-
Notifications
You must be signed in to change notification settings - Fork 764
Adding a note on a FIPS compliance for RHEL-09-672020 #14119
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Adding a note on a FIPS compliance for RHEL-09-672020 #14119
Conversation
|
Hi @Arden97. Thanks for your PR. I'm waiting for a github.com member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
Mab879
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Some minor rewording
| levels: | ||
| - medium | ||
| title: RHEL 9 crypto policy must not be overridden. | ||
| notes: The rule for this STIG is intentionally not implemented. Checking whether files under /etc/crypto-policies/back-ends/ |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| notes: The rule for this STIG is intentionally not implemented. Checking whether files under /etc/crypto-policies/back-ends/ | |
| notes: Rules for this control are intentionally not implemented. Checking whether files under /etc/crypto-policies/back-ends/ |
| title: RHEL 9 crypto policy must not be overridden. | ||
| notes: The rule for this STIG is intentionally not implemented. Checking whether files under /etc/crypto-policies/back-ends/ | ||
| are symlinks is not an appropriate way to verify the consistency of the system's cryptographic settings. | ||
| The suggested fix for the mentioned STIG does not fully satisfy its own requirements, as it also symlinks the nss.config file. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| The suggested fix for the mentioned STIG does not fully satisfy its own requirements, as it also symlinks the nss.config file. | |
| The suggested fix for the mentioned in the STIG does not fully satisfy its own requirements, as it also symlinks the nss.config file. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
fixed in b7a0787
| The suggested fix for the mentioned STIG does not fully satisfy its own requirements, as it also symlinks the nss.config file. | ||
| Furthermore, running sudo 'update-crypto-policies --set FIPS' is not a reliable way to ensure FIPS compliance. Customers should | ||
| refer to the official Red Hat Documentation and use the 'fips=1' kernel option during system installation to ensure the system is | ||
| in FIPS mode. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think it can be useful to add a link to the documentation here.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
added in 915a08d
|
@jan-cerny, @Mab879 thank you for your review! Do you mind if I leave a comment for reporter with similar wording on the original issue on JIRA? |
|
/packit build |
Description:
Rationale:
notcheckedresult in their reports