[openssl-users] FIPS_drbg_*() are not exported from FIPS capable libeay32.dll on Windows (OpenSSL 1.0.2x and 1.0.1x)

2015-08-26 Thread Dr. Matthias St. Pierre
Dear Mr. Henson, I noticed that for OpenSSL 1.0.2x and 1.0.1x on Windows the FIPS capable libeay32.dll does not export any of the FIPS_drbg_*() functions, although they are officially documented by the OpenSSL FIPS 2.0 User Guide. Is this an oversight or was this done on purpose? (IOW, is it a

[openssl-users] CTR_DRBG with or without a derivation function (re: FIPS 140-2)

2015-08-21 Thread Steve Pate
To quote from several places: Once you call FIPS_mode_set (and assuming it returns non-zero), you are using the NIST approved DRBGs. >From OpenSSL's Random Numbers wiki page: The default DRBG is 256-bit CTR AES using a derivation function ... To use the FIPS random number generator, si

[openssl-users] FIPS 140-2 casualty list (continued)

2015-08-11 Thread Steve Marquess
If you don't know or care what FIPS 140-2 is then heave a big sigh of relief and move on. Over a month ago[1] I noted that the four typographical errors from the CMVP "execution" of the "hostage" platforms[2] had still not been corrected. Ten weeks have now passed, and

Re: [openssl-users] RSA key generation in FIPS mode

2015-07-29 Thread Dr. Stephen Henson
On Tue, Jul 28, 2015, Randy Steck wrote: > Thus, it appears that there is a function in the FIPS API that allows > for the creation of RSA keys in a non-approved manner. > > Am I missing something? Is this by design, or is it a bug? > Yes you're right it uses the unappro

[openssl-users] RSA key generation in FIPS mode

2015-07-28 Thread Randy Steck
I posted this to openssl-dev, but didn't get a reply. Perhaps it's more appropriate here. In the FIPS Security Policy there are listed two functions for generating RSA keys: FIPS_rsa_generate_key_ex() (renamed from RSA_generate_key_ex()) and FIPS_rsa_x931_generate_key_ex() (re

Re: [openssl-users] Help needed on FIPS error 0409A09E:lib(4):func(154):reason(158)

2015-07-17 Thread Jayalakshmi bhat
SSL client performing mutual > > authentication. RSA certificate used is signed with SHA512 digest. When I > > switch to FIPS mode and perform re-authentication, I am hitting an > > error :0409A09E:lib(4):func(154):reason(158). Cipher used is AES128-SHA. > > > > Can

Re: [openssl-users] Help needed on FIPS error 0409A09E:lib(4):func(154):reason(158)

2015-07-16 Thread Dr. Stephen Henson
On Thu, Jul 16, 2015, Jayalakshmi bhat wrote: > Hi All, > > I am using OpenSSL library for a SSL client performing mutual > authentication. RSA certificate used is signed with SHA512 digest. When I > switch to FIPS mode and perform re-authentication, I am hitting an > error :04

[openssl-users] Help needed on FIPS error 0409A09E:lib(4):func(154):reason(158)

2015-07-16 Thread Jayalakshmi bhat
Hi All, I am using OpenSSL library for a SSL client performing mutual authentication. RSA certificate used is signed with SHA512 digest. When I switch to FIPS mode and perform re-authentication, I am hitting an error :0409A09E:lib(4):func(154):reason(158). Cipher used is AES128-SHA. Can any one

Re: [openssl-users] FIPS test parse error?

2015-07-15 Thread Dr. Stephen Henson
e appears on provable prime generation algorithms which OpenSSL FIPS module doesn't support. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org ___ openssl-users ma

Re: [openssl-users] FIPS test parse error?

2015-07-15 Thread Steve Marquess
On 07/15/2015 01:34 PM, Philip Bellino wrote: > Hello, > > We are testing our FIPS implementation which is based on openssl-1.0.2a > and openssl-fips-2.0.9. > > We are executing tests on the target machine (which doesn't support > running perl scripts so we cannot run

[openssl-users] FIPS test parse error?

2015-07-15 Thread Philip Bellino
One more item of note: The code appears to be erroring out on the keyword SEED. Looking at the source code there appears to be no provision to accept that word, hence the parse error. Hello, We are testing our FIPS implementation which is based on openssl-1.0.2a and openssl-fips-2.0.9

[openssl-users] FIPS test parse error?

2015-07-15 Thread Philip Bellino
Hello, We are testing our FIPS implementation which is based on openssl-1.0.2a and openssl-fips-2.0.9. We are executing tests on the target machine (which doesn't support running perl scripts so we cannot run fipsalgtest.pl) that are included in the openssl-fips-2.0.9/fips directory,

Re: [openssl-users] openssl fips package for openssl-0.9.8zg

2015-07-14 Thread Gayathri Manoj
Hi Jacob, I have used openssl-fips-1_2_4 with openssl 0.9.8zf and not found any issue. For my environment, just I upgraded my openssl version from 0.9.8zf to zg. Thanks, Gayathri On Wed, Jul 15, 2015 at 12:36 AM, Jakob Bohm wrote: > On 14/07/2015 12:35, Gayathri Manoj wrote: > >

Re: [openssl-users] openssl fips package for openssl-0.9.8zg

2015-07-14 Thread Jakob Bohm
On 14/07/2015 12:35, Gayathri Manoj wrote: Hi All, Please let me know what is the compatible openssl-fips package for the 0.9.8zg version. As far as I know you need to use the file http://www.openssl.org/source/openssl-fips-1.2.4.tar.gz with the specific HMAC checksum specified in the

[openssl-users] openssl fips package for openssl-0.9.8zg

2015-07-14 Thread Gayathri Manoj
Hi All, Please let me know what is the compatible openssl-fips package for the 0.9.8zg version. When i try with with openssl-1_2_4, I am getting the below error bash 3.2:90>gcc -I. -I.. -I../include -fPIC -DOPENSSL_PIC -DOPENSSL_THREADS -D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -m32 -DL_END

[openssl-users] openssl-.0.9.8zg issue while compiling with fips library

2015-07-13 Thread Gayathri Manoj
Hi, I am getting the below error while compliling openssl-0.9.8zg with fips canister library. make[2]: Entering directory `open_source/openssl/0_9_8zg_new1/fips' ../libcrypto.a(err_def.o): In function `ERR_get_state': err_def.c:(.text+0x710): multiple definition of `ERR

[openssl-users] FIPS mode entropy callback for rsa key

2015-07-11 Thread choliz
Hello, I currently have a FIPS module where I'm trying to add entropy to RSA key generation pair. I've overwritten the callbacks within my application but I'm not seeing them being executed when I generate an RSA key. When I call RSA_generate_key_ex shouldn't my entropy

[openssl-users] FIPS 140-2 casualty list -- Ubuntu 10.4 still MIA

2015-07-08 Thread Steve Marquess
If you don't know or care what FIPS 140-2 is then dance a little jig of joy and move on. The "hostage issue" has resulted in the forced removal[*] of a number of platforms from the #1747 validation. That removal was done by editing the "Big Blob o' Text" in the right

Re: [openssl-users] New FIPS 140-2 "SE" Validation Approved

2015-06-30 Thread Steve Marquess
On 06/30/2015 07:15 AM, jonetsu wrote: > The validation is on the ARM platform using Linux 2.4. I am one of those > 'unlucky' having to deal with FIPS so please pardon any silly questions. > Would this validation be limited to these two aspects ? The validation is limite

Re: [openssl-users] New FIPS 140-2 "SE" Validation Approved

2015-06-30 Thread jonetsu
The validation is on the ARM platform using Linux 2.4. I am one of those 'unlucky' having to deal with FIPS so please pardon any silly questions. Would this validation be limited to these two aspects ? And, is there any money-saving advantage at using an already validated OpenSSL when

[openssl-users] Compiling FIPS compliant Openssl for SSE architecture

2015-06-27 Thread Shobha Dashottar
Hi All, I am trying to build fips compliant openssl 1.0.1m for SSE (nonSSE2) architecture . The last time I did this, it was not fips compliant( just built openssl for SSE ) so it worked. >From the Developer Command Prompt for VS 2012: 1. Build fips-ecp 2.

