-
Notifications
You must be signed in to change notification settings - Fork 54
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
FIPS on Fedora and RHEL 8/9 images #282
FIPS on Fedora and RHEL 8/9 images #282
Conversation
mmartinv
commented
Nov 28, 2023
•
edited
Loading
edited
- feat: enable FIPS customization in OS pipeline
- feat: enable FIPS customization in Anaconda tar installer
- feat: Enable FIPS customization for RHEL 9
- feat: Enable FIPS customization for RHEL 8
- feat: Enable FIPS customization for Fedora
9e8a721
to
17d1877
Compare
6fd51b9
to
cd6e93b
Compare
Just to be clear here. Current ssg (0.1.69) won't try to enable FIPS during the oscap remediation phase since it caused troubles with bootloader. Idea is to keep it that way and use Blueprint instead as we do with partitions and packages. What would be the Blueprint snippet to enable FIPS, BTW? |
The docs PR for the syntax is here: Should just be:
|
cd6e93b
to
00bff4a
Compare
FTR I'm testing this locally. Just ran into one or two issues, will report back |
00bff4a
to
716dc1a
Compare
It looks like the oscap remediation stage was setting the system's crypto policy to |
I also posted osbuild/osbuild#1484 to fix RHEL/CentOS 8 builds. |
716dc1a
to
8e43aa9
Compare
Yeah this was the issue I was running into, I haven't had time for getting back to it. Thanks for that |
That's not good. Ideally oscap should not switch policy from FIPS if it is set in the profile and use the FIPS mode it to adjust its behaviour. Which profile does that? |
OTOH, if the profile requires a different policy it should be OK that the FIPS mode is reset as the result of remediation. TLDR: FIPS mode should be set before oscap stage. If there is a discrepancy in the behaviour it should be solved on the oscap/CaC side. |
I'd even say that you should isolate enablement of Blueprint's |
432686c
to
0d61685
Compare
The blueprint configuration regarding oscap is:
I also tested by removing the |
Instead of using a copy of the |
The PCI-DSS profile does not require FIPS mode. It also ensures that DEFAULT crypto policy is in effect. No surprises here.
The PCI-DSS profile actually does not have Anyhow, as I said, just get rid of oscap section. Test only BP customization itself. The oscap stage will be bootstrapped with initial BP customization and won't interfere unless misconfigured (but we'll deal with that ourselves). |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good overall. Just one small question about the dracut stage and where it should be defined and reused.
0d61685
to
e432fa6
Compare
Enable FIPS customization in OS pipeline. Until now only the Anaconda OSTree Installer and the OSTree deployment based images supported this customization. Signed-off-by: Miguel Martín <[email protected]>
Enable FIPS customization in Anaconda tar installer. Until now only the Anaconda OSTree Installer and the OSTree deployment based images supported this customization. Signed-off-by: Miguel Martín <[email protected]>
Enable FIPS customization for RHEL 9 images. Signed-off-by: Miguel Martín <[email protected]>
Enable FIPS customization for RHEL 8 images. Signed-off-by: Miguel Martín <[email protected]>
Enable FIPS customization for Fedora images. Signed-off-by: Miguel Martín <[email protected]>
Add tests for Fedora and RHEL 8/9 qcow2 images with system FIPS mode enabled. Signed-off-by: Miguel Martín <[email protected]>
e432fa6
to
4b943cd
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good to me :)