搜索

此内容没有您所选择的语言版本。

Chapter 4. Federal Information Processing Standard on Red Hat OpenStack Services on OpenShift

download PDF

The Federal Information Processing Standards (FIPS) is a set of security requirements developed by the National Institute of Standards and Technology (NIST). In Red Hat Enterprise Linux 9, the supported standard is FIPS publication 140-3: Security Requirements for Cryptographic Modules. For details about the supported standard, see the Federal Information Processing Standards Publication 140-3.

FIPS 140-3 validated cryptographic modules are cryptographic libraries that have completed the NIST CMVP process and have received a certificate from NIST. For current information on Red Hat FIPS 140 validated modules, see Compliance Activities and Government Standards.

When you use the system-wide cryptographic policy, FIPS 140 mode, RHEL and CoreOS are designed to restrict the use of core cryptographic modules and libraries to those that have been FIPS-validated. Paramiko however, implements cryptographic functions in code, and has not been FIPS-validated. RHOSO core components use the RHEL cryptographic libraries submitted to NIST for FIPS validation unless they call paramiko.

Note

When you deploy RHOSO on a FIPS-enabled RHOCP cluster, iSCSI MD5 is disabled.

4.1. Verification of FIPS status

You can check the FIPS status of RHOCP or deployed worker nodes.

Procedure

  1. On your workstation, log into your RHOCP cluster with an account with cluster-admin privileges:

    $ oc login -u <username> -p <password> <url>
    • Replace <username> with your user name.
    • Replace <password> with your password.
    • Replace <url> the API URL of your RHOCP cluster.
  2. Get a list of the nodes in the cluster:

    $ oc get nodes

    Example output:

    NAME  	STATUS   ROLES              	AGE	VERSION
    master1   Ready	control-plane,master   7d1h   v1.28.6+6216ea1
    master2   Ready	control-plane,master   7d1h   v1.28.6+6216ea1
    master3   Ready	control-plane,master   7d1h   v1.28.6+6216ea1
    worker1   Ready	worker             	7d1h   v1.28.6+6216ea1
    worker2   Ready	worker             	7d1h   v1.28.6+6216ea1
    worker3   Ready	worker
  3. Open a debug pod on one of the nodes shown in the output of the previous step:

    $ oc debug node/worker2

    Example output:

    Temporary namespace openshift-debug-rq2m8 is created for debugging node...
    Starting pod/worker2-debug-5shqt ...
    To use host binaries, run `chroot /host`
    Pod IP: 192.168.50.112
    If you don't see a command prompt, try pressing enter.
    ssh-4.4#
  4. Check for fips_enabled in /proc

    ssh-4.4# cat /proc/sys/crypto/fips_enabled

    Example output. 1 is displayed for enabled, 0 for disabled:

    1

For more information about installing Red Hat OpenShift Cluster Platform in FIPS mode, see Support for FIPS cryptography.

Red Hat logoGithubRedditYoutubeTwitter

学习

尝试、购买和销售

社区

关于红帽文档

通过我们的产品和服务,以及可以信赖的内容,帮助红帽用户创新并实现他们的目标。

让开源更具包容性

红帽致力于替换我们的代码、文档和 Web 属性中存在问题的语言。欲了解更多详情,请参阅红帽博客.

關於紅帽

我们提供强化的解决方案,使企业能够更轻松地跨平台和环境(从核心数据中心到网络边缘)工作。

© 2024 Red Hat, Inc.