Troubleshooting
FIPS Enablement Issues
dracut failures during enablement
Symptom:
When running fips-mode-setup --enable, the command fails with errors similar to:
dracut: installkernel failed in module kernel-modules-extra
dracut: Can't write to /boot/efi/...
Cause:
This issue typically occurs if the currently running kernel was updated via a package manager but lacks the corresponding Boot Loader Specification (BLS) entries in /boot/loader/entries/. This prevents dracut from correctly locating the kernel images to regenerate the FIPS-compliant initramfs.
Resolution:
- Check for stuck processes: Ensure no other
dnforyumprocesses are running or stuck. - Reinstall Kernel Core: Reinstalling the kernel core package often triggers the scripts to regenerate the missing boot entries.
dnf reinstall kernel-core-$(uname -r) - Manual Entry Creation: if reinstalling fails, use
kernel-installto manually add the entry:kernel-install add $(uname -r) /lib/modules/$(uname -r)/vmlinuz
Application Issues in FIPS Mode
"Digital envelope routines: unsupported" (MD5 Errors)
Symptom: Applications failures or error messages containing:
Error: error:0308010C:digital envelope routines:inner_evp_generic_fetch:unsupported
Cause: FIPS mode disables cryptographic algorithms that are considered weak or non-compliant, such as MD5. Applications attempting to use MD5 for cryptographic purposes (signatures, hashing passwords) will be blocked by the OpenSSL FIPS provider.
Resolution:
- Update the Application: Configure the application to use FIPS-compliant algorithms like SHA-256 or SHA-512.
- Context-Specific Exceptions: Some applications allow configuring exceptions for non-cryptographic use of MD5, but this is generally discouraged in a FIPS-compliant environment.
SSH Connectivity Issues
Ed25519 Keys Rejected
Symptom:
After enabling FIPS mode, SSH connections using Ed25519 keys fail, or the sshd service logs errors about ignoring host keys.
sshd: Ed25519 keys are not allowed in FIPS mode
Cause: The Ed25519 algorithm is not currently FIPS 140-3 validated (or FIPS 140-2 validated in older profiles) and is therefore disabled by the system-wide cryptographic policies in FIPS mode.
Resolution: Switch to FIPS-compliant key types, such as:
- RSA (3072 bits or larger)
- ECDSA (P-256, P-384, or P-521)
Example of generating a compliant key:
ssh-keygen -t ecdsa -b 384
For additional assistance, consult the component-specific guides or contact CIQ Support.