mirror of
https://github.com/optim-enterprises-bv/vault.git
synced 2025-10-30 02:02:43 +00:00
Document additional FIPS restrictions (#16208)
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
This commit is contained in:
@@ -70,6 +70,8 @@ from the following sources:
|
|||||||
|
|
||||||
### Usage Restrictions
|
### Usage Restrictions
|
||||||
|
|
||||||
|
#### Migration Restrictions
|
||||||
|
|
||||||
Hashicorp **does not** support in-place migrations from non-FIPS Inside
|
Hashicorp **does not** support in-place migrations from non-FIPS Inside
|
||||||
versions of Vault to FIPS Inside versions of Vault, regardless of version.
|
versions of Vault to FIPS Inside versions of Vault, regardless of version.
|
||||||
A fresh cluster installation is required to receive support. We generally
|
A fresh cluster installation is required to receive support. We generally
|
||||||
@@ -89,11 +91,34 @@ reasons:
|
|||||||
Combined, we suggest leaving the existing cluster in place, and carefully
|
Combined, we suggest leaving the existing cluster in place, and carefully
|
||||||
consider migration of specific workloads to the FIPS-backed cluster.
|
consider migration of specific workloads to the FIPS-backed cluster.
|
||||||
|
|
||||||
|
#### Entropy Augmentation Restrictions
|
||||||
|
|
||||||
Entropy Augmentation **does not** work with FIPS 140-2 Inside. The internal
|
Entropy Augmentation **does not** work with FIPS 140-2 Inside. The internal
|
||||||
BoringCrypto RNG is FIPS 140-2 certified and does not accept entropy from
|
BoringCrypto RNG is FIPS 140-2 certified and does not accept entropy from
|
||||||
other sources. Attempting to use Entropy Augmentation will result in failures
|
other sources. Attempting to use Entropy Augmentation will result in failures
|
||||||
at runtime such as `panic: boringcrypto: invalid code execution`.
|
at runtime such as `panic: boringcrypto: invalid code execution`.
|
||||||
|
|
||||||
|
#### TLS Restrictions
|
||||||
|
|
||||||
|
Vault Enterprise's FIPS modifications include restrictions to supported TLS
|
||||||
|
cipher suites and key information. Only the following cipher suites are
|
||||||
|
allowed:
|
||||||
|
|
||||||
|
- `TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256`,
|
||||||
|
- `TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384`,
|
||||||
|
- `TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256`,
|
||||||
|
- `TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384`,
|
||||||
|
- `TLS_RSA_WITH_AES_128_GCM_SHA256`, and
|
||||||
|
- `TLS_RSA_WITH_AES_256_GCM_SHA384`.
|
||||||
|
|
||||||
|
Additionally, only the following key types are allowed in TLS chains of trust:
|
||||||
|
|
||||||
|
- RSA 2048, 3072, 4096, 7680, and 8192-bit;
|
||||||
|
- ECDSA P-256, P-384, and P-521.
|
||||||
|
|
||||||
|
Finally, only TLSv1.2 or higher is supported in FIPS mode. These are in line
|
||||||
|
with recent NIST guidance and recommendations.
|
||||||
|
|
||||||
## Technical Details
|
## Technical Details
|
||||||
|
|
||||||
Vault Enterprise's FIPS 140-2 Inside binaries rely on a special version of the
|
Vault Enterprise's FIPS 140-2 Inside binaries rely on a special version of the
|
||||||
|
|||||||
Reference in New Issue
Block a user