You can configure Jtest so that it is FIPS compliant.
In this section:
You will need to download the following BouncyCastle FIPS libraries from https://www.bouncycastle.org/download/bouncy-castle-java-fips/:
You can place these libraries wherever you choose. This location will be referred to as <BC_DIR> below.
Copy bc-fips-<VERSION>.jar, bctls-fips-<VERSION>.jar and bcutil-fips-<VERSION>.jar into the <JTEST_INSTALL_DIR>/bin
directory.
keytool
to convert the cacerts file to the FIPS-compliant BCFKS format.cd <JTEST_INSTALL_DIR> mv bin/jre/lib/security/cacerts bin/jre/lib/security/cacerts.pkcs12 ./bin/jre/bin/keytool -importkeystore -srckeystore bin/jre/lib/security/cacerts.pkcs12 -srcstoretype PKCS12 -destkeystore bin/jre/lib/security/cacerts -deststoretype BCFKS -providername BCFIPS -providerclass org.bouncycastle.jcajce.provider.BouncyCastleFipsProvider -providerpath bin/bc-fips-<VERSION>.jar -srcstorepass changeit -deststorepass changeit |
Open the jtestcli.jvm file in the <JTEST_INSTALL_DIR>/etc
directory, and insert the following line:
java.arg=-Djavax.net.ssl.trustStorePassword=changeit |
Open the java.security file in the <JTEST_INSTALL_DIR>/bin/jre/conf/security/
directory and make the following changes:
Set the list of security providers by commenting out all existing properties named security.provider.<number>
. and inserting the following lines:
security.provider.1=org.bouncycastle.jcajce.provider.BouncyCastleFipsProvider security.provider.2=org.bouncycastle.jsse.provider.BouncyCastleJsseProvider fips:BCFIPS security.provider.3=SUN |
Change key and trust manager factory algorithms for the javax.net.ssl package to PKIX.
ssl.KeyManagerFactory.algorithm=PKIX ssl.TrustManagerFactory.algorithm=PKIX |
Change the default keystore type to fips and disable the compatibility mode for JKS and PKCS12 keystore types.
keystore.type=fips keystore.type.compat=false |
(Linux only) Add the NativePRNGNonBlocking algorithm to the list of known strong SecureRandom implementations:
securerandom.strongAlgorithms=NativePRNGNonBlocking:SUN,NativePRNGBlocking:SUN,DRBG:SUN |
Allow only FIPS-approved algorithms:
org.bouncycastle.fips.approved_only=true |
Open the java.policy file in the <JTEST_INSTALL_DIR>/bin/jre/conf/security/
directory and insert the following permissions into the default domain:
permission java.lang.RuntimePermission "accessClassInPackage.sun.security.internal.spec"; permission org.bouncycastle.crypto.CryptoServicesPermission "tlsAlgorithmsEnabled"; |
Open the logging.properties file in the <JTEST_INSTALL_DIR>/bin/jre/conf/
directory and insert the following Bouncy Castle logger configuration:
org.bouncycastle.jsse.provider.DisabledAlgorithmConstraints.level=SEVERE org.bouncycastle.jsse.provider.PropertyUtils.level=SEVERE org.bouncycastle.jsse.provider.ProvTlsClient.level=SEVERE |
Save your changes.
keytool
to convert the cacerts file to the FIPS-compliant BCFKS format. Open the console and execute the following commands:cd <JAVA_HOME> mv lib/security/cacerts lib/security/cacerts.pkcs12 ./bin/keytool -importkeystore -srckeystore lib/security/cacerts.pkcs12 -srcstoretype PKCS12 -destkeystore lib/security/cacerts -deststoretype BCFKS -providername BCFIPS -providerclass org.bouncycastle.jcajce.provider.BouncyCastleFipsProvider -providerpath <BC_DIR>/bc-fips-<VERSION>.jar -srcstorepass changeit -deststorepass changeit |
Open the java.security file in the <JAVA_HOME>/conf/security
directory and make the following changes:
Set the list of security providers by commenting out all existing properties named security.provider.<number>
and fips.provider.<number>
, then inserting the following lines:
security.provider.1=org.bouncycastle.jcajce.provider.BouncyCastleFipsProvider security.provider.2=org.bouncycastle.jsse.provider.BouncyCastleJsseProvider fips:BCFIPS security.provider.3=SUN |
Change key and trust manager factory algorithms for the javax.net.ssl
package to PKIX.
ssl.KeyManagerFactory.algorithm=PKIX ssl.TrustManagerFactory.algorithm=PKIX |
Change the default keystore type to fips and disable the compatibility mode for JKS and PKCS12 keystore types.
keystore.type=fips keystore.type.compat=false |
(Linux only) Add the NativePRNGNonBlocking
algorithm to the list of known strong SecureRandom implementations:
securerandom.strongAlgorithms=NativePRNGNonBlocking:SUN,NativePRNGBlocking:SUN,DRBG:SUN |
org.bouncycastle.fips.approved_only=true |
Open the java.policy file in the <JAVA_HOME>/conf/security
directory and insert the following permissions into the default domain:
permission java.lang.RuntimePermission "accessClassInPackage.sun.security.internal.spec"; permission org.bouncycastle.crypto.CryptoServicesPermission "tlsAglorithmsEnabled"; |
Open the logging.properties file in the <JAVA_HOME>/conf
directory and insert the following Bouncy Castle logger configuration:
org.bouncycastle.jsse.provider.DisabledAlgorithmConstraints.level=SEVERE org.bouncycastle.jsse.provider.PropertyUtils.level=SEVERE org.bouncycastle.jsse.provider.ProvTlsClient.level=SEVERE |
Add the option that points to the Bouncy Castle FIPS libraries and the option that specifies the password required to access the trust store to your Java command line:
--module-path=<BC_DIR> -Djavax.net.ssl.trustStorePassword=changeit |