-
Notifications
You must be signed in to change notification settings - Fork 29.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[v14.x backport] crypto: make FIPS related options always awailable #40241
Changes from 2 commits
2b35f7b
9f7f84c
c59618a
e942e28
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -45,6 +45,11 @@ | |
#ifndef OPENSSL_NO_ENGINE | ||
# include <openssl/engine.h> | ||
#endif // !OPENSSL_NO_ENGINE | ||
|
||
#ifdef OPENSSL_FIPS | ||
# include <openssl/fips.h> | ||
#endif // OPENSSL_FIPS | ||
|
||
#include <openssl/evp.h> | ||
#include <openssl/pem.h> | ||
#include <openssl/x509v3.h> | ||
|
@@ -183,6 +188,16 @@ static int PasswordCallback(char* buf, int size, int rwflag, void* u) { | |
return -1; | ||
} | ||
|
||
void TestFipsCrypto(const v8::FunctionCallbackInfo<v8::Value>& args) { | ||
#ifdef OPENSSL_FIPS | ||
const auto enabled = FIPS_selftest() ? 1 : 0; | ||
#else // OPENSSL_FIPS | ||
const auto enabled = 0; | ||
#endif // OPENSSL_FIPS | ||
|
||
args.GetReturnValue().Set(enabled); | ||
} | ||
|
||
// Loads OpenSSL engine by engine id and returns it. The loaded engine | ||
// gets a reference so remember the corresponding call to ENGINE_free. | ||
// In case of error the appropriate js exception is scheduled | ||
|
@@ -3618,12 +3633,10 @@ void CipherBase::Init(const char* cipher_type, | |
HandleScope scope(env()->isolate()); | ||
MarkPopErrorOnReturn mark_pop_error_on_return; | ||
|
||
#ifdef NODE_FIPS_MODE | ||
if (FIPS_mode()) { | ||
return env()->ThrowError( | ||
"crypto.createCipher() is not supported in FIPS mode."); | ||
} | ||
#endif // NODE_FIPS_MODE | ||
|
||
const EVP_CIPHER* const cipher = EVP_get_cipherbyname(cipher_type); | ||
if (cipher == nullptr) | ||
|
@@ -3809,13 +3822,11 @@ bool CipherBase::InitAuthenticated(const char* cipher_type, int iv_len, | |
return false; | ||
} | ||
|
||
#ifdef NODE_FIPS_MODE | ||
// TODO(tniessen) Support CCM decryption in FIPS mode | ||
if (mode == EVP_CIPH_CCM_MODE && kind_ == kDecipher && FIPS_mode()) { | ||
env()->ThrowError("CCM decryption not supported in FIPS mode"); | ||
return false; | ||
} | ||
#endif | ||
|
||
// Tell OpenSSL about the desired length. | ||
if (!EVP_CIPHER_CTX_ctrl(ctx_.get(), EVP_CTRL_AEAD_SET_TAG, auth_tag_len, | ||
|
@@ -4690,7 +4701,6 @@ static AllocatedBuffer Node_SignFinal(Environment* env, | |
} | ||
|
||
static inline bool ValidateDSAParameters(EVP_PKEY* key) { | ||
#ifdef NODE_FIPS_MODE | ||
/* Validate DSA2 parameters from FIPS 186-4 */ | ||
if (FIPS_mode() && EVP_PKEY_DSA == EVP_PKEY_base_id(key)) { | ||
DSA* dsa = EVP_PKEY_get0_DSA(key); | ||
|
@@ -4706,7 +4716,6 @@ static inline bool ValidateDSAParameters(EVP_PKEY* key) { | |
(L == 2048 && N == 256) || | ||
(L == 3072 && N == 256); | ||
} | ||
#endif // NODE_FIPS_MODE | ||
|
||
return true; | ||
} | ||
|
@@ -6866,7 +6875,6 @@ void InitCryptoOnce() { | |
settings = nullptr; | ||
#endif | ||
|
||
#ifdef NODE_FIPS_MODE | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. There were changes in the original PR that don't seem to have made it into this block. In crypto_util.cc ->
@danbev was that intentional? There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. That was not intentional 😞 I'll take a closer look add it tomorrow. Thanks! There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I've pushed a commit with the missing code now, please take a look. |
||
/* Override FIPS settings in cnf file, if needed. */ | ||
unsigned long err = 0; // NOLINT(runtime/int) | ||
if (per_process::cli_options->enable_fips_crypto || | ||
|
@@ -6881,7 +6889,6 @@ void InitCryptoOnce() { | |
ERR_error_string(err, nullptr)); | ||
UNREACHABLE(); | ||
} | ||
#endif // NODE_FIPS_MODE | ||
|
||
|
||
// Turn off compression. Saves memory and protects against CRIME attacks. | ||
|
@@ -6927,7 +6934,6 @@ void SetEngine(const FunctionCallbackInfo<Value>& args) { | |
} | ||
#endif // !OPENSSL_NO_ENGINE | ||
|
||
#ifdef NODE_FIPS_MODE | ||
void GetFipsCrypto(const FunctionCallbackInfo<Value>& args) { | ||
args.GetReturnValue().Set(FIPS_mode() ? 1 : 0); | ||
} | ||
|
@@ -6945,7 +6951,6 @@ void SetFipsCrypto(const FunctionCallbackInfo<Value>& args) { | |
return ThrowCryptoError(env, err); | ||
} | ||
} | ||
#endif /* NODE_FIPS_MODE */ | ||
|
||
namespace { | ||
// SecureBuffer uses openssl to allocate a Uint8Array using | ||
|
@@ -7013,10 +7018,9 @@ void Initialize(Local<Object> target, | |
env->SetMethod(target, "setEngine", SetEngine); | ||
#endif // !OPENSSL_NO_ENGINE | ||
|
||
#ifdef NODE_FIPS_MODE | ||
env->SetMethodNoSideEffect(target, "getFipsCrypto", GetFipsCrypto); | ||
env->SetMethod(target, "setFipsCrypto", SetFipsCrypto); | ||
#endif | ||
env->SetMethodNoSideEffect(target, "testFipsCrypto", TestFipsCrypto); | ||
|
||
env->SetMethod(target, "pbkdf2", PBKDF2); | ||
env->SetMethod(target, "generateKeyPairRSA", GenerateKeyPairRSA); | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Will
./configure --openssl-fips
still be accepted. Want to understand if this could break existing workflows/buildsThere was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yeah, it will still be accepted at configuration time to specify the directory where the FIPS fipscanister.o is located.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@mhdawson The ubi81_sharedlibs_openssl111fips_x64 CI job runs with
configure --openssl-is-fips
(we didn't update the job when #36341 landed).There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for the quick confirmation.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
ah sorry confused
--open-is-fips
with--openssl-fips
configure options.There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I don't think
--openssl-fips
works before on Node.js 14 based onconfigure.py
?node/configure.py
Lines 1382 to 1383 in 95b9240
(
--openssl-is-fips
does work and is tested in the CI.)There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If I recall correctly it is not possible to enable FIPS with the OpenSSL version that is statically linked with Node.js. This is still the case with upstream/master.
But it is possible to dynamically link to an OpenSSL version that does support FIPS (which is the use case at Red Hat).
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@danbev that is my understanding as well.