Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Disable support for DSA sign and key gen by default in the FIPS provider. #23890

Draft
wants to merge 6 commits into
base: master
Choose a base branch
from

Conversation

slontis
Copy link
Member

@slontis slontis commented Mar 20, 2024

FIPS 140-3 now uses FIPS 186-5 which removes DSA.
DSA may still be used for Verification for legacy purposes.

Checklist
  • documentation is added or updated
  • tests are added or updated

@github-actions github-actions bot added the severity: fips change The pull request changes FIPS provider sources label Mar 20, 2024
@t8m t8m added branch: master Merge to master branch triaged: feature The issue/pr requests/adds a feature labels Apr 4, 2024
@slontis slontis force-pushed the fips_no_dsa_sig branch 2 times, most recently from 3039876 to b51fa36 Compare April 22, 2024 01:57
@github-actions github-actions bot added the severity: ABI change This pull request contains ABI changes label Apr 22, 2024
@slontis slontis changed the title Remove DSA sign and key gen from the FIPS provider. Disable support for DSA sign and key gen by default in the FIPS provider. Apr 23, 2024
whenever a non approved algorithm test has occurred. It may be used to
log non approved algorithms. The callback is passed a name and
description string. The return value can be either 0 or 1.
A value of 0 can be used to force an error to occur from the algorithm
that called the callback.
DSA signing is no longer approved (in FIPS 140-3).
By default DSA signing wil not be enabled, and will result in an error.

Non approved DSA signing in the FIPS provider can be enabled by either
1) By using the fipsinstall option 'no_dsa_check' OR
2) By setting the OSSL_PARAM OSSL_ALG_PARAM_STRICT_CHECKS to zero during
   the signature init.

When using non approved signing the user may register a callback using
OSSL_INDICATOR_set_callback() that can be used to indicate non approved
behaviour.
Since DSA generated keys can only be used for signing purposes, restrict
the DSA Keygen also for FIPS 140-3.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
branch: master Merge to master branch severity: ABI change This pull request contains ABI changes severity: fips change The pull request changes FIPS provider sources triaged: feature The issue/pr requests/adds a feature
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants