Skip to content
This repository was archived by the owner on May 30, 2023. It is now read-only.

sys-kernel: allow fips mode to be enabled#1602

Merged
pothos merged 1 commit intomainfrom
kai/enable-fips
Jan 31, 2022
Merged

sys-kernel: allow fips mode to be enabled#1602
pothos merged 1 commit intomainfrom
kai/enable-fips

Conversation

@pothos
Copy link
Copy Markdown
Contributor

@pothos pothos commented Jan 31, 2022

With this kernel config, users can boot with fips=1 set in
/usr/share/oem/grub.cfg:

set linux_append="fips=1"

Which triggers various behaviors, for FIPS 200 certification.

with this config compiled in, and that boot parameter, users can can
that fips is enabled with:

flatcar ~ # cat /proc/sys/crypto/fips_enabled
1

How to use

Testing done

scheduled

  • Changelog entries added in the respective changelog/ directory (user-facing change, bug fix, security fix, update)

With this kernel config, users can boot with fips=1 set in
`/usr/share/oem/grub.cfg`:
```
set linux_append="fips=1"
```

Which triggers various behaviors, for FIPS 200 certification.

with this config compiled in, and that boot parameter, users can can
that fips is enabled with:
```
flatcar ~ # cat /proc/sys/crypto/fips_enabled
1
```
Copy link
Copy Markdown
Contributor

@krnowak krnowak left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good. But I guess that the non-interactive first boot is going to be with fips mode disabled, even if we patch up grub.cfg with ignition, as the patched grub.cfg would take effect only after a reboot.

@pothos pothos merged commit 30920a1 into main Jan 31, 2022
@pothos pothos deleted the kai/enable-fips branch January 31, 2022 18:51
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants