Skip to content

SYSTEM Cited by 1 source

OpenSSL

OpenSSL is the dominant open-source C library implementing TLS and a wide catalogue of cryptographic primitives (AES, SHA-2/3, RSA, ECDSA, X25519, and — since 3.x — post-quantum candidates via providers). It underpins most Linux-hosted TLS stacks: web servers (NGINX, Apache), databases (Postgres, MySQL), brokers (Kafka, Redpanda), SSH libraries, and language runtimes. OpenSSL ships both as a library linked by applications and as a openssl(1) command-line tool.

FIPS-validated builds

Since OpenSSL 3.x, FIPS 140 validation is delivered via a provider module (a distinct artefact from the core library) that gates the advertised algorithm surface to FIPS-approved primitives only.

  • OpenSSL 3.0.9 — validated for FIPS 140-2; under NIST review for FIPS 140-3 at the time of Redpanda's 2025-05-20 post (Source: sources/2025-05-20-redpanda-implementing-fips-compliance-in-redpanda).
  • OpenSSL 3.1.2 — validated for FIPS 140-3; Redpanda's late-2025 upgrade target to remain compliant once FIPS 140-2 sunsets (2026-02-22 per NIST).

A FIPS-validated build doesn't replace the default OpenSSL install — it ships as a parallel FIPS-module binary plus configuration files (openssl.cnf, fipsmodule.cnf). Applications in FIPS mode load the validated module at startup and refuse to negotiate non-approved algorithms.

Why validated-module distribution looks different from ordinary binaries

Validated-module distribution carries a per-primitive lag that ordinary library releases don't — any patch touching crypto code requires NIST re-validation before it can be consumed inside a FIPS boundary. This is structurally distinct from the normal "upgrade to get the latest CVE fix" cadence: compliance operators inside the boundary pay the validation-lag cost as part of the boundary.

Downstream vendors integrating OpenSSL FIPS mode (Redpanda, GitHub, AWS-for-GovCloud, etc.) typically ship two parallel artefacts — a default build linked against upstream OpenSSL, and a FIPS build linked against a NIST-validated OpenSSL release — so customers inside and outside the boundary can share the same upgrade pipeline. Redpanda's two-package split (redpanda-fips + redpanda-rpk-fips installable alongside the base packages) is the canonical wiki instance.

Seen in

Last updated · 470 distilled / 1,213 read