-
Notifications
You must be signed in to change notification settings - Fork 13
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Various test failures when using OpenSSL 3.0 #25
Comments
I added diagnostic logging and it turned out that the failures are caused by stricter checks on RSA usage recently introduced in the openssl package in CentOS Stream 9 to adhere to the FIPS requirements, where:
(1) could be fixed by updating the key (and data) used in the tests, while we have no options for the others; in particular (3) cannot be worked around by envvar nor configuration option in my test. I'm attaching the full log for further analysis. |
The above comment is about --- FAIL: TestBoringCertAlgs (2.55s)
boring_test.go:344: basic: accept
boring_test.go:377: basic (client cert): BAD reject (tls: failed to sign handshake:
EVP_PKEY_decrypt/encrypt failed
openssl error(s):
file: providers/implementations/asymciphers/rsa_enc.c
line: 250
function: rsa_decrypt
flags: 0
error string: error:1C800069:Provider routines::invalid key length
)
boring_test.go:352: basic (fips): BAD accept
boring_test.go:373: basic (fips, client cert): reject
boring_test.go:396: basic test failed, skipping exhaustive test This is because the leaf certificate created using a 1024-bit RSA key. |
This was actually incorrect; the offending SHA-1 usage is outer hash, while SHA-1 usage in MGF1 is still allowed (as it is the default in the spec). |
Certain configurations of OpenSSL 3.0 (eg. CentOS Stream 9) deprecate certain crypto algortihms, causing tests to fail in FIPS mode.
https://github.com/dbenoit17/openssl-fips/actions/runs/3146401859/jobs/5114808045#step:14:1
The text was updated successfully, but these errors were encountered: