Page MenuHome GnuPG
Feed Advanced Search

Jun 7 2022

Jakuje created T6019: Parsing AEAD preference string parsing causes reads uninitialized memory.
Jun 7 2022, 11:58 AM · patch, gnupg (gpg23), Bug Report
Jakuje created T6018: libassuan: Coverity reports.
Jun 7 2022, 11:25 AM · patch, libassuan, Bug Report

May 30 2022

Jakuje added a comment to T6007: coverity issues in pinentry.

AFAIK the above case has a lot of wiggle room to fit one PID and the surrounded string into 400 bytes and even if it would need to truncate, it would write terminating character, at least on Linux:

May 30 2022, 9:20 PM · pinentry, Bug Report
Jakuje created T6007: coverity issues in pinentry.
May 30 2022, 3:28 PM · pinentry, Bug Report

May 13 2022

Jakuje added a comment to T5975: Allow signature verification using specific RSA keys <2k in FIPS mode.

Ok. Thank you for the clarification. I will drop the second part and keep only the FIPS change in the patch. Merge request already updated.

May 13 2022, 11:17 AM · backport, patch, libgcrypt, FIPS, Feature Request

May 12 2022

Jakuje created T5975: Allow signature verification using specific RSA keys <2k in FIPS mode.
May 12 2022, 2:53 PM · backport, patch, libgcrypt, FIPS, Feature Request

May 11 2022

Jakuje created T5973: libgcrypt: Minor test issues reported by coverity.
May 11 2022, 6:19 PM · backport, patch, libgcrypt, Bug Report

May 4 2022

Jakuje created T5964: gnupg should use the KDFs implemented in libgcrypt.
May 4 2022, 3:16 PM · gnupg26, FIPS, libgcrypt, Feature Request

Apr 13 2022

Jakuje created T5930: Use the FIPS-compatible digest&sign API.
Apr 13 2022, 7:54 PM · FIPS, Feature Request
Jakuje added a project to T5929: gnupg fails to add ssh key to control entry in FIPS mode with libgcrypt 1.10.1: FIPS.
Apr 13 2022, 4:15 PM · FIPS, gnupg (gpg23), Bug Report
Jakuje created T5929: gnupg fails to add ssh key to control entry in FIPS mode with libgcrypt 1.10.1.
Apr 13 2022, 4:14 PM · FIPS, gnupg (gpg23), Bug Report

Apr 11 2022

Jakuje added a comment to T5835: libgcrypt: More robust/portable integrity check.

I was pointed by Daiki to the following patch in Fedora binutils, which allows listing the fdo packaging metadata, but it does not list any other unknown objects and unfortunately fails hard:

Apr 11 2022, 2:00 PM · Bug Report, libgcrypt, FIPS

Apr 8 2022

Jakuje added a comment to T5835: libgcrypt: More robust/portable integrity check.

I have one follow-up is that the readelf chokes on the integrity note for some reason:

$ readelf -n /usr/lib64/libgcrypt.so.20.4.1
Displaying notes found in: .note.fdo.integrity
  Owner                Data size 	Description
  FDO                  0x00000020	Unknown note type: (0x8e2afeca)

I assume this is just because the readelf does not know this type. I see this type was initially proposed by Daiki, but I did not find any other sources for this magic number so before filling bugs for readelf, do we have some doc why the 0xcafe2a8e is used?

Apr 8 2022, 9:33 PM · Bug Report, libgcrypt, FIPS

Apr 5 2022

Jakuje created T5918: Disable RSA PKCS #1.5 encryption in FIPS mode.
Apr 5 2022, 10:31 AM · backport, libgcrypt, FIPS, Bug Report

Mar 29 2022

Jakuje created T5907: bench-slope missing brainpool curves in master branch.
Mar 29 2022, 10:56 AM · libgcrypt, Bug Report

Mar 21 2022

Jakuje added a comment to T5885: Better message than "Inappropriate ioctl for device" for tty pinentries.

Adding

GPG_TTY=$(tty)
export GPG_TTY

makes this working so thank you for the pointer.

