SLE LTSS BCI 15 SP4 FIPS-140-3

15 SP4 FIPS-140-3 container based on the SLE LTSS Base Container Image.

Get Image
Requires login
Digest:
sha256:1a3e4b51f187e65fb299815885cf8e937d795b9b70b62bd1da8d6c4afefda086
1a3e4b51f
Repository:
registry.suse.com/suse/ltss/sle15.4/bci-base-fips:15.4

The SUSE Linux Enterprise 15 SP4 LTSS FIPS-140-3 container image

Access Protected Long Term Service Pack Support SLSA Provenance: Available

Description

This SUSE Linux Enterprise 15 SP4 LTSS-based container image includes the OpenSSL and libgcrypt modules that have been interim validated to FIPS 140-3.

The FIPS 140-3 certified OpenSSL module is a cryptographic module that provides a FIPS 140-3 compliant cryptographic library. The module is designed to provide the same functionality as the standard OpenSSL library, with additional security features to meet the FIPS 140-3 requirements. An interim validation has been issued by NIST.

Similarly, the FIPS 140-3 certified libgcrypt module is designed to provide the same functionality as the standard libgcrypt library, with additional security features enforced to meet the FIPS 140-3 requirements. An interim validation has been issued by NIST.

Usage

The image is configured to enforce the use of FIPS mode by default, independent of the host environment setup by specifying the following environment variables:

  • OPENSSL_FIPS=1: Initialize the OpenSSL FIPS mode
  • OPENSSL_FORCE_FIPS_MODE=1: Set FIPS mode to enforcing independent of the host kernel
  • LIBGCRYPT_FORCE_FIPS_MODE=1: Set FIPS mode in libgcrypt to enforcing

Below is a list of other environment variables that can be used to configure the OpenSSL library:

  • OPENSSL_ENFORCE_MODULUS_BITS=1: Restrict the OpenSSL module to only generate the acceptable key sizes of RSA. ## Accessing the container image

Accessing this container image requires a valid SUSE subscription. In order to access the container image, you must login to the SUSE Registry with your credentials. There are three ways to do that which are described below. The first two methods leverage the system registration of your host system, while the third method requires you to obtain the organisation SCC mirroring credentials.

Use the system registration of your host system

If the host system you are using to build or run a container is already registered with the correct subscription required for accessing the LTSS container images, you can use the registration information from the host to log in to the registry.

The file /etc/zypp/credentials.d/SCCcredentials contains a username and a password. These credentials allow you to access any container that is available under the subscription of the respective host system. You can use these credentials to log in to SUSE Registry using the following commands (use the leading space before the echo command to avoid storing the credentials in the shell history):

set +o history
 echo PASSWORD | podman login -u USERNAME --password-stdin registry.suse.com
set -o history

Use a separate SUSE Customer Center registration code

If the host system is not registered with SUSE Customer Center, you can use a valid SUSE Customer Center registration code to log in to the registry:

set +o history
 echo SCC_REGISTRATION_CODE | podman login -u "regcode" --password-stdin registry.suse.com
set -o history

The user parameter in this case is the verbatim string regcode, and SCC_REGISTRATION_CODE is the actual registration code obtained from SUSE.

Use the organization mirroring credentials

You can also use the organization mirroring credentials to log in to the SUSE Registry:

set +o history
 echo SCC_MIRRORING_PASSWORD | podman login -u "SCC_MIRRORING_USER" --password-stdin registry.suse.com
set -o history

These credentials give you access to all subscriptions the organization owns, including those related to container images in the SUSE Registry. The credentials are highly privileged and should be preferably used for a private mirroring registry only.

Licensing

SPDX-License-Identifier: MIT

This documentation and the build recipe are licensed as MIT. The container itself contains various software components under various open source licenses listed in the associated Software Bill of Materials (SBOM).

This image is based on SUSE Linux Enterprise Server, a reliable, secure, and scalable server operating system built to power mission-critical workloads in physical and virtual environments.

  • Image Data

    Last Built: 05 Dec 16:49 UTC

    Compressed Size: 62.8 MB

    Uncompressed Size: 169.1 MB

    Support Level: L3

    Supported until: 31 Dec 2026


  • Health Index
    D
    0:C3:H30:M3:L0:U

    Last Scan:

    7 days ago