Page MenuHome GnuPG
Feed Advanced Search

Dec 7 2021

gniibe moved T5710: FIPS: disable DSA for FIPS from Backlog to Next on the FIPS board.
Dec 7 2021, 11:13 AM · FIPS, libgcrypt
gniibe added a comment to T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.

We have tests in gniibe/new-pk-api, which can be backported.

  • t-dsa
  • t-ecdsa
  • t-rsa-pss
  • t-rsa-15
Dec 7 2021, 6:02 AM · FIPS, libgcrypt, Feature Request
gniibe added a comment to T5512: Implement service indicators.

Thank you, applied.

Dec 7 2021, 3:37 AM · Feature Request, FIPS, libgcrypt
gniibe added a comment to T5706: libgcrypt: random: Remove the feature getting randomness from random daemon.

The patch has been applied.

Dec 7 2021, 2:35 AM · libgcrypt
gniibe added a project to T5706: libgcrypt: random: Remove the feature getting randomness from random daemon: Restricted Project.
Dec 7 2021, 2:12 AM · libgcrypt

Dec 6 2021

dannytsen added a comment to T5700: libgcrypt: bulk AES-GCM acceleration for ppc64le.

Thanks jukivili for the review.

Dec 6 2021, 3:37 PM · patch, ppc, libgcrypt, Feature Request
Jakuje added a comment to T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.

I have just a note about this issue, that it would be helpful to exercise this new API in some tests. Right now, only the old API is tested.

Dec 6 2021, 12:38 PM · FIPS, libgcrypt, Feature Request
Jakuje added a comment to T5512: Implement service indicators.

It turns out that the asymmetric key operations are not yet properly enforced with the .disabled flag. While the other key crypto usually has some "open" api, where this can be simply captured, the pubkey API has several entry points and the "test_algo" is not enough to check for disabled key types.

Dec 6 2021, 11:56 AM · Feature Request, FIPS, libgcrypt
werner added a comment to T5706: libgcrypt: random: Remove the feature getting randomness from random daemon.

Yeah, remove it.

Dec 6 2021, 11:28 AM · libgcrypt
Jakuje added a comment to T5636: Run integrity checks + selftests from library constructor in FIPS.

Thank you. My local tests (in emulated fips mode and normal mode) do not show any errors with current master branch.

Dec 6 2021, 11:03 AM · FIPS, libgcrypt, Bug Report
gniibe added a comment to T5636: Run integrity checks + selftests from library constructor in FIPS.

And please let me know the change rC751fcadd34ed: random: Release memory in DRBG. affects t-secmem failure.

Dec 6 2021, 7:08 AM · FIPS, libgcrypt, Bug Report
gniibe added a comment to T5636: Run integrity checks + selftests from library constructor in FIPS.

IIUC, one of the causes for the failure of secmem was resource release of DRBG memory.

Dec 6 2021, 3:34 AM · FIPS, libgcrypt, Bug Report
gniibe added a comment to T5636: Run integrity checks + selftests from library constructor in FIPS.

Thank you for testing.

Dec 6 2021, 3:23 AM · FIPS, libgcrypt, Bug Report
gniibe claimed T5714: tests: Do not run tests for algorithms that are not built-in.

Applied. Thank you.

Dec 6 2021, 1:54 AM · libgcrypt, Bug Report

Dec 4 2021

jukivili added a comment to T5700: libgcrypt: bulk AES-GCM acceleration for ppc64le.

Thanks, however I didn't see your email on mailing-list. Maybe the email got stuck on the way.

Dec 4 2021, 12:46 PM · patch, ppc, libgcrypt, Feature Request

Dec 3 2021

Jakuje added a comment to T5645: RSA/DSA keygen modification for FIPS/ACVP testing.

Thanks. I did some git archeology and found the first mention of this in the following commit in 2011 without much details:

Dec 3 2021, 10:21 AM · libgcrypt, FIPS, Bug Report
gniibe added a comment to T5645: RSA/DSA keygen modification for FIPS/ACVP testing.

Adding the case for == 0 only might be problematic, because I don't think it's an alias for a secure value; I think that == 0 means that it's up to libgcrypt to select the value (just like other generate_* functions).

Dec 3 2021, 9:14 AM · libgcrypt, FIPS, Bug Report
gniibe added a comment to T5523: jitter entropy RNG update.

Thank you, applied.

Dec 3 2021, 8:24 AM · FIPS, libgcrypt

Dec 2 2021

dannytsen added a comment to T5700: libgcrypt: bulk AES-GCM acceleration for ppc64le.

I sent a copy to gcrypt-devel@gnupg.org. Hope this is the right process. Thanks.

Dec 2 2021, 5:47 PM · patch, ppc, libgcrypt, Feature Request
jukivili added a comment to T5700: libgcrypt: bulk AES-GCM acceleration for ppc64le.

Please read doc/HACKING carefully on the process of sending DCO the right way.

Dec 2 2021, 5:31 PM · patch, ppc, libgcrypt, Feature Request
Jakuje added a comment to T5645: RSA/DSA keygen modification for FIPS/ACVP testing.

Let me get back to this once more as one of the parts for RSA was initially missed:

diff -up libgcrypt-1.8.4/cipher/rsa.c.fips-keygen libgcrypt-1.8.4/cipher/rsa.c
--- libgcrypt-1.8.4/cipher/rsa.c.fips-keygen	2017-11-23 19:16:58.000000000 +0100
+++ libgcrypt-1.8.4/cipher/rsa.c	2019-02-12 14:29:25.630513971 +0100
@@ -696,7 +696,7 @@ generate_x931 (RSA_secret_key *sk, unsig
Dec 2 2021, 4:34 PM · libgcrypt, FIPS, Bug Report
Jakuje created T5714: tests: Do not run tests for algorithms that are not built-in.
Dec 2 2021, 2:21 PM · libgcrypt, Bug Report
Jakuje added a comment to T5523: jitter entropy RNG update.

I went through some more testing and noticed one missing file in the release tarball, that prevents building libgcrypt now. Should be fixed with the attached patch.

Dec 2 2021, 12:32 PM · FIPS, libgcrypt
Jakuje added a comment to T5636: Run integrity checks + selftests from library constructor in FIPS.

I did go through a bit more testing too and the selftests still initialize and use the secure memory (and the t-secmem fails in FIPS mode if we invoke selftests from constructor). Now from run_random_selftests() -> _gcry_random_selftest() -> drbg_healthcheck() -> _gcry_rngdrbg_healthcheck_one(). So this means that we either need to de-initialize secure memory after the constructor selftests or prevent its initialization as I suggested in some of the previous comments.

Dec 2 2021, 12:29 PM · FIPS, libgcrypt, Bug Report
gniibe added a comment to T5512: Implement service indicators.

For the part 1, I created: T5710: FIPS: disable DSA for FIPS

Dec 2 2021, 1:16 AM · Feature Request, FIPS, libgcrypt
gniibe updated subscribers of T5710: FIPS: disable DSA for FIPS.

This is the patch from @Jakuje

Dec 2 2021, 1:14 AM · FIPS, libgcrypt
gniibe triaged T5710: FIPS: disable DSA for FIPS as Normal priority.
Dec 2 2021, 1:12 AM · FIPS, libgcrypt

Dec 1 2021

gniibe added a comment to T5512: Implement service indicators.

Also, applied the part 2, improving basic.c.

Dec 1 2021, 6:46 AM · Feature Request, FIPS, libgcrypt
gniibe added a comment to T5512: Implement service indicators.

Applied the part 3, the 3DES is no-FIPS patch.

Dec 1 2021, 6:19 AM · Feature Request, FIPS, libgcrypt

Nov 30 2021

gniibe moved T5512: Implement service indicators from Backlog to Next on the FIPS board.
Nov 30 2021, 11:06 AM · Feature Request, FIPS, libgcrypt
gniibe renamed T5706: libgcrypt: random: Remove the feature getting randomness from random daemon from libgcrypt: random: Remove access to random daemon to libgcrypt: random: Remove the feature getting randomness from random daemon.
Nov 30 2021, 10:57 AM · libgcrypt
gniibe added a comment to T5512: Implement service indicators.

Applied the part 4, the indicator patch.

Nov 30 2021, 10:54 AM · Feature Request, FIPS, libgcrypt
gniibe added a project to T5692: New entropy gatherer using the genentropy system call.: Restricted Project.
Nov 30 2021, 10:49 AM · libgcrypt, FIPS
gniibe closed T5433: libgcrypt: Do not use SHA1 by default as Wontfix.

The change for pubkey-util.c is not needed any more, because

  • T5665 handles new functions rejects use of SHA-1 as approved signature.
  • pubkey-util.c is used by gcry_pk_sign and gcry_pk_verify.
Nov 30 2021, 10:48 AM · FIPS, libgcrypt, Bug Report
gniibe triaged T5706: libgcrypt: random: Remove the feature getting randomness from random daemon as Normal priority.
Nov 30 2021, 5:11 AM · libgcrypt
gniibe requested review of D544: Deprecation of random daemon part 1 (remove use of random daemon).
Nov 30 2021, 5:09 AM · libgcrypt

Nov 26 2021

Jakuje added a comment to T5512: Implement service indicators.

I do not like the idea of using the get_config interface for this. It should be easily usable by applications to check for single cipher/mode so int/bool return values would be preferred against the string ones (which are now used in the get_config). I am not sure if getting all the configuration in one string blob would be any use (except for some auditing) either.

Nov 26 2021, 12:22 PM · Feature Request, FIPS, libgcrypt

Nov 25 2021

gniibe added a project to T5637: Use poll for libgcrypt (support more than 1024 fds): Restricted Project.
Nov 25 2021, 3:31 AM · libgcrypt, Feature Request

Nov 23 2021

dannytsen added a comment to T5700: libgcrypt: bulk AES-GCM acceleration for ppc64le.

Hi Werner, Here is the DCO. Thanks.

Nov 23 2021, 3:51 PM · patch, ppc, libgcrypt, Feature Request
Jakuje added a comment to T5636: Run integrity checks + selftests from library constructor in FIPS.

Thank you. Extending the semantics of GCRYCTL_CLOSE_RANDOM_DEVICE sounds good to me. I think the deinit functions were created initially especially not to change the semantics of existing code using GCRYCTL_CLOSE_RANDOM_DEVICE, but I agree that it will probably not be an issue.

Nov 23 2021, 9:59 AM · FIPS, libgcrypt, Bug Report
werner triaged T5700: libgcrypt: bulk AES-GCM acceleration for ppc64le as Normal priority.

FWIW: We need a DCO; see doc/HACKING.

Nov 23 2021, 9:06 AM · patch, ppc, libgcrypt, Feature Request

Nov 22 2021

gniibe removed a project from T5637: Use poll for libgcrypt (support more than 1024 fds): gpgme.
Nov 22 2021, 6:21 AM · libgcrypt, Feature Request
gniibe edited projects for T5637: Use poll for libgcrypt (support more than 1024 fds), added: libgcrypt; removed gpgrt.
Nov 22 2021, 6:20 AM · libgcrypt, Feature Request

Nov 19 2021

gniibe added a comment to T5636: Run integrity checks + selftests from library constructor in FIPS.

Part 1 was applied. Part 3, Part 4, and Part 7 are irrelevant now, because we now have rndgetentropy which doesn't use device.

Nov 19 2021, 8:50 AM · FIPS, libgcrypt, Bug Report

Nov 18 2021

jukivili added a comment to T5694: poly1305-s390x.S is compiled despite --disable-asm.

Following patch should prevent assembly files being built at all with --disable-asm:

Nov 18 2021, 8:51 AM · libgcrypt, Bug Report
jukivili added a comment to T5694: poly1305-s390x.S is compiled despite --disable-asm.

Thanks for your report.

Nov 18 2021, 8:27 AM · libgcrypt, Bug Report
jukivili claimed T5694: poly1305-s390x.S is compiled despite --disable-asm.
Nov 18 2021, 8:17 AM · libgcrypt, Bug Report
gniibe added a comment to T5523: jitter entropy RNG update.

Fixed, with using normal memory for ->mem.

Nov 18 2021, 8:12 AM · FIPS, libgcrypt
gniibe added a comment to T5523: jitter entropy RNG update.

->mem is just used to measure the difference of memory access.

Nov 18 2021, 7:56 AM · FIPS, libgcrypt
gniibe added a comment to T5523: jitter entropy RNG update.

It found that newer jitterentropy uses larger mem (128KiB), while older uses 2KiB.

Nov 18 2021, 7:33 AM · FIPS, libgcrypt

Nov 17 2021

gniibe added a project to T5523: jitter entropy RNG update: Restricted Project.

Pushed to master.

Nov 17 2021, 7:03 AM · FIPS, libgcrypt

Nov 16 2021

wrobelda added a comment to T5694: poly1305-s390x.S is compiled despite --disable-asm.

Additionally, poly1305-s390x.S is being compiled despite running/targeting a PC system:

Nov 16 2021, 1:31 PM · libgcrypt, Bug Report
werner added a comment to T5512: Implement service indicators.

We could use a new mode #define GCRY_GET_CONFIG_FIPS 1 with gcry_get_config:

Nov 16 2021, 1:21 PM · Feature Request, FIPS, libgcrypt
werner triaged T5694: poly1305-s390x.S is compiled despite --disable-asm as Normal priority.
Nov 16 2021, 1:10 PM · libgcrypt, Bug Report
Jakuje added a comment to T5512: Implement service indicators.

With just implicit indicators, we would have to block all non-approved cipher modes and kdfs including the OCB mode and skcrypt, which would probably make gnupg2 unusable in FIPS mode, which is not our intention.

Nov 16 2021, 1:10 PM · Feature Request, FIPS, libgcrypt
gniibe moved T5665: libgcrypt : Restrict message digest use for FIPS 140-3 from Next to Ready for release on the FIPS board.
Nov 16 2021, 11:22 AM · FIPS, Bug Report, libgcrypt
gniibe moved T5692: New entropy gatherer using the genentropy system call. from Backlog to Next on the FIPS board.
Nov 16 2021, 11:22 AM · libgcrypt, FIPS
gniibe added a project to T5665: libgcrypt : Restrict message digest use for FIPS 140-3: Restricted Project.
Nov 16 2021, 11:20 AM · FIPS, Bug Report, libgcrypt
gniibe added a comment to T5636: Run integrity checks + selftests from library constructor in FIPS.

In the documentation, I found:

Nov 16 2021, 10:58 AM · FIPS, libgcrypt, Bug Report

Nov 15 2021

wrobelda created T5694: poly1305-s390x.S is compiled despite --disable-asm.
Nov 15 2021, 10:16 PM · libgcrypt, Bug Report
werner triaged T5692: New entropy gatherer using the genentropy system call. as Normal priority.
Nov 15 2021, 7:30 PM · libgcrypt, FIPS
werner triaged T5691: Release libgcrypt 1.10.0 as Low priority.
Nov 15 2021, 7:22 PM · FIPS, Release Info, libgcrypt
wrobelda added a comment to T5365: --with-libgpg-error-prefix doesn't affect gpgrt-config path detection.

Also, and I should maybe have opened with it, the issues vcpkg has with your build system are currently tracked here, while my effort to build gpg-error natively (i.e. without relying on ShiftMediaProject fork) on all platforms is here.

Nov 15 2021, 11:27 AM · MacOS, gpgrt, Cross-Compiler, libgcrypt
wrobelda added a comment to T5365: --with-libgpg-error-prefix doesn't affect gpgrt-config path detection.

Let me clarify the use case of gpg-error.m4.

gpg-error.m4 is for GnuPG and its friends, where we cannot assume availability of pkg-config. Its capability is limited, and we don't pursue 100% compatibility of pkg-config.

Nov 15 2021, 11:16 AM · MacOS, gpgrt, Cross-Compiler, libgcrypt
gniibe added a comment to T5365: --with-libgpg-error-prefix doesn't affect gpgrt-config path detection.

Let me clarify the use case of gpg-error.m4.

Nov 15 2021, 2:30 AM · MacOS, gpgrt, Cross-Compiler, libgcrypt
wrobelda added a comment to T5365: --with-libgpg-error-prefix doesn't affect gpgrt-config path detection.

If it is new, it may be the change of this commit rC8e3cd4c4677c: build: Update gpg-error.m4.

Nov 15 2021, 1:22 AM · MacOS, gpgrt, Cross-Compiler, libgcrypt

Nov 11 2021

Jakuje added a comment to T5636: Run integrity checks + selftests from library constructor in FIPS.

I just wanted to add one more note that i just found out that the tests --disable-hwf or gcry_control GCRYCTL_DISABLE_HWF have no effect in case the global_init() is called from constructor.