Mar 21 2022, 4:23 PM · Feature Request, pinentry, gnupg

Mar 18 2022

Jakuje added a comment to T5885: Better message than "Inappropriate ioctl for device" for tty pinentries.

the -v does not show more useful info on the gpg side:

# gpg2 --quick-gen-key admin
About to create a key for:
    "admin"
Mar 18 2022, 3:00 PM · Feature Request, pinentry, gnupg
Jakuje created T5885: Better message than "Inappropriate ioctl for device" for tty pinentries.
Mar 18 2022, 1:25 PM · Feature Request, pinentry, gnupg

Mar 8 2022

Jakuje added a comment to T5870: libgcrypt: AEAD API for FIPS 140 (in future).

You are combining two concepts here -- the KDF and the AEAD cipher itself (at least from the FIPS terminology). I would like to avoid mixing these two together in the new API. If you would like to implement the SSH/TLS KDF, I would suggest to use the kdf API you already have. Then we are here left only with a new geniv API to implement. In the T4873 I mentioned example how it is now used in libssh using libgcrypt, which implements the iv increment outside of the libgcrypt:

Mar 8 2022, 3:51 PM · Feature Request, FIPS, libgcrypt

Mar 7 2022

Jakuje added a comment to T5816: mailing list address confusion (lists.gnupg.org shown, but does not work).

The mails from these days still contain the following header:

List-Post: <mailto:gnupg-devel@lists.gnupg.org>

which is probably causing the mail client directing the mails to this address. Is there a way to change or or make it an alias so it is easier for people to use the mailing list without finding this issue?

Mar 7 2022, 11:41 AM · gpgweb, Bug Report

Mar 3 2022

Jakuje added a comment to T5870: libgcrypt: AEAD API for FIPS 140 (in future).

I think this is not urgent as we are able to FIPS certify libgcrypt without that, but the modern protocols and algorithm use this and if we want to use libgcrypt to implement these in FIPS compliant way, we certainly need something like that.

Mar 3 2022, 2:08 PM · Feature Request, FIPS, libgcrypt

Feb 24 2022

Jakuje updated the task description for T5856: Forcing aead when creating sign & encrypted files creates inconsistent results.
Feb 24 2022, 9:10 AM · gnupg (gpg23), Bug Report
Jakuje created T5856: Forcing aead when creating sign & encrypted files creates inconsistent results.
Feb 24 2022, 9:10 AM · gnupg (gpg23), Bug Report

Feb 2 2022

Jakuje added a watcher for FIPS: Jakuje.
Feb 2 2022, 10:30 AM

Jan 25 2022

Jakuje added a comment to T5692: New entropy gatherer using the genentropy system call..

For the record, there is a new report on the mailing list about this module on MacOS:

Jan 25 2022, 10:43 AM · libgcrypt, FIPS

Jan 24 2022

Jakuje added a comment to T5512: Implement service indicators.

Thanks. Looks good to me.

Jan 24 2022, 1:38 PM · Feature Request, FIPS, libgcrypt

Jan 17 2022

Jakuje added a comment to T5512: Implement service indicators.

This is my draft for the FIPS indicator KDF. I think we do not need to keep the original GCRYCTL_FIPS_SERVICE_INDICATOR if we replace it also in the tests. This will also need some tests and documentation update.

Jan 17 2022, 7:01 PM · Feature Request, FIPS, libgcrypt

Jan 11 2022

Jakuje added a comment to T5512: Implement service indicators.

I went through the documentation related to FIPS and updated some wording to match reality. It will probably require still some more work.

Jan 11 2022, 7:10 PM · Feature Request, FIPS, libgcrypt
Jakuje added a comment to T5512: Implement service indicators.

This is my draft for the FIPS indicator KDF. I think we do not need to keep the original GCRYCTL_FIPS_SERVICE_INDICATOR if we replace it also in the tests. This will also need some tests and documentation update.

Jan 11 2022, 3:46 PM · Feature Request, FIPS, libgcrypt

Jan 10 2022

Jakuje added a comment to T5512: Implement service indicators.

The previous comment should have come to the T5600. Sorry for the noise.

Jan 10 2022, 4:30 PM · Feature Request, FIPS, libgcrypt
Jakuje updated subscribers of T5600: Provide module name/version API for FIPS 140-3.

