Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

FIPS-140 Compliance #2

Open
atheriel opened this issue Jan 21, 2022 · 0 comments
Open

FIPS-140 Compliance #2

atheriel opened this issue Jan 21, 2022 · 0 comments
Assignees
Labels
enhancement New feature or request product-feature Enhancements that would be made in coordination with downstream products

Comments

@atheriel
Copy link
Collaborator

There is some interest in FIPS-140 compliance, which would likely involve:

Some notes:

  • There are a few possible API choices here, including a build-time decision (using build tags) and a runtime "I want FIPS" decision. The build-time decision seems more consistent with FIPS in general, even if it's more opaque to users.

  • I've discovered that Docker Swarm used a runtime FIPS flag to select AES-128-CBC, but from a casual reading of that package this approach would not be FIPS-compliant by itself, since it uses Go's (non-compliant) crypto under the hood.

  • I don't want to guess whether these changes would make us compliant. We'll have to get a more formal opinion on the matter.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request product-feature Enhancements that would be made in coordination with downstream products
Projects
None yet
Development

No branches or pull requests

1 participant