Consider if we should always enforce/check for FIPS compliance during TLS initialization. #183
Labels
area/ci
CI/CD, automated testing, etc.
area/core
Core functionality, event model, etc.
effort/intermediate
Involves changes that can be worked on by non-experts but might require guidance.
type/meta
Things that can't be neatly categorized and/or aren't yet fully-formed ideas/thoughts.
Presently, we utilize
rustls
, with its default cryptography provider, AWS-LC, as a pathway to generating FIPS-compliant ADP binaries. While FIPS is not currently enabled by default, it is likely that we will want to do so in the future to avoid issues around FIPS-vs-not-FIPS builds.However, enabling FIPS support boils down to enabling a specific set of feature flags on related crates, which is opaque and doesn't lend itself well to asserting that a build was built in FIPS mode.
We should consider what it might take to check for FIPS mode at runtime, such that we could ensure that startup terminated if we detected that we were not in FIPS mode. This would also require analyzing if always running in FIPS mode would be sufficient/harmful to users when FIPS compliance wasn't actually necessary.
The text was updated successfully, but these errors were encountered: