Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Need FIPS 140-2 Compliant variant of Talos #9141

Open
JoeHCQ1 opened this issue Aug 9, 2024 · 8 comments
Open

Need FIPS 140-2 Compliant variant of Talos #9141

JoeHCQ1 opened this issue Aug 9, 2024 · 8 comments

Comments

@JoeHCQ1
Copy link

JoeHCQ1 commented Aug 9, 2024

Feature Request

In order to use Talos in any US Government context, we need all cryptography to be FIPS 140-2 compliant. Without FIPS compliance, we cannot consider using Talos in our production environments, and we would very much like Talos to be a serious contender in this space.

This would also make Talos a viable solution for any other high-security environments which care about FIPS 140-2 compliance.

Description

Provide a variant of the Talos image which contains only FIPS 140-2 authorized cryptography modules. FIPS variants of other opensource offerings exist. For reference:

This was requested previously in #6230 but grew stale. You can search to see if a particular library is FIPS compliant here: https://csrc.nist.gov/projects/cryptographic-module-validation-program/validated-modules/search.

@JoeHCQ1 JoeHCQ1 changed the title Need FIPS-140 Compliant variant of Talos Need FIPS 140-2 Compliant variant of Talos Aug 9, 2024
@aravindhkudiyarasan
Copy link

Do we have any update in getting Talos Linux to be FIPS Compliant ?

@smira
Copy link
Member

smira commented Nov 28, 2024

We are in research phase here, not commitment/dates so far.

@steverfrancis
Copy link
Collaborator

Absent a compelling commercial case, we are unlikely to explore FIPS compliance in the next 12 months.

@flickerfly
Copy link

You might have someone take enough interest eventually to contribute FIPS to this CNCF project without any need for commercial spending if there was some idea of where to start documented in this issue. If FIPS support is compiled into the kernel, it might be as easy as tossing an option to add "fips=1" to the boot loader. Looks like talos might be doing something similar with kspp? I see some possibly relevant stuff in the machinery/kernel too.

Absent a compelling commercial case, we are unlikely to explore FIPS compliance in the next 12 months.

What exactly are you looking for? US Government's budget isn't exactly a small customer. Not wishing to focus on that market is valid of course for many different reasons, but that's a business decisions, not a lack of commercial opportunity. Rancher, before they were bought by SUSE, created RKE2 (originally RKE Gov) specifically to address this market and forked off Rancher Government when SUSE bought the rest which is still successfully selling services to support government kubernetes installations. Red Hat is making tons off of US Gov selling OpenShift. Broadcom/VMWare has sold Tanzu hard to the government. There is also a lot of push toward more automated and higher security solutions which Talos has the potential to be, but FIPS is a foundational expectation. You can get things through that aren't that, but the compliance battle to do something different than the old way benefits from these things not being a hindrance.

In other words, it's a chicken and egg problem. You aren't likely to have someone champion your solution in gov space before you show a willingness to invest something. It'll take partnership with someone who knows the market to make the initial wins. As I said before though, being open source, maybe there is an alternative to Sidero Labs putting in some of that investment.

@steverfrancis
Copy link
Collaborator

It's definitely a chicken and egg problem, and we agree there is a good business opportunity in the federal arena that getting FIPS compliant would help.

However, as a small company, unless we get someone saying "We will give you $500K contract if you get the FIPS cert", we are not going to do it in the short term.

  • we've not had any luck with the federal space so far (we've spent a bunch of time applying for SBIR programs; we've engaged in a CRADA, but while there is interest, there has been slow progress due to gov personnel changes, budget, etc.)
  • while there is an opportunity, selling to the gov space requires a big investment in engineering in just our build pipelines to support a different version; plus a parallel investment in different sales and marketing teams and collateral focussed on federal, etc.

We are just expanding our engineering team and marketing (from zero!) currently, so will be increasing investment over the short term before our revenue reflects that, and we are not in a position to invest for other long term initiatives just now.

SO... we will get to it. But in a while.

@flickerfly
Copy link

Yeah, valid.

@huberhefe
Copy link

huberhefe commented Dec 7, 2024

However, as a small company, unless we get someone saying "We will give you $500K contract if you get the FIPS cert", we are not going to do it in the short term.

What if the contract was just "get FIPS compliant?" How much would that cost?

@huberhefe
Copy link

golang/go#69536
golang "crypto: obtain a FIPS 140-3 validation"
if that helps

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

6 participants