Sorry for resurrecting the done task, but I got a message from @pmgdeb who noticed there is mismatch between parenthesis in the --with-fips-module-version help string. The attached patch fixes the issue and add proper help text.

Jan 10 2022, 3:41 PM · libgcrypt, FIPS, Bug Report
Jakuje added a comment to T5512: Implement service indicators.

Sorry for resurrecting the done task, but I got a message from @pmgdeb who noticed there is mismatch between parenthesis in the --with-fips-module-version help string. The attached patch fixes the issue and add proper help text.

Jan 10 2022, 9:34 AM · Feature Request, FIPS, libgcrypt

Jan 4 2022

Jakuje added a comment to T5747: Provide a way to request non-FIPS service in FIPS mode.

Thanks. Looks good to me (both merged changes and the above proposal). In addition to the changes proposed above, we certainly need to update the documentation about this, probably also the FSM diagram.

Jan 4 2022, 12:47 PM · Feature Request, FIPS, libgcrypt

Dec 21 2021

Jakuje added a comment to T5692: New entropy gatherer using the genentropy system call..

We talked today about the renaming the current "linux" entropy module to "oldlinux" would make sense.

Dec 21 2021, 5:13 PM · libgcrypt, FIPS
Jakuje created T5747: Provide a way to request non-FIPS service in FIPS mode.
Dec 21 2021, 4:58 PM · Feature Request, FIPS, libgcrypt

Dec 16 2021

Jakuje added a comment to T5636: Run integrity checks + selftests from library constructor in FIPS.

Thank you. Tested locally that it does what it is supposed to do and all tests passed for me as expected.

Dec 16 2021, 6:43 PM · FIPS, libgcrypt, Bug Report
Jakuje added a comment to T5692: New entropy gatherer using the genentropy system call..

Reading through the changes, the content and usage of the getentropy looks good.

Dec 16 2021, 3:58 PM · libgcrypt, FIPS
Jakuje added a comment to T5706: libgcrypt: random: Remove the feature getting randomness from random daemon.

the random daemon is still part of the configure.ac and the undefined _gcry_daemon_initialize_basics() and _gcry_daemon_randomize() is still used under the USE_RANDOM_DAEMON guard in several places. I think at least the following cases should be removed too (or the configure check to be modified to throw error or warning):

Dec 16 2021, 1:38 PM · libgcrypt

Dec 9 2021

Jakuje created T5726: Setting "compliance de-vs" in gpg.conf with libgcrypt 1.9.0 and newer causes confusing error messages.
Dec 9 2021, 5:33 PM · Not A Bug, libgcrypt, gnupg
Jakuje added a comment to T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.

It turned out that the new *.inp files are not part of the release tarball, which makes the tests from generated tarball fail. The attached patch should fix this issue.

Dec 9 2021, 5:06 PM · FIPS, libgcrypt, Feature Request

Dec 8 2021

Jakuje added a comment to T5710: FIPS: disable DSA for FIPS.

Sorry for the noise. There were couple of other places which I missed initially and which are covered in the v2 patch which follows:

Dec 8 2021, 1:25 PM · FIPS, libgcrypt
Jakuje added a comment to T5710: FIPS: disable DSA for FIPS.

It turns out together with rCe96980022e5e some tests are failing in FIPS mode. The attached patch should handle the failures.

Dec 8 2021, 12:39 PM · FIPS, libgcrypt

Dec 7 2021

Jakuje renamed T5720: The libgpg-error is using old inet_addr() unconditionally from The libgpg-error is using old inet_pton() unconditionally to The libgpg-error is using old inet_addr() unconditionally.
Dec 7 2021, 12:12 PM · gpgrt, Bug Report

Dec 6 2021

Jakuje created T5720: The libgpg-error is using old inet_addr() unconditionally.
Dec 6 2021, 8:54 PM · gpgrt, Bug Report
Jakuje added a comment to T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.

I have just a note about this issue, that it would be helpful to exercise this new API in some tests. Right now, only the old API is tested.

Dec 6 2021, 12:38 PM · FIPS, libgcrypt, Feature Request
Jakuje added a comment to T5512: Implement service indicators.

It turns out that the asymmetric key operations are not yet properly enforced with the .disabled flag. While the other key crypto usually has some "open" api, where this can be simply captured, the pubkey API has several entry points and the "test_algo" is not enough to check for disabled key types.

Dec 6 2021, 11:56 AM · Feature Request, FIPS, libgcrypt
Jakuje added a comment to T5636: Run integrity checks + selftests from library constructor in FIPS.

Thank you. My local tests (in emulated fips mode and normal mode) do not show any errors with current master branch.

Dec 6 2021, 11:03 AM · FIPS, libgcrypt, Bug Report

Dec 3 2021

Jakuje added a comment to T5645: RSA/DSA keygen modification for FIPS/ACVP testing.

Thanks. I did some git archeology and found the first mention of this in the following commit in 2011 without much details:

Dec 3 2021, 10:21 AM · libgcrypt, FIPS, Bug Report

Dec 2 2021

Jakuje added a comment to T5645: RSA/DSA keygen modification for FIPS/ACVP testing.

Let me get back to this once more as one of the parts for RSA was initially missed:

diff -up libgcrypt-1.8.4/cipher/rsa.c.fips-keygen libgcrypt-1.8.4/cipher/rsa.c
--- libgcrypt-1.8.4/cipher/rsa.c.fips-keygen	2017-11-23 19:16:58.000000000 +0100
+++ libgcrypt-1.8.4/cipher/rsa.c	2019-02-12 14:29:25.630513971 +0100
@@ -696,7 +696,7 @@ generate_x931 (RSA_secret_key *sk, unsig
Dec 2 2021, 4:34 PM · libgcrypt, FIPS, Bug Report
Jakuje created T5714: tests: Do not run tests for algorithms that are not built-in.
Dec 2 2021, 2:21 PM · libgcrypt, Bug Report
Jakuje added a comment to T5523: jitter entropy RNG update.

I went through some more testing and noticed one missing file in the release tarball, that prevents building libgcrypt now. Should be fixed with the attached patch.

Dec 2 2021, 12:32 PM · FIPS, libgcrypt
Jakuje added a comment to T5636: Run integrity checks + selftests from library constructor in FIPS.

I did go through a bit more testing too and the selftests still initialize and use the secure memory (and the t-secmem fails in FIPS mode if we invoke selftests from constructor). Now from run_random_selftests() -> _gcry_random_selftest() -> drbg_healthcheck() -> _gcry_rngdrbg_healthcheck_one(). So this means that we either need to de-initialize secure memory after the constructor selftests or prevent its initialization as I suggested in some of the previous comments.

Dec 2 2021, 12:29 PM · FIPS, libgcrypt, Bug Report

Nov 26 2021

Jakuje added a comment to T5512: Implement service indicators.

I do not like the idea of using the get_config interface for this. It should be easily usable by applications to check for single cipher/mode so int/bool return values would be preferred against the string ones (which are now used in the get_config). I am not sure if getting all the configuration in one string blob would be any use (except for some auditing) either.

Nov 26 2021, 12:22 PM · Feature Request, FIPS, libgcrypt

Nov 23 2021

Jakuje added a comment to T5393: gnupg coverity static analysis reports.

(forgot to upload the patch to the last comment)

Nov 23 2021, 3:59 PM · gnupg (gpg23), Bug Report
Jakuje added a comment to T5393: gnupg coverity static analysis reports.

I am fine with either way. The memcmp variant is probably cleaner to make sure all works as expected in all cases.

Nov 23 2021, 3:59 PM · gnupg (gpg23), Bug Report
Jakuje added a comment to T5636: Run integrity checks + selftests from library constructor in FIPS.

Thank you. Extending the semantics of GCRYCTL_CLOSE_RANDOM_DEVICE sounds good to me. I think the deinit functions were created initially especially not to change the semantics of existing code using GCRYCTL_CLOSE_RANDOM_DEVICE, but I agree that it will probably not be an issue.

Nov 23 2021, 9:59 AM · FIPS, libgcrypt, Bug Report

Nov 16 2021

Jakuje added a comment to T5512: Implement service indicators.

With just implicit indicators, we would have to block all non-approved cipher modes and kdfs including the OCB mode and skcrypt, which would probably make gnupg2 unusable in FIPS mode, which is not our intention.

Nov 16 2021, 1:10 PM · Feature Request, FIPS, libgcrypt

Nov 11 2021

Jakuje added a comment to T5636: Run integrity checks + selftests from library constructor in FIPS.

I just wanted to add one more note that i just found out that the tests --disable-hwf or gcry_control GCRYCTL_DISABLE_HWF have no effect in case the global_init() is called from constructor.

Nov 11 2021, 12:08 PM · FIPS, libgcrypt, Bug Report

Nov 8 2021

Jakuje added a comment to T5512: Implement service indicators.

Thank you for merging the important parts of the patches and implementing similar stuff for DSA. You are right that DSA is supported in the 140-3 specs so it is fine to keep it enabled with the keylength constraints.

Nov 8 2021, 9:02 AM · Feature Request, FIPS, libgcrypt

Nov 5 2021

Jakuje added a comment to T5512: Implement service indicators.

Implicit indicators mean that we need to go through the all algorithms and verify that they work if they have approved key sizes/parameters and do not work when they do not.

Nov 5 2021, 2:27 PM · Feature Request, FIPS, libgcrypt

Nov 3 2021

Jakuje added a comment to T5523: jitter entropy RNG update.

If I read it right, the version 3.1.0 adds the pthread requirement. Using 3.0.2 should be fine for us.

Nov 3 2021, 2:39 PM · FIPS, libgcrypt

Nov 2 2021

Jakuje added a comment to T5636: Run integrity checks + selftests from library constructor in FIPS.

The most of the stuff about boot blocking was discussed in the bug https://bugzilla.redhat.com/show_bug.cgi?id=1569393 (private). There were some bugs in our patches, but also some issue in the kernel that locked the boot process (in FIPS mode).

Nov 2 2021, 9:12 PM · FIPS, libgcrypt, Bug Report

Oct 27 2021

Jakuje closed T5669: Run continuous random test in FIPS mode as Invalid.

OK. Sorry for the noise. I got a clarification that the test is no longer needed so closing this issue.

Oct 27 2021, 11:48 AM · libgcrypt, FIPS, Bug Report

Oct 25 2021

Jakuje added a comment to T5669: Run continuous random test in FIPS mode.

From the FIPS Certs draft for RHEL 8.5, I have the following sentence:

Oct 25 2021, 3:04 PM · libgcrypt, FIPS, Bug Report

Oct 21 2021

Jakuje added a comment to T5636: Run integrity checks + selftests from library constructor in FIPS.

Fair enough. Unfortunately, the separation is not completely clear from the dist git history, so please, excuse any inaccuracies I will provide here. I will try to reference particular bugs so we can get back to them if needed:

Oct 21 2021, 10:06 PM · FIPS, libgcrypt, Bug Report
Jakuje created T5669: Run continuous random test in FIPS mode.
Oct 21 2021, 9:08 PM · libgcrypt, FIPS, Bug Report

Oct 20 2021

Jakuje added a comment to T5665: libgcrypt : Restrict message digest use for FIPS 140-3.

At this moment, we agreed on keeping the current behavior and not allowing the SHA1 for verification either. But we might need to revisit that in the future if this will cause issues. Or we might go the way of switching the service to non-fips if needed, rather than creating some more middle ground.

Oct 20 2021, 4:20 PM · FIPS, Bug Report, libgcrypt
Jakuje added a comment to T5665: libgcrypt : Restrict message digest use for FIPS 140-3.

Thank you for having a look into that. The change looks fine, but I need to get some clarification about what "Legacy use" means for "Digital signature verification" in the Table 8 of https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar2.pdf

Oct 20 2021, 10:34 AM · FIPS, Bug Report, libgcrypt

Oct 19 2021

Jakuje added a comment to T5433: libgcrypt: Do not use SHA1 by default.

Sorry, I was wrong. We don't need any changes.

When using gcry_pk_hash_sign and gcry_pk_hash_verify, approved digest algos are guaranteed when FIPS enabled.

Yes, it's a user of the function who supplies HD (handle for hash). (I had wrong assumption HD could be with non-approved digest algo.) But it is needed for the user to enable the HD and to feed message beforehand. At that stage, non-approved digest algo must fail.

Oct 19 2021, 11:54 AM · FIPS, libgcrypt, Bug Report

Oct 14 2021

Jakuje added a comment to T5617: fips: Check library integrity before running selftests.

OK, let us start discussion by applying the patch first.

I have wondered if introducing another state in FSM would be needed, because:

Oct 14 2021, 6:58 PM · FIPS, libgcrypt, Bug Report

Oct 8 2021

Jakuje added a comment to T5645: RSA/DSA keygen modification for FIPS/ACVP testing.

sorry for a confusion. We do not plan to certify DSA so disregard the second part of the patch.

Oct 8 2021, 4:17 PM · libgcrypt, FIPS, Bug Report
Jakuje created T5645: RSA/DSA keygen modification for FIPS/ACVP testing.
Oct 8 2021, 11:05 AM · libgcrypt, FIPS, Bug Report

Oct 6 2021

Jakuje updated the task description for T5636: Run integrity checks + selftests from library constructor in FIPS.
Oct 6 2021, 4:47 PM · FIPS, libgcrypt, Bug Report

Oct 4 2021

Jakuje created T5636: Run integrity checks + selftests from library constructor in FIPS.
Oct 4 2021, 4:10 PM · FIPS, libgcrypt, Bug Report

Sep 29 2021

Jakuje added a comment to T2385: support more than 1024 fds..

Hi, was there any update on this? I found the following bug [0] in libgcrypt, which we solved [1] with using poll ages ago.

Sep 29 2021, 6:13 PM · gpgrt, Feature Request, gpgme

Sep 24 2021

Jakuje added a comment to T5550: Fix check_binary_integrity.

Thanks. This looks good to me.

Sep 24 2021, 9:30 AM · FIPS, libgcrypt

Sep 22 2021

Jakuje added a comment to T5550: Fix check_binary_integrity.

I tried to generate a tarball from master and I failed to build the hmac256 binary because the hmac256.h was not packaged into the dist tarball in master. If hmac256 should be standalone binary, I propose it should not need have a separate header file:

Sep 22 2021, 4:53 PM · FIPS, libgcrypt
Jakuje created T5617: fips: Check library integrity before running selftests.
Sep 22 2021, 4:37 PM · FIPS, libgcrypt, Bug Report

Sep 17 2021

Jakuje added a comment to T5600: Provide module name/version API for FIPS 140-3.

I have a draft, which results in the following "API" of the name-version:

Sep 17 2021, 6:13 PM · libgcrypt, FIPS, Bug Report
Jakuje added a comment to T5244: libgcrypt: Restrict MD5 use.

I had in my mind something like this:

Sep 17 2021, 3:36 PM · Bug Report, FIPS, libgcrypt

Sep 16 2021

Jakuje added a comment to T5393: gnupg coverity static analysis reports.

We ran the coverity again with the new 2.3.1 release and there are couple of new stuff that I probably missed in the initial review.

Sep 16 2021, 3:36 PM · gnupg (gpg23), Bug Report
Jakuje added a comment to T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.

Thank you. On the first sight, it looks reasonable, but I would like to experiment with it a bit to see all use cases are covered.

Sep 16 2021, 11:52 AM · FIPS, libgcrypt, Feature Request
Jakuje added a comment to T5520: Fix tests in FIPS mode.

Thanks. I think we are good here. If we will decide to pursuate the brainpool switch, I will open a new issue.

Sep 16 2021, 11:07 AM · FIPS, libgcrypt, Bug Report

Sep 15 2021

Jakuje created T5600: Provide module name/version API for FIPS 140-3.
Sep 15 2021, 4:34 PM · libgcrypt, FIPS, Bug Report
Jakuje added a comment to T5520: Fix tests in FIPS mode.

Oh, my bad. I probably used wrong git command. Uploaded now the patches themselves:

Sep 15 2021, 9:51 AM · FIPS, libgcrypt, Bug Report

Sep 13 2021

Jakuje added a comment to T5520: Fix tests in FIPS mode.

I have one more patch set to improve FIPS testing in test/curves.c. In the past, it was basically skipped altogether in FIPS mode. This implements more fine-grained selection of what is being tested. This is the first part.

Sep 13 2021, 8:53 AM · FIPS, libgcrypt, Bug Report

Sep 6 2021

Jakuje added a comment to T5576: New set of API for public key cryptography.

I added couple of minor comments. I hope they went into somewhere.

Sep 6 2021, 2:58 PM · libgcrypt, Feature Request
Jakuje added a comment to T5520: Fix tests in FIPS mode.

looks good to me. Tested now with master 47e425e07995454573e28c13c08229d2f8a75642 and all tests pass for me in and out of FIPS mode as well as in the "soft" one.

Sep 6 2021, 1:08 PM · FIPS, libgcrypt, Bug Report

Aug 23 2021

Jakuje added a comment to T5523: jitter entropy RNG update.

We should update jitterentropy to 3.0.2 or newer, which should be easier to get through certification, if we will go this way. From FIPS perspective, we should be fine with either going through getrandom only or with jitter entropy, but the bottom-line was that we should probably keep both as we do now.

Aug 23 2021, 12:46 PM · FIPS, libgcrypt
Jakuje added a comment to T5244: libgcrypt: Restrict MD5 use.

From Stephan I got the following response to the allocation handler use case

Aug 23 2021, 12:00 PM · Bug Report, FIPS, libgcrypt

Aug 19 2021

Jakuje added a comment to T5550: Fix check_binary_integrity.

We have the same patch (including the hmac key and we use the switch. The reasoning on our side was to be compatible with fipscheck, but it is no longer used since last year and we use just the hmac256 tool:

Aug 19 2021, 12:52 PM · FIPS, libgcrypt

Aug 18 2021

Jakuje added a comment to T5244: libgcrypt: Restrict MD5 use.

Right. The clarification is that SHA1 itself (for non-security and non-signature use) is still allowed in FIPS mode. But it is not allowed to be used as part of signature schemes of the new API in FIPS mode. The old API, which allows raw signatures without digests, should just fail in FIPS mode too. And the FIPS-compatible gnupg should use the new API too (it would be good to think about this when putting it together).

Aug 18 2021, 7:46 PM · Bug Report, FIPS, libgcrypt
Jakuje added a comment to T5523: jitter entropy RNG update.

For Linux and FIPS, we should be actually fine with using /dev/random or getrandom().

Aug 18 2021, 7:24 PM · FIPS, libgcrypt
Jakuje added a comment to T5540: Update fipsdrv and cavs_driver.pl.

The CAVS driver can be safely removed. The certification goes through the ACVP these days so it does not make sense to keep this.

Aug 18 2021, 12:46 PM · FIPS, libgcrypt
Jakuje created T5559: libksba: possible NULL pointer dereference.
Aug 18 2021, 11:35 AM · libksba, Bug Report

Aug 16 2021

Jakuje added a comment to T5244: libgcrypt: Restrict MD5 use.

I went a bit back to the history to figure out what is the enforced and soft fips mode as it was initially not completely clear to me. For the record, I used the following bug from 9 years ago:

Aug 16 2021, 7:11 PM · Bug Report, FIPS, libgcrypt
Jakuje added a comment to T5520: Fix tests in FIPS mode.

Tested the master on (faked) FIPS and non-FIPS Fedora and I created couple of more changes for master to work in FIPS mode:

Aug 16 2021, 4:16 PM · FIPS, libgcrypt, Bug Report

Aug 5 2021

Jakuje created T5548: pinentry default timeout does not match documentation.
Aug 5 2021, 9:31 AM · Documentation, pinentry, Bug Report

Aug 3 2021

Jakuje added a comment to T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.

In RHEL, we do not have anything about PCT so the PCT requirement is not completely clear to me: https://git.centos.org/rpms/libgcrypt/blob/c8s/f/SOURCES

Aug 3 2021, 1:33 PM · FIPS, libgcrypt, Feature Request

Jul 13 2021

Jakuje added a comment to T5520: Fix tests in FIPS mode.

I went through the patches above + what I suggested in previous comments, tested everything against both upstream and libgcrypt in Fedora in FIPS mode. There were slight differences, some cases were already fixed in master, some needed to upstream some of our changes, but the result is 10 patches working in both FIPS and non-fips mode, hopefully enough annotated. If not, please, ask for clarifications.

Jul 13 2021, 11:25 PM · FIPS, libgcrypt, Bug Report