Re: [openssl-users] Limit the number of AES-GCM keys allowed in TLS

2018-09-18 Thread Salz, Rich via openssl-users
This is factually incorrect; the TLS values are lower than the FIPS values, for example. And also, what “everyone in the know” has always stated isn’t really true any more. It would be nice to keep politics out of this list. -- openssl-users mailing list To unsubscribe:

Re: [openssl-users] Limit the number of AES-GCM keys allowed in TLS

2018-09-17 Thread Kyle Hamilton
...and once again FIPS screws those who don't want to adhere to its mandates (which everyone in the know has always stated simply reduces security by requiring the use of less-secure ciphers and implementations, without allowing patches or modifications to deal with newly-discovered classes of

Re: [openssl-users] Limit the number of AES-GCM keys allowed in TLS

2018-09-16 Thread Paul Dale
There is nothing S390 specific in this, it is a requirement to use GCM based ciphers for TLS when running in a FIPS validated environment.  The check will be cheaper than trying to avoid it by conditioning on FIPS mode -- hence it’s unconditional.     Pauli -- Oracle Dr Paul Dale |

Re: [openssl-users] Limit the number of AES-GCM keys allowed in TLS

2018-09-14 Thread Dmitry Belyavsky
Hello, Sorry, I've just found similar checks in all _CGM functions. On Fri, Sep 14, 2018 at 1:30 PM Dmitry Belyavsky wrote: > Dear Paul, > > Could you please clarify? > The code seems to be related to s390 platform. Do I miss something? > > On Thu, Sep 13, 2018 at 1:55 AM Paul Dale wrote: >

Re: [openssl-users] Limit the number of AES-GCM keys allowed in TLS

2018-09-14 Thread Dmitry Belyavsky
Dear Paul, Could you please clarify? The code seems to be related to s390 platform. Do I miss something? On Thu, Sep 13, 2018 at 1:55 AM Paul Dale wrote: > I wasn’t aware of other national standards requiring a similar check. > > > > I made the change in the AES-GCM code because FIPS demands

Re: [openssl-users] Limit the number of AES-GCM keys allowed in TLS

2018-09-12 Thread Paul Dale
I wasn’t aware of other national standards requiring a similar check.   I made the change in the AES-GCM code because FIPS demands the check be inside the FIPS boundary.  I’d have preferred to make it in the TLS layer, but that mustn’t be inside the FIPS boundary.  My understanding is that TLS

[openssl-users] Limit the number of AES-GCM keys allowed in TLS

2018-09-12 Thread Dmitry Belyavsky
Hello, The issue https://github.com/openssl/openssl/pull/7129 has introduced a possibility to limit the amount of TLS records processed without key changing as required by FIPS. We in Russia have limitations with the same semantics applicable to Russian GOST TLS ciphersuites (