FIPS 140-3 Validated Modules in Oracle Linux 9
The following sections describe how to review FIPS 140-3 certifications and install FIPS 140-3 validated cryptographic modules in Oracle Linux 9.
Information About Modules That Have Received FIPS 140-3 Validation
The Oracle FIPS Certifications website provides the following information for each module:
-
Name and description of the module.
-
Status of the FIPS 140-3 validation process.
Important:
To achieve compliance with FIPS Publication 140-3, you must use the package version that the Security Policy document specifies for each respective module only.
-
Package version for the module.
-
Certificate number for the module.
After NIST completes its review for each cryptographic module, the status moves from "Review Pending" or "In Progress" to "Validated." You can then click the certificate number for each cryptographic module to review its associated FIPS certificate, and each FIPS certificate links to the relevant Security Policy document for that module. See the "Life-Cycle Assurance" section of those Security Policy documents for details about each module, and instructions with which the Cryptographic officer can verify their installation and configuration.
Installing FIPS Validated Cryptographic Modules for Oracle Linux 9
After you enable FIPS mode on Oracle Linux 9, you can then install FIPS validated cryptographic modules, as required. For information about the software channels that provide packages containing FIPS validated cryptographic modules, see Yum Repositories and ULN Channels for FIPS Validated Cryptographic Modules.
The following information applies to systems that are running a fully patched Oracle Linux 9 release that can install and enable FIPS cryptographic modules.
To install FIPS validated cryptographic modules, see the "Life-Cycle Assurance" section of the Security Policy document for the FIPS module that you plan to install.
The Security Policy document explains how to verify that the package is FIPS 140-3 validated, and how to configure the module for FIPS mode. See the Oracle FIPS Certifications website for the certificate number, which includes a link to the NIST FIPS 140-3 validation page. This page provides details about FIPS certification and the Security Policy document. The package versions that are listed reflect information that's found in the logical cryptographic boundary for the specific module.
Yum Repositories and ULN Channels for FIPS Validated Cryptographic Modules
The following are the dedicated Unbreakable Linux Network (ULN) channels and yum repository containing FIPS validated cryptographic modules for Oracle Linux 9:
x86_64 Platform:
-
ol9_x86_64_u3_security_validation
ULN channel -
ol9_u3_security_validation
yum repository
aarch64 Platform:
-
ol9_aarch64_u3_security_validation
ULN channel -
ol9_u3_security_validation
yum repository
Note that the
ol9_u3_security_validation
yum
repository is a common repository name for the x86_64 and aarch64 platforms. This repository
contains FIPS validated packages for both platforms and security updates for those
packages.
The epoch for
package updates with the _fips
suffix is set to 10
, so they
supersede any versions of the same package that don't use the _fips
suffix
and don't contain FIPS 140-3
compliance patches.
Security updates for the Oracle Linux 9
Kernel Crypto API Cryptographic Module (RHCK) are available in the "RHCK with Oracle fixes"
yum repository with identifier ol9_MODRHCK
and
the corresponding ULN channel.
Security updates for the UEK7 cryptographic module are available in the corresponding yum repository and ULN channel. For more information, see the Unbreakable Enterprise Kernel documentation.
For more information about how to manage yum repositories and ULN channels, see Oracle Linux: Managing Software on Oracle Linux.
For specific instructions on installing FIPS validated cryptographic modules, see Installing FIPS Validated Cryptographic Modules for Oracle Linux 9.