-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Restrict cipher suites for Desktop Access in FIPS mode #42277
Conversation
This hash is on a branch and should be changed once that branch is merged. It includes the `set_fips_compliance_policy` function which is used to enforce FIPS-valid ciphers in the connection. This commit also updates `Cargo.lock` generally by having called `cargo update` before committing the changes.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM, just one question
Co-authored-by: Zac Bergquist <[email protected]>
I've added this note to the documentation re: Desktop Access FIPS: ab64baa |
The PR changelog entry failed validation: Changelog entry not found in the PR body. Please add a "no-changelog" label to the PR, or changelog lines starting with |
🤖 Vercel preview here: https://docs-8107z7e87-goteleport.vercel.app/docs/ver/preview |
🤖 Vercel preview here: https://docs-j29wuxett-goteleport.vercel.app/docs/ver/preview |
🤖 Vercel preview here: https://docs-kvy7f9kqo-goteleport.vercel.app/docs/ver/preview |
🤖 Vercel preview here: https://docs-e9nq1972y-goteleport.vercel.app/docs/ver/preview |
Co-authored-by: Zac Bergquist <[email protected]>
Co-authored-by: Zac Bergquist <[email protected]>
Co-authored-by: Zac Bergquist <[email protected]>
🤖 Vercel preview here: https://docs-mrhfdecv1-goteleport.vercel.app/docs/ver/preview |
🤖 Vercel preview here: https://docs-hpn5owylz-goteleport.vercel.app/docs/ver/preview |
🤖 Vercel preview here: https://docs-g7bqvdmld-goteleport.vercel.app/docs/ver/preview |
@ibeckermayer See the table below for backport results.
|
* Updates to the new boring fork's hash with FIPS enforcement. This hash is on a branch and should be changed once that branch is merged. It includes the `set_fips_compliance_policy` function which is used to enforce FIPS-valid ciphers in the connection. This commit also updates `Cargo.lock` generally by having called `cargo update` before committing the changes. * reverts previous changes such that we are again using clang 12.0.0 rather than 14.0.6 * Updates to latest boring hash * removes rdp client for fips builds on arm64 * updates e to isaiah/enforce-fips head * Updates boring ref * Updates boring ref * Update Makefile Co-authored-by: Zac Bergquist <[email protected]> * Adds note about desktop access fips to fedramp docs * Updates boring hash to now-merged HEAD of the `teleport` branch * update e to latest head * try adding --nocheck to see if that fixes arm64 builds * udates to latest HEAD * latest e * Update docs/pages/access-controls/compliance-frameworks/fedramp.mdx Co-authored-by: Zac Bergquist <[email protected]> * Update docs/pages/access-controls/compliance-frameworks/fedramp.mdx Co-authored-by: Zac Bergquist <[email protected]> * Update docs/pages/access-controls/compliance-frameworks/fedramp.mdx Co-authored-by: Zac Bergquist <[email protected]> * noteable --> notable --------- Co-authored-by: Zac Bergquist <[email protected]>
* Updates to the new boring fork's hash with FIPS enforcement. This hash is on a branch and should be changed once that branch is merged. It includes the `set_fips_compliance_policy` function which is used to enforce FIPS-valid ciphers in the connection. This commit also updates `Cargo.lock` generally by having called `cargo update` before committing the changes. * reverts previous changes such that we are again using clang 12.0.0 rather than 14.0.6 * Updates to latest boring hash * removes rdp client for fips builds on arm64 * updates e to isaiah/enforce-fips head * Updates boring ref * Updates boring ref * Update Makefile * Adds note about desktop access fips to fedramp docs * Updates boring hash to now-merged HEAD of the `teleport` branch * update e to latest head * try adding --nocheck to see if that fixes arm64 builds * udates to latest HEAD * latest e * Update docs/pages/access-controls/compliance-frameworks/fedramp.mdx * Update docs/pages/access-controls/compliance-frameworks/fedramp.mdx * Update docs/pages/access-controls/compliance-frameworks/fedramp.mdx * noteable --> notable --------- Co-authored-by: Zac Bergquist <[email protected]>
This PR changes the boring hash in the Cargo.toml to one which allows us to call
builder.set_fips_compliance_policy()?;
, which restricts cipher suites to those which are FIPS validated. To this end, it also reverts clang from 14 to 12.0.0 in the buildbox, because the boring hash we're now using is using a (actually, not soon-to-be) FIPS-validated hash for boringssl which must be built by 12.0.0.It also removes the RDP client (and therefore Desktop Access feature) for FIPS builds on arm64. It was proving extremely difficult to get boringssl to build via the Centos 7 Docker image. Since we are unaware of paying customers who require running a FIPS-enabled Windows Desktop Service on this architecture, we've elected to just drop support for now.
Closes https://github.com/gravitational/teleport.e/issues/3065
Closes https://github.com/gravitational/customer-sensitive-requests/issues/254
Depends on
set_fips_compliance_policy
(FIPS enforcement mechanism) boring#9