Re: [PATCH] mount.cifs.rst: add FIPS information

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Enzo,

Thanks for the patch.

After it is applied, the build fails on my machine:

rst2man --syntax-highlight=none mount.cifs.rst mount.cifs.8
mount.cifs.rst:952: (ERROR/3) Unknown target name:
"https://csrc.nist.gov/csrc/media/projects/cryptographic-module-validation-program/documents/fips140-2/fips1402ig.pdf<https://csrc.nist.gov/csrc/media/projects/cryptographic-module-validation-program/documents/fips140-2/fips1402ig.pdf>".

Does it compile on your side?

Best regards,
Pavel Shilovsky

пн, 4 апр. 2022 г. в 19:26, Enzo Matsumiya <ematsumiya@xxxxxxx>:
>
> On 04/03, Steve French wrote:
> >SMB2.1 or later is probably fine (and we note SMB2.1 or 3) for most
> >cases in our mount warning message.
> >
> >But this FIPS compliance issue reminds me that we should get the other
> >auth mechanisms working that are 'peer to peer' (so not forced to be
> >domain joined).   krb5 is great, but Macs support 'peer-to-peer
> >kerberos' and also SCRAM (RFC 7677) so we could also presumably get
> >FIPS compliant login for peer-to-peer cases if we implement on or both
> >of those other auth mechanisms.
>
> Thanks, Steve. AFAIK, as I mentioned earlier, I don't see FIPS
> disapproving particular auth mechanisms, but if those you mention uses
> algorithms that are not on FIPS-validated crypto modules, we're out of
> luck there as well.
>
> (full disclosure: I'm not yet familiar with "peer-to-peer kerberos")
>
> On-topic: I'd just like to have this patch merged for informational
> purposese only. I then can start working on your's and Tom's
> suggestions.
>
> >Anyone have some Macs or Mac VMs to test against ...?
>
> Yes. But let's move this one privately please.
>
>
> Cheers,
>
> Enzo



[Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux