Support Table of RHEL8-10 FIPS/Crypto v. Server 2016-2022 AD DCs?
RHEL9+ have introduced newer Crypto Policies, and RHEL9.4+ is FIPS 140-3 certified.
As many enterprises are still communicating with Active Directory (AD) Domain Controllers (DCs) running Windows 2016, 2019 & 2022, I would like to understand what settings are compatible with what, on both sides. E.g.,
RHEL8+ supports ...
$ sudo update-crypto-policies --set FIPS:AD-SUPPORT
And RHEL9+ further offers ...
$ sudo update-crypto-policies --set FIPS:AD-SUPPORT-LEGACY
I've also seen this work on RHEL8+ as well ...
$ sudo update-crypto-polices --set FIPS:NO-SHA1:DISABLE-CBC
I'd like to understand all the differences, and what RHEL8, RHEL9 and RHEL10 can and cannot support. It would be great if we could break it down by release, FIPS mode, crypto policies and what ciphers, hashes and cipher blocks are supported, or not.
I'd then like each matched against, such in a table, Windows Server 2016, 2019, 2022 which have been put into FIPS mode, and any possible exceptions required.
Since there is a strategic alliance and support agreement between Microsoft and Red Hat, this really should be documented for Enterprises. Most of us who work in FSI, federal, basically anything regulated in the western world, especially under the US' various departments and regulated industries, have to deal with FIPS 140-2 and 140-3.
Thank you in advance. I'm more than willing to assist with the investigation and creation.
Responses