Page MenuHome GnuPG
Feed Advanced Search

Tue, May 7

Jakuje added a comment to T6511: EdDSA support in FIPS mode.

I think so. We did not submit a modules for recertification with these changes, but we do not plan this in close future so you can consider it completed.

Tue, May 7, 3:01 PM · FIPS, libgcrypt, Bug Report

Fri, Apr 26

Jakuje created T7105: libgpg-error: Memory leak in store_alias().
Fri, Apr 26, 9:35 AM · gpgrt, Bug Report

Mar 28 2024

Jakuje added a comment to T7065: pinentry 1.3.0 ships desktop file with icons, but does not install them.

For the reference, for now i just did the dummy install in the Fedora spec file:

Mar 28 2024, 1:30 PM · pinentry, Bug Report
Jakuje created T7065: pinentry 1.3.0 ships desktop file with icons, but does not install them.
Mar 28 2024, 12:15 PM · pinentry, Bug Report

Feb 12 2024

Jakuje created T6992: Fix possible uninitialized err variable in libskba der builder.
Feb 12 2024, 10:08 AM · libksba, Bug Report

Jan 31 2024

Jakuje created T6969: Fix shellcheck warning in gpgrt-config.
Jan 31 2024, 11:32 AM · gpgrt, Bug Report

Nov 27 2023

Jakuje added a comment to T6838: keyboxd hangs on stale locks after changing hostname.

Nope, The gpgconf --kill keyboxd hangs too, if I see right, while waiting for agent:

$ strace gpgconf --kill keyboxd
[...]
clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x7f2d74fe2a10) = 3244
wait4(3244, 0x7ffc9836e364, 0, NULL)    = ? ERESTARTSYS (To be restarted if SA_RESTART is set)
Nov 27 2023, 9:54 AM · gnupg24 (gnupg-2.4.4), Bug Report

Nov 24 2023

Jakuje created T6838: keyboxd hangs on stale locks after changing hostname.
Nov 24 2023, 5:11 PM · gnupg24 (gnupg-2.4.4), Bug Report

Aug 29 2023

Jakuje created T6689: Prolonging expiration date strips old signatures, confusing RPM.
Aug 29 2023, 12:46 PM · Support, gnupg

Jun 27 2023

Jakuje added a comment to T6539: The digest&sign/verify API with SHAKE-class digests does not work.

From the FIPS 186-5 there are some limitations to use the SHAKE in FIPS Mode that we will have to reflect:

Jun 27 2023, 5:22 PM · libgcrypt, FIPS, Bug Report

Jun 20 2023

Jakuje added a comment to T6539: The digest&sign/verify API with SHAKE-class digests does not work.

Thank you for having a look into that! The proposed patch looks good. Should we have this change also in master?

Jun 20 2023, 1:58 PM · libgcrypt, FIPS, Bug Report

Jun 15 2023

Jakuje created T6539: The digest&sign/verify API with SHAKE-class digests does not work.
Jun 15 2023, 5:34 PM · libgcrypt, FIPS, Bug Report

Jun 13 2023

Jakuje added a comment to T6511: EdDSA support in FIPS mode.

Another approach would be having "non-hash" algo for gcry_md_open.

Jun 13 2023, 9:53 AM · FIPS, libgcrypt, Bug Report

Jun 12 2023

Jakuje added a comment to T6271: The old FSF address in libgcrypt source code.

FYI, while going through the licenses again I noticed one of the pinentry files have even older address that so if you would do sed, this would not be matched:

Jun 12 2023, 4:11 PM · Documentation, libgcrypt, Bug Report

Jun 1 2023

Jakuje added a comment to T6511: EdDSA support in FIPS mode.

Correct, but the last revision of FIPS 140-3 lists the EdDSA already. The same for the IG for FIPS 140-3:

Jun 1 2023, 9:08 AM · FIPS, libgcrypt, Bug Report

May 31 2023

Jakuje created T6511: EdDSA support in FIPS mode.
May 31 2023, 4:51 PM · FIPS, libgcrypt, Bug Report

May 30 2023

Jakuje created T6507: SCRYPT does not work in FIPS mode.
May 30 2023, 11:33 AM · libgcrypt, FIPS, Bug Report

Mar 30 2023

Jakuje created T6433: SHA-1 digest is not considered weak.
Mar 30 2023, 12:00 PM · Bug Report

Mar 20 2023

Jakuje created T6417: FIPS service indicator regarding the public key algorithm flags and objects.
Mar 20 2023, 3:41 PM · libgcrypt, FIPS

Mar 6 2023

Jakuje added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

Actually, the same issue is in the mac case, which I missed on first couple of reviews:

-  enum gcry_mac_algos alg = va_arg (arg_ptr, enum gcry_cipher_algos);
+  enum gcry_mac_algos alg = va_arg (arg_ptr, enum gcry_mac_algos);
Mar 6 2023, 5:01 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
Jakuje added a comment to T6394: FIPS requires running PCT tests unconditionally.

We discussed this further with the lab and there are more problematic flags that we need to "cut" and we can not do that always in the code as for example the RFC6979 (deterministic ECDSA signatures) are not allowed in the current version of the FIPS documents, but it is used in the selftests (which is weirdly enough allowed) so we just need to mark it unapproved. Lets discuss this further tomorrow.

Mar 6 2023, 4:49 PM · FIPS, libgcrypt, Bug Report
Jakuje added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

Going through the code once more, there is one typo to be fixed:

+_gcry_fips_indicator_md (va_list arg_ptr)
+{
+  enum gcry_md_algos alg = va_arg (arg_ptr, enum gcry_cipher_algos);

should say

+_gcry_fips_indicator_md (va_list arg_ptr)
+{
+  enum gcry_md_algos alg = va_arg (arg_ptr, enum gcry_md_algos);

otherwise ack.

Mar 6 2023, 4:46 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS

Mar 2 2023

Jakuje created T6397: PCT failures inconsistency in regards to the FIPS error state.
Mar 2 2023, 9:46 AM · libgcrypt, FIPS, Bug Report

Mar 1 2023

Jakuje created T6396: the gcry_pk_hash_sign/verify operates in FIPS non-operational mode.
Mar 1 2023, 9:07 PM · libgcrypt, FIPS, Bug Report
Jakuje added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

We came to the same conclusion -- the SHAKE digests are not usable for sign/verify operations the way how it is implemented now. But it would be more clear if we would have explicit allow-list.

Mar 1 2023, 7:57 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
Jakuje created T6394: FIPS requires running PCT tests unconditionally.
Mar 1 2023, 3:57 PM · FIPS, libgcrypt, Bug Report
Jakuje created T6393: DRBG with SHA384 is no longer allowed in FIPS mode (and looks like impossible to enable anyway).
Mar 1 2023, 3:36 PM · FIPS, libgcrypt, Bug Report

Nov 30 2022

Jakuje created T6294: Import of EC448 keys fails.
Nov 30 2022, 5:29 PM · gnupg (gpg23), Bug Report

Nov 10 2022

Jakuje created T6271: The old FSF address in libgcrypt source code.
Nov 10 2022, 11:57 AM · Documentation, libgcrypt, Bug Report

Oct 20 2022

Jakuje added a comment to T6039: FIPS: Allow salt=NULL (or shorter salt) for HKDF.

In regards to this issue, we were also notified that the MD API using gcry_md_setkey() can be used to calculate HMACs and it does not have the needed input key length limitation. From the discussion here I read that we would like to keep the internal usage still available so my proposal would be to to add similar check as in gcry_mac_setkey() into the above function. Together with the revert, it is available in the following merge request:

Oct 20 2022, 6:33 PM · backport, libgcrypt, FIPS
Jakuje added a comment to T6039: FIPS: Allow salt=NULL (or shorter salt) for HKDF.

I read the document (SP 800-131Ar2) again. I think that it would be irrelevant for PKDF2, because it's password KDF, not deriving additional keys from a Cryptographic Key.

Oct 20 2022, 11:12 AM · backport, libgcrypt, FIPS

Oct 18 2022

Jakuje created T6248: FIPS compliant RSA OAEP encryption.
Oct 18 2022, 11:57 AM · libgcrypt, FIPS, Feature Request

Oct 7 2022

Jakuje added a comment to T6217: sha3: wrong results for large inputs.

One more nit regarding to the test is the format string for size_t which was using %d instead of %zu. This is fixed by the attached patch:

Oct 7 2022, 11:21 AM · libgcrypt, FIPS, Bug Report

Oct 5 2022

Jakuje added a comment to rCa6a6e94027ab: random: Get maximum 32B of entropy at once in FIPS Mode.

I tried to clarify the comment in the following merge request. Feel free to pull it from there or adjust if it is too verbose or missing some points:

Oct 5 2022, 9:17 AM

Oct 4 2022

Jakuje added a comment to rCa6a6e94027ab: random: Get maximum 32B of entropy at once in FIPS Mode.

