Replies: 1 comment 1 reply
-
I'm not sure I follow what exactly is the question TBH. Strimzi is developed, tested, and released with Red Hat UBI base images. If you create a fork that is based on Debian, it would be expected that you would need to do some things differently as that is pretty major change. Also - as a sidenote - your reproducer commands do not seem to be what Strimzi is using as we have there bunch of additional parameters that were added there exactly for the purpose of making the command work in FIPS environments. |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
We are running Strimzi (
0.42.0
) + components and building our own images based on a debian base image whereopenssl
is installed with the fips provider:Multiple components will fail on startup, e.g. Zookeeper:
This also affects other components.
The reason for this is the shared script tls_utils.sh#L33 which is used to create the keystore:
The command above from the script will fail on a FIPS compliant
openssl
installation sincepkcs12
will by default usePKCS12KDF
as MAC generation.PKCS12KDF
is not FIPS approved.Alternatives would be
-pbmac1_pbkdf2
or-nomac
to skip the MAC generation (https://docs.openssl.org/3.5/man1/openssl-pkcs12/#pkcs12-output-export-options):There is RFC#9579 to integrate
PBMAC1
intoPKCS12
and make it default when using the FIPS provider, but this is not reflected inopenssl
as of now.This can reproduced also without the Strimzi operator, just by calling the corresponding line:
So my question would be, is that an expected behaviour and FIPS for Strimzi applies only to runtime and not the keystore creation itself? Or am I missing potentially something?
Thanks in advance!
Beta Was this translation helpful? Give feedback.
All reactions