-
Notifications
You must be signed in to change notification settings - Fork 76
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix for FIPS startup #366
Fix for FIPS startup #366
Conversation
We have created an issue in Pivotal Tracker to manage this: https://www.pivotaltracker.com/story/show/182557199 The labels on this github issue will be updated when the story is started. |
here I cannot judge if this is a regression for others / older installations @torsten-sap @friegger we need someone with BOSH expierence to verify that this change does not break existing landscapes |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
if you have checked that this option does not break start on non-/old - VMs thank ok from my side
@@ -123,7 +123,7 @@ function process_certs { | |||
function insert_ssl_cert { | |||
log "Installing Server SSL certificate" | |||
|
|||
openssl pkcs12 -export -name uaa_ssl_cert \ | |||
openssl pkcs12 -export -certpbe PBE-SHA1-3DES -name uaa_ssl_cert \ |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can we expose this through a bosh property, instead of hard coding this change?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
ok so I agree, please use a parameter
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
you could also check (cat /proc/sys/crypto/fips_enabled
) if FIPS is enabled and only add that parameter in the FIPS case.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
#407 is an alternative using the fix I suggested here.
SHA1 and 3DES raises hackles here. Aren't there other ciphers/hashes that aren't so tied to the 20th century? SHA1 was deprecated nearly a decade ago. |
The algorithm is used for p12 creation, but the password is passed 3 lines later, so this parameter is not needed to increase or change security level, but simply on a FIPS compliant image the openssl version requires such a parameter. We convert key files into p12 to pass the key material to tomcat configuration. |
Addresses #358