Source file src/cmd/go/internal/fips140/fips140.go
1 // Copyright 2024 The Go Authors. All rights reserved. 2 // Use of this source code is governed by a BSD-style 3 // license that can be found in the LICENSE file. 4 5 // Package fips implements support for the GOFIPS140 build setting. 6 // 7 // The GOFIPS140 build setting controls two aspects of the build: 8 // 9 // - Whether binaries are built to default to running in FIPS-140 mode, 10 // meaning whether they default to GODEBUG=fips140=on or =off. 11 // 12 // - Which copy of the crypto/internal/fips140 source code to use. 13 // The default is obviously GOROOT/src/crypto/internal/fips140, 14 // but earlier snapshots that have differing levels of external 15 // validation and certification are stored in GOROOT/lib/fips140 16 // and can be substituted into the build instead. 17 // 18 // This package provides the logic needed by the rest of the go command 19 // to make those decisions and implement the resulting policy. 20 // 21 // [Init] must be called to initialize the FIPS logic. It may fail and 22 // call base.Fatalf. 23 // 24 // When GOFIPS140=off, [Enabled] returns false, and the build is 25 // unchanged from its usual behaviors. 26 // 27 // When GOFIPS140 is anything else, [Enabled] returns true, and the build 28 // sets the default GODEBUG to include fips140=on. This will make 29 // binaries change their behavior at runtime to confirm to various 30 // FIPS-140 details. [cmd/go/internal/load.defaultGODEBUG] calls 31 // [fips.Enabled] when preparing the default settings. 32 // 33 // For all builds, FIPS code and data is laid out in contiguous regions 34 // that are conceptually concatenated into a "fips object file" that the 35 // linker hashes and then binaries can re-hash at startup to detect 36 // corruption of those symbols. When [Enabled] is true, the link step 37 // passes -fipso={a.Objdir}/fips.o to the linker to save a copy of the 38 // fips.o file. Since the first build target always uses a.Objdir set to 39 // $WORK/b001, a build like 40 // 41 // GOFIPS140=latest go build -work my/binary 42 // 43 // will leave fips.o behind in $WORK/b001 44 // (unless the build result is cached, of course). 45 // 46 // When GOFIPS140 is set to something besides off and latest, [Snapshot] 47 // returns true, indicating that the build should replace the latest copy 48 // of crypto/internal/fips140 with an earlier snapshot. The reason to do 49 // this is to use a copy that has been through additional lab validation 50 // (an "in-process" module) or NIST certification (a "certified" module). 51 // The snapshots are stored in GOROOT/lib/fips140 in module zip form. 52 // When a snapshot is being used, Init unpacks it into the module cache 53 // and then uses that directory as the source location. 54 // 55 // A FIPS snapshot like v1.2.3 is integrated into the build in two different ways. 56 // 57 // First, the snapshot's fips140 directory replaces crypto/internal/fips140 58 // using fsys.Bind. The effect is to appear to have deleted crypto/internal/fips140 59 // and everything below it, replacing it with the single subdirectory 60 // crypto/internal/fips140/v1.2.3, which now has the FIPS packages. 61 // This virtual file system replacement makes patterns like std and crypto... 62 // automatically see the snapshot packages instead of the original packages 63 // as they walk GOROOT/src/crypto/internal/fips140. 64 // 65 // Second, ResolveImport is called to resolve an import like crypto/internal/fips140/sha256. 66 // When snapshot v1.2.3 is being used, ResolveImport translates that path to 67 // crypto/internal/fips140/v1.2.3/sha256 and returns the actual source directory 68 // in the unpacked snapshot. Using the actual directory instead of the 69 // virtual directory GOROOT/src/crypto/internal/fips140/v1.2.3 makes sure 70 // that other tools using go list -json output can find the sources, 71 // as well as making sure builds have a real directory in which to run the 72 // assembler, compiler, and so on. The translation of the import path happens 73 // in the same code that handles mapping golang.org/x/mod to 74 // cmd/vendor/golang.org/x/mod when building commands. 75 // 76 // It is not strictly required to include v1.2.3 in the import path when using 77 // a snapshot - we could make things work without doing that - but including 78 // the v1.2.3 gives a different version of the code a different name, which is 79 // always a good general rule. In particular, it will mean that govulncheck need 80 // not have any special cases for crypto/internal/fips140 at all. The reports simply 81 // need to list the relevant symbols in a given Go version. (For example, if a bug 82 // is only in the in-tree copy but not the snapshots, it doesn't list the snapshot 83 // symbols; if it's in any snapshots, it has to list the specific snapshot symbols 84 // in addition to the “normal” symbol.) 85 package fips140 86 87 import ( 88 "cmd/go/internal/base" 89 "cmd/go/internal/cfg" 90 "cmd/go/internal/fsys" 91 "cmd/go/internal/modfetch" 92 "cmd/go/internal/str" 93 "context" 94 "os" 95 "path" 96 "path/filepath" 97 "strings" 98 99 "golang.org/x/mod/module" 100 "golang.org/x/mod/semver" 101 ) 102 103 // Init initializes the FIPS settings. 104 // It must be called before using any other functions in this package. 105 // If initialization fails, Init calls base.Fatalf. 106 func Init() { 107 if initDone { 108 return 109 } 110 initDone = true 111 initVersion() 112 initDir() 113 if Snapshot() { 114 fsys.Bind(Dir(), filepath.Join(cfg.GOROOT, "src/crypto/internal/fips140")) 115 } 116 117 // ExperimentErr != nil if GOEXPERIMENT failed to parse. Typically 118 // cmd/go main will exit in this case, but it is allowed during 119 // toolchain selection, as the GOEXPERIMENT may be valid for the 120 // selected toolchain version. 121 if cfg.ExperimentErr == nil && cfg.Experiment.BoringCrypto && Enabled() { 122 base.Fatalf("go: cannot use GOFIPS140 with GOEXPERIMENT=boringcrypto") 123 } 124 } 125 126 var initDone bool 127 128 // checkInit panics if Init has not been called. 129 func checkInit() { 130 if !initDone { 131 panic("fips: not initialized") 132 } 133 } 134 135 // Version reports the GOFIPS140 version in use, 136 // which is either "off", "latest", or a version like "v1.2.3". 137 // If GOFIPS140 is set to an alias like "inprocess" or "certified", 138 // Version returns the underlying version. 139 func Version() string { 140 checkInit() 141 return version 142 } 143 144 // Enabled reports whether FIPS mode is enabled at all. 145 // That is, it reports whether GOFIPS140 is set to something besides "off". 146 func Enabled() bool { 147 checkInit() 148 return version != "off" 149 } 150 151 // Snapshot reports whether FIPS mode is using a source snapshot 152 // rather than $GOROOT/src/crypto/internal/fips140. 153 // That is, it reports whether GOFIPS140 is set to something besides "latest" or "off". 154 func Snapshot() bool { 155 checkInit() 156 return version != "latest" && version != "off" 157 } 158 159 var version string 160 161 func initVersion() { 162 // For off and latest, use the local source tree. 163 v := cfg.GOFIPS140 164 if v == "off" || v == "" { 165 version = "off" 166 return 167 } 168 if v == "latest" { 169 version = "latest" 170 return 171 } 172 173 // Otherwise version must exist in lib/fips140, either as 174 // a .zip (a source snapshot like v1.2.0.zip) 175 // or a .txt (a redirect like inprocess.txt, containing a version number). 176 if strings.Contains(v, "/") || strings.Contains(v, `\`) || strings.Contains(v, "..") { 177 base.Fatalf("go: malformed GOFIPS140 version %q", cfg.GOFIPS140) 178 } 179 if cfg.GOROOT == "" { 180 base.Fatalf("go: missing GOROOT for GOFIPS140") 181 } 182 183 file := filepath.Join(cfg.GOROOT, "lib", "fips140", v) 184 if data, err := os.ReadFile(file + ".txt"); err == nil { 185 v = strings.TrimSpace(string(data)) 186 file = filepath.Join(cfg.GOROOT, "lib", "fips140", v) 187 if _, err := os.Stat(file + ".zip"); err != nil { 188 base.Fatalf("go: unknown GOFIPS140 version %q (from %q)", v, cfg.GOFIPS140) 189 } 190 } 191 192 if _, err := os.Stat(file + ".zip"); err == nil { 193 // Found version. Add a build tag. 194 cfg.BuildContext.BuildTags = append(cfg.BuildContext.BuildTags, "fips140"+semver.MajorMinor(v)) 195 version = v 196 return 197 } 198 199 base.Fatalf("go: unknown GOFIPS140 version %q", v) 200 } 201 202 // Dir reports the directory containing the crypto/internal/fips140 source code. 203 // If Snapshot() is false, Dir returns GOROOT/src/crypto/internal/fips140. 204 // Otherwise Dir ensures that the snapshot has been unpacked into the 205 // module cache and then returns the directory in the module cache 206 // corresponding to the crypto/internal/fips140 directory. 207 func Dir() string { 208 checkInit() 209 return dir 210 } 211 212 var dir string 213 214 func initDir() { 215 v := version 216 if v == "latest" || v == "off" { 217 dir = filepath.Join(cfg.GOROOT, "src/crypto/internal/fips140") 218 return 219 } 220 221 mod := module.Version{Path: "golang.org/fips140", Version: v} 222 file := filepath.Join(cfg.GOROOT, "lib/fips140", v+".zip") 223 zdir, err := modfetch.Unzip(context.Background(), mod, file) 224 if err != nil { 225 base.Fatalf("go: unpacking GOFIPS140=%v: %v", v, err) 226 } 227 dir = filepath.Join(zdir, "fips140") 228 return 229 } 230 231 // ResolveImport resolves the import path imp. 232 // If it is of the form crypto/internal/fips140/foo 233 // (not crypto/internal/fips140/v1.2.3/foo) 234 // and we are using a snapshot, then LookupImport 235 // rewrites the path to crypto/internal/fips140/v1.2.3/foo 236 // and returns that path and its location in the unpacked 237 // FIPS snapshot. 238 func ResolveImport(imp string) (newPath, dir string, ok bool) { 239 checkInit() 240 const fips = "crypto/internal/fips140" 241 if !Snapshot() || !str.HasPathPrefix(imp, fips) { 242 return "", "", false 243 } 244 fipsv := path.Join(fips, version) 245 var sub string 246 if str.HasPathPrefix(imp, fipsv) { 247 sub = "." + imp[len(fipsv):] 248 } else { 249 sub = "." + imp[len(fips):] 250 } 251 newPath = path.Join(fips, version, sub) 252 dir = filepath.Join(Dir(), version, sub) 253 return newPath, dir, true 254 } 255