No, you are not FIPS compliant at the server just because your clients are 
using FIPS compliant crypto modules and security functions. In this case, the 
client will be using RSA+3TDES in EDE/CBC mode with SHA-1 HMAC, because this is 
the only available cipher suite on XP that is FIPS compliant (supposedly!). TLS 
will allow this to be negotiated as a common cipher suite between client and 
server. Your server, in its current configuration, would allow non-approved 
security functions to be used.

Your server side process must use a certified crypto module and be in FIPS 
compliant enabled mode so that only FIPS approved security functions can be 
used.

Carl
  ----- Original Message ----- 
  From: Koripella Srinivas 
  To: openssl-users@openssl.org 
  Sent: Thursday, February 19, 2009 10:01 AM
  Subject: FIPS Server




  Hello all,

  I have a general query regarding FIPS mode. I am running an  simple openssl 
https server based on openssl that services https requests from window clients. 
I have the following setting in my windows XP "Use FIPS comliant
  algorithms for encryption, hashing and signing set to 1" . 
  Using IE on a windows xp client with the above setting i am able to 
communicate with a openssl command line https server. I dont have  FIPS enabled 
on my opessl command line tool. Then how come i am able to handle requests from 
a windows machine which has the FIPS setting to 1.

  Now is it ok to say i am FIPS compliant on the server side becaause i am 
handling FIPS requests from clients?

  thanks in advance for your time.








------------------------------------------------------------------------------
  Add more friends to your messenger and enjoy! Invite them now.


------------------------------------------------------------------------------
  Download prohibited? No problem. CHAT from any browser, without download.

Reply via email to