On 03/15/2016 08:38 PM, Satya Das wrote:
> Steve,
> 
> How does one get a hold of the embedded signature in libcrypto.so ? 

I assume you're referring to the known-good FIPS 140-2 integrity check
digest that is used for the runtime integrity check in the POST.

Several people have already tried to explain that finding that digest
DOES NOT repeat NOT prove that the application runtime binary is using a
FIPS 140-2 validated module. The digest was inserted when the
application was (correctly) linked to the FIPS module, and I've already
told you a way it could be located, but having such a tool gains you
nothing.

The magical pixie dust that distinguishes a validated module from a
bit-for-bit identical non-validated module is undetectable by any kind
of software, thus it is impossible -- even blue-sky theoretically -- to
develop a technical tool or utility of any kind that will suffice as
proof a product is using a validated cryptographic module. It is even
less possible than the "secure backdoor" in FBI/DoJ fantasies.

-Steve M.

-- 
Steve Marquess
OpenSSL Validation Services, Inc.
1829 Mount Ephraim Road
Adamstown, MD  21710
USA
+1 877 673 6775 s/b
+1 301 874 2571 direct
marqu...@openssl.com
gpg/pgp key: http://openssl.com/docs/0x6D1892F5.asc
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Reply via email to