-
Notifications
You must be signed in to change notification settings - Fork 725
feat: add fips aligned security policy without CBC #5265
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can you use the "policy" utility in ./bin to generate a before and after report of the default_fips policy? A diff between the before and after would also help verify this change is correct.
Also, do you need to update the security policy documentation under ./docs?
Oh, and this PR definitely needs a Release Notes section. And I'm also not sure why it doesn't have a Testing section. |
Release Summary:
security_policy_20250416
that removes CBC cipher suites.Description of changes:
Removed CBC (Cipher Block Chaining) cipher suites due to their security weaknesses of being vulnerable to Padding Oracle Attacks.
Uses secure AEAD ciphers (immune to Padding Oracle Attacks), since AEAD ciphers don't have padding
Testing:
20250416
to the list of policies being tested ins2n_security_policies_test.c
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.