Re: FW: OpenSSL FIPS 1.0 AIX using GCC patches

2006-04-14 Thread Steve Marquess
fixed cost among multiple sponsors. The next validation should take a lot less than 3-1/2 years... -Steve M. -- Steve Marquess c/o Open Source Software Institute [EMAIL PROTECTED] __ OpenSSL Project

Re: OpenSSL FIPS 140 Support

2006-09-08 Thread Steve Marquess
good fit. The lead time for correcting and announcing problems in OpenSSL code is usually measured in days. The lead time for validating changes is measured in many months. Closed source proprietary vendors of course have an enormous incentive to skip the announcement step :-) -Steve M. --

Re: Build FIPS code in openssl?

2007-02-02 Thread Steve Marquess
;vendor affirmed" binary modules that can be made to order for application vendors unable to wait for the source based product. We hope to be announcing the details soon. -Steve M. -- Steve Marquess Open Source Software Institute [EMAIL PROTECTED] __

Re: Windows build of FIPS 1.1.1 is not thread-safe

2007-08-12 Thread Steve Marquess
8 based FIPS Object Module for validation. This time around we will include MS Windows, thanks to a generous corporate sponsor, but the number of platforms we can test is severely constrained by available funding -- the test lab fees alone are several kilobucks a platform and they don't

Re: OpenSSL FIPS Object Module v1.2

2007-11-29 Thread Steve Marquess
of validations in process, spaced a few months apart -- then problems found in validation N could be addressed in validation N+1. But validations are very expensive and our financial sponsorship is erratic so we proceed as resources allow.

Re: OpenSSL FIPS Object Module v1.2

2007-11-30 Thread Steve Marquess
new validation will start from that point. While new problems may be introduced with new development it's unlikely that any problems already there will spontaneously disappear. -Steve M. -- Steve Marquess Open Source Software institute [EMAIL PROTECTED]

Re: OpenSSL FIPS Object Module v1.2

2007-11-30 Thread Steve Marquess
Steve Marquess wrote: Brad House wrote: Ok, guys, let me point out a harsh reality here. As noted in an earlier comment, FIPS 140-2 validation doesn't mesh all that well with the open source world. ... We're a paying OSS member (or at least we were, not sure if we were invo

Re: OpenSSL FIPS Object Module v1.2

2007-11-30 Thread Steve Marquess
hat the work is tedious, boring, frustrating, and mind-bendingly surrealistic. There is a long "you're kidding, right?" and "WTF?" learning curve... -Steve M. -- Steve Marquess Open Source Software Institute [EMAIL PROTECTED] _

Re: OpenSSL FIPS Object Module v1.2

2007-11-30 Thread Steve Marquess
OSSI directly with any questions, I think we're pretty good at being responsive to those contributors. And Steve Henson is responsive to everyone. -Steve M. -- Steve Marquess Open Source Software Institute [EMAIL PROTECTED] __

Re: OpenSSL FIPS Object Module v1.2

2007-12-02 Thread Steve Marquess
ken on my part. I've had to deal with much worse in other less public forums. I can tell you that this kind of "frank exchange of views" does not play well everywhere, most bureaucracies (not just the CMVP) have very different ways of working and establishing consensus. So please please p

Re: OpenSSL FIPS Object Module v1.2

2007-12-10 Thread Steve Marquess
Kyle Hamilton wrote: > On Dec 2, 2007 4:31 PM, Steve Marquess <[EMAIL PROTECTED]> wrote: > >> Kyle Hamilton wrote: >> >>> I just want to have the opportunity to know that what is submitted >>> will actually run on the platform I must use. >>

Re: OpenSSL FIPS Object Module v1.2

2007-12-11 Thread Steve Marquess
te your input, Steve M, and I appreciate > the time that you have taken thus far to express what you've thus far > been willing and able to. I basically seek to find a means by which > we (the users) can contribute to something which is arguably the most > important advanc

Re: OpenSSL FIPS Object Module v1.2

2007-12-12 Thread Steve Marquess
Kyle Hamilton wrote: On Dec 2, 2007 4:31 PM, Steve Marquess <[EMAIL PROTECTED]> wrote: .. c) I would like to know where to find the formal specification documents for what must be met in a module boundary, ... The module boundary is *the* key concept for FIPS 140-2. It is also a

Re: OpenSSL FIPS Object Module v1.2

2007-12-12 Thread Steve Marquess
pting a validated Module" then of course the answer is no. But if you ask the equivalent question "must I take steps to prevent such subversion such as not using calls to shared malloc functions" then the answer is also no. LD_PRELOAD is one example of many of ways to subvert

OpenSSL FIPS Object Module v1.2 snapshots

2007-12-18 Thread Steve Marquess
th the command: cvs -d [EMAIL PROTECTED]:/openssl-cvs co \ -r OpenSSL-fips-0_9_8-stable openssl -Steve M. -- Steve Marquess Open Source Software Institute [EMAIL PROTECTED] __ OpenSSL P

Re: openssl 0.9.8 with fips

2008-05-31 Thread Steve Marquess
FIPS capable 0.9.8 OpenSSL. There is (will be) only one version of the former, while the "FIPS capable" support will be carried forward in future 0.9.8 releases. -Steve M. -- Steve Marquess Open Source Software institute [EMAIL PROTECTED]

Re: FIPS mode and SSE2

2008-06-05 Thread Steve Marquess
a non-SSE capable processor you'll have to use the no-asm version, sorry. Contributions to defray validation test lab fees are always welcome. -Steve M. -- Steve Marquess Open Source Software institute [EMAIL PROTECTED] __

Re: FIPS 140-2 Certification

2008-08-12 Thread Steve Marquess
ler optimizations. It is based on and compatible with OpenSSL 0.9.7+. I'm expecting two more validations for the 0.9.8+ based v1.2 Real Soon Now. -Steve M. -- Steve Marquess Open Source Software Institute [EMAIL PROTECTED]

Re: FIPS certification document for OpenSsl

2008-08-19 Thread Steve Marquess
r restriction is not unique to the OpenSSL FIPS Object Module; in years past I have pursued and been given multiple explanations, some quite elaborate, that I just don't get. -Steve M. -- Steve Marquess Open Source Software institute [EMAIL PROTECTED] ___

Re: FIPS certification document for OpenSsl

2008-08-20 Thread Steve Marquess
e clients." That still doesn't make a lot of sense to me from a technical perspective, but it does seem to say that validated modules can be used on what we would consider multi-user, multi-tasking systems. Start asking about threading, forking, multiple cores, etc., though, and you start gett

Re: FIPS certification document for OpenSsl

2008-08-20 Thread Steve Marquess
Prashant Kumar wrote: Hello All, Where can I find the documentation for OpenSsl FIPS certification ? Any help is appreciated. See http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm#918 and http://www.openssl.org/docs/fips/UserGuide-1.1.1.pdf. -Steve M. -- Steve

Re: Question regarding openssl fips module

2008-08-26 Thread Steve Marquess
t code without violating the conditions of the Security Policy. The pending OpenSSL FIPS Object Module v1.2 will include some 64 bit platforms. I've been expecting that validation Real Soon Now for weeks. -Steve M. -- Steve Marquess Open Source So

Re: ssl teses forbidden in FIPS mode

2008-09-25 Thread Steve Marquess
r code first, *then* test -- ready, fire, aim!). Since there is little practical reason to disable FIPS mode once enabled (reference earlier discussion) we elected to just leave that bug as-is rather than abort and restart the validation process. -Steve M. -- Steve Marquess Open Source Software I

Re: ssl teses forbidden in FIPS mode

2008-09-25 Thread Steve Marquess
lude them in the v1.2 frozen code baseline for which the validation is still pending. -Steve M. -- Steve Marquess Open Source Software Institute [EMAIL PROTECTED] __ OpenSSL Project http

(Non)status of OpenSSL FIPS Object Module v1.2 Validation

2008-09-26 Thread Steve Marquess
IPS 140-2 validation I've participated in took about three months, the longest over five years. So my current prediction is that this validation will be awarded no later than April 2013. About the time OpenSSL 1.6 is released :-) -Steve M. -- Steve Marquess Open Source Softw

Draft FIPS Module v1.2 User Guide

2008-11-26 Thread Steve Marquess
anticipate revisions over the next few weeks. Feedback on errors/omissions/improvements will be greatly appreciated. -Steve M. -- Steve Marquess Open Source Software Institute [EMAIL PROTECTED] __ OpenSSL Project

Mea Culpa on FIPS Module v1.2 User Guide and Windows

2008-12-08 Thread Steve Marquess
kle a reinstall and another revalidation. I'll gladly incorporate any contributed feedback into the User Guide, but until/if another paying client needs Microsoft specific support I won't be doing any hands-on work with Windows. -Steve M. -- Steve Marquess Veridical Systems, Inc. 182

Re: [PATCH RFC] Add support to Intel AES-NI instruction set for?x86_64 platform

2008-12-11 Thread Steve Marquess
Well, as with most such initiatives the FIPS validation program was initiated with the best of intentions and IMHO in the beginning served a useful purpose. Other that that, no comment :-) -Steve M. -- Steve Marquess Open Source Software Institute [EMAIL PROTECTED]

Re: FIPS_selftest_rng fails on Solaris10 x86

2009-02-13 Thread Steve Marquess
anned due to lack of any financial sponsors for the significant cash outlays required. We want the "fips" option to work properly in 0.9.8j+, but IMHO failure of "fipscanisterbuild" is a bug worthy of note but not necessarily of prompt correction. -Steve M. -- Steve Marquess Op

Re: New fips compliance version based on 0.9.8k or later? (UNCLASSIFIED)

2009-04-20 Thread Steve Marquess
compatible") versions of OpenSSL, so as to leverage the advantages of the high level API of the latter, but it is a separate and distinct product. See the User Guide (http://www.openssl.org/docs/fips/UserGuide-1.2.pdf) for more details. -Steve M. -- Steve Marquess Veridical Systems, Inc.

Re: FIPS validation docs

2009-05-05 Thread Steve Marquess
epresenting vendors for validations) am not even allowed to see, much of the rest I'm not allowed to reveal under non-disclosure restrictions. -Steve M. -- Steve Marquess Veridical Systems, Inc. marqu...@veridicalsystems.com __

Re: fipsld or libcrypto.so

2009-05-08 Thread Steve Marquess
led where all crypto operations are performed in the validated fipscanister.o. This behavior was an important design goal because it allows software vendors to ship one binary to all customers. -Steve M. -- Steve Marquess Veridical Systems, Inc. marqu...@veridicalsystems.com

Re: fipsld or libcrypto.so

2009-05-08 Thread Steve Marquess
Steve Marquess wrote: > canroc wrote: > >> I am confused with what is required in builiding an application to use >> encryption functions from a FIPS 140-2 capable openSSL library. >> >> If I link the shared library libcrypto.so (0.9.8j) into my application and >

Re: fipsld or libcrypto.so

2009-05-11 Thread Steve Marquess
atever technique you're using there won't work for fipscanister.o, which is what you need in order to enable FIPS mode. Statically linking fipscanister.o into an application executable requires the special link-execute-link as done by the fipsld utility, in order to generate the embed

Re: Delivering two version of libcrypto - fips and non-fips

2009-08-27 Thread Steve Marquess
ts, so please feel free to ask. -Steve M. -- Steve Marquess The OpenSSL Software Foundation, Inc. 1829 Mount Ephraim Road Adamstown, MD 21710 USA +1 877-673-6775 marqu...@opensslfoundation.com __ OpenSSL Project

Re: Delivering two version of libcrypto - fips and non-fips

2009-08-28 Thread Steve Marquess
Steve Marquess wrote: Mark Phalan wrote: ... > Due to the way the FIPS Capable OpenSSL is built it ends up with > older implementations of ciphers (all the ones that fipscanister.o > implements). These cipher implementations are used regardless of > being in FIPS mode or not.

Re: Delivering two version of libcrypto - fips and non-fips

2009-08-30 Thread Steve Marquess
at even the existing v1.2 module will no longer be compliant. The commercial vendors who have been obtaining "private label" validations based on v1.2 will find that those validations will no longer be rubber stamp formalities as is the case today. -Steve M. -- Steve Mar

Re: Delivering two version of libcrypto - fips and non-fips

2009-09-01 Thread Steve Marquess
butions of that sort. So what is currently a community resource will gradually revert back to a roll-your-own situation, same as it was before the first open source based validation. -Steve M. -- Steve Marquess The OpenSSL Software Foundation, Inc. 1829 Mou

Re: Delivering two version of libcrypto - fips and non-fips

2009-09-13 Thread Steve Marquess
Thor Lancelot Simon wrote: On Thu, Sep 10, 2009 at 06:10:27PM +0200, Dr. Stephen Henson wrote: > On Wed, Sep 09, 2009, Thor Lancelot Simon wrote: > >> On Sat, Aug 29, 2009 at 05:34:04PM -0400, Steve Marquess wrote: >> >> That this wasn't the obvious approach from

Re: Delivering two version of libcrypto - fips and non-fips - correction

2009-09-13 Thread Steve Marquess
Steve Marquess wrote: Thor Lancelot Simon wrote: On Thu, Sep 10, 2009 at 06:10:27PM +0200, Dr. Stephen Henson wrote: > On Wed, Sep 09, 2009, Thor Lancelot Simon wrote: > >> On Sat, Aug 29, 2009 at 05:34:04PM -0400, Steve Marquess wrote: >> >> That this wasn't the o

History Note on FIPS Validation

2009-09-13 Thread Steve Marquess
is for private label validations. -Steve M. -- Steve Marquess OpenSSL Software Foundation, Inc. 1829 Mount Ephraim Road Adamstown, MD 21710 USA +1 877-673-6775 marqu...@opensslfoundation.com __ OpenSSL Project

Re: sha256 in FIPS mode.

2009-10-27 Thread Steve Marquess
f 2010 the current v1.2 code will need very substantial modification for new validations. -Steve M. -- Steve Marquess The OpenSSL Software Foundation, Inc. 1829 Mount Ephraim Road Adamstown, MD 21710 USA +1 877-673-6775 marqu.

Re: sha256 in FIPS mode.

2009-10-27 Thread Steve Marquess
nd not the future SHA-3. -Steve M. -- Steve Marquess Open Source Software institute marqu...@oss-institute.org __ OpenSSL Project http://www.openssl.org Development Ma