Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

FIPS mode to enforce boringssl compliance policies #49081

Closed
kyessenov opened this issue Jan 30, 2024 · 5 comments · Fixed by #49385
Closed

FIPS mode to enforce boringssl compliance policies #49081

kyessenov opened this issue Jan 30, 2024 · 5 comments · Fixed by #49385

Comments

@kyessenov
Copy link
Contributor

kyessenov commented Jan 30, 2024

Background: envoyproxy/envoy#31746, golang/go#65321

FIPS cryptographic module used by Istio requires disabling TLSv1.3 for compliance. Future releases of the module will expose an API to enforce configuration compliance, which is needed in addition to using the signed module builds.

In practical terms, Istio must disable TLSv1.3 on all TLS paths in FIPS mode, which includes Envoy, Go runtime, and gRPC TLS implementations.

In addition, all Wasm modules using grpc_service may be impacted since they are not adhering to the compliance policies.

@costinm
Copy link
Contributor

costinm commented Feb 1, 2024

forgive my ignorance - if we disable TLS1.3, what versions are we going to support ? Just 1.2 ? Or does FIPS require even more ancient versions ? AFAIK 1.3 is the latest version and I don't remember a 1.4.

@kyessenov
Copy link
Contributor Author

TLS1.2 has no planned obsolescence. We can re-enable TLS1.3 once it has a FIPS mode.

@kyessenov
Copy link
Contributor Author

CC @ramaraochavali @kfaseela.

I think we could leverage mesh_mTLS and tls_defaults flags. The gap is propagating those controls to Envoy and agent, not just istiod process.

@kyessenov
Copy link
Contributor Author

Correction: we can't. It doesn't have the max TLS version.

@kyessenov
Copy link
Contributor Author

@howardjohn I think this also impacts ambient code - but I'm not familiar with TLS modules used there.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants