Eugen Hartmann created GUACAMOLE-2004:
-----------------------------------------
Summary: Fix KSM integration for RHEL systems with FIPS mode
enabled
Key: GUACAMOLE-2004
URL: https://issues.apache.org/jira/browse/GUACAMOLE-2004
Project: Guacamole
Issue Type: Bug
Components: guacamole-client
Affects Versions: 1.5.5
Reporter: Eugen Hartmann
The change fixes the following KSM issue on RHEL systems with FIPS enabled:
{code:java}
Exception in thread "main" java.security.ProviderException: Could not derive
key at
sun.security.pkcs11.P11ECDHKeyAgreement.engineGenerateSecret(P11ECDHKeyAgreement.java:145)
at javax.crypto.KeyAgreement.generateSecret(KeyAgreement.java:586) at
com.keepersecurity.secretsManager.core.CryptoUtils.getEciesSymmetricKey(CryptoUtils.kt:149)
at
com.keepersecurity.secretsManager.core.CryptoUtils.publicEncrypt(CryptoUtils.kt:160)
at
com.keepersecurity.secretsManager.core.SecretsManager.generateTransmissionKey(SecretsManager.kt:1105)
at
com.keepersecurity.secretsManager.core.SecretsManager.fetchAndDecryptSecrets(SecretsManager.kt:1517)
at
com.keepersecurity.secretsManager.core.SecretsManager.getSecrets(SecretsManager.kt:395)
at
com.keepersecurity.secretsManager.core.SecretsManager.getSecrets$default(SecretsManager.kt:393)
at
com.keepersecurity.secretsManager.core.SecretsManager.getSecrets(SecretsManager.kt)
at com.keepersecurity.secretsManager.fipsTest.Main.main(Main.java:17)
Caused by: sun.security.pkcs11.wrapper.PKCS11Exception: CKR_ATTRIBUTE_SENSITIVE
at sun.security.pkcs11.wrapper.PKCS11.C_GetAttributeValue(Native Method)
at
sun.security.pkcs11.P11ECDHKeyAgreement.engineGenerateSecret(P11ECDHKeyAgreement.java:140)
... 9 more {code}
KSM expects us to use a correct security provider for proper functioning of
[Java/Kotlin
SDK|https://docs.keeper.io/en/secrets-manager/secrets-manager/developer-sdk-library/java-sdk]
{code:java}
Keeper will use the default cryptographic module of the Java runtime unless a
specific provider is added. In the examples here in this documentation, we are
using the BouncyCastle FIPS provider. {code}
The Security.addProvider method checks internally for duplication so it is safe
to add the same provider multiple times.
{code:java}
-1 if the provider was not added because it is already installed. {code}
The provider is added to the end of the provider list so I believe it is safe
to add the BouncyCastle FIPS provider by default. In this case, when some code
requests a cryptographic method/protocol, the BouncyCastle FIPS provider will
be used either in case of an exact match or as a fallback option.
--
This message was sent by Atlassian Jira
(v8.20.10#820010)