Received: by 2002:a05:6a10:1a4d:0:0:0:0 with SMTP id nk13csp1712161pxb; Wed, 2 Feb 2022 10:46:59 -0800 (PST) X-Google-Smtp-Source: ABdhPJzInB9tlcprzKZaw1n1v8so7gPJL763ZOgyHPubTSPqdt7XJtM9BBld88qF5geth8llGZJF X-Received: by 2002:a17:90a:601:: with SMTP id j1mr9661237pjj.192.1643827619087; Wed, 02 Feb 2022 10:46:59 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1643827619; cv=none; d=google.com; s=arc-20160816; b=0w2iSQo2iDyngqP4G8073xhZj7AiD3NG0naeBpO+lq1XdYkxB7JmGlYv/8cZ4N+sS9 kozH+Gm2ewdpd7jLPRRViTePZUeHvnp4H/S0zozHQmxzZ4zzEcbsDDefnyEuPEltVenx GEEdz92srIWIfmdEirDSAyWzLNCX9AWCLuowO7rgpl/f6ZtimKpAujdfm2tPy85x6Tpx 03Ym9gGoBZpHY9kPbjc4uphImT3Kp5b5fFU/cORlZmZ9cKhmxjCxwG3g+zYwhhcPb18r TqU5yqqNQC92rrITUAK4McHgjBGsSFlpo+hsL/KJXSgsmdQrWkRT/UFckYUoLeTwQZyc NYeQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature:dkim-signature; bh=T7D42mbyFyOr0nXM0heUBfey/sShYlFuQidjL1PwPws=; b=LMgzX6lNq81ovAsK3Rdo9oHWuyCGop4pMSolJSG4sMsNkyG8UyZpVlibowxEjI0/pX w264LUkI8U9+WuZRraFg5xJm+gDwbQW/TRHhU4iCsgEQaYHwRVVLAUyITasYj4PVnHb5 Ee4cExWpwk4a5PrW4tZaehgnXMhu7mzn+hf0adRsNZN7x8XNDzlOvC89wBSbEYiX6rNF LqjTQmtn95xQU9qVpB1sBNf/oQ8Jz6jxu4hpkEz8rWOoe8J1IM6hNEeKtFpOY9dyWxHF k+NOZIPjkWXv4h+EHF2v356L3u/sAfIYNEvOBGjDHAtRVeLm5LWhYzVKTcIkHXhrphE1 7gFg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.de header.s=susede2_rsa header.b=JRdmCgQM; dkim=neutral (no key) header.i=@suse.de header.b=CbO5UVop; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=suse.de Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id m62si21651197pgm.327.2022.02.02.10.46.45; Wed, 02 Feb 2022 10:46:59 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.de header.s=susede2_rsa header.b=JRdmCgQM; dkim=neutral (no key) header.i=@suse.de header.b=CbO5UVop; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=suse.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1343766AbiBBKmb (ORCPT + 99 others); Wed, 2 Feb 2022 05:42:31 -0500 Received: from smtp-out1.suse.de ([195.135.220.28]:41958 "EHLO smtp-out1.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1343591AbiBBKlp (ORCPT ); Wed, 2 Feb 2022 05:41:45 -0500 Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by smtp-out1.suse.de (Postfix) with ESMTPS id 7B18521102; Wed, 2 Feb 2022 10:41:44 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_rsa; t=1643798504; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=T7D42mbyFyOr0nXM0heUBfey/sShYlFuQidjL1PwPws=; b=JRdmCgQMqpIAixFVXed1TwP7hhDatpy79vxH+LFy1aEE+dLSFUZdqU91PxCdxymplgiZLJ aE3+50xEMLFn7I6cnkAqtEYXmBOyZAm5VmbX5hk5cvHLj3EqMWi9G2iwYInUAA6jytSUkM V5fke7kWOcmsK713YR9FcDEb2dWz8+s= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_ed25519; t=1643798504; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=T7D42mbyFyOr0nXM0heUBfey/sShYlFuQidjL1PwPws=; b=CbO5UVopFWD11nP1eY2rQkVA9XjbsoLZHUadK/0Sq493GAblSTquuEXam9Zhe6AlfNo38Y CxQPcjU7AidtnMDw== Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 65E7113E02; Wed, 2 Feb 2022 10:41:44 +0000 (UTC) Received: from dovecot-director2.suse.de ([192.168.254.65]) by imap2.suse-dmz.suse.de with ESMTPSA id AeqwFuhf+mGWbAAAMHmgww (envelope-from ); Wed, 02 Feb 2022 10:41:44 +0000 From: Nicolai Stange To: Herbert Xu , "David S. Miller" Cc: =?UTF-8?q?Stephan=20M=C3=BCller?= , Hannes Reinecke , Torsten Duwe , David Howells , Jarkko Sakkinen , linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, keyrings@vger.kernel.org, Nicolai Stange Subject: [PATCH v3 13/15] crypto: dh - disallow plain "dh" usage in FIPS mode Date: Wed, 2 Feb 2022 11:40:10 +0100 Message-Id: <20220202104012.4193-14-nstange@suse.de> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20220202104012.4193-1-nstange@suse.de> References: <20220202104012.4193-1-nstange@suse.de> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org SP800-56Arev3, sec. 5.5.2 ("Assurance of Domain-Parameter Validity") asserts that an implementation needs to verify domain paramtere validity, which boils down to either - the domain parameters corresponding to some known safe-prime group explicitly listed to be approved in the document or - for parameters conforming to a "FIPS 186-type parameter-size set", that the implementation needs to perform an explicit domain parameter verification, which would require access to the "seed" and "counter" values used in their generation. The latter is not easily feasible and moreover, SP800-56Arev3 states that safe-prime groups are preferred and that FIPS 186-type parameter sets should only be supported for backward compatibility, if it all. Mark "dh" as not fips_allowed in testmgr. Note that the safe-prime ffdheXYZ(dh) wrappers are not affected by this change: as these enforce some approved safe-prime group each, their usage is still allowed in FIPS mode. This change will effectively render the keyctl(KEYCTL_DH_COMPUTE) syscall unusable in FIPS mode, but it has been brought up that this might even be a good thing ([1]). [1] https://lore.kernel.org/r/20211217055227.GA20698@gondor.apana.org.au Signed-off-by: Nicolai Stange --- crypto/testmgr.c | 1 - 1 file changed, 1 deletion(-) diff --git a/crypto/testmgr.c b/crypto/testmgr.c index d715ddc22c6b..b7973a47c6f4 100644 --- a/crypto/testmgr.c +++ b/crypto/testmgr.c @@ -4647,7 +4647,6 @@ static const struct alg_test_desc alg_test_descs[] = { }, { .alg = "dh", .test = alg_test_kpp, - .fips_allowed = 1, .suite = { .kpp = __VECS(dh_tv_template) } -- 2.26.2