Why is that not stated in my man page which knows about kernel 3.19? Is that a regression or a RedHat specific patch?

Oct 4 2022, 9:57 AM

Sep 30 2022

Jakuje added a comment to T6217: sha3: wrong results for large inputs.

One nit that I overlooked initially is the memory leak, which is fixed with the following patch:

Sep 30 2022, 2:56 PM · libgcrypt, FIPS, Bug Report

Sep 27 2022

Jakuje added a comment to T6219: Ensure minimum key length for KDF in FIPS mode.

The specs https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-132.pdf page 10 says specifically:

Sep 27 2022, 11:07 AM · libgcrypt, FIPS, Bug Report

Sep 26 2022

Jakuje added a comment to T6217: sha3: wrong results for large inputs.

The test looks good. I hope I changed the API in all the hw optimized implementations.

Sep 26 2022, 2:44 PM · libgcrypt, FIPS, Bug Report

Sep 23 2022

Jakuje created T6217: sha3: wrong results for large inputs.
Sep 23 2022, 7:20 PM · libgcrypt, FIPS, Bug Report
Jakuje added a comment to T6052: gnupg2 tpm2d tests do not work.

This still did not seem to help me in making the tests working on Fedora with git master. I am still getting wrong paths to the gpgconf

gpgscm: error running '/root/gnupg/tests/tools/gpgconf': probably not installed

There is a full reproducer and more complete log in https://bugzilla.redhat.com/show_bug.cgi?id=2089075#c11

Sep 23 2022, 10:53 AM · gnupg24 (gnupg-2.4.4), Tests, TPM, Bug Report

Sep 19 2022

Jakuje created T6212: The ssh keys are no longer returned in the order from control file after T5996.
Sep 19 2022, 3:12 PM · gnupg24 (gnupg-2.4.1), ssh, Feature Request

Aug 23 2022

Jakuje added a comment to T4873: Enable AES GCM in FIPS mode.

Thank you for your work on the proposal. I have two comments:

  • Do we have some test vector, which can be used in the testsute to test the new API?
  • We need to mention the new API in the documentation.
Aug 23 2022, 12:39 PM · FIPS, libgcrypt, Feature Request

Aug 18 2022

Jakuje added a comment to T6127: FIPS 140-3 final review comments.

For the record, the changeset in the attached merge request is final and waiting for reviews.

Aug 18 2022, 8:42 AM · FIPS, libgcrypt, Bug Report

Aug 9 2022

Jakuje created T6127: FIPS 140-3 final review comments.
Aug 9 2022, 11:25 AM · FIPS, libgcrypt, Bug Report

Aug 1 2022

Jakuje reopened T6052: gnupg2 tpm2d tests do not work as "Open".

The provided change does not look like fixing the problem for me. The path to gpgconf is still wrong and I am getting the same error both with master and with the patched tarballs:

make[2]: Entering directory '/home/jjelen/devel/gnupg/tests/tpm2dtests'
LC_ALL=C EXEEXT= PATH="../gpgscm:/home/jjelen/.local/bin:/home/jjelen/bin:/usr/local/bin:/usr/local/sbin:/usr/bin:/usr/sbin" abs_top_srcdir="/home/jjelen/devel/gnupg" objdir="/home/jjelen/devel/gnupg" TPMSERVER="" SWTPM="/bin/swtpm" SWTPM_IOCTL="/bin/swtpm_ioctl" GNUPG_BUILD_ROOT="/home/jjelen/devel/gnupg/tests" GPGSCM_PATH="/home/jjelen/devel/gnupg/tests/gpgscm" /home/jjelen/devel/gnupg/tests/gpgscm/gpgscm \
  /home/jjelen/devel/gnupg/tests/tpm2dtests/run-tests.scm  
gpgscm: error running '/home/jjelen/devel/gnupg/tests/tools/gpgconf': probably not installed
(wait-process "/home/jjelen/devel/gnupg/tests/tools/gpgconf" 2693795 #t): Configuration error
Aug 1 2022, 11:31 AM · gnupg24 (gnupg-2.4.4), Tests, TPM, Bug Report

Jul 4 2022

Jakuje created T6052: gnupg2 tpm2d tests do not work.
Jul 4 2022, 10:39 AM · gnupg24 (gnupg-2.4.4), Tests, TPM, Bug Report