To unsubscribe from this group and stop receiving emails from it, send an email to vault-tool+unsubscribe@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/vault-tool/ac173fdf-6f01-4df0-9436-21d7f8f40075%40googlegroups.com.
curl -X PUT -d "{\"secret_shares\":1, \"secret_threshold\":1}" http://${server IP}:8200/v1/sys/init
To unsubscribe from this group and stop receiving emails from it, send an email to vault-tool+unsubscribe@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/vault-tool/e8bbc56a-022f-4c40-a3dc-3967e012a39e%40googlegroups.com.
Disclaimer: my company has a key management solution that is FIPS 140-2 compliant, and I've managed NIST validation and FIPS 140-2 projects.
It is difficult to see how Vault could be considered FIPS 140-2 compliant even when the Vault master key is protected by an HSM which is itself FIPS 140-2 compliant. There are a large number of requirements for FIPS 140-2 compliance. Here are just a couple of those:
First, the Vault master key would need to be generated using a NIST compliant process. For symmetric key generation this would typically involve the use of a NIST approved deterministic random number generation routine as described in NIST Special Publication 800-90A Revision 1, which you can find here:
http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90Ar1.pdf
Since Vault is written in the Go language it is probably using the Go language <rand> function or similar. The Go language reference describes the use of a pseudo random number routine that is not NIST compliant. You can find the Go language specification here:
Secondly, and related to the first point, NIST compliant random number generators use either a secure hash algorithm or an encryption algorithm. Whichever method is used the hash or encryption method must also be NIST compliant. I can find no evidence that the Go language hash and crypto functions have been NIST validated. The list of compliant hash libraries are here:
The AES encryption validation list is here:
Please let me know if there are any errors in the above analysis.
It would be great to see Vault achieve FIPS 140-2 compliance. There is a clear path to validating this compliance that is open to anyone. See the NIST National Voluntary Laboratory Accreditation Program (NVLAP). Organizations which achieve NVLAP status can take you through the process.
Patrick
--
This mailing list is governed under the HashiCorp Community Guidelines - https://www.hashicorp.com/community-guidelines.html. Behavior in violation of those guidelines may result in your removal from this mailing list.
GitHub Issues: https://github.com/hashicorp/vault/issues
IRC: #vault-tool on Freenode
---
You received this message because you are subscribed to the Google Groups "Vault" group.
To unsubscribe from this group and stop receiving emails from it, send an email to vault-tool+unsubscribe@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/vault-tool/6c86e609-0afe-4198-bd64-4dbb8a403859%40googlegroups.com.