Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

md5sum FIPS issue #205

Closed
shaze opened this issue Apr 3, 2024 · 1 comment
Closed

md5sum FIPS issue #205

shaze opened this issue Apr 3, 2024 · 1 comment

Comments

@shaze
Copy link

shaze commented Apr 3, 2024

Version :

Truvari v4.2.3-dev

Describe the bug :

For systems which are FIPS-compliant there is a very aggravating constraint that hashlib.md5 calls need the optional argument usedforsecurity=False added, or the code won't work.

See below

/usr/local/bin/truvari
crypto/fips/fips.c:154: OpenSSL internal error: FATAL FIPS SELFTEST FAILURE
Aborted (core dumped)

To Reproduce :

Enable FIPS (e.g., run fips-mode-setup and set up policies) and install with pip

Expected behavior :
N/A

Additional context :

The usedforsecurity=False argument must be added to hashlib.md5. I've done this and built locally and it works. A patch is attached. (As an aside, the upstream dependancies numpy and pysam also have this problem)

fips.patch

ACEnglish added a commit that referenced this issue Apr 3, 2024
@ACEnglish
Copy link
Owner

ACEnglish commented Apr 3, 2024

Hello,

Yes, that is particularly aggravating because those three calls are never reached by users and is only as part of the functional tests infrastructure. Regardless, the changes have been made. Hope it helps!

It may be a bit before I cut a new release. In the meantime you can building directly from develop (details) or use pip install git+https://github.com/acenglish/truvari@a8dbd3066f7572e9b7487c470485de34930eee12

Have a great day,
~/Adam English

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants