-
Notifications
You must be signed in to change notification settings - Fork 25.3k
Recommend ssha256
cache hasher in FIPS docs
#87255
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
for all `cache.hash_algo` realm settings. | ||
See <<hashing-settings>>. | ||
|
||
You _may_ set the `cache.hash_algo` realm settings to any of the `pbkdf2` options, however you |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Not sure we need this paragraph, and happy to remove it if we don't think it adds value. Essentially, pbkdf2
is a bad idea but it's not technically wrong and if a customer decides they want to use it and that the performance hit is acceptable, they can, from a FIPS standpoint. Wdyt?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think this paragraph should go along with the previous one that says about pbkdf2
not suitable for caching hashing.
Pinging @elastic/es-docs (Team:Docs) |
Pinging @elastic/es-security (Team:Security) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I suggest we split the "Password Hashing" section into two sub-sections, stored password and in-memory password. Or maybe just add one subsection for in-memory password. This will make it easier to directly link to the relevant texts about cache hashing.
for all `cache.hash_algo` realm settings. | ||
See <<hashing-settings>>. | ||
|
||
You _may_ set the `cache.hash_algo` realm settings to any of the `pbkdf2` options, however you |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think this paragraph should go along with the previous one that says about pbkdf2
not suitable for caching hashing.
@@ -27,8 +27,8 @@ For {es}, adherence to FIPS 140-2 is ensured by | |||
[discrete] | |||
=== Upgrade considerations | |||
|
|||
[IMPORTANT] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Intellij keeps auto-formatting this. I'm assuming it's fine to drop the trailing spaces
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
Let's wait for @lockewritesdocs to go through the changes before merging. Thanks!
@elasticmachine run elasticsearch-ci/docs |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Left minor, non-blocking comments, but LGTM otherwise
Co-authored-by: Adam Locke <[email protected]>
Co-authored-by: Adam Locke <[email protected]>
Co-authored-by: Adam Locke <[email protected]>
@elasticmachine run elasticsearch-ci/part-2-fips |
Our docs currently recommend PBKDF2 as a cache hasher in FIPS mode. However, the performance overhead of PBKDF2 is prohibitive; ssha256 is a more appropriate choice for in-memory credential hashing. This PR updates the docs to reflect this. See elastic#86740 for more context.
Our docs currently recommend PBKDF2 as a cache hasher in FIPS mode. However, the performance overhead of PBKDF2 is prohibitive; ssha256 is a more appropriate choice for in-memory credential hashing. This PR updates the docs to reflect this. See elastic#86740 for more context.
Our docs currently recommend PBKDF2 as a cache hasher in FIPS mode. However, the performance overhead of PBKDF2 is prohibitive; ssha256 is a more appropriate choice for in-memory credential hashing. This PR updates the docs to reflect this. See #86740 for more context.
Our docs currently recommend PBKDF2 as a cache hasher in FIPS mode. However, the performance overhead of PBKDF2 is prohibitive; ssha256 is a more appropriate choice for in-memory credential hashing. This PR updates the docs to reflect this. See #86740 for more context.
Our docs currently recommend
PBKDF2
as a cache hasher in FIPS mode.However, the performance overhead of
PBKDF2
is prohibitive;ssha256
is a more appropriate choice for in-memory credential hashing. This PR
updates the docs to reflect this. See #86740 for more context.