mirror of
				https://github.com/minio/minio.git
				synced 2025-11-04 02:01:05 +01:00 
			
		
		
		
	
		
			
				
	
	
		
			148 lines
		
	
	
		
			5.1 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			148 lines
		
	
	
		
			5.1 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// Copyright (c) 2015-2021 MinIO, Inc.
 | 
						|
//
 | 
						|
// This file is part of MinIO Object Storage stack
 | 
						|
//
 | 
						|
// This program is free software: you can redistribute it and/or modify
 | 
						|
// it under the terms of the GNU Affero General Public License as published by
 | 
						|
// the Free Software Foundation, either version 3 of the License, or
 | 
						|
// (at your option) any later version.
 | 
						|
//
 | 
						|
// This program is distributed in the hope that it will be useful
 | 
						|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
						|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | 
						|
// GNU Affero General Public License for more details.
 | 
						|
//
 | 
						|
// You should have received a copy of the GNU Affero General Public License
 | 
						|
// along with this program.  If not, see <http://www.gnu.org/licenses/>.
 | 
						|
 | 
						|
// Package fips provides functionality to configure cryptographic
 | 
						|
// implementations compliant with FIPS 140.
 | 
						|
//
 | 
						|
// FIPS 140 [1] is a US standard for data processing that specifies
 | 
						|
// requirements for cryptographic modules. Software that is "FIPS 140
 | 
						|
// compliant" must use approved cryptographic primitives only and that
 | 
						|
// are implemented by a FIPS 140 certified cryptographic module.
 | 
						|
//
 | 
						|
// So, FIPS 140 requires that a certified implementation of e.g. AES
 | 
						|
// is used to implement more high-level cryptographic protocols.
 | 
						|
// It does not require any specific security criteria for those
 | 
						|
// high-level protocols. FIPS 140 focuses only on the implementation
 | 
						|
// and usage of the most low-level cryptographic building blocks.
 | 
						|
//
 | 
						|
// [1]: https://en.wikipedia.org/wiki/FIPS_140
 | 
						|
package fips
 | 
						|
 | 
						|
import (
 | 
						|
	"crypto/tls"
 | 
						|
 | 
						|
	"github.com/minio/sio"
 | 
						|
)
 | 
						|
 | 
						|
// Enabled indicates whether cryptographic primitives,
 | 
						|
// like AES or SHA-256, are implemented using a FIPS 140
 | 
						|
// certified module.
 | 
						|
//
 | 
						|
// If FIPS-140 is enabled no non-NIST/FIPS approved
 | 
						|
// primitives must be used.
 | 
						|
const Enabled = enabled
 | 
						|
 | 
						|
// DARECiphers returns a list of supported cipher suites
 | 
						|
// for the DARE object encryption.
 | 
						|
func DARECiphers() []byte {
 | 
						|
	if Enabled {
 | 
						|
		return []byte{sio.AES_256_GCM}
 | 
						|
	}
 | 
						|
	return []byte{sio.AES_256_GCM, sio.CHACHA20_POLY1305}
 | 
						|
}
 | 
						|
 | 
						|
// TLSCiphers returns a list of supported TLS transport
 | 
						|
// cipher suite IDs.
 | 
						|
//
 | 
						|
// The list contains only ciphers that use AES-GCM or
 | 
						|
// (non-FIPS) CHACHA20-POLY1305 and ellitpic curve key
 | 
						|
// exchange.
 | 
						|
func TLSCiphers() []uint16 {
 | 
						|
	if Enabled {
 | 
						|
		return []uint16{
 | 
						|
			tls.TLS_AES_128_GCM_SHA256, // TLS 1.3
 | 
						|
			tls.TLS_AES_256_GCM_SHA384,
 | 
						|
			tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, // TLS 1.2
 | 
						|
			tls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
 | 
						|
			tls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
 | 
						|
			tls.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return []uint16{
 | 
						|
		tls.TLS_CHACHA20_POLY1305_SHA256, // TLS 1.3
 | 
						|
		tls.TLS_AES_128_GCM_SHA256,
 | 
						|
		tls.TLS_AES_256_GCM_SHA384,
 | 
						|
		tls.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305, // TLS 1.2
 | 
						|
		tls.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
 | 
						|
		tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
 | 
						|
		tls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
 | 
						|
		tls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
 | 
						|
		tls.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// TLSCiphersBackwardCompatible returns a list of supported
 | 
						|
// TLS transport cipher suite IDs.
 | 
						|
//
 | 
						|
// In contrast to TLSCiphers, the list contains additional
 | 
						|
// ciphers for backward compatibility. In particular, AES-CBC
 | 
						|
// and non-ECDHE ciphers.
 | 
						|
func TLSCiphersBackwardCompatible() []uint16 {
 | 
						|
	if Enabled {
 | 
						|
		return []uint16{
 | 
						|
			tls.TLS_AES_128_GCM_SHA256, // TLS 1.3
 | 
						|
			tls.TLS_AES_256_GCM_SHA384,
 | 
						|
			tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, // TLS 1.2 ECDHE GCM
 | 
						|
			tls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
 | 
						|
			tls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
 | 
						|
			tls.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
 | 
						|
			tls.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, // TLS 1.2 ECDHE CBC
 | 
						|
			tls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
 | 
						|
			tls.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
 | 
						|
			tls.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
 | 
						|
			tls.TLS_RSA_WITH_AES_128_GCM_SHA256, // TLS 1.2 non-ECDHE
 | 
						|
			tls.TLS_RSA_WITH_AES_256_GCM_SHA384,
 | 
						|
			tls.TLS_RSA_WITH_AES_128_CBC_SHA,
 | 
						|
			tls.TLS_RSA_WITH_AES_256_CBC_SHA,
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return []uint16{
 | 
						|
		tls.TLS_CHACHA20_POLY1305_SHA256, // TLS 1.3
 | 
						|
		tls.TLS_AES_128_GCM_SHA256,
 | 
						|
		tls.TLS_AES_256_GCM_SHA384,
 | 
						|
		tls.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256, // TLS 1.2 ECDHE GCM / POLY1305
 | 
						|
		tls.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,
 | 
						|
		tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
 | 
						|
		tls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
 | 
						|
		tls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
 | 
						|
		tls.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
 | 
						|
		tls.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, // TLS 1.2 ECDHE CBC
 | 
						|
		tls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
 | 
						|
		tls.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
 | 
						|
		tls.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
 | 
						|
		tls.TLS_RSA_WITH_AES_128_GCM_SHA256, // TLS 1.2 non-ECDHE
 | 
						|
		tls.TLS_RSA_WITH_AES_256_GCM_SHA384,
 | 
						|
		tls.TLS_RSA_WITH_AES_128_CBC_SHA,
 | 
						|
		tls.TLS_RSA_WITH_AES_256_CBC_SHA,
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// TLSCurveIDs returns a list of supported elliptic curve IDs
 | 
						|
// in preference order.
 | 
						|
func TLSCurveIDs() []tls.CurveID {
 | 
						|
	var curves []tls.CurveID
 | 
						|
	if !Enabled {
 | 
						|
		curves = append(curves, tls.X25519) // Only enable X25519 in non-FIPS mode
 | 
						|
	}
 | 
						|
	curves = append(curves, tls.CurveP256)
 | 
						|
	if go19 {
 | 
						|
		// With go1.19 enable P384, P521 newer constant time implementations.
 | 
						|
		curves = append(curves, tls.CurveP384, tls.CurveP521)
 | 
						|
	}
 | 
						|
	return curves
 | 
						|
}
 |