronix.com) 20
Phoronix reports a new change was merged into the soon-to-be-released Linux 5.19 on Tuesday, making the kernel's signature verification code compliant with the Federal Information Processing Standards known as FIPS:
FIPS are public standards via the National Institute of Standards and Technology used by U.S. government agencies and contractors in the areas of computer security and interoperability... Known-answer self-tests are required for FIPS compliance at startup/reboot, but the Linux kernel's signature verification code has been lacking such tests.
The signature checking code is used for module signing, Kexec, and other functionality. With Linux 5.19 there will now be some basic self-tests at start.
The tests will make their debut in Linux 5.19-rc4.
Thanks to long-time Slashdot reader UnknowingFool for sharing the news!
The signature checking code is used for module signing, Kexec, and other functionality. With Linux 5.19 there will now be some basic self-tests at start.
The tests will make their debut in Linux 5.19-rc4.
Thanks to long-time Slashdot reader UnknowingFool for sharing the news!
Re: (Score:3)
"federal altar" ie kow-towing to external influences. . In which case it's time to ditch linux. . . only exists to appease FIPS compliance demands."
Wow, someone is irrationally angry that Linux, years after a standard was published, did the absolute minimum to comply with that standard. And by minimum, that means adding a small bit of code. To be clear, Linux was already mostly compliant; it lacked the "known self-tests" at start/reboot that the standard requires. I hate to tell that person that Linux is used already by "federal altar" types like Lawrence Livermore National Laboratory. Also this means different variants of Linux like Red Hat [redhat.com] which is F
Bring on the conspiracy theories! (Score:2)
Let's see how many comments there are about all sorts of conspiracy theories from people who have no clue what FIPS means or does!
Re: (Score:2)
Can we throw in TPM for good effect? That always makes people wet the bed.
Re: Bring on the conspiracy theories! (Score:1)
Re: (Score:2)
Re: (Score:2)
This sounds OK. (Score:2)
compliance vs certification (Score:4, Interesting)
Compliance by itself is only a start. To use this in an environment where FIPS is a requirement it has to not only be compliant, it has to be third party certified. That 3rd party certification is expensive, which means that you are only likely to find it in a commercial offering.
Re: (Score:2)
While true, you can't have the one without the other, and this is one of the ones.
I won't be surprised if Ubuntu does a FIPS flavor
FIPS is required, but also ridiculous (Score:1)
I mean, it's likely that some of the commercial distros want this to help them get federal contracts.
But FIPS itself is kind of a brain dead standard, sometimes mandating support for stupid and insecure things like Dual_EC_DRBG [wikipedia.org]:
Re: (Score:3)
Re: (Score:2)
So what? It was silly of FIPS to ever mandate this. There are plenty of other reasons [marc.info] why it's ridiculous to use it unless you have to [microsoft.com], that one is just the most famous.
Re: (Score:2)
Isn't FIPS from NIST? The F is 'Federal'. Of course the Feds are going to mandate the backdoors they paid to create and make default in the RSA library.
Re: (Score:2)
Re: (Score:2)
Right, exactly.
Is it PQC Compliant? (Score:2)
It won't be long before Nation States have Quantum key cracking capability and will be able to crack most FIPS crypto keysystems. NIST has not even announced a potential PQC standard for this yet but some algorithms are obviously better than others. The draft release for a standard with a call for comments is expected 2022-2023 at best.
https://www.nccoe.nist.gov/sit... [nist.gov]
The title (and article) are horrid (Score:4, Informative)
FIPS isn't a standard. FIPS ###-# are standards issued by the U.S. Gov't that are *required* to be used when applicable. The exact phrasing is usually something like "No provision is provided under FISMA for waivers to FIPS made mandatory by the Secretary of
Commerce.".
They are the stricter cousins to the NIST SP-XXX series of publications, which are more like guidelines and leave a lot of leeway for implementation -- mostly.
There are close to a dozen [nist.gov] FIPS standards, while there are over 200 [nist.gov] SPs.
The FIPS-140-3 standard covers cryptographic modules and their choice and use in Federal information systems. One of the dozens of requirements buried in the associated SP 800-140 series that breaks out the specifics of cryptographic modules is self-test on start.
OpenSSL has a validated FIPS 140-2 module for v2.x and they are going through validation testing [openssl.org] for the v3.x version.
The ability to test for correctness is a good thing to add, but we're talking like one capability of dozens and it'd need to go thru conformance testing. And the kernel isn't a cryptographic module, so... I'm not sure which FIPS they're talking about, unless they really mean FIPS-200 which directs you to NIST SP 800-53r5, and in there control SI-7 Software, Firmware, and Information Integrity for HIGH baseline systems.
Re: The title (and article) are horrid (Score:4)
TFA mentions that it's FIPS140.
The kernel isn't a cryptographic module. But some of its functionality relies on cryptographic functions. That subset is likely considered to the cryptographic module, for purposes of FIPS140. That's where the cryptographic boundary is likely set, for purpose of FIPS140 validation.
Re: (Score:3)
Yeah, I've seen requests come in for FIPS-140 certified Wi-Fi modules. Took quite a bit of digging to figure out what that meant, but it turned out the encryption system used must be certified. (WPA-CCMP is using AES internally, s