Unix & Linux Stack Exchange
Q&A for users of Linux, FreeBSD and other Unix-like operating systems
Latest Questions
7
votes
1
answers
2236
views
Debian FIPS Certified
Is Debian OS FIPS certified? Does it support FIPS Validated Cryptographic Modules? What I noticed is that FIPS mode can be enabled with the tool [fips-mode-setup][1]. This tool is developed and can be used for other Linux distributions (SUSE, Oracle Linux, Red Hat, Ubuntu), in case the user wants to...
Is Debian OS FIPS certified? Does it support FIPS Validated Cryptographic Modules?
What I noticed is that FIPS mode can be enabled with the tool fips-mode-setup . This tool is developed and can be used for other Linux distributions (SUSE, Oracle Linux, Red Hat, Ubuntu), in case the user wants to enable FIPS mode afterward (not part of OS). Does that mean that Debian can be configured to use FIPS Validated Cryptographic Modules?
Milica
(71 rep)
Sep 19, 2022, 09:16 AM
• Last activity: Aug 4, 2025, 08:06 PM
0
votes
1
answers
242
views
Rhel 9 SSH giving ssh_dispatch-run-fatal error
I'm trying to connect to a RHEL9 VM using ssh. When attempting, it gives the error: Connection closed by xxx.xxx.xxx.xxx port 22 I checked the /var/logs/secure log and found the following error Connection from xxx.xxx.xxx.xxx port 65527 on xxx.xxx.xxx.xxx port 22 rdomain input_kex_gen_init: key exch...
I'm trying to connect to a RHEL9 VM using ssh.
When attempting, it gives the error:
Connection closed by xxx.xxx.xxx.xxx port 22
I checked the /var/logs/secure log and found the following error
Connection from xxx.xxx.xxx.xxx port 65527 on xxx.xxx.xxx.xxx port 22 rdomain
input_kex_gen_init: key exchange type c25519 is not allowed in FIPS mode [preauth]
ssh_dispatch_run_fatal: Connection from xxx.xxx.xxx.xxx port 65527: invalid argument [preauth]
I've checked the firewall to allow port 22, I've checked the sshd_config and it matched a known good. I have no idea what could be blocking me. Any help would be greatly appreciated.
Will Burnside
(9 rep)
Jun 5, 2025, 06:36 PM
• Last activity: Jun 6, 2025, 10:08 AM
3
votes
1
answers
6655
views
securing SAMBA smb.conf best parameters
given today's date, running **windows 10 or later** and connecting to a **RHEL 8.8 or newer** Linux system which currently has `samba-4.17.5-3.el8_8` what is a ***best practice*** for parameters one should have in `/etc/samba/smb.conf` to ensure the **most secure and reliable connection** over that...
given today's date, running **windows 10 or later** and connecting to a **RHEL 8.8 or newer** Linux system which currently has
samba-4.17.5-3.el8_8
what is a ***best practice*** for parameters one should have in /etc/samba/smb.conf
to ensure the **most secure and reliable connection** over that protocol?
Below is what I am using. Can anyone modify or add to it to make it better? I am doing a simple samba setup with security=user
and passdb backend = tdbsam
withsimple local passwords created with smbpasswd -a
. If you have a smb.conf
template to share that involves windows domain joining and Active Directory and other more complicated things that would be cool too.
I am showing the two basic shares (home and data) that I almost always do, if there are parameters that should also be there to improve security?
note: not concerned all that much with the logging part, but appreciated if you can improve on it or provide explanation such that an admin could read and make a rationale decision on how to configure.
# /etc/samba/smb.conf template, RHEL 8.8
[global]
workgroup = SAMBA
security = user
passdb backend = tdbsam
printing = bsd
printcap name = /dev/null
load printers = no
disable spoolss = yes
log level = 0 vfs:10
log file = /var/log/samba/sambavfs.log
max log size = 0
smb encrypt = required
client min protocol = SMB3
client max protocol = SMB3
client signing = mandatory
server signing = mandatory
[homes]
comment = Home Directories
valid users = %S, %D%w%S
browseable = No
read only = No
inherit acls = Yes
vfs objects = extd_audit
[data]
comment = data
inherit acls = Yes
read only = No
path = /data
directory mask = 770
create mask = 660
vfs objects = extd_audit
**NOTE:** just also found out that **FIPS=1** in GRUB_CMDLINE_LINUX
in /etc/default/grub
(or doing fips-mode-setup --enable
which is available in RHEL-8) kills a samba connection from windows. See https://access.redhat.com/discussions/7022626 . This was not the case in RHEL-7.9 when doing FIPS=1.
ron
(8647 rep)
Nov 14, 2023, 08:47 PM
• Last activity: Sep 17, 2024, 05:08 AM
0
votes
0
answers
1833
views
Error in libcrypto when attempting to create Public/Private Keys in PEM format with Passphrase in FIPS mode
After attempting to create a public/private key using the following commands with a passphrase I receive this error Saving key "/home/.ssh/rsa_id" failed: error in libcrypto If I run this command without entering either the passphrase or the PEM option it works but I need both not one or the other....
After attempting to create a public/private key using the following commands with a passphrase I receive this error
Saving key "/home/.ssh/rsa_id" failed: error in libcrypto
If I run this command without entering either the passphrase or the PEM option it works but I need both not one or the other. The issue appears to be with using a passphrase together with the PEM option which I need for our Nessus scans to get proper credentials because of this type of error "Failed to parse ssh keys".
Commands:
ssh-keygen -t rsa -b 4096 -m PEM -f
Output:
Generating pubic/private rsa key pair. Enter passphrase (empty for no passphrase):
I enter a passphrase here
Enter same passphrase again:
I enter the passphrase again
Saving key "(file path and name)" failed: error in libcrypto
I've been able to create credentials without the PEM option and the passphrase but never with both. I've tried to convert the file to PEM format and add a passphrase but I always receive the erro in libcrypto.
Jason R
(1 rep)
Jul 8, 2024, 02:23 PM
• Last activity: Jul 8, 2024, 02:27 PM
Showing page 1 of 4 total questions