-----Original Message-----
From: James Peach <jpe...@apache.org>
Reply-To: "dev@trafficserver.apache.org" <dev@trafficserver.apache.org>
Date: Sunday, December 27, 2015 at 8:34 PM
To: "dev@trafficserver.apache.org" <dev@trafficserver.apache.org>
Cc: Bryan Call <bc...@apache.org>
Subject: Re: Question regarding FIPS mode support for Apache Traffic Server

>
>> On Dec 24, 2015, at 10:38 AM, Craig Schomburg (craigs)
>><cra...@cisco.com> wrote:
>> 
>> Thanks Brian.
>> 
>> We just started our investigation of what it will take to FIPS'ify ATS
>>(have a config option).  Also looking into what additional work would be
>>required to complete this work.  We can figure out the best approach and
>>follow through on the work to get the work reviewed and added to github
>>after we get a better grasp on the work.
>
>Since ATS is using MD5 for looking up cache objects, not crypto, does
>FIPS still apply?

Good question.  That was one of the questions I had as well.  I was going
to follow up with our internal FIPS experts (folks that handle the FIPS
certifications on our products).  Let me get their take and I will follow
up with the information on this thread for further discussion.

Craig Schomburg

>
>> More news and likely questions as well to follow.
>> 
>> Craig S.
>> 
>> From: Bryan Call <bc...@apache.org<mailto:bc...@apache.org>>
>> Date: Thursday, December 24, 2015 at 1:32 PM
>> To: "dev@trafficserver.apache.org<mailto:dev@trafficserver.apache.org>"
>><dev@trafficserver.apache.org<mailto:dev@trafficserver.apache.org>>
>> Cc: Craig Schomburg <cra...@cisco.com<mailto:cra...@cisco.com>>
>> Subject: Re: Question regarding FIPS mode support for Apache Traffic
>>Server
>> 
>> There is also code that disables locking for FIPS, that was the main
>>part of TS-3576.  If you would like to submit a github pull request to
>>create a configurable option that would enable FIPS and enable the
>>locking that would be great.
>> 
>> I would also be in favor of having a configurable option to use SHA256
>>instead of MD5.  I don't know of anyone working on these enhancements.
>> 
>> -Bryan
>> 
>> 
>> On Dec 23, 2015, at 5:33 AM, Craig Schomburg (craigs)
>><cra...@cisco.com<mailto:cra...@cisco.com>> wrote:
>> 
>> 
>> I was looking through various Apache Traffic Server posts and noticed
>>that some FIPS related work was done with Apache Traffic Server (ATS).
>>Was looking for someone with first hand knowledge of the ATS FIPS status
>>that might have some time for a few questions...
>> 
>> I am working with one of our product teams on FIPS enablement on a
>>product that is using Apache Traffic Server.  I just completed upgrading
>>our product to pull in ATS 6.0.0 code base and started working on
>>enabling FIPS mode.
>> 
>> Had a few questions pertaining to FIPS support on ATS 6.0.0 as well as
>>some changes made via "TS-3576 Remove the need for FIPS locking for
>>OpenSSL".
>> 
>> First question is basically how far has the support for FIPs mode
>>progressed with ATS?
>> 
>> Follow up question and observation...  I had to make local
>>modifications to the TS-3576 change that was mentioned in a thread
>>regarding SSL_CTX_add_extra_chain_cert_file() update of FIPS mode.  As
>>was mentioned in the separate e-mail thread the committed code really
>>does nothing as the FIPS_mode() call simply reads the current state and
>>then the call to FIPS_mode_set(mode) basically sets OpenSSL to the same
>>state it is already in (NO-OP).
>> 
>> +#ifdef OPENSSL_FIPS
>> +    int mode = FIPS_mode();
>> +    FIPS_mode_set(mode);
>> +    Debug("ssl", "FIPS_mode: %d", mode);
>> +#endif
>> 
>> I made a local modification in our repository to basically add a new
>>config option to records.config and then set the mode based on the
>>config setting.
>> 
>> That got me by the first issue then I hit the next major issue which is
>>that the Apache Traffic Server code is pretty heavily entrenched in
>>using MD5.  Since MD5 is not FIPS compliant the call to MD5_Init() in
>>the Ink code then causes a process to crash.  I am now looking into the
>>possibility of converting the existing MD5 references to SHA256 or
>>making a model where it could be switched between MD5/SHA256 based on
>>the fips_mode setting.  Have not  really started digging into this yet
>>as I wanted to first probe the ATS community to see if this work may
>>have already been started, if there was any position statement, plan,
>>etc. on moving to a FIPS compliant hash, or if this work was being
>>avoided for other reasons.
>> 
>> Any input would be greatly appreciated.  Likewise if there is a better
>>forum for posting this question, please let me know.
>> 
>> Thanks,
>> 
>> Craig Schomburg
>> 
>> 
>

Reply via email to