Having the CBC mode ciphers enabled will trigger Nessus Plugin ID 70658:

https://www.tenable.com/plugins/nessus/70658

This was likely a factor in DISA's decision to remove them from the STIG. Older 
versions of the STIG (at least the RHEL 6 STIG) had the CBC modes enabled, but 
they were taken out at some point for reasons unrelated to FIPS 140-2.

On Wed, Mar 11, 2020, at 11:36 AM, Matěj Týč wrote:
> One of RHEL7 bugzillas [1] shows an interesting discrepancy between our 
> content and STIG:
> 
>  * We feature [2] a rule "Use Only FIPS 140-2 Validated Ciphers"
>  * STIG has its own [3] "A FIPS 140-2 approved cryptographic algorithm 
> must be used for SSH communications."
> There is a discrepancy between the two - while we claim that the 
> following ciphers are FIPS 140-2 certified on Red Hat Enterprise Linux 
> 7, only three of them are recognized as such by the STIG:
> 
>  * aes128-ctr(STIG)
>  * aes192-ctr(STIG)
>  * aes256-ctr(STIG)
>  * aes128-cb 
>  * aes192-cbc
>  * aes256-cbc
>  * 3des-cbc
>  * rijndael-...@lysator.liu.se
> I have confirmed correctness of our description with our FIPS SME Tomas 
> Mraz (in CC), so this issue looks as a bug in STIG - either the 
> requirement is too strict, so it is incorrect, or it is supposed to be 
> strict, and it should therefore be reworded, and we need to create a 
> new rule in our content.
> 

Indeed, the STIG allows fewer ciphers than FIPS allows; the STIG currently says 
"If any ciphers other than "aes128-ctr", "aes192-ctr", or "aes256-ctr" are 
listed, the "Ciphers" keyword is missing, or the returned line is commented 
out, this is a finding." [4]

Similarly, for the MACs allowed, "If any ciphers other than "hmac-sha2-256" or 
"hmac-sha2-512" are listed or the returned line is commented out, this is a 
finding." [5]

More are permitted by FIPS than by SSH, but the STIG is FIPS compliant as-is, 
using a subset of the FIPS ciphers. From the Security Policy document for the 
certification [6],

Only the following ciphers are allowed:
- aes128-ctr
- aes192-ctr
- aes256-ctr
- aes128-cbc
- aes192-cbc
- aes256-cbc
- 3des-cbc
- rijndael-...@lysator.liu.se
Only the following message authentication codes are allowed:
- hmac-sha1
- hmac-sha2-256
- hmac-sha2-512
- hmac-sha1-...@openssh.com
- hmac-sha2-256-...@openssh.com
- hmac-sha2-512-...@openssh.com


> What is the procedure in cases like this?
> 

I'd just configure the STIG subset of FIPS, and maybe ask DISA to add a 
clarification note to the STIG.  Many folks are concerned about the 
FIPS-permitted 3DES algorithm [7], "3DES is deprecated for all new applications 
and usage is disallowed after 2023"


V/r,
James Cassell


[4] 
Caution-https://vaulted.io/library/disa-stigs-srgs/red_hat_enterprise_linux_7_security_technical_implementation_guide/V-72221?version=V2R6

[5] 
Caution-https://vaulted.io/library/disa-stigs-srgs/red_hat_enterprise_linux_7_security_technical_implementation_guide/V-72253?version=V2R6

[6] 
Caution-https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/security-policies/140sp3067.pdf

[7] 
Caution-https://www.cryptomathic.com/news-events/blog/3des-is-officially-being-retired


> References:
> 
> 
> > [1]: Caution-https://bugzilla.redhat.com/show_bug.cgi?id=1781244
> >  [2]: 
> > Caution-https://static.open-scap.org/ssg-guides/ssg-rhel7-guide-stig.html#xccdf_org.ssgproject.content_rule_sshd_use_approved_ciphers
> >  [3]: 
> Caution-https://www.stigviewer.com/stig/red_hat_enterprise_linux_7/2017-12-14/finding/V-72221
> 
_______________________________________________
scap-security-guide mailing list -- scap-security-guide@lists.fedorahosted.org
To unsubscribe send an email to scap-security-guide-le...@lists.fedorahosted.org
Fedora Code of Conduct: 
Caution-https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: Caution-https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
Caution-https://lists.fedorahosted.org/archives/list/scap-security-guide@lists.fedorahosted.org

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
scap-security-guide mailing list -- scap-security-guide@lists.fedorahosted.org
To unsubscribe send an email to scap-security-guide-le...@lists.fedorahosted.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/scap-security-guide@lists.fedorahosted.org

Reply via email to