From: Jeff Layton <jlayton@redhat.com>
To: "J. Bruce Fields" <bfields@fieldses.org>
Cc: NeilBrown <neilb@suse.de>, NFS <linux-nfs@vger.kernel.org>
Subject: Re: nfsd needs "md5", but fips=1 disables it -> hang
Date: Thu, 27 Mar 2014 13:11:32 -0700 [thread overview]
Message-ID: <20140327131132.5fe8ea33@ipyr.poochiereds.net> (raw)
In-Reply-To: <20140327143024.GA27633@fieldses.org>
On Thu, 27 Mar 2014 10:30:24 -0400
"J. Bruce Fields" <bfields@fieldses.org> wrote:
> On Thu, Mar 27, 2014 at 08:52:39PM +1100, NeilBrown wrote:
> >
> > [I sent this 2 days ago but haven't seen it come back on the nfs
> > list and don't see it in the archives. Maybe someone we cannot
> > name filtered it because it contains the word 'crypto' ??]
>
> Huh.
>
> > Apparently there is a thing called "FIPS" which lists some approved
> > crypto algorithms. And some sites need to only use those. So they
> > boot their kernel with
> > fips=1
> > and anything non-fips-approved stops working.
> >
Yes. As best I can tell, the primary purpose of FIPS is to render the
machine unusable for any non-trivial purpose. ;)
The story I have heard is that FIPS carves out an exemption for the use
of unapproved crypto as long as it stays "within the
implementation" (whatever that means).
> > "md5" is not fips-approved.
> >
> > So
> >
> > desc.tfm = crypto_alloc_hash("md5", 0, CRYPTO_ALG_ASYNC);
> >
> > in
> >
> > nfs4_make_rec_clidname(char *dname, const struct xdr_netobj *clname)
> >
> >
> > always fails when fips=1. This interferes with efficient NFS
> > service (every 'open' hangs).
> >
> > s/md5/sha1/
> >
> > makes this problem go away, because sha1 is fips-approved.
> >
> > My question is: is this safe, or is the hash value used in some
> > external way (in /var/lib/nfs/v4recovery ??).
>
The hashes aren't used outside the machine and they're not even
cryptographically significant. The kernel only uses it as a way to
squash the long-form clientid into something that it can use as a
directory name.
In hindsight, the decision to use md5 for that purpose was
unfortunate...
> Right, it's used in v4recovery, so you'd lose client state when you
> rebooted the server to the new (SHA1-using) server.
>
> Our intention was to migrate people that care about FIPS to the umh
> upcall. But rhel6 has a hack (a private md5 implementation).
>
> Cc'ing jlayton (currently traveling) who did that work.
>
Yep, exactly.
For any newer kernels and nfs-utils, just use nfsdcltrack and don't
bother with the legacy code. Eventually I can forsee us getting rid of
the legacy client tracking.
> >
> > If changing the hash to sha1 is safe, we should do that and
> > probably add select CRYPTO_SHA1
> > to Kconfig just to be safe.
> >
> > If we really need to keep it stable, I guess we need to find a way
> > to perform md5 computations that bypasses the fips checks.
For RHEL6 I just made a private md5 implementation. I had considered
switching it to sha1 instead, but the problem is that you'll lose
persistent state if you upgrade the kernel and it switches the hashing
implementation.
--
Jeff Layton <jlayton@redhat.com>
next prev parent reply other threads:[~2014-03-27 20:11 UTC|newest]
Thread overview: 4+ messages / expand[flat|nested] mbox.gz Atom feed top
[not found] <20140327205239.2ea29060@notabene.brown>
2014-03-27 14:30 ` nfsd needs "md5", but fips=1 disables it -> hang J. Bruce Fields
2014-03-27 20:11 ` Jeff Layton [this message]
2014-03-31 6:54 ` NeilBrown
2014-03-31 12:11 ` Jeff Layton
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20140327131132.5fe8ea33@ipyr.poochiereds.net \
--to=jlayton@redhat.com \
--cc=bfields@fieldses.org \
--cc=linux-nfs@vger.kernel.org \
--cc=neilb@suse.de \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).