| ▲ | usui 4 hours ago | |||||||
I know software developers complain about forced compliance due to the security theatre aspects, but I would like to charitably ask from someone who has technical understanding of FIPS-compliant cryptography. Are there any actual security advantages on technical grounds for making WireGuard FIPS-compliant? Assume the goal is not to appease pencil pushers. I really want to know if this kind of effort has technical gains. | ||||||||
| ▲ | ongy 4 hours ago | parent | next [-] | |||||||
Crypto wise, fips is outdated but not horrible. Actual fips compliant (certified) gives you confidence in some basic competence of the solution. Just fips compatible (i.e. picking algos that could be fips compliant) is generally neutral to negative. I'm not 100% up to date, so that might have changed, but AEAD used to be easier if you don't follow fips than fips compatible. Still possible, but more foot guns due to regulatory lag in techniques. Overall, IMO the other top-level comment of "only fips if you have pencil pusher benefit" applies. | ||||||||
| ▲ | loeg 4 hours ago | parent | prev | next [-] | |||||||
There is no security advantages or technical grounds for using FIPS algorithms in a WireGuard clone instead of Chacha / Blake2. It's purely a compliance move. ChaPoly, Blake2, etc, are not known to be broken and we have every reason to believe they are strong. | ||||||||
| ▲ | briandw 4 hours ago | parent | prev | next [-] | |||||||
My limited understanding is that issues like being vulnerable to side channel attacks are very difficult to detect. So you have to have shown that the entire development process is safe. From the code to the compiler to the hardware to the microcode, it all needs to be checked. That said it does seem like compliance is a bigger priority than safety. | ||||||||
| ▲ | IncRnd 3 hours ago | parent | prev | next [-] | |||||||
If you're considering whether to use a FIPS 140-3 module for your cryptography, consider that FIPS 140-3 is really only for specific compliance verticals. If you don't know whether you need it, you probably don't need it. So, along those lines, if you wonder whether a package's cryptography should be FIPS 140-3 compliant, then the real question is whether you are a vertical that needs to be compliant. Again, if you aren't sure, the answer is likely NO. | ||||||||
| ||||||||
| ▲ | some_furry 3 hours ago | parent | prev | next [-] | |||||||
No. Getting a crypto module validated by FIPS 140-3 simply lets you sell to the US Government (something something FedRAMP). It doesn't give you better assurance in the actual security of your designs or implementations, just verifies that you're using algorithms the US government has blessed for use in validated modules, in a way that an independent lab has said "LGTM". You generally want to layer your compliance (FIPS, etc.) with actual assurance practices. | ||||||||
| ▲ | alfanick 4 hours ago | parent | prev | next [-] | |||||||
I presume it's a product strategy to provide a box of "compliant" libraries/services, so other companies can quickly tick and sign a checkbox saying "we use compliant VPN", because someone else is going to look whether the checkbox is ticked and signed, because someone else is going to... | ||||||||
| ||||||||
| ▲ | tptacek 4 hours ago | parent | prev [-] | |||||||
No, there are not. | ||||||||