FIPS: Difference between revisions

From DikapediaV2
Jump to: navigation, search
No edit summary
No edit summary
Line 46: Line 46:




+------------------------+-----------------------+----------------------------------------+
+------------------------+-----------------------+----------------------------------------+</br>
|      Crypto Policy    | FIPS Compliance Level |                Description            |
|      Crypto Policy    | FIPS Compliance Level |                Description            |</br>
+------------------------+-----------------------+----------------------------------------+
+------------------------+-----------------------+----------------------------------------+</br>
| FIPS                  | FIPS-Compliant        | Enforces FIPS compliance. Only        |
| FIPS                  | FIPS-Compliant        | Enforces FIPS compliance. Only        |</br>
|                        |                      | FIPS-validated algorithms are allowed.|
|                        |                      | FIPS-validated algorithms are allowed.|</br>
+------------------------+-----------------------+----------------------------------------+
+------------------------+-----------------------+----------------------------------------+</br>
| FIPS:NO-ENFORCE-EMS    | Relaxed FIPS          | Enforces FIPS compliance but allows  |
| FIPS:NO-ENFORCE-EMS    | Relaxed FIPS          | Enforces FIPS compliance but allows  |</br>
|                        |                      | the use of non-compliant algorithms  |
|                        |                      | the use of non-compliant algorithms  |</br>
|                        |                      | for Emergency Management Services    |
|                        |                      | for Emergency Management Services    |</br>
|                        |                      | (EMS).                                |
|                        |                      | (EMS).                                |</br>
+------------------------+-----------------------+----------------------------------------+
+------------------------+-----------------------+----------------------------------------+</br>
| OSPP                  | Non-FIPS              | Common Criteria OSPP (Orange Book)    |
| OSPP                  | Non-FIPS              | Common Criteria OSPP (Orange Book)    |</br>
|                        |                      | compliance. This policy is used for  |
|                        |                      | compliance. This policy is used for  |</br>
|                        |                      | achieving specific security          |
|                        |                      | achieving specific security          |</br>
|                        |                      | certifications beyond FIPS.          |
|                        |                      | certifications beyond FIPS.          |</br>
+------------------------+-----------------------+----------------------------------------+
+------------------------+-----------------------+----------------------------------------+</br>
| DEFAULT                | Non-FIPS              | No FIPS restrictions. All algorithms  |
| DEFAULT                | Non-FIPS              | No FIPS restrictions. All algorithms  |</br>
|                        |                      | (compliant and non-compliant) are    |
|                        |                      | (compliant and non-compliant) are    |</br>
|                        |                      | allowed. This is the default policy.  |
|                        |                      | allowed. This is the default policy.  |</br>
+------------------------+-----------------------+----------------------------------------+
+------------------------+-----------------------+----------------------------------------+</br>
| LEGACY                | Non-FIPS              | Allows the use of legacy algorithms  |
| LEGACY                | Non-FIPS              | Allows the use of legacy algorithms  |</br>
|                        |                      | that may not be FIPS-compliant. This  |
|                        |                      | that may not be FIPS-compliant. This  |</br>
|                        |                      | policy is intended for compatibility  |
|                        |                      | policy is intended for compatibility  |</br>
|                        |                      | with older systems and applications. |
|                        |                      | with older systems and applications. |</br>
+------------------------+-----------------------+----------------------------------------+
+------------------------+-----------------------+----------------------------------------+</br>


<b>Descriptions:</b>
<b>Descriptions:</b>

Revision as of 17:37, 20 August 2025

How to check if FIPS is enabled


Check that FIPS mode is enabled:

$ fips-mode-setup --check
FIPS mode is enabled.


Kernel Parameter for enabling FIPS


fips=1


How to disable FIPS


$ fips-mode-setup --check
# fips-mode-setup --disable

Reboot and then check again.


Changing Crypto Policies


Sometimes you may need FIPS to be enabled but it appears to be blocking or preventing you from doing something (e.g. RDP sessions using xfreerdp or something, SSH issues, etc.). In such cases it is best to change the crypto crypto polices, that way you can still FIPS enabled and have further restrictions as opposed to disabling it.

To update the crypto policies, you can run something like:

$ sudo update-crypto-policies --set FIPS:OSPP
Setting system policy to FIPS:OSPP
Note: System-wide crypto policies are applied on application start-up.
It is recommended to restart the system for the change of policies
to fully take place.

or

$ sudo update-crypto-policies --set FIPS:NO-ENFORCE-EMS


Play around with different crypto policies to see what would work for you.

Helpful links: https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/security_hardening/using-the-system-wide-cryptographic-policies_security-hardening#system-wide-crypto-policies_using-the-system-wide-cryptographic-policies


Check Crypto Policies


$ sudo update-crypto-policies --show
FIPS:OSPP


+------------------------+-----------------------+----------------------------------------+
| Crypto Policy | FIPS Compliance Level | Description |
+------------------------+-----------------------+----------------------------------------+
| FIPS | FIPS-Compliant | Enforces FIPS compliance. Only |
| | | FIPS-validated algorithms are allowed.|
+------------------------+-----------------------+----------------------------------------+
| FIPS:NO-ENFORCE-EMS | Relaxed FIPS | Enforces FIPS compliance but allows |
| | | the use of non-compliant algorithms |
| | | for Emergency Management Services |
| | | (EMS). |
+------------------------+-----------------------+----------------------------------------+
| OSPP | Non-FIPS | Common Criteria OSPP (Orange Book) |
| | | compliance. This policy is used for |
| | | achieving specific security |
| | | certifications beyond FIPS. |
+------------------------+-----------------------+----------------------------------------+
| DEFAULT | Non-FIPS | No FIPS restrictions. All algorithms |
| | | (compliant and non-compliant) are |
| | | allowed. This is the default policy. |
+------------------------+-----------------------+----------------------------------------+
| LEGACY | Non-FIPS | Allows the use of legacy algorithms |
| | | that may not be FIPS-compliant. This |
| | | policy is intended for compatibility |
| | | with older systems and applications. |
+------------------------+-----------------------+----------------------------------------+

Descriptions:

  • FIPS: This policy enforces FIPS compliance strictly. Only FIPS-validated algorithms are allowed. This is used in environments where FIPS compliance is mandatory.
  • FIPS:NO-ENFORCE-EMS: This policy enforces FIPS compliance but allows the use of non-compliant algorithms specifically for Emergency Management Services (EMS). This provides a relaxation for critical services while maintaining overall FIPS compliance.
  • OSPP: This policy is used for achieving Common Criteria OSPP (Orange Book) compliance. It is not specifically focused on FIPS compliance but rather on broader security certifications.
  • DEFAULT: This is the default crypto policy with no FIPS restrictions. All algorithms, both compliant and non-compliant, are allowed. It provides maximum flexibility but does not ensure FIPS compliance.
  • LEGACY: This policy allows the use of legacy algorithms that may not be FIPS-compliant. It is intended for compatibility with older systems and applications that require these algorithms.