Skip to content

Comments

Support for FIPS 140-3 compliance in Docker and build scripts#59

Merged
HalFinneyIsMyHomeBoy merged 11 commits intomainfrom
Enforce-FIPS-140-3-mode
Feb 17, 2026
Merged

Support for FIPS 140-3 compliance in Docker and build scripts#59
HalFinneyIsMyHomeBoy merged 11 commits intomainfrom
Enforce-FIPS-140-3-mode

Conversation

@HalFinneyIsMyHomeBoy
Copy link
Contributor

Enforce FIPS 140-3 by default

  • Without FIPS: (current mode)

    • Only one source of entropy is used
    • crypto/rand.Reader uses only the operating system’s RNG via crypto/internal/sysrand.
    • No DRBG is used; output is directly from the OS.
  • With FIPS enabled: (new default)

    • Two different sources of entropy are mixed together
    • crypto/rand.Reader is backed by an SP 800-90A DRBG (crypto/internal/fips140/drbg), seeded from a dedicated FIPS entropy source.
    • On every read, 128 bits of OS randomness are mixed in as additional input, strengthening the output per FIPS requirements.

Reference: https://go.dev/doc/security/fips140

Copy link
Contributor

@boldbitcoin boldbitcoin left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

FIPs compliance applied 👍

@HalFinneyIsMyHomeBoy HalFinneyIsMyHomeBoy removed the request for review from kar1timmins February 17, 2026 03:47
@HalFinneyIsMyHomeBoy HalFinneyIsMyHomeBoy merged commit 47e494c into main Feb 17, 2026
1 check passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants