Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security Linux

Linux Kernel Signature Verification Code Adds FIPS Compliance (phoronix.com) 20

Phoronix reports a new change was merged into the soon-to-be-released Linux 5.19 on Tuesday, making the kernel's signature verification code compliant with the Federal Information Processing Standards known as FIPS: FIPS are public standards via the National Institute of Standards and Technology used by U.S. government agencies and contractors in the areas of computer security and interoperability... Known-answer self-tests are required for FIPS compliance at startup/reboot, but the Linux kernel's signature verification code has been lacking such tests.

The signature checking code is used for module signing, Kexec, and other functionality. With Linux 5.19 there will now be some basic self-tests at start.

The tests will make their debut in Linux 5.19-rc4.

Thanks to long-time Slashdot reader UnknowingFool for sharing the news!
This discussion has been archived. No new comments can be posted.

Linux Kernel Signature Verification Code Adds FIPS Compliance

Comments Filter:
  • Let's see how many comments there are about all sorts of conspiracy theories from people who have no clue what FIPS means or does!

  • Just be aware a superkey may have more than one private key. It would appear Linux will still enable superior modern, more efficient algorithms not presently approved by FIP's. Which is good, given the tardy response on compromised or suspect algorithms. So said the evil ME standalone OS that runs under windows - well who knows what it is up to,
  • by awwshit ( 6214476 ) on Saturday June 25, 2022 @10:45AM (#62649942)

    Compliance by itself is only a start. To use this in an environment where FIPS is a requirement it has to not only be compliant, it has to be third party certified. That 3rd party certification is expensive, which means that you are only likely to find it in a commercial offering.

    • While true, you can't have the one without the other, and this is one of the ones.

      I won't be surprised if Ubuntu does a FIPS flavor

      • I mean, it's likely that some of the commercial distros want this to help them get federal contracts.

        But FIPS itself is kind of a brain dead standard, sometimes mandating support for stupid and insecure things like Dual_EC_DRBG [wikipedia.org]:

        According to John Kelsey (who was listed as author of NIST SP 800-90A together with Elaine Barker), the possibility of the backdoor by carefully chosen P and Q values was brought up at an ANSI X9.82 meeting. As a result, a way was specified for implementers to choose their own P and

    • Generally Linux itself does not do certification due to the cost and time required. However, variants of Linux like RedHat are free to become certified. This change means less work/testing for those variants.
  • It won't be long before Nation States have Quantum key cracking capability and will be able to crack most FIPS crypto keysystems. NIST has not even announced a potential PQC standard for this yet but some algorithms are obviously better than others. The draft release for a standard with a call for comments is expected 2022-2023 at best.

    https://www.nccoe.nist.gov/sit... [nist.gov]

  • by chill ( 34294 ) on Saturday June 25, 2022 @04:00PM (#62650546) Journal

    FIPS isn't a standard. FIPS ###-# are standards issued by the U.S. Gov't that are *required* to be used when applicable. The exact phrasing is usually something like "No provision is provided under FISMA for waivers to FIPS made mandatory by the Secretary of
    Commerce.".

    They are the stricter cousins to the NIST SP-XXX series of publications, which are more like guidelines and leave a lot of leeway for implementation -- mostly.

    There are close to a dozen [nist.gov] FIPS standards, while there are over 200 [nist.gov] SPs.

    The FIPS-140-3 standard covers cryptographic modules and their choice and use in Federal information systems. One of the dozens of requirements buried in the associated SP 800-140 series that breaks out the specifics of cryptographic modules is self-test on start.

    OpenSSL has a validated FIPS 140-2 module for v2.x and they are going through validation testing [openssl.org] for the v3.x version.

    The ability to test for correctness is a good thing to add, but we're talking like one capability of dozens and it'd need to go thru conformance testing. And the kernel isn't a cryptographic module, so... I'm not sure which FIPS they're talking about, unless they really mean FIPS-200 which directs you to NIST SP 800-53r5, and in there control SI-7 Software, Firmware, and Information Integrity for HIGH baseline systems.

    • by madbrain ( 11432 ) on Saturday June 25, 2022 @04:54PM (#62650642) Homepage Journal

      TFA mentions that it's FIPS140.

      The kernel isn't a cryptographic module. But some of its functionality relies on cryptographic functions. That subset is likely considered to the cryptographic module, for purposes of FIPS140. That's where the cryptographic boundary is likely set, for purpose of FIPS140 validation.

      • by tlhIngan ( 30335 )

        The kernel isn't a cryptographic module. But some of its functionality relies on cryptographic functions. That subset is likely considered to the cryptographic module, for purposes of FIPS140. That's where the cryptographic boundary is likely set, for purpose of FIPS140 validation.

        Yeah, I've seen requests come in for FIPS-140 certified Wi-Fi modules. Took quite a bit of digging to figure out what that meant, but it turned out the encryption system used must be certified. (WPA-CCMP is using AES internally, s

C'est magnifique, mais ce n'est pas l'Informatique. -- Bosquet [on seeing the IBM 4341]

Working...