Skip to content

Commit 2e7a0b2

Browse files
authored
fix: FIPS compliance for OpenSSL (#1133)
fix: add openssl validation info
1 parent 28c6b5d commit 2e7a0b2

File tree

1 file changed

+13
-2
lines changed

1 file changed

+13
-2
lines changed

content/nginx/fips-compliance-nginx-plus.md

Lines changed: 13 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -107,6 +107,14 @@ Several operating system vendors have obtained FIPS 140-2 Level 1 and 140-3 Leve
107107

108108
You also can verify whether your operating system or cryptographic module is FIPS-validated using the [NIST database search tool](https://csrc.nist.gov/Projects/cryptographic-module-validation-program/validated-modules/search).
109109

110+
## FIPS validation of OpenSSL
111+
112+
OpenSSL 3.0 and later versions introduced a FIPS provider that enables cryptographic operations in a FIPS-compliant mode.
113+
114+
FIPS 140-3 validation: starting with OpenSSL 3.1.2, the library has [achieved FIPS 140-3 validation](https://openssl-library.org/post/2025-03-11-fips-140-3/) under certification [#4985](https://csrc.nist.gov/projects/cryptographic-module-validation-program/certificate/4985).
115+
116+
FIPS 140-2 validation: the FIPS provider for OpenSSL 3.0.x has been validated for FIPS 140-2 under certifications [#4811](https://csrc.nist.gov/projects/cryptographic-module-validation-program/certificate/4811) and [#4282](https://csrc.nist.gov/projects/cryptographic-module-validation-program/certificate/4282).
117+
110118
## Verification of correct operation of NGINX Plus
111119

112120
The following process describes how to deploy NGINX Plus in a FIPS‑compliant environment and verify that the FIPS operations are functioning correctly. It involves three basic steps:
@@ -248,7 +256,6 @@ nginx version: nginx/1.29.0 (nginx-plus-r35)
248256
built by gcc 11.5.0 20240719 (Red Hat 11.5.0-5) (GCC)
249257
built with OpenSSL 3.2.2 4 Jun 2024
250258
```
251-
Note that OpenSSL 1.0.x might include the `–fips` suffix to indicate that the library was linked with a FIPS-validated module, but it did not confirm that the library was operating in FIPS mode. Starting with OpenSSL 3.0, the concept of Providers was introduced, allowing explicit verification of FIPS validation by listing providers with the `openssl list -providers | grep fips` command.
252259

253260
**Configure NGINX Plus to serve a simple SSL/TLS‑protected website**: Add the following simple configuration to NGINX Plus:
254261

@@ -515,7 +522,7 @@ The process described above may be used to verify that NGINX Plus is operating i
515522

516523
- **FIPS compliant**: NGINX Plus is compliant with FIPS 140-2 Level 1 and FIPS 140-3 Level 1 within the cryptographic boundary when used with a FIPS‑validated OpenSSL cryptographic module on an operating system running in FIPS mode.
517524

518-
## See also:
525+
## See also
519526

520527
[FIPS 140-3 Standard in the PDF format](https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.140-3.pdf)
521528

@@ -524,4 +531,8 @@ The process described above may be used to verify that NGINX Plus is operating i
524531
[F5 NGINX Plus running on Red Hat Enterprise Linux is now FIPS 140-3 compliant](https://www.redhat.com/en/blog/f5-nginx-plus-running-red-hat-enterprise-linux-now-fips-140-3-compliant)
525532

526533

534+
## Revision history
535+
536+
- Version 2 (September 2025) - Added information about FIPS 140-3 Level 1 compliance, updated test procedures, updated product versions, updated URLs to operating systems, NIST certificates and other relevant resources.
527537

538+
- Version 1 (August 2019) - Initial version with FIPS 140-2 Level 1 compliance.

0 commit comments

Comments
 (0)