Re: [openssl-users] Call for FIPS 140-2 stakeholders

2015-06-26 Thread Tom Francis
include those in my position, since I can just read your updates, and accept them without knowing all the reasons behind it. :) I'm ok either way. TOM -- Preserve wildlife -- pickle a squirrel! > On Jun 22, 2015, at 11:27 AM, Steve Marquess wrote: > > If you don't know or ca

[openssl-users] New FIPS 140-2 "SE" Validation Approved

2015-06-26 Thread Steve Marquess
If you don't know or care what FIPS 140-2 is, a hysterical giggle of pure delight and whoop of relief before moving on is fully justified. The "SE" (Salavge Edition) validation has been approved: http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm#2398 This ac

Re: [openssl-users] Generating FIPS Compliant libcrypto.so

2015-06-25 Thread Mark
Ok, the API call was not correct RSA_generate_key_ex was not working same. I have resolved all the issues now. -- View this message in context: http://openssl.6102.n7.nabble.com/Generating-FIPS-Compliant-libcrypto-so-tp58890p58904.html Sent from the OpenSSL - User mailing list archive at

Re: [openssl-users] Generating FIPS Compliant libcrypto.so

2015-06-25 Thread Mark
Ok, I will answer my own question here. The problem was that I did not have the LD_LIBRARY_PATH set correctly for openssl. -- View this message in context: http://openssl.6102.n7.nabble.com/Generating-FIPS-Compliant-libcrypto-so-tp58890p58899.html Sent from the OpenSSL - User mailing list

[openssl-users] Generating FIPS Compliant libcrypto.so

2015-06-25 Thread Mark
Ok, I searched and there are a lot of topics around building the fip compliant version of openssl. My problem is with the generation of the libcrypto.so. Environment Debian 8 openssl fips 2.0.9 openssl 1.0.1o I follow the security guide and build a valid fipscanister.o file. I test it and it

[openssl-users] Call for FIPS 140-2 stakeholders

2015-06-22 Thread Steve Marquess
If you don't know or care about FIPS 140-2 then count yourself very lucky and move on. In the same spirit of collaboration that underlies all of the open source based OpenSSL FIPS Object Module validations, of which the #1747 validation is the latest, some of the stakeholders impacted b

Re: [openssl-users] Provisional FIPS 140-2 casualty list

2015-06-22 Thread Steve Marquess
On 06/22/2015 02:36 AM, Jeffrey Walton wrote: > Hi Steve, > > Forgive my ignorance > >>From the previous postings, I *thought* that the validation only > applies to real iron, and [retroactively] was not conferred to the > VMs. But it seems like this list includes real hardware, too: > >

Re: [openssl-users] Provisional FIPS 140-2 casualty list

2015-06-21 Thread Jeffrey Walton
015 at 11:17 AM, Steve Marquess wrote: > If you don't know or care what FIPS 140-2 is then count yourself very > lucky and move on. > > I've created a new web page to summarize the current status of the > long-running hostage saga: > > http://openssl.com/fips/afterma

[openssl-users] Provisional FIPS 140-2 casualty list

2015-06-18 Thread Steve Marquess
If you don't know or care what FIPS 140-2 is then count yourself very lucky and move on. I've created a new web page to summarize the current status of the long-running hostage saga: http://openssl.com/fips/aftermath.html If you use the OpenSSL FIPS Object Module 2.0 (validation #

Re: [openssl-users] Building OpenSSL with FIPS crypto Module Linker forking too many processes

2015-06-17 Thread Mark
Ok, I finally figure out my issues. I was setting the environment variables when I should not have been. The "make depend" set will setup all the fips dependencies you need. So I was shooting myself in the foot so to speak. Using the commands listed in the Security Policy for OpenSSL w

[openssl-users] FIPS 140-2 hostages executed

2015-06-16 Thread Steve Marquess
If you don't know or care what FIPS 140-2 is then count yourself very lucky and move on. There is a new development in the long running saga of the "hostage issue"[*]; the hostages have been executed: http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm#1747 Cr

Re: [openssl-users] Not getting "RSA" keyword for a key in fips mode

2015-06-12 Thread Gayathri Manoj
. > > > > openssl rsa -in my_rsa_key -outform PEM -out my_res_newkey_pem > > > > The new key format is -BEGIN PRIVATE KEY-. > > But I am expecting -BEGIN RSA PRIVATE KEY- > > > > In nonFIPS mode i am getting -BEGIN RSA PRIVATE KEY- as ex

Re: [openssl-users] Not getting "RSA" keyword for a key in fips mode

2015-06-11 Thread Dr. Stephen Henson
-. > But I am expecting -BEGIN RSA PRIVATE KEY- > > In nonFIPS mode i am getting -BEGIN RSA PRIVATE KEY- as expected. > > My openssl version is OpenSSL 0.9.8zf-fips. > > Please let me know how can I generate the new key in BEGIN RSA PRIVATE KEY > for

[openssl-users] Not getting "RSA" keyword for a key in fips mode

2015-06-11 Thread Gayathri Manoj
-BEGIN RSA PRIVATE KEY- as expected. My openssl version is OpenSSL 0.9.8zf-fips. Please let me know how can I generate the new key in BEGIN RSA PRIVATE KEY format. Thanks, Gayathri ___ openssl-users mailing list To unsubscribe: https

Re: [openssl-users] Building OpenSSL with FIPS crypto Module Linker forking too many processes

2015-06-09 Thread OpenSSL Curious
the "fips.h" file. I see it in the /usr/local/ssl/fips-2.0/include directory and I have tried "export FIPSDIR=/usr/local/ssl/fips-2.0" but it still does not pick it up. Is there an environment variable that I am missing? Thanks -- View this message in context: http://ope

Re: [openssl-users] Compiling openssl fips for iOS 7.1 on Yosemite

2015-06-09 Thread Jeffrey Walton
> The problem is: > ld: building for iOS Simulator, but linking against dylib built for MacOSX > file '/usr/lib/libSystem.dylib' for architecture i386 > clang: error: linker command failed with exit code 1 (use -v to see > invocation) There's no reason to build

[openssl-users] Compiling openssl fips for iOS 7.1 on Yosemite

2015-06-09 Thread Kawecka, Anna
Hello, I have problems with compiling Openssl FIPS library for iOS 7.1 (openssl-fips 2.0.9) on Yosemite (using Xcode 6.2). After checking few build scripts available on net (mainly for older versions of openssl-fips library) I came across the testing instructions ( http

Re: [openssl-users] Building OpenSSL with FIPS crypto Module Linker forking too many processes

2015-06-05 Thread John Foley
Well, since you're using the fips-ecp tarball, you'll need to include no-ec2m when configuring OpenSSL 1.0.2a. But this isn't why you're seeing a fork error from fipsld. I'm using Ubuntu 14.04 (Is there a 14.4?) and don't see any issue. However, I'm not s

Re: [openssl-users] Building OpenSSL with FIPS crypto Module Linker forking too many processes

2015-06-05 Thread OpenSSL Curious
-- View this message in context: http://openssl.6102.n7.nabble.com/Building-OpenSSL-with-FIPS-crypto-Module-Linker-forking-too-many-processes-tp58444p58472.html Sent from the OpenSSL - User mailing list archive at Nabble.com. ___ openssl-users

Re: [openssl-users] Building OpenSSL with FIPS crypto Module Linker forking too many processes

2015-06-05 Thread OpenSSL Curious
/workspace/libs/openssl-fips-ecp-2.0.9/fips/fipsld FIPSLD_CC=/usr/bin/gcc FIPSDIR=/usr/local/ssl/fips-2.0 for building fips canister ./config fipscanisterbuild no-asm make make install using ./config fips no-asm make make install This seemed to be pretty straight forward. I think i created

