Re: Will my application be FIPS 140-2 Certified under following conditions?

2019-07-03 Thread Kyle Hamilton
Step a. needs to verified the digest with an existing FIPS 140-2 validated cryptography implementation. Otherwise, to my understanding, this is the correct sequence of events. Do note that after building the fipscanister.lib, you will want to digest it and print it on a certification letter that

Re: Can applications built with 'FIPS Capable OpenSSL' be called as 'FIPS 140-2' certified?

2019-07-03 Thread Eric Jacksch
Unless your product (application) is listed on the certificate, it is not FIPS 140-2 certified. Similarly, if you build your own car and drop in an OEM Ford engine, your car does not become a Ford. On Wed, 3 Jul 2019 at 13:35, Dipak B wrote: > > Hi, > > Thank you for the quick an

Re: Can applications built with 'FIPS Capable OpenSSL' be called as 'FIPS 140-2' certified?

2019-07-03 Thread Eric Jacksch
No, strictly speaking, you cannot. Just because you use a FIPS 140-2 certified cryptographic module doesn't mean that your application is FIPS 140-2 certified. It means that your application includes (or uses) a FIPS 140-2 certified cryptographic module. Or, as it is sometimes called, "F

Re: Can applications built with 'FIPS Capable OpenSSL' be called as 'FIPS 140-2' certified?

2019-07-03 Thread Dipak B
Hi, Thank you for the quick answer. Both the questions have subtle difference. My apology they appear almost same. So, to clear my doubts, following is my understanding a) An application is FIPS 140-2 certified if and only if it links directly to 'fipscanister.lib'. b) Application w

Re: Can applications built with 'FIPS Capable OpenSSL' be called as 'FIPS 140-2' certified?

2019-07-03 Thread Salz, Rich via openssl-users
Didn’t you just ask this question? :) If you followed the Win32 build instructions *exactly* and you build your application to turn on FIPS mode and link against the canister, then yes. If you made changes to the process, then no.

Can applications built with 'FIPS Capable OpenSSL' be called as 'FIPS 140-2' certified?

2019-07-03 Thread Dipak B
Dear Experts, Can you please help with the following questions? All inputs are appreciated. a) Can we call an Win32 application built with FIPS Capable OpenSSL as FIPS 140-2 Certified in strict sense? where FIPS Capable OpenSSL is OpenSSL built using the FOM (fipscanister.lib) I am seeking

Will my application be FIPS 140-2 Certified under following conditions?

2019-07-03 Thread Dipak B
Dear Experts, Can you please help me with the following question? My win32 desktop application uses 'libcurl' to interact with web service, in order to get my application FIPS 140-2 certified, following is the plan which I arrived at after going through the 'User Guide'

Re: openssl-fips configure parameters to force IANA cipher suite compliance

2019-07-03 Thread Jakob Bohm via openssl-users
On 02/07/2019 22:13, Larry Jordan via openssl-users wrote: I want to build an openssl-fips canister to force IANA cipher suite compliance. With the help of an openssl-iana mapping (https://testssl.sh/openssl-iana.mapping.html) I can identify the corresponding OpenSSL cipher suites. Not

query regarding openssl and FIPS

2019-07-02 Thread manju prasad
Hi I have two queries. I am new to FIPS validation. The first query is 1. We have a system which is using Arm Cortex-A9 on ThreadX. If I cross compile FIPS module 2.0.16 for Threadx ( Arm Cortex-A9 ) and use openssl 1.0.2s. Can we claim that our product is FIPS compliant ? The second query is 2

openssl-fips configure parameters to force IANA cipher suite compliance

2019-07-02 Thread Larry Jordan via openssl-users
I want to build an openssl-fips canister to force IANA cipher suite compliance. With the help of an openssl-iana mapping (https://testssl.sh/openssl-iana.mapping.html) I can identify the corresponding OpenSSL cipher suites. IANA

SHA1_Init () is called through SSL_shutdown () in FIPS mode

2019-06-14 Thread Chethan Kumar
Hi all, Need help in resolving an error or understanding the flow. Openssl library we are using is FIPS capabled. Openssl version is 1.0.2n with fips-2.0.16 Platform: Linux version 3.10.38-ltsi-WR6.0.0.11_standard (gcc version 4.8.1) We have an application which uses libssl and libcrypto for its

RE: RSA public and private key encrypt with fips issue

2019-06-12 Thread Yi tiger
986> for Windows 10 From: openssl-users on behalf of Yi tiger Sent: Wednesday, June 12, 2019 11:31:37 PM To: openssl-users@openssl.org Subject: RSA public and private key encrypt with fips issue Hi guys, I have download openssl 1.0.2s and fips 2.0.16 and

RSA public and private key encrypt with fips issue

2019-06-12 Thread Yi tiger
Hi guys, I have download openssl 1.0.2s and fips 2.0.16 and build successfully on windows and then I try to write a simple app encrypted with public key and decrypt with private key. But It failed decrypted with private key when fips mode is turned on, decrypt will be success if fips is turned

Re: Trying to use a ((constructor)) to force libcrypto.so into FIPS mode

2019-06-07 Thread J Decker
On Thu, Jun 6, 2019 at 2:34 PM Larry Jordan via openssl-users < openssl-users@openssl.org> wrote: > Re: openssl-1.0.2r > > Re: openssl-fips-2.0.16 > > OS: Linux Mint 19.1 (Ubuntu) > > > > I have added a shared library initializer function to cryptlib.c to force

Re: Trying to use a ((constructor)) to force libcrypto.so into FIPS mode

2019-06-07 Thread Andrew Tucker via openssl-users
Assuming your OpenSSL library is already FIPS capable you need to build and link with the FIPS container library enable the integrity check in your app. Details are in section C.1 of the FIPS user guide at https://www.openssl.org/docs/fips/UserGuide-2.0.pdf On Thu, Jun 6, 2019 at 2:34 PM Larry

Trying to use a ((constructor)) to force libcrypto.so into FIPS mode

2019-06-06 Thread Larry Jordan via openssl-users
Re: openssl-1.0.2r Re: openssl-fips-2.0.16 OS: Linux Mint 19.1 (Ubuntu) I have added a shared library initializer function to cryptlib.c to force OpenSSL into FIPS mode, without requiring a “module operator” to directly initiate (i.e. call FIPS_mode_set(1)). void __attribute__((constructor

Re: FIPS module for OpenSSL 1.1.1x

2019-05-16 Thread Dr Paul Dale
In answer to the second question: there will *never* be a FIPS module for any 1.1.1 OpenSSL version. The next version of OpenSSL will be 3.0.0 and it will support FIPS. There will be a gap in FIPS support between the end of life of 1.0.2 and the validation of 3.0.0. Pauli -- Dr Paul Dale

Re: FIPS module for OpenSSL 1.1.1x

2019-05-16 Thread Dennis Clarke
On 5/16/19 12:14 PM, Michael Wojcik wrote: From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of shiva kumar Sent: Thursday, May 16, 2019 04:30 1) If I upgrade to 1.1.1b will it cause any problem to other applications? which uses openssl for communications. ( say apache

RE: FIPS module for OpenSSL 1.1.1x

2019-05-16 Thread Michael Wojcik
temporary protocols and algorithms. Since there have been many versions of Apache, and it offers a multitude of configurations, it's impossible to guess whether you'd have interoperability issues with it. > 2) can I expect FIPS module for 1.1.1b as well ? No. This has been discussed

RE: Build the FIPS Object Module issue on Ubuntu 18.04

2019-05-16 Thread Michael Wojcik
> From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of > Jakob Bohm via openssl-users > Sent: Thursday, May 16, 2019 02:21 > > On 16/05/2019 02:11, Paul Dale wrote: > > Just noting that any module built in this manner is *not* FIPS compliant. > >

FIPS module for OpenSSL 1.1.1x

2019-05-16 Thread shiva kumar
Hi, I wanted to move from OpenSSL 1.0.2r to 1.1.1b. I have some doubts they are 1) If I upgrade to 1.1.1b will it cause any problem to other applications? which uses openssl for communications. ( say apache http server ). 2) can I expect FIPS module for 1.1.1b as well ? 3) since OpenSSL 1.1.1b

Re: Build the FIPS Object Module issue on Ubuntu 18.04

2019-05-16 Thread Jakob Bohm via openssl-users
On 16/05/2019 02:11, Paul Dale wrote: Just noting that any module built in this manner is *not* FIPS compliant. The distribution must be unmodified and build exactly as per the documentation. Any change to the files or the build process renders the result invalid from a FIPS perspective

RE: Build the FIPS Object Module issue on Ubuntu 18.04

2019-05-15 Thread Paul Dale
Just noting that any module built in this manner is *not* FIPS compliant. The distribution must be unmodified and build exactly as per the documentation. Any change to the files or the build process renders the result invalid from a FIPS perspective. Pauli -- Oracle Dr Paul Dale

Re: Build the FIPS Object Module issue on Ubuntu 18.04

2019-05-15 Thread sreekanth1m
I was able to generate FIPS Object Module - fipscanister.o fipscanister.o.sha1 fips_premain.c fips_premain.c.sha1 successfully but now struck in generating Build the FIPS capable library. followed below steps: $ . ./setenv-android.sh $ cd openssl-1.0.1e/ Next, fix the makefile and run

Build the FIPS Object Module issue on Ubuntu 18.04

2019-05-10 Thread Sreekanth Reddy
Hi, I am trying to build the FIPS object module using the fips library openssl-fips-2.0.16 on Ubuntu 18.04 for x86 arch. I am following the steps in https://wiki.openssl.org/index.php/FIPS_Library_and_Android below steps are followed to Build the FIPS Object Module: $ . ./setenv-android.sh $ cd

Re: Openssl1.1.1 fips certification

2019-05-09 Thread Dr Paul Dale
There is no confirmed timeline for FIPS availability for OpenSSL 3.0. There will never be a FIPS 1.1.1 version. It is almost certain that there will be a gap between the end of support of 1.0.2 (end of this year) and a FIPS validated 3.0 release. If FIPS is vital for you then there is an

Openssl1.1.1 fips certification

2019-05-09 Thread Manish Patidar
Hi Can you please tell me what is the plan for fips certification for openssl1.1.1, when the fips version will be available ? Regards Manish

Re: AES-cipher offload to engine in openssl-fips

2019-02-28 Thread Richard Levitte
was argued that this was invalid use from a FIPS > perspective. Now, we can't actually stop any application from doing > this, sure! But... > > No, it's not illegal -- FIPS code being used for all FIPS operations. > > > If the EVP API does the digesting w

Re: AES-cipher offload to engine in openssl-fips

2019-02-28 Thread Salz, Rich via openssl-users
> There are two options. First, the application does the digest and > sign as two separate things. My memory is a foggy surrounding that scenario, so I might be wrong, but I think it was argued that this was invalid use from a FIPS perspective. Now, we can'

Re: AES-cipher offload to engine in openssl-fips

2019-02-28 Thread suji
>From https://www.openssl.org/docs/fips/UserGuide-2.0.pdf I got these lines "OpenSSL provides mechanisms for interfacing with external cryptographic devices, such as accelerator cards, via “ENGINES.” This mechanism is not disabled in FIPS mode. In general, if a FIPS validated crypt

Re: AES-cipher offload to engine in openssl-fips

2019-02-28 Thread Matt Caswell
rithms may come from different > providers or the same one. In the case of the FIPS module the > algorithms must both come from the same FIPS module provider. The > operation will fail if an attempt is made to do otherwise. > > Ref: > https://www.openssl.org/docs/OpenS

Re: AW: AES-cipher offload to engine in openssl-fips

2019-02-28 Thread Richard Levitte
On Thu, 28 Feb 2019 00:51:24 +0100, Dr. Matthias St. Pierre wrote: > > > > Uhm, I'm confused. I thought we were talking about 3.0? > > Well, the original post started at FIPS 2.0: > > > I am using openssl-fips-2.0.16 and openssl-1.0.2e. > https://mta.

Re: AES-cipher offload to engine in openssl-fips

2019-02-28 Thread Richard Levitte
involves two algorithms: a signing algorithm, and a digest > algorithm. In general those two algorithms may come from different > providers or the same one. In the case of the FIPS module the > algorithms must both come from the same FIPS module provider. The >

AW: AES-cipher offload to engine in openssl-fips

2019-02-27 Thread Dr. Matthias St. Pierre
> Uhm, I'm confused. I thought we were talking about 3.0? Well, the original post started at FIPS 2.0: > I am using openssl-fips-2.0.16 and openssl-1.0.2e. https://mta.openssl.org/pipermail/openssl-users/2019-February/009919.html But it seems like the discussion in the thread ha

Re: AES-cipher offload to engine in openssl-fips

2019-02-27 Thread Salz, Rich via openssl-users
general those two algorithms may come from different providers or the same one. In the case of the FIPS module the algorithms must both come from the same FIPS module provider. The operation will fail if an attempt is made to do otherwise. There are two options. First, th

Re: AES-cipher offload to engine in openssl-fips

2019-02-27 Thread Richard Levitte
Uhm, I'm confused. I thought we were talking about 3.0? "Dr. Matthias St. Pierre" skrev: (27 februari 2019 23:34:23 CET) > >> -Ursprüngliche Nachricht- >> > >I always understood "FIPS-capable OpenSSL" to refer >specifically to

AW: AES-cipher offload to engine in openssl-fips

2019-02-27 Thread Dr. Matthias St. Pierre
> -Ursprüngliche Nachricht- > > >I always understood "FIPS-capable OpenSSL" to refer specifically to an > > OpenSSL compiled with the options to incorporate the FIPS canister > > module, not just any OpenSSL build that might be used in FIPS

Re: AES-cipher offload to engine in openssl-fips

2019-02-27 Thread Richard Levitte
On Wed, 27 Feb 2019 22:54:41 +0100, Salz, Rich via openssl-users wrote: > > >I always understood "FIPS-capable OpenSSL" to refer specifically to an > OpenSSL compiled with the options to incorporate the FIPS canister > module, not just any OpenSSL build t

Re: AES-cipher offload to engine in openssl-fips

2019-02-27 Thread Salz, Rich via openssl-users
>I always understood "FIPS-capable OpenSSL" to refer specifically to an OpenSSL compiled with the options to incorporate the FIPS canister module, not just any OpenSSL build that might be used in FIPS compliant applications (as that would be any OpenSSL at all).

Re: AES-cipher offload to engine in openssl-fips

2019-02-27 Thread Jakob Bohm via openssl-users
validation. I believe the context here is one I also mentioned in my comment on the 3.0 draft spec: - OpenSSL FIPS Module provides FIPS validated software implementations of all/most of the permitted algorithms. - Engine provides FIPS validated (hardware?) implementations of one or more

Re: AES-cipher offload to engine in openssl-fips

2019-02-27 Thread Richard Levitte
t; > > I believe the context here is one I also mentioned in my comment on > the 3.0 draft spec: > > - OpenSSL FIPS Module provides FIPS validated software implementations of > all/most of the permitted algorithms. > - Engine provides FIPS validated (hardware?) implementation

Re: AES-cipher offload to engine in openssl-fips

2019-02-27 Thread Jakob Bohm via openssl-users
On 27/02/2019 20:59, Salz, Rich via openssl-users wrote: If you change a single line of code or do not build it EXACTLY as documented, you cannot claim to use the OpenSSL validation. I believe the context here is one I also mentioned in my comment on the 3.0 draft spec: - OpenSSL FIPS

Re: AES-cipher offload to engine in openssl-fips

2019-02-27 Thread Salz, Rich via openssl-users
If you change a single line of code or do not build it EXACTLY as documented, you cannot claim to use the OpenSSL validation.

Re: AES-cipher offload to engine in openssl-fips

2019-02-27 Thread Short, Todd via openssl-users
No. The OpenSSL FIPS Module is not written that way. It should not be permitting any non-FIPS implementations (see Rich's email regarding a bug). You could write your own engine, get that FIPS certified, and run it with plain, vanilla OpenSSL. There's a design spec out for OpenSSL

Re: AES-cipher offload to engine in openssl-fips

2019-02-27 Thread suji
The requirement here is, to offload my "engine supported fips-compliant methods" to engine and other "fips-complaint" functions to openssl dynamically. Here I need to use openssl-fips module I guess. -- Sent from: http://openssl.6102.n7.nabble.com/OpenSSL-User-f3.html

Re: AES-cipher offload to engine in openssl-fips

2019-02-27 Thread suji
Thanks for the reply. With non-fips openssl, it is possible to write my own fips-module. I understood. But, is it possible for me to write a fips-compliant/fips validated "dynamic engine" with openssl-fips? Which allows me to offload "fips-compilant" functions to my

Re: AES-cipher offload to engine in openssl-fips

2019-02-26 Thread Walter Paley
To clarify here, using the OpenSSL FIPS implementation does not allow you to claim “FIPS Validated”, rather this would be “FIPS Compliant”. If you want to claim “FIPS Validated”, you must get your own validation for your implementation regardless of what you are using, OpenSSL FIPS module or

Re: AES-cipher offload to engine in openssl-fips

2019-02-26 Thread Salz, Rich via openssl-users
* Which means in fips mode ciphers never gets offloaded to engine? * All other functions (digest, RSA etc) , it first updates to fips function, and then engine function. Why only ciphers has this different behaviour? That seems like a bug. In FIPS mode you can only use the FIPS

AES-cipher offload to engine in openssl-fips

2019-02-26 Thread Suji
Hi, I am unable to use AES-cipher offload to my engine even though it was registered with the proper flag (EVP_CIPH_FLAG_FIPS). I was able to use RSA, digests, and ECDSA to the engine with corresponding flags. I am using openssl-fips-2.0.16 and openssl-1.0.2e. OPENSSL_FIPS is set. I come

Re: [openssl-project] OpenSSL 3.0 and FIPS Update

2019-02-25 Thread Richard Levitte
On Sat, 23 Feb 2019 21:47:00 +0100, Dmitry Belyavsky wrote: > > > Dear Richard,  > > On Sat, Feb 23, 2019 at 8:47 AM Richard Levitte wrote: > > Since our RAND API is separate from the EVP API, I'm unsure how we > plan on getting custom RAND_methods from providers. > > Please no

Re: [openssl-project] OpenSSL 3.0 and FIPS Update

2019-02-25 Thread Richard Levitte
On Mon, 25 Feb 2019 00:40:51 +0100, Michael Richardson wrote: > I think that the #define/enum of NIDs should be made internal-only, > available as optimization to internal code only. Having asked around a bit on this, that was the original intention... However, in an old era of having everything i

Re: [openssl-project] OpenSSL 3.0 and FIPS Update

2019-02-25 Thread Dmitry Belyavsky
Dear Dr Paul, I think this change is somewhere in a gray zone. On Mon, Feb 25, 2019 at 1:37 PM Dr Paul Dale wrote: > I don’t think that that new OIDs or NIDs are considering breaking. > Changing existing ones definitely is, but that’s an entirely different > proposition. > > > Pauli > -- > Dr P

Re: [openssl-project] OpenSSL 3.0 and FIPS Update

2019-02-25 Thread Dr Paul Dale
I don’t think that that new OIDs or NIDs are considering breaking. Changing existing ones definitely is, but that’s an entirely different proposition. Pauli -- Dr Paul Dale | Cryptographer | Network Security & Encryption Phone +61 7 3031 7217 Oracle Australia > On 25 Feb 2019, at 5:02 pm,

Re: [openssl-project] OpenSSL 3.0 and FIPS Update

2019-02-24 Thread Dmitry Belyavsky
Dear Michael, On Mon, Feb 25, 2019 at 2:41 AM Michael Richardson wrote: > > Not sure who Matt quoted, wrote: > >> 2. Can we do something with a bunch of hard-linked non-extendable > >> lists of internal NIDs? > >> > >> For example, providing GOST algorithms always requires a patc

Re: [openssl-project] OpenSSL 3.0 and FIPS Update

2019-02-24 Thread Dmitry Belyavsky
On Sun, Feb 24, 2019 at 11:31 PM Viktor Dukhovni wrote: > On Thu, Feb 21, 2019 at 04:20:53PM +, Matt Caswell wrote: > > > > 2. Can we do something with a bunch of hard-linked non-extendable > lists of > > > internal NIDs? > > > > > For example, providing GOST algorithms always requires a patc

Re: [openssl-project] OpenSSL 3.0 and FIPS Update

2019-02-24 Thread Michael Richardson
Not sure who Matt quoted, wrote: >> 2. Can we do something with a bunch of hard-linked non-extendable >> lists of internal NIDs? >> >> For example, providing GOST algorithms always requires a patch to >> extend 3-5 >> internal lists. >> If it could be done dynamically,

Re: [openssl-project] OpenSSL 3.0 and FIPS Update

2019-02-24 Thread Viktor Dukhovni
On Thu, Feb 21, 2019 at 04:20:53PM +, Matt Caswell wrote: > > 2. Can we do something with a bunch of hard-linked non-extendable lists of > > internal NIDs? > > > For example, providing GOST algorithms always requires a patch to extend 3-5 > > internal lists. > > If it could be done dynamically

Re: [openssl-project] OpenSSL 3.0 and FIPS Update

2019-02-23 Thread Dmitry Belyavsky
019 at 9:30 PM Matt Caswell > > <mailto:m...@openssl.org>> wrote: > > > > > > Please see my blog post for an OpenSSL 3.0 and FIPS Update: > > > > > > https://www.openssl.org/blog/blog/2019/02/13/FIPS-update/ > > > > > > >

Re: [openssl-project] OpenSSL 3.0 and FIPS Update

2019-02-22 Thread Richard Levitte
On Thu, 21 Feb 2019 17:20:53 +0100, Matt Caswell wrote: > On 21/02/2019 15:02, Dmitry Belyavsky wrote: > > Dear Matt > > > > > > > > On Wed, Feb 13, 2019 at 9:30 PM Matt Caswell > <mailto:m...@openssl.org>> wrote: > > > > P

Re: [openssl-project] OpenSSL 3.0 and FIPS Update

2019-02-21 Thread Matt Caswell
On 21/02/2019 15:02, Dmitry Belyavsky wrote: > Dear Matt > > > > On Wed, Feb 13, 2019 at 9:30 PM Matt Caswell <mailto:m...@openssl.org>> wrote: > > Please see my blog post for an OpenSSL 3.0 and FIPS Update: > > https://www.openssl.

Re: [openssl-project] OpenSSL 3.0 and FIPS Update

2019-02-21 Thread Dmitry Belyavsky
Dear Matt On Wed, Feb 13, 2019 at 9:30 PM Matt Caswell wrote: > Please see my blog post for an OpenSSL 3.0 and FIPS Update: > > https://www.openssl.org/blog/blog/2019/02/13/FIPS-update/ After reading the proposed architecture description, I have some questions that are very impo

Re: [openssl-users] [openssl-project] OpenSSL 3.0 and FIPS Update

2019-02-19 Thread Walter Paley
Thanks for the speculation on validated platforms, Mark. Please be careful about using this resource as a medium for self-promotion. - Walt Walter Paley w...@safelogic.com SafeLogic - FIPS 140-2 Simplified

Re: [openssl-project] OpenSSL 3.0 and FIPS Update

2019-02-15 Thread Matt Caswell
On 15/02/2019 19:03, Sam Roberts wrote: > I don't see a FIPS repo in https://github.com/openssl, or a FIPS > branch in https://github.com/openssl/openssl/branches/all >> Has coding started? If so, is it visible anywhere? If not, where > should we watch for when it does?

Re: [openssl-project] OpenSSL 3.0 and FIPS Update

2019-02-15 Thread Richard Levitte
On Fri, 15 Feb 2019 20:03:33 +0100, Sam Roberts wrote: > > I don't see a FIPS repo in https://github.com/openssl, or a FIPS > branch in https://github.com/openssl/openssl/branches/all > > Has coding started? If so, is it visible anywhere? If not, where > should we watch fo

Re: [openssl-project] OpenSSL 3.0 and FIPS Update

2019-02-15 Thread Sam Roberts
I don't see a FIPS repo in https://github.com/openssl, or a FIPS branch in https://github.com/openssl/openssl/branches/all Has coding started? If so, is it visible anywhere? If not, where should we watch for when it does? The FIPS design doc looks like lots of thought has gone into it, whi

Re: [openssl-users] [openssl-project] OpenSSL 3.0 and FIPS Update

2019-02-15 Thread Mark Minnoch
Responding to some earlier questions: > Can you give any guidance on which platforms will be validated with the OpenSSL FIPS 3.0 module? My recollection is that it will only be a handful of platforms. I would expect the number of platforms to be small. The wonderful 5 sponsors of the F

Re: [openssl-users] OpenSSL 3.0 and FIPS Update

2019-02-14 Thread Salz, Rich via openssl-users
se since there's only one runtime that works with the one FIPS module. -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Re: [openssl-users] OpenSSL 3.0 and FIPS Update

2019-02-14 Thread Salz, Rich via openssl-users
e full tarball? I do not believe this has been discussed within the FIPS sponsors. >(If there are answers in the FIPS 3.0.0 draft spec, they need repeating). Or a more careful reading. :) >So right now, FIPS-validated users are left hanging, with no date to get a 3.0.0

Re: [openssl-users] [openssl-project] OpenSSL 3.0 and FIPS Update

2019-02-14 Thread Zeke Evans
Can you give any guidance on which platforms will be validated with the OpenSSL FIPS 3.0 module? My recollection is that it will only be a handful of platforms. It would be helpful to have an idea which platforms will and will not be included. Any additional information about how other

Re: [openssl-users] OpenSSL 3.0 and FIPS Update

2019-02-14 Thread Ludwig, Mark
anks, Mark Ludwig -Original Message- From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of Jakob Bohm via openssl-users Sent: Thursday, February 14, 2019 10:34 AM To: openssl-users@openssl.org Subject: Re: [openssl-users] OpenSSL 3.0 and FIPS Update On 13/02/2019 2

Re: [openssl-users] OpenSSL 3.0 and FIPS Update

2019-02-14 Thread Matt Caswell
On 14/02/2019 16:34, Jakob Bohm via openssl-users wrote: > On 13/02/2019 20:12, Matt Caswell wrote: >> >> On 13/02/2019 17:32, Jakob Bohm via openssl-users wrote: >>> On 13/02/2019 12:26, Matt Caswell wrote: >>>> Please see my blog post for an OpenSSL

Re: [openssl-users] OpenSSL 3.0 and FIPS Update

2019-02-14 Thread Jakob Bohm via openssl-users
On 13/02/2019 20:12, Matt Caswell wrote: On 13/02/2019 17:32, Jakob Bohm via openssl-users wrote: On 13/02/2019 12:26, Matt Caswell wrote: Please see my blog post for an OpenSSL 3.0 and FIPS Update: https://www.openssl.org/blog/blog/2019/02/13/FIPS-update/ Matt Given this announcement, a

Re: [openssl-users] [openssl-project] OpenSSL 3.0 and FIPS Update

2019-02-14 Thread Matt Caswell
On 13/02/2019 20:28, Michael Richardson wrote: > > Matt Caswell wrote: > > Please see my blog post for an OpenSSL 3.0 and FIPS Update: > > > https://www.openssl.org/blog/blog/2019/02/13/FIPS-update/ > > Thank you, it is very useful to have these plans ma

Re: [openssl-users] [openssl-project] OpenSSL 3.0 and FIPS Update

2019-02-13 Thread Michael Richardson
Matt Caswell wrote: > Please see my blog post for an OpenSSL 3.0 and FIPS Update: > https://www.openssl.org/blog/blog/2019/02/13/FIPS-update/ Thank you, it is very useful to have these plans made up front. I think your posts should probably explain what happened to 2.x, and i

Re: [openssl-users] OpenSSL 3.0 and FIPS Update

2019-02-13 Thread Matt Caswell
On 13/02/2019 17:32, Jakob Bohm via openssl-users wrote: > On 13/02/2019 12:26, Matt Caswell wrote: >> Please see my blog post for an OpenSSL 3.0 and FIPS Update: >> >> https://www.openssl.org/blog/blog/2019/02/13/FIPS-update/ >> >> Matt > > Given t

Re: [openssl-users] OpenSSL 3.0 and FIPS Update

2019-02-13 Thread Jakob Bohm via openssl-users
On 13/02/2019 12:26, Matt Caswell wrote: Please see my blog post for an OpenSSL 3.0 and FIPS Update: https://www.openssl.org/blog/blog/2019/02/13/FIPS-update/ Matt Given this announcement, a few questions arise: - How will a FIPS provider in the main tarball ensure compliance  with the

Re: [openssl-users] FIPS Module for OpenSSL 1.1.1

2019-02-13 Thread Matt Caswell
On 13/02/2019 14:00, Jason Schultz wrote: > Thanks for your response. A follow up question based on Matt Caswell's blog > post: Does the blog post imply that the next FIPS module will be based on > OpenSSL 3.0? Or is 3.0 a longer term thing and the next FIPS module will be &

Re: [openssl-users] FIPS Module for OpenSSL 1.1.1

2019-02-13 Thread Jason Schultz
Thanks for your response. A follow up question based on Matt Caswell's blog post: Does the blog post imply that the next FIPS module will be based on OpenSSL 3.0? Or is 3.0 a longer term thing and the next FIPS module will be for OpenSSL 1.1.1? Thanks.

[openssl-users] OpenSSL 3.0 and FIPS Update

2019-02-13 Thread Matt Caswell
Please see my blog post for an OpenSSL 3.0 and FIPS Update: https://www.openssl.org/blog/blog/2019/02/13/FIPS-update/ Matt -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

[openssl-users] FIPS Fails due to Fingerprint Error while running for a App

2019-02-13 Thread ALe TAHIR
Hi Experts, Looking for some assistance. I’ve compiled one of the App in FIPs mode and while running the App. I’m getting fingerprint mismatch error. I’ve followed the standard procedure to build a FIPS module using OpenSSL UserGuide 2.0. But not sure what part is missing. :~$ openssl

Re: [openssl-users] FIPS Module for OpenSSL 1.1.1

2019-02-12 Thread Paul Dale
February 2019 9:39 AM To: openssl-users@openssl.org Subject: [openssl-users] FIPS Module for OpenSSL 1.1.1 Just wondering if there is a time frame for the availability of the FIPS Module for OpenSSL 1.1.1? Q3 2019? Q4? I realize this has been asked before, but the most recent answer I

[openssl-users] FIPS Module for OpenSSL 1.1.1

2019-02-12 Thread Jason Schultz
Just wondering if there is a time frame for the availability of the FIPS Module for OpenSSL 1.1.1? Q3 2019? Q4? I realize this has been asked before, but the most recent answer I found was from several months ago, so I thought there might be new information. Thanks in advance. -- openssl

Re: [openssl-users] Compiling FIPS-cable OpenSSL on Windows Server 2012R2

2019-01-17 Thread Chris Fernando via openssl-users
o this problem, so if this is a question that has been asked & >> answered, please feel free to point me at the relevant location to read >> about what I'm doing incorrectly. =) >> >> I'm not at all familiar with Windows & compiling Open Source project

Re: [openssl-users] Compiling FIPS-cable OpenSSL on Windows Server 2012R2

2019-01-07 Thread Chris Fernando via openssl-users
point me at the relevant location to read about > what I'm doing incorrectly. =) > > I'm not at all familiar with Windows & compiling Open Source projects, but I > am having no trouble on Linux with OpenSSL + FIPS. On Windows, with Visual > Studio 2017 (Community Editio

[openssl-users] Compiling FIPS-cable OpenSSL on Windows Server 2012R2

2019-01-07 Thread Chris Fernando via openssl-users
familiar with Windows & compiling Open Source projects, but I am having no trouble on Linux with OpenSSL + FIPS. On Windows, with Visual Studio 2017 (Community Edition), I am able to compile the FIPS 2.0.16 module and OpenSSL 1.0.2q (NO FIPS) without issue. When I try to compile OpenSSL with the

Re: [openssl-users] FIPS module v3

2018-12-23 Thread Alibek Jorajev via openssl-users
| Network Security & Encryption Phone +61 7 3031 7217 Oracle Australia From: Alibek Jorajev via openssl-users [mailto:openssl-users@openssl.org] Sent: Tuesday, 18 December 2018 8:10 PM To: openssl-users@openssl.org Subject: [openssl-users] FIPS module v3 Hi everyone, I have been following Ope

Re: [openssl-users] FIPS module v3

2018-12-18 Thread Paul Dale
via openssl-users [mailto:openssl-users@openssl.org] Sent: Tuesday, 18 December 2018 8:10 PM To: openssl-users@openssl.org Subject: [openssl-users] FIPS module v3 Hi everyone, I have been following OpenSSL blog and know that work on new OpenSSL FIPS module has started. Current FIPS module (v.2) has

[openssl-users] FIPS module v3

2018-12-18 Thread Alibek Jorajev via openssl-users
Hi everyone, I have been following OpenSSL blog and know that work on new OpenSSL FIPS module has started. Current FIPS module (v.2) has end of life (December 2019) and I assume that new FIPS module will be by that time.  but can someone tell me - is there are approximate dates -  will it be

Re: [openssl-users] Fips lib usage in Openssl 1.1.1

2018-10-15 Thread Salz, Rich via openssl-users
* I want to use fips certify crypto libs. Is it possible to use crypto lib from Openssl-fips 2.0.16 and ssl lib from Openssl1.1.1? No, it is not possible. The current FIPS code only works with 1.0.2. The project is working on a new FIPS module. You can find some details at the blog

[openssl-users] Fips lib usage in Openssl 1.1.1

2018-10-15 Thread Manish Patidar
Hi I want to use fips certify crypto libs. Is it possible to use crypto lib from Openssl-fips 2.0.16 and ssl lib from Openssl1.1.1? If yes, how we can use, pleas provide details? Regards Manish -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl

Re: [openssl-users] Could we have more details on the FIPS 3.0 plans?

2018-09-23 Thread Paul Dale
It is early in the FIPS process. Design and planning stages. At this point, we do not know for certain: 1. which algorithms will be validated; 2. what platforms they will be validated on or 3. when the formal validation will begin. The decision making processes take time and while I&#

[openssl-users] Could we have more details on the FIPS 3.0 plans?

2018-09-21 Thread Nelson Caro
Dear Reader: I know that it may be early in the FIPS process, so the answer may not be ready. Could you provide us with more details as to the objectives for the FIPS Object Module 3.0? In particular, my company would like to know the estimated timetable for it to get certified, and whether

[openssl-users] FIPS mode on Windows

2018-09-21 Thread Nelson Caro
On Mon Sep 10 11:26:25 UTC 2018, Hubert Kario wrote: > On Friday, 7 September 2018 20:18:38 CEST Alessandro Gherardi wrote: >> I'm running Windows 10. >> I downloaded the FIPS module sources >> from https://www.openssl.org/source/openssl-fips-2.0.16.tar.gz and the >

[openssl-users] Why default FIPS DBRG only call the RAND_poll() once?

2018-09-17 Thread Gaofan
hi all, I set the fips mode and call the RAND_pseudo_bytes for more than 1<<24 times to trigger the reseed process, but I found RAND_Poll() still cannot be called in the reseed process. if (!initialized) { RAND_poll(); initialized = 1; } the initialized cannot be c

Re: [openssl-users] /dev/random in FIPS mode Error: PRNG not seeded

2018-09-12 Thread Paul Dale
In FIPS mode, the default entropy gathering is not performed. You, the user, must supply all entropy to the module. See section 6.1.1 of the OpenSSL FIPS User Guide (https://www.openssl.org/docs/fips/UserGuide-2.0.pdf). Pauli -- Oracle Dr Paul Dale | Cryptographer | Network Security

[openssl-users] /dev/random in FIPS mode Error: PRNG not seeded

2018-09-12 Thread Cipher
Hello, We have a custom hardware system running Linux Debian OS having openssl 1.0.2l compiled with FIPS module 2.0. We are trying for FIPS 140-2 certification. By default it looks like openssl RAND_poll() uses /dev/urandom for entropy. We are told this may not be acceptable for FIPS 140-2 Level

[openssl-users] OpenSSL 1.0.2p w/ FIPS 2.0.16 - Apache 2.4.29

2018-09-11 Thread Strife1817
Noticing that my earlier attempts to compile Apache were not FIPS compliant, I set off to correct my error. I found the wiki, that provides the steps for building Apache with FIPS. Every time that it attempts to compile the SSL module, it dies. "mod_ssl.c", line 41: warning: sy

Re: [openssl-users] FIPS mode on Windows

2018-09-10 Thread Hubert Kario
On Friday, 7 September 2018 20:18:38 CEST Alessandro Gherardi wrote: > I'm running Windows 10. > I downloaded the FIPS module sources > from https://www.openssl.org/source/openssl-fips-2.0.16.tar.gz and the > OpenSSL sources from https://www.openssl.org/source/openssl-1.0.2p.t

Re: [openssl-users] FIPS mode on Windows

2018-09-07 Thread Hubert Kario
On Friday, 7 September 2018 16:18:48 CEST Alessandro Gherardi wrote: > Thank you for your reply. > Looking at the OpenSSL FIPS Security > Policy https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-valid > ation-program/documents/security-policies/140sp1747.pdf, I see t

Re: [openssl-users] FIPS mode on Windows

2018-09-07 Thread Hubert Kario
On Thursday, 6 September 2018 04:18:38 CEST Alessandro Gherardi via openssl- users wrote: > I have a question: On Windows, should OpenSSL FIPS automatically enable FIPS > mode (FIPS_mode_set(1)) if the FIPS registry > entry HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\Fips

<    1   2   3   4   5   6   7   8   9   10   >