Password authentication in FIPS-compliant mode

Bug #1809252 reported by Tomasz Barański
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
QEMU
Invalid
Undecided
Unassigned

Bug Description

The documentation states, that:

"The VNC protocol has limited support for password based authentication. (...) Password authentication is not supported when operating in FIPS 140-2 compliance mode as it requires the use of the DES cipher."

Would it be possible for qemu to use a different cipher and re-enable password as an option in VNC console? Is there a technical reason for not using a stronger cipher?

Tags: fips vnc
Revision history for this message
Eric Blake (eblake) wrote : Re: [Qemu-devel] [Bug 1809252] [NEW] Password authentication in FIPS-compliant mode

On 12/20/18 6:59 AM, Tomasz Barański wrote:
> Public bug reported:
>
> The documentation states, that:
>
> "The VNC protocol has limited support for password based authentication.
> (...) Password authentication is not supported when operating in FIPS
> 140-2 compliance mode as it requires the use of the DES cipher."
>
> Would it be possible for qemu to use a different cipher and re-enable
> password as an option in VNC console? Is there a technical reason for
> not using a stronger cipher?

The technical reason is that there are no other VNC endpoints out there
that support a different cipher. The VNC protocol itself declares what
all compliant servers/clients must use - and that spec is what makes the
non-FIPS-compliant requirement. You wouldn't have to patch just qemu,
but every other VNC endpoint out there that you want to interoperate
with a patched qemu. But it's really not worth doing that when there
are already better solutions available. That is, rather than trying to
fix VNC, just use an alternative protocol that doesn't have a baked-in
authentication limitation in the first place - namely, Spice.

--
Eric Blake, Principal Software Engineer
Red Hat, Inc. +1-919-301-3266
Virtualization: qemu.org | libvirt.org

Revision history for this message
Daniel Berrange (berrange) wrote :

The VNC password authentication scheme is not extensible. It is unfixably broken by design.

QEMU provides the SASL authentication scheme for VNC which allows for strong authentication, when combined with the VeNCrypt authentication scheme that uses TLS.

These extensions are supported by the gtk-vnc client used by remote-viewer, virt-viewer, virt-manager, GNOME Boxes and more. Other VNC clients are also known to implement VeNCrypt, though SASL support is less wide spread.

From a QEMU POV, there's nothing more we need todo really - any remaining gaps are client side.

Changed in qemu:
status: New → Invalid
Revision history for this message
Tomasz Barański (tomasz.baranski) wrote :

I understand. Thank you, guys!

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.