[openssl-users] Fwd: X9.31 RSA key generation for FIPS validation (180-4)

2015-06-02 Thread SecInterlocutor
Hello, Our product was FIPS-certified a few years ago. We are now about to start the re-certification process. The test for RSA X9.31 key generation have somewhat changed, or so it looks like to me anyway. A few years ago, we received test vectors with the following parameters: modulus size

[openssl-users] FIPS Validation questions

2015-05-26 Thread Philip Bellino
Hello, We use OpenSSL-1.0.2a and FIPS 2.0.9 and have questions we need to answer in conjunction with the FIPS validation process. One question is whether SHA1 accepts NULL (zero-length) messages? I couldn't find anything on the OpenSSL wiki so I thought I'd ask here. Also, another qu

[openssl-users] FIPs validation questions

2015-05-22 Thread Philip Bellino
Hello, We use OpenSSL-1.0.2a and FIPS 2.0.9 and have questions we need to answer in conjunction with the FIPS validation process. One question is whether SHA1 accepts NULL (zero-length) messages? I couldn't find anything on the OpenSSL wiki so I thought I'd ask here. Als

[openssl-users] Fwd: X9.31 RSA key generation for FIPS validation (180-4)

2015-05-20 Thread SecInterlocutor
1 RSA key generation for FIPS validation (180-4) To: openssl-users@openssl.org Hello, Our product was FIPS-certified a few years ago. We are now about to start the re-certification process. The test for RSA X9.31 key generation have somewhat changed, or so it looks like to me anyway. A few

[openssl-users] Fwd: X9.31 RSA key generation for FIPS validation (180-4)

2015-05-15 Thread SecInterlocutor
Hello, Our product was FIPS-certified a few years ago. We are now about to start the re-certification process. The test for RSA X9.31 key generation have somewhat changed, or so it looks like to me anyway. A few years ago, we received test vectors with the following parameters: modulus size

[openssl-users] FIPS mode and AES_set_encrypt_key/AES_set_decrypt_key

2015-05-12 Thread David Weidenkopf
Can anyone shed light on why these APIs are disabled in FIPS mode? They involve operations that must be implemented within the boundary of the FIPS crypto module? It seems like disabling them is intended to prevent mistakes from developers trying to write their own AES mode implementations

Re: [openssl-users] FIPS 140-2 on iOS

2015-04-29 Thread Sec_Aficionado
forum where someone was building an app with FIPS 140-2 compliant >> communications. > > Note there really is no such thing as "FIPS 140-2 compliant" (though you > see that terms bandied around a lot and I'm guilty of doing so myself). > > The term of inter

Re: [openssl-users] FIPS 140-2 on iOS

2015-04-28 Thread Steve Marquess
On 04/28/2015 03:44 PM, Sec_Aficionado wrote: > Hi there, > > Total n00b question here. I recently ran across a question on an iOS > forum where someone was building an app with FIPS 140-2 compliant > communications. Note there really is no such thing as "FIPS 140-2 compli

Re: [openssl-users] FIPS 140-2 on iOS

2015-04-28 Thread Q Gct
Hi, I believe you can make an app that is FIPS compliant: since OpenSSL can be made FIPS compliant on a non-validated OS, why not an app on iOS? But it will be FIPS compliant, not FIPS validated app. Le mar. 28 avr. 2015 21:45, Sec_Aficionado a écrit : > Hi there, > > Total n00b ques

[openssl-users] FIPS 140-2 on iOS

2015-04-28 Thread Sec_Aficionado
Hi there, Total n00b question here. I recently ran across a question on an iOS forum where someone was building an app with FIPS 140-2 compliant communications. Now, from reading here (mailing lists) about FIPS certification, it involves both the bits and the platform. So it would not be

Re: [openssl-users] FIPS: SSL 3.0 now forbidden in latest NDCPP update

2015-04-28 Thread Salz, Rich
> If they have counterparts in TLS that could be used, why wouldn't > the TLS version show up instead ? Because they are *the same* TLS did not take old ciphers and renumber or rename them. ___ openssl-users mailing list To unsubscribe: https://mta.o

Re: [openssl-users] FIPS: SSL 3.0 now forbidden in latest NDCPP update

2015-04-28 Thread jonetsu
ically understood. What was lacking then in my undestanding, is that : % OPENSSL_FIPS=1 openssl ciphers -v Will not output strictly according to FIPS. Maybe there's no easy way to do that when the definition of a cipher states otherwise. Thanks. -- View this message in context:

Re: [openssl-users] FIPS: SSL 3.0 now forbidden in latest NDCPP update

2015-04-28 Thread Matt Caswell
On 28/04/15 13:31, jonetsu wrote: >> That refers to the minimum version of the ciphersuite: it >> doesn't imply that it will only be used in SSLv3 (which is >> disabled in FIPS mode). > > Hmmm... I'm sorry but I do not really understand this. Since openss

Re: [openssl-users] FIPS: SSL 3.0 now forbidden in latest NDCPP update

2015-04-28 Thread jonetsu
> That refers to the minimum version of the ciphersuite: it > doesn't imply that it will only be used in SSLv3 (which is > disabled in FIPS mode). Hmmm... I'm sorry but I do not really understand this. Since openssl is run in FIPS mode, and since SSLv3 is disabled, then

[openssl-users] fingerprint mismatch issue with fips build on Win32

2015-04-27 Thread Zeke Evans
Hi, Our win32 applications will sometimes fail to start due to a fingerprint mismatch in the fips module. It appears this is caused by the fixed baseaddr used to verify the checksum. We are building with the /FIXED and /DYNAMICBASE:NO options. The User Guide states: "The standard OpenSSL

Re: [openssl-users] FIPS: SSL 3.0 now forbidden in latest NDCPP update

2015-04-24 Thread Dr. Stephen Henson
On Fri, Apr 24, 2015, jonetsu wrote: > Hello, > > > In FIPS mode SSL 3.0 is not allowed: that has always been the > > case. > > % openssl version > OpenSSL 1.0.1f 6 Jan 2014 > > % OPENSSL_FIPS=1 openssl ciphers -v | grep SSL > > ECDHE-RSA-AES256-SHA

Re: [openssl-users] FIPS: SSL 3.0 now forbidden in latest NDCPP update

2015-04-24 Thread jonetsu
Hello, > In FIPS mode SSL 3.0 is not allowed: that has always been the > case. % openssl version OpenSSL 1.0.1f 6 Jan 2014 % OPENSSL_FIPS=1 openssl ciphers -v | grep SSL ECDHE-RSA-AES256-SHASSLv3 ECDHE-ECDSA-AES256-SHA SSLv3 DHE-RSA-AES256-SHA SSLv3 DHE-DSS-AES256-SHA

Re: [openssl-users] FIPS: SSL 3.0 now forbidden in latest NDCPP update

2015-04-24 Thread Dr. Stephen Henson
On Fri, Apr 24, 2015, jonetsu wrote: > > ... Along with TLS 1.0 (which is absent from OpenSSL FIPS mode) > > https://www.niap-ccevs.org/pp/pp.cfm?id=CPP_ND_V1.0 > > Specifically: > > "FCS_TLSS_EXT.1.2 The TSF shall deny connections from clients requesting SSL &

[openssl-users] FIPS: SSL 3.0 now forbidden in latest NDCPP update

2015-04-24 Thread jonetsu
Hi, ... Along with TLS 1.0 (which is absent from OpenSSL FIPS mode) https://www.niap-ccevs.org/pp/pp.cfm?id=CPP_ND_V1.0 Specifically: "FCS_TLSS_EXT.1.2 The TSF shall deny connections from clients requesting SSL 1.0, SSL 2.0, SSL 3.0, TLS 1.0" "FCS_TLSS_EXT.2.2 The TSF shall d

Re: [openssl-users] FIPS mode restrictions and DES

2015-04-15 Thread Jeffrey Walton
>> One point is that if this is a delivery for someone >> subject to the FIPS-only procurementrequirement >> imposed on various US Government related entities, >> then whatever OS theyuse, MUST (by that requirement) >> have already passed this for its password hand

Re: [openssl-users] FIPS mode restrictions and DES

2015-04-14 Thread Kevin Fowler
"libraries" to be FIPS-validated, perhaps as separate crypto modules. Kevin On Tue, Apr 14, 2015 at 8:51 AM, jonetsu wrote: > Salz, Rich wrote > > As the old joke goes, "if you have to ask, you can't afford it." > > Well, exploration can be free.

Re: [openssl-users] FIPS mode restrictions and DES

2015-04-14 Thread Kevin Fowler
"libraries" to be FIPS-validated, perhaps as separate crypto modules. Kevin On Tue, Apr 14, 2015 at 8:51 AM, jonetsu wrote: > Salz, Rich wrote > > As the old joke goes, "if you have to ask, you can't afford it." > > Well, exploration can be free.

Re: [openssl-users] FIPS mode restrictions and DES

2015-04-14 Thread Steve Marquess
On 04/14/2015 09:42 AM, jonetsu wrote: > > >> From: "Steve Marquess" Date: 04/14/15 09:31 >> > >> and note that of the 101 platforms ("OEs") appearing there, most >> of those operating systems are neither CC certified nor have any >&

Re: [openssl-users] FIPS mode restrictions and DES

2015-04-14 Thread Steve Marquess
On 04/13/2015 01:30 PM, Jakob Bohm wrote: > .. >> >> With the very unique exception of the OpenSSL FIPS Object Module, there >> are no FIPS 140-2 validated cryptographic modules that can be obtained >> in source form and compiled by the end user. The fact that Red Hat

Re: [openssl-users] FIPS mode restrictions and DES

2015-04-14 Thread jonetsu
> From: "Steve Marquess" > Date: 04/14/15 09:31 > and note that of the 101 platforms ("OEs") appearing there, most of > those operating systems are neither CC certified nor have any other FIPS > 140-2 validated crypto. Keep in mind that at Leve

Re: [openssl-users] FIPS mode restrictions and DES

2015-04-14 Thread jonetsu
Salz, Rich wrote > As the old joke goes, "if you have to ask, you can't afford it." Well, exploration can be free. I noticed that Strongswan uses a plug-in architecture for crypto that seemingly allows the use of OpenSSL instead of the kernel for crypto operations, for use

Re: [openssl-users] FIPS mode restrictions and DES

2015-04-13 Thread Salz, Rich
> If I may, I'd like to ask about including the Linux kernel in the validation. As the old joke goes, "if you have to ask, you can't afford it." ___ openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Re: [openssl-users] FIPS mode restrictions and DES

2015-04-13 Thread jonetsu
Thanks for all the comments, they're much appreciated. It is a Debian system, so there is no Red Hat FIPS validation (or SuSE which also has one I think) or validated components that can be used. If I may, I'd like to ask about including the Linux kernel in the validation. Now, includ

Re: [openssl-users] FIPS mode restrictions and DES

2015-04-13 Thread Jakob Bohm
anything you can imagine. Yes, the only thing easier would be if someone (maybe Red Hat) already has a FIPS validatedopen source implementation of crypt(). And even if Red Hat does, you would be limited to using the specific commercial versions of RHEL that included that specific validated binary

Re: [openssl-users] FIPS mode restrictions and DES

2015-04-13 Thread Steve Marquess
so much easier than anything you can imagine. > Yes, the only thing easier would be if someone (maybe Red Hat) > already has a FIPS validatedopen source implementation of > crypt(). And even if Red Hat does, you would be limited to using the specific commercial versions of RHEL that included

Re: [openssl-users] FIPS mode restrictions and DES

2015-04-13 Thread Jakob Bohm
) already has a FIPS validatedopen source implementation of crypt(). Enjoy Jakob -- Jakob Bohm, CIO, Partner, WiseMo A/S. http://www.wisemo.com Transformervej 29, 2860 Søborg, Denmark. Direct +45 31 13 16 10 This public discussion message is non-binding and may contain errors. WiseMo - Remote

Re: [openssl-users] FIPS mode restrictions and DES

2015-04-13 Thread Salz, Rich
> In other words, is the only > practical and viable option regarding this to re-implement crypt() using EVP > methods ? - thanks. Yes. That would be so much easier than anything you can imagine. ___ openssl-users mailing list To unsubscribe: https://m

Re: [openssl-users] FIPS mode restrictions and DES

2015-04-13 Thread jonetsu
Thanks for the comments - much appreciated. The following question might be on the naive side of things, but then I'm all new to this. Since crypt() in glibc2 supports SHA-256 and SHA-512 for password, and assuming that these two are FIPS compatible, what would be the (financial) overhe

Re: [openssl-users] Is there any plan for FIPS to be supported on Linux-aarch64?

2015-04-06 Thread Steve Marquess
or which we must pay them. Also FYI for change letters the (unique/creative component of the) documentation is trivial. As with most FIPS 140-2 documentation such paperwork is very low in nutritional value and of essentially no value to the end user. In particular it isn't going to help anyone &q

Re: [openssl-users] FIPS wrapper to lock low level AES calls in FIPS mode

2015-04-06 Thread Philip Bellino
users-boun...@openssl.org] On Behalf Of Philip Bellino Sent: Monday, April 06, 2015 8:03 AM To: openssl-users@openssl.org Subject: [openssl-users] FIPS wrapper to lock low level AES calls in FIPS mode Hello, We are using Openssl-1.0.2a with FIPS 2.0.9 on Linux PPC environment. We have code that we a

Re: [openssl-users] Is there any plan for FIPS to be supported on Linux-aarch64?

2015-04-06 Thread Nicolae Rosia
available? Maybe >> someone can pick it up and work from there. > > It doesn't work that way. With FIPS 140-2 the software itself is never > the problem, it's everything else. > > The OpenSSL FIPS Object Module is entirely open source, but having the > source code does y

Re: [openssl-users] Is there any plan for FIPS to be supported on Linux-aarch64?

2015-04-06 Thread Steve Marquess
On 04/06/2015 10:09 AM, Nicolae Rosia wrote: > Is the documentation for the current validation available? Maybe > someone can pick it up and work from there. It doesn't work that way. With FIPS 140-2 the software itself is never the problem, it's everything else. The OpenSSL FI

Re: [openssl-users] Is there any plan for FIPS to be supported on Linux-aarch64?

2015-04-06 Thread Nicolae Rosia
cts are using OpenSSL >> with FIPS. I know that OpenSSL 1.0.2 started to support Linux-aarch64, but >> our products need OpenSSL FIPS as well. >> >> My question is when OpenSSL FIPS will be supported on Linux-aarch64? > > When we have a sponsor to cover the non-trivial co

Re: [openssl-users] Is there any plan for FIPS to be supported on Linux-aarch64?

2015-04-06 Thread Steve Marquess
On 04/05/2015 09:13 PM, Aaron wrote: > Hello, > > We are porting our products to Linux-aarch64. Our products are using OpenSSL > with FIPS. I know that OpenSSL 1.0.2 started to support Linux-aarch64, but > our products need OpenSSL FIPS as well. > > My question is when

[openssl-users] FIPS wrapper to lock low level AES calls in FIPS mode

2015-04-06 Thread Philip Bellino
Hello, We are using Openssl-1.0.2a with FIPS 2.0.9 on Linux PPC environment. We have code that we assume needs updating, to avoid using low level routines in FIPS. For example, our snmp v3 implementation currently decrypts/encrypts using AES_set_encrypt_key() and AES_cfb128_encrypt(). The old

[openssl-users] Is there any plan for FIPS to be supported on Linux-aarch64?

2015-04-05 Thread Aaron
Hello, We are porting our products to Linux-aarch64. Our products are using OpenSSL with FIPS. I know that OpