Re: Replace current implementations in crypt() and gen_salt() to OpenSSL
От | Joe Conway |
---|---|
Тема | Re: Replace current implementations in crypt() and gen_salt() to OpenSSL |
Дата | |
Msg-id | e3316dcc-c25f-4df8-a241-9bb65f6f921e@joeconway.com обсуждение исходный текст |
Ответ на | Re: Replace current implementations in crypt() and gen_salt() to OpenSSL (Daniel Gustafsson <daniel@yesql.se>) |
Список | pgsql-hackers |
On 2/16/24 04:16, Daniel Gustafsson wrote: >> On 15 Feb 2024, at 16:49, Peter Eisentraut <peter@eisentraut.org> wrote: > >> 1. All the block ciphers currently supported by crypt() and gen_salt() are not FIPS-compliant. >> >> 2. The crypt() and gen_salt() methods built on top of them (modes of operation, kind of) are not FIPS-compliant. > > I wonder if it's worth trying to make pgcrypto disallow non-FIPS compliant > ciphers when the compiled against OpenSSL is running with FIPS mode enabled, or > raise a WARNING when used? It seems rather unlikely that someone running > OpenSSL with FIPS=yes want to use our DES cipher without there being an error > or misconfiguration somewhere. > > Something like the below untested pseudocode. > > diff --git a/contrib/pgcrypto/pgcrypto.c b/contrib/pgcrypto/pgcrypto.c > index 96447c5757..3d4391ebe1 100644 > --- a/contrib/pgcrypto/pgcrypto.c > +++ b/contrib/pgcrypto/pgcrypto.c > @@ -187,6 +187,14 @@ pg_crypt(PG_FUNCTION_ARGS) > *resbuf; > text *res; > > +#if defined FIPS_mode > + if (FIPS_mode()) > +#else > + if (EVP_default_properties_is_fips_enabled(OSSL_LIB_CTX_get0_global_default())) > +#endif > + ereport(ERROR, > + (errmsg("not available when using OpenSSL in FIPS mode"))); Makes sense +1 -- Joe Conway PostgreSQL Contributors Team RDS Open Source Databases Amazon Web Services: https://aws.amazon.com
В списке pgsql-hackers по дате отправления: