Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[4.5] Manual rebase of OTP FIPS mode fixes #1678

Closed
wants to merge 3 commits into from

Commits on Mar 13, 2018

  1. Fix OTP validation in FIPS mode

    NSS doesn't allow keys to be loaded directly in FIPS mode. To work around
    this, we encrypt the input key using an ephemeral key and then unwrap the
    encrypted key.
    
    https://pagure.io/freeipa/issue/7168
    
    Reviewed-By: Rob Crittenden <rcritten@redhat.com>
    npmccallum authored and rcritten committed Mar 13, 2018
    Configuration menu
    Copy the full SHA
    4e7013b View commit details
    Browse the repository at this point in the history
  2. Increase the default token key size

    The previous default token key size would fail in FIPS mode for the sha384
    and sha512 algorithms. With the updated key size, the default will work in
    all cases.
    
    https://pagure.io/freeipa/issue/7168
    
    Reviewed-By: Rob Crittenden <rcritten@redhat.com>
    npmccallum authored and rcritten committed Mar 13, 2018
    Configuration menu
    Copy the full SHA
    00044ac View commit details
    Browse the repository at this point in the history
  3. Revert "Don't allow OTP or RADIUS in FIPS mode"

    This reverts commit 16a952a.
    
    OTP now works in FIPS mode. RADIUS can be made to be compliant by wrapping
    traffic in a VPN.
    
    https://pagure.io/freeipa/issue/7168
    https://pagure.io/freeipa/issue/7243
    
    Reviewed-By: Rob Crittenden <rcritten@redhat.com>
    npmccallum authored and rcritten committed Mar 13, 2018
    Configuration menu
    Copy the full SHA
    e04b93f View commit details
    Browse the repository at this point in the history