Eugen Hartmann created GUACAMOLE-2004:
-----------------------------------------

             Summary: Fix KSM integration for RHEL systems with FIPS mode 
enabled
                 Key: GUACAMOLE-2004
                 URL: https://issues.apache.org/jira/browse/GUACAMOLE-2004
             Project: Guacamole
          Issue Type: Bug
          Components: guacamole-client
    Affects Versions: 1.5.5
            Reporter: Eugen Hartmann


The change fixes the following KSM issue on RHEL systems with FIPS enabled:
{code:java}
Exception in thread "main" java.security.ProviderException: Could not derive 
key     at 
sun.security.pkcs11.P11ECDHKeyAgreement.engineGenerateSecret(P11ECDHKeyAgreement.java:145)
     at javax.crypto.KeyAgreement.generateSecret(KeyAgreement.java:586)     at 
com.keepersecurity.secretsManager.core.CryptoUtils.getEciesSymmetricKey(CryptoUtils.kt:149)
     at 
com.keepersecurity.secretsManager.core.CryptoUtils.publicEncrypt(CryptoUtils.kt:160)
     at 
com.keepersecurity.secretsManager.core.SecretsManager.generateTransmissionKey(SecretsManager.kt:1105)
     at 
com.keepersecurity.secretsManager.core.SecretsManager.fetchAndDecryptSecrets(SecretsManager.kt:1517)
     at 
com.keepersecurity.secretsManager.core.SecretsManager.getSecrets(SecretsManager.kt:395)
     at 
com.keepersecurity.secretsManager.core.SecretsManager.getSecrets$default(SecretsManager.kt:393)
     at 
com.keepersecurity.secretsManager.core.SecretsManager.getSecrets(SecretsManager.kt)
     at com.keepersecurity.secretsManager.fipsTest.Main.main(Main.java:17) 
Caused by: sun.security.pkcs11.wrapper.PKCS11Exception: CKR_ATTRIBUTE_SENSITIVE 
    at sun.security.pkcs11.wrapper.PKCS11.C_GetAttributeValue(Native Method)    
 at 
sun.security.pkcs11.P11ECDHKeyAgreement.engineGenerateSecret(P11ECDHKeyAgreement.java:140)
     ... 9 more {code}
 

KSM expects us to use a correct security provider for proper functioning of 
[Java/Kotlin 
SDK|https://docs.keeper.io/en/secrets-manager/secrets-manager/developer-sdk-library/java-sdk]
{code:java}
Keeper will use the default cryptographic module of the Java runtime unless a 
specific provider is added. In the examples here in this documentation, we are 
using the BouncyCastle FIPS provider. {code}
The Security.addProvider method checks internally for duplication so it is safe 
to add the same provider multiple times.
{code:java}
-1 if the provider was not added because it is already installed. {code}
The provider is added to the end of the provider list so I believe it is safe 
to add the BouncyCastle FIPS provider by default. In this case, when some code 
requests a cryptographic method/protocol, the BouncyCastle FIPS provider will 
be used either in case of an exact match or as a fallback option.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to