Skip to content

Adds PQC release note to 4.22#111946

Open
stevsmit wants to merge 1 commit into
openshift:enterprise-4.22from
stevsmit:18598-osdocs
Open

Adds PQC release note to 4.22#111946
stevsmit wants to merge 1 commit into
openshift:enterprise-4.22from
stevsmit:18598-osdocs

Conversation

@stevsmit
Copy link
Copy Markdown
Member

Version(s):

Issue:

Link to docs preview:

QE review:

  • QE has approved this change.

Additional information:

@openshift-ci openshift-ci Bot added the size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. label May 19, 2026
@@ -25,4 +25,11 @@ Commencing with the {product-title} 4.14 release, Red{nbsp}Hat is simplifying th
// Added in 4.14. Language came directly from Kirsten Newcomer.
{product-title} is designed for FIPS. When running {op-system-base-full} or {op-system-first} booted in FIPS mode, {product-title} core components use the {op-system-base} cryptographic libraries that have been submitted to NIST for FIPS 140-2/140-3 Validation on only the `x86_64`, `ppc64le`, and `s390x` architectures.
Copy link
Copy Markdown
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Maybe make this into a section, like:

Suggested change
{product-title} is designed for FIPS. When running {op-system-base-full} or {op-system-first} booted in FIPS mode, {product-title} core components use the {op-system-base} cryptographic libraries that have been submitted to NIST for FIPS 140-2/140-3 Validation on only the `x86_64`, `ppc64le`, and `s390x` architectures.
== About FIPS compliance
{product-title} is designed for FIPS. When running {op-system-base-full} or {op-system-first} booted in FIPS mode, {product-title} core components use the {op-system-base} cryptographic libraries that have been submitted to NIST for FIPS 140-2/140-3 Validation on only the `x86_64`, `ppc64le`, and `s390x` architectures.


// Added in 4.22. See https://redhat.atlassian.net/browse/NE-2329 and https://redhat.atlassian.net/browse/OCPSTRAT-2361
{product-title} supports post-quantum cryptography (PQC) readiness for secure cluster communication. When running on {op-system-base-full} or {op-system-first}, core {product-title} components use the cryptographic capabilities provided by the platform operating system and TLS 1.3 security profiles, including hybrid Module-Lattice-Based Key-Encapsulation Mechanism (ML-KEM) key exchange where enabled by the configured TLS security profile and supported by the component.
Copy link
Copy Markdown
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If we make the above into a section, maybe we could do the same here?

Suggested change
{product-title} supports post-quantum cryptography (PQC) readiness for secure cluster communication. When running on {op-system-base-full} or {op-system-first}, core {product-title} components use the cryptographic capabilities provided by the platform operating system and TLS 1.3 security profiles, including hybrid Module-Lattice-Based Key-Encapsulation Mechanism (ML-KEM) key exchange where enabled by the configured TLS security profile and supported by the component.
== About PQC compliance
{product-title} supports post-quantum cryptography (PQC) readiness for secure cluster communication. When running on {op-system-base-full} or {op-system-first}, core {product-title} components use the cryptographic capabilities provided by the platform operating system and TLS 1.3 security profiles, including hybrid Module-Lattice-Based Key-Encapsulation Mechanism (ML-KEM) key exchange where enabled by the configured TLS security profile and supported by the component.

Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

concur


// Added in 4.22. See https://redhat.atlassian.net/browse/NE-2329 and https://redhat.atlassian.net/browse/OCPSTRAT-2361
{product-title} supports post-quantum cryptography (PQC) readiness for secure cluster communication. When running on {op-system-base-full} or {op-system-first}, core {product-title} components use the cryptographic capabilities provided by the platform operating system and TLS 1.3 security profiles, including hybrid Module-Lattice-Based Key-Encapsulation Mechanism (ML-KEM) key exchange where enabled by the configured TLS security profile and supported by the component.
Copy link
Copy Markdown
Member Author

@stevsmit stevsmit May 19, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Do we want to be specific about which core components this includes? The FIPs note also says "core components"

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The expectation for 4.22 is that all core payload and platform-aligned layered products have tested that their components offer TLS 1.3 and hybrid ML-KEM.

There is some ongoing project management happening in https://redhat.atlassian.net/browse/OCPSTRAT-2361 to make sure platform-aligned layered products have done the required testing for their 4.22-aligned versions.

But your statement only specifically mentions core components, which we're in better shape on.

I think this sounds good. We could extend this to say "and platform-aligned layered products" but I'm not confident about that yet.

Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

dont include it unless we're 100%.

@stevsmit stevsmit added this to the Planned for 4.22 GA milestone May 19, 2026
@ocpdocs-previewbot
Copy link
Copy Markdown

ocpdocs-previewbot commented May 19, 2026

🤖 Tue May 19 19:43:29 - Prow CI generated the docs preview:

https://111946--ocpdocs-pr.netlify.app/openshift-enterprise/latest/release_notes/ocp-4-22-release-notes.html

@openshift-ci openshift-ci Bot added size/S Denotes a PR that changes 10-29 lines, ignoring generated files. and removed size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. labels May 19, 2026
@openshift-ci openshift-ci Bot added size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. and removed size/S Denotes a PR that changes 10-29 lines, ignoring generated files. labels May 19, 2026
@openshift-ci
Copy link
Copy Markdown

openshift-ci Bot commented May 19, 2026

@stevsmit: all tests passed!

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

size/XS Denotes a PR that changes 0-9 lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants