Your submission was sent successfully! Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

Developing for FIPS

Applications can be developed either by using the FIPS validated packages, such as OpenSSL, directly, or by using a higher level language and software ecosystem. The following table shows the recommended packages to use to develop FIPS applications in high level software languages/environments.

Environment Recommended package FIPS package used
Python python3-cryptography OpenSSL
Ruby openssl module OpenSSL
Perl Net::SSLeay OpenSSL
Nodejs crypto and tls APIs OpenSSL

How do I use the FIPS validated components correctly?

In addition to its development documentation, each validated package comes with a security policy attached to its certificate which provides detailed guidance about using the module in the “User Guidance” section. You can find the security policy document after clicking on the certificate number on the table above, under the section ‘Related Files’. You can find all certificates and policies issued by Canonical by querying the NIST website.

For the libraries like OpenSSL and libgcrypt, these instructions contain guidance about particular algorithms, for example, where to apply the AES-XTS algorithm and details about initialization and other aspects relevant to the package.

How can I detect whether the system has FIPS enabled?

Τηε generic way to check whether the Ubuntu system runs in FIPS mode is to check the file /proc/sys/crypto/fips_enabled.

When the Ubuntu FIPS kernel is present and runs with FIPS enabled, the /proc/sys/crypto/fips_enabled file exists and contains the 0x31 byte (character ‘1’ in ASCII). This in Ubuntu indicates that FIPS is enabled.

Which random generator should I use?

When using a validated cryptographic library like OpenSSL we recommend using that’s library’s random generator. In other cases we recommend using one of the following generators.

Random generator interface Description Recommended
getrandom() getrandom() is NIST SP800-90B compliant unless the GRND_RANDOM flag is specified. This is the recommended interface to use in Ubuntu. Yes
/dev/urandom It is wired to the NIST SP800-90B compliant Kernel Crypto API hash-based DRBG but does not block before the random generator is fully seeded. No
/dev/random It uses the traditional random number generator from the Linux kernel and it is not SP800-90B compliant. Because it can block indefinitely we do not recommend using it for any operation. No

Developing with OpenSSL

For an example of developing for FIPS with OpenSSL, see this article.

This page was last modified 1 year, 9 months ago. Help improve this document in the forum.