chainctl
chainctl Chainguard Control chainctl [flags] Options --api string The url of the Chainguard platform API. (default …
This document provides an overview of FIPS TLS connectivy requirements for using Chainguard FIPS products. These FIPS products have higher minimum TLS requirements, which complicates connecting them to insecure EOL non-FIPS systems, as well as FIPS systems with lapsed (historical) certification.
Chainguard strives to ensure the broadest connectivity possible for its FIPS products. However, many obsolete systems are still widely used and may not be able to connect with Chainguard FIPS products.
NIST Special Publication 800-52 Rev. 2 required all clients and servers to support TLSv1.3 by January 1, 2024.
While the majority of FIPS modules do have support for TLSv1.3, there are many FIPS 140-2 certified products and operating systems that do not have TLSv1.3 support. As of November 2025 there are 768 Active FIPS 140-2 validated modules, many of which do not have TLSv1.3 capability.
As a rule of thumb, products launched prior to 2019 do not have TLSv1.3 support, and still require TLSv1.2. If at all possible, upgrade clients and servers to gain TLSv1.3 capability, as newer FIPS modules have started to drop support for validated TLSv1.2. This is primarily driven by adding Post-Quantum Cryptograpy (PQC) which is only supported with TLSv1.3.
A “triple handshake” man-in-the-middle attack was discovered in the original TLSv1.2 RFC 5246 protocol specification. The TLSv1.2 RFC 7627 (published in 2015) addresses this vulnerability with an Extended Master Secret extension.
If you connect to Chainguard’s FIPS products without support for TLSv1.2 RFC 7627, your privacy and data integrity are not guaranteed.
To address this vulnerability in FIPS modules, NIST initiated a programmatic transition to require TLSv1.2 RFC 7627 in approved mode for all new module validations from May 16, 2023.
This means that all FIPS modules submitted after that date require TLSv1.2 with RFC 7627 support in approved mode.
In practice, products that support TLS 1.2 with RFC 7627 almost always also support TLS 1.3; only a handful of cases—primarily specific Windows and Android versions—do not.
The following Operating Systems, and newer versions of thereof, are known to support TLSv1.2 RFC 7627 and/or TLSv1.3 and should be able to establish TLS connectivy with Chainguard FIPS products:
This list is not exhaustive. To find FIPS products that suppot TLSv1.2 RFC 7627 or TLS v1.3 one can use CAVP search, select Implementation, and in the list of algorithms select “TLS v1.2 RFC7627” or “TLS v1.3 KDF”.
AWS RDS Postgres 16.11-R1 and later support TLSv1.3. If you require access to Postgres 14 or 15, please consider using Chainguard postgres-fips container image or VM instead.
At this time AWS MQ RabbitMQ does not support TLSv1.2 RFC 7627 or TLSv1.3. This product is currently out of compliance with NIST Special Publication 800-52 Rev. 2.
Please consider using AWS MQ Apache ActiveMQ, Chainguard’s rabbitmq-fips container image, or a VM instead.
There is no approved mode for connecting Chainguard products with Amazon Linux 2 in its default FIPS and non-FIPS configurations.
Amazon Linux 2 ships without support for TLSv1.2 RFC 7627 or TLS v1.3. Additionally, Amazon Linux 2 FIPS certification has lapsed.
Amazon Linux 2 non-FIPS has an optional package: openssl11. With this installed, it is possible to gain approved connectivity with Chainguard FIPS products.
As of this writing, Amazon Linux 2 is currently scheduled to sunset on June 30, 2026. We recommend upgrading to Chainguard VMs, Amazon Linux 2023, or Bottlerocket.
To guarantee connectivity, clients and servers communicating with Chainguard FIPS products must, at minimum, support the following TLS requirements:
These requirements can be approximately tested with the following OpenSSL client command:
openssl s_client -cipher @SECLEVEL=2:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384 -ciphersuites TLS_AES_256_GCM_SHA384 -groups P-256 -connect HOST:PORTNote that in the case of TLSv1.2 connectivity you must check the output for
Extended master secret: yes.
Last updated: 2025-11-15 15:22