Nov 11 2021, 12:08 PM · FIPS, libgcrypt, Bug Report

Nov 10 2021

gniibe added a project to T5610: macOS 11 or newer support: Update libtool: gpgme.

Also applied to gpgme.

Nov 10 2021, 3:07 AM · gpgme, MacOS, ntbtls, npth, libksba, libassuan, libgcrypt, gpgrt
gniibe added a comment to T5610: macOS 11 or newer support: Update libtool.

Since there is no problem with libgpg-error 1.43, I applied it to other libraries: npth, libassuan, libksba, and ntbtls.

Nov 10 2021, 3:04 AM · gpgme, MacOS, ntbtls, npth, libksba, libassuan, libgcrypt, gpgrt
gniibe added a comment to T5512: Implement service indicators.

I'll fix regressions: failures of pubkey and pkcs1v2.

Nov 10 2021, 2:09 AM · Feature Request, FIPS, libgcrypt

Nov 9 2021

werner added a comment to T5523: jitter entropy RNG update.

Yes, keep the internal SHA-3.

Nov 9 2021, 11:33 AM · FIPS, libgcrypt
gniibe added a comment to T5636: Run integrity checks + selftests from library constructor in FIPS.

We will have rnd-getentropy.c

Nov 9 2021, 11:16 AM · FIPS, libgcrypt, Bug Report
gniibe claimed T5636: Run integrity checks + selftests from library constructor in FIPS.
Nov 9 2021, 11:08 AM · FIPS, libgcrypt, Bug Report
gniibe moved T5636: Run integrity checks + selftests from library constructor in FIPS from Backlog to Next on the FIPS board.
Nov 9 2021, 11:08 AM · FIPS, libgcrypt, Bug Report
gniibe added a comment to T5512: Implement service indicators.

Applied and pushed symmetric algo for basic.

Nov 9 2021, 7:37 AM · Feature Request, FIPS, libgcrypt
gniibe added a comment to T5636: Run integrity checks + selftests from library constructor in FIPS.

Let me clean up rndlinux.c for current use case, at first.

Nov 9 2021, 7:07 AM · FIPS, libgcrypt, Bug Report
gniibe added a comment to T5523: jitter entropy RNG update.

I decided to use 3.3.0 disabling pthread feature.

Nov 9 2021, 6:41 AM · FIPS, libgcrypt

Nov 8 2021

Jakuje added a comment to T5512: Implement service indicators.

Thank you for merging the important parts of the patches and implementing similar stuff for DSA. You are right that DSA is supported in the 140-3 specs so it is fine to keep it enabled with the keylength constraints.

Nov 8 2021, 9:02 AM · Feature Request, FIPS, libgcrypt
gniibe added a comment to T5512: Implement service indicators.

Applied parts except part 2.
The part 3 are modified version, so that memory can be released correctly.

Nov 8 2021, 6:58 AM · Feature Request, FIPS, libgcrypt

Nov 5 2021

Jakuje added a comment to T5512: Implement service indicators.

Implicit indicators mean that we need to go through the all algorithms and verify that they work if they have approved key sizes/parameters and do not work when they do not.

Nov 5 2021, 2:27 PM · Feature Request, FIPS, libgcrypt
gniibe added a comment to T5636: Run integrity checks + selftests from library constructor in FIPS.

Firstly, applied uncontroversial part in rC976673425784: doc: Reference the new FIPS 140-3

Nov 5 2021, 7:23 AM · FIPS, libgcrypt, Bug Report

Nov 3 2021

werner closed T5610: macOS 11 or newer support: Update libtool as Resolved.
Nov 3 2021, 3:16 PM · gpgme, MacOS, ntbtls, npth, libksba, libassuan, libgcrypt, gpgrt
Jakuje added a comment to T5523: jitter entropy RNG update.

If I read it right, the version 3.1.0 adds the pthread requirement. Using 3.0.2 should be fine for us.

Nov 3 2021, 2:39 PM · FIPS, libgcrypt

Nov 2 2021

Jakuje added a comment to T5636: Run integrity checks + selftests from library constructor in FIPS.

The most of the stuff about boot blocking was discussed in the bug https://bugzilla.redhat.com/show_bug.cgi?id=1569393 (private). There were some bugs in our patches, but also some issue in the kernel that locked the boot process (in FIPS mode).

Nov 2 2021, 9:12 PM · FIPS, libgcrypt, Bug Report

Nov 1 2021

gniibe claimed T5665: libgcrypt : Restrict message digest use for FIPS 140-3.
Nov 1 2021, 6:59 AM · FIPS, Bug Report, libgcrypt
gniibe added a comment to T5665: libgcrypt : Restrict message digest use for FIPS 140-3.

Check for FIPS has been added. (1) and (2) were solved.

Nov 1 2021, 6:59 AM · FIPS, Bug Report, libgcrypt
gniibe added a comment to T5523: jitter entropy RNG update.

Its copyright notice in upstream now refers LICENSE file, which requires some arrangement.

Nov 1 2021, 6:48 AM · FIPS, libgcrypt

Oct 29 2021

gniibe added a comment to T5523: jitter entropy RNG update.

I work on gniibe/jitterent branch.
I realized that full featured jitterentropy now requires pthread. Timer-less mode uses threads for entropy. This is not good for libgcrypt use.

Oct 29 2021, 8:05 AM · FIPS, libgcrypt

Oct 27 2021

Jakuje closed T5669: Run continuous random test in FIPS mode as Invalid.

OK. Sorry for the noise. I got a clarification that the test is no longer needed so closing this issue.

Oct 27 2021, 11:48 AM · libgcrypt, FIPS, Bug Report

Oct 25 2021

Jakuje added a comment to T5669: Run continuous random test in FIPS mode.

From the FIPS Certs draft for RHEL 8.5, I have the following sentence:

Oct 25 2021, 3:04 PM · libgcrypt, FIPS, Bug Report
werner reassigned T5523: jitter entropy RNG update from werner to gniibe.
Oct 25 2021, 11:25 AM · FIPS, libgcrypt
werner edited projects for T5512: Implement service indicators, added: Feature Request; removed Bug Report.

We are currently using "implict" service indicators but eventually we may change Libgcrypt to support explicit indicators.

Oct 25 2021, 11:23 AM · Feature Request, FIPS, libgcrypt
werner lowered the priority of T5512: Implement service indicators from High to Normal.
Oct 25 2021, 11:20 AM · Feature Request, FIPS, libgcrypt
gniibe moved T5665: libgcrypt : Restrict message digest use for FIPS 140-3 from Backlog to Next on the FIPS board.
Oct 25 2021, 11:09 AM · FIPS, Bug Report, libgcrypt
gniibe moved T5244: libgcrypt: Restrict MD5 use from Backlog to Ready for release on the FIPS board.
Oct 25 2021, 11:08 AM · Bug Report, FIPS, libgcrypt
gniibe moved T5669: Run continuous random test in FIPS mode from Backlog to Next on the FIPS board.
Oct 25 2021, 11:07 AM · libgcrypt, FIPS, Bug Report

Oct 22 2021

gniibe added a comment to T5669: Run continuous random test in FIPS mode.

I understand the point in the 1706920, but I'm afraid that the patch itself would not be directly related for the bug. My point: It surely may catch a most serious failure, but not many failures (if we need to check here).

Oct 22 2021, 3:02 AM · libgcrypt, FIPS, Bug Report

Oct 21 2021

Jakuje added a comment to T5636: Run integrity checks + selftests from library constructor in FIPS.

Fair enough. Unfortunately, the separation is not completely clear from the dist git history, so please, excuse any inaccuracies I will provide here. I will try to reference particular bugs so we can get back to them if needed:

Oct 21 2021, 10:06 PM · FIPS, libgcrypt, Bug Report
Jakuje created T5669: Run continuous random test in FIPS mode.
Oct 21 2021, 9:08 PM · libgcrypt, FIPS, Bug Report

Oct 20 2021

Jakuje added a comment to T5665: libgcrypt : Restrict message digest use for FIPS 140-3.

At this moment, we agreed on keeping the current behavior and not allowing the SHA1 for verification either. But we might need to revisit that in the future if this will cause issues. Or we might go the way of switching the service to non-fips if needed, rather than creating some more middle ground.

Oct 20 2021, 4:20 PM · FIPS, Bug Report, libgcrypt