-
Notifications
You must be signed in to change notification settings - Fork 1.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
FIPS compliance #8435
Comments
@jszwedko AFIK Vector is FIPS compliant if running on a FIPS compliant environment, For instance Openshift 4.9 is FIPS compliant and have introduced Vector as alternative to Fluentd and I beleive they are still claiming FIPS complaince ;) |
I'm the lead of our logging team looking to introduce Vector as an alternate collector in OpenShift Logging 5.5 (~OCP 4.10) as a tech preview. I would be interested in understanding who "they" in this reference; our team has a release pending in days and I know of no other. We are only able to claim FIPS compliance if we are utilizing openSSL that ships with RHEL/CoreOS but otherwise I don't believe we make any explicit statement Is there any work planned to address this issue? Is there a place where we can assist to make these changes? |
Hi @jcantrill ! Thanks for the notes. We have this on our backlog but it hasn't been scheduled yet. I think we first just need to identify what needs to be done to make Vector FIPS compliant. |
Hi @jszwedko! Making Vector FIPS compliant would involve using exclusively a FIPS-audited crypto implementation for all crypto needs. On RHEL/CoreOS that's OpenSSL, supplied by the OS, linked to Vector dynamically. ring has not been FIPS-auditied. It appears the most interesting part of this work is going to be not with Vector itself, but with it's (transitive) dependencies. For example, the AWS Rust SDK depends on ring directly. rustls is having a discussion along these lines rustls/rustls#521.
|
For the sake of cross-referencing, here is the AWS Rust SDK issue and PR on making OpenSSL the exclusive crypto provider: |
The bulk of our dependencies use OpenSSL so we prefer it when possible to reduce variance. We may also consider [FIPS compliance](#8435) in the future; which rustls does not have support. Closes: #15905 Signed-off-by: Jesse Szwedko <[email protected]>
* chore(aws provider): Switch to native-tls The bulk of our dependencies use OpenSSL so we prefer it when possible to reduce variance. We may also consider [FIPS compliance](#8435) in the future; which rustls does not have support. Closes: #15905 Signed-off-by: Jesse Szwedko <[email protected]> * Add upgrade note Signed-off-by: Jesse Szwedko <[email protected]> * Update website/content/en/highlights/2023-02-28-0-28-0-upgrade-guide.md Co-authored-by: Spencer Gilbert <[email protected]> --------- Signed-off-by: Jesse Szwedko <[email protected]> Co-authored-by: Spencer Gilbert <[email protected]>
Notably we added VRL encryption/decryption functions using pure Rust implementations which will likely be impacted by this initiative. |
There was some progress on this but also quite a bit of friction:
Fortunately, there's no hard blocker. Someone can resurrect PR #21504 |
A couple of users in discord have asked about FIPS compliance with regards to Vector:
I'm not entirely sure what all would be involved to have Vector be FIPS compliant, but at the least it seems like it'd be compiling using this openssl module: https://www.openssl.org/docs/fips.html (probably optionally)
This appears to be required for running applications in AWS GovCloud.
The text was updated successfully, but these errors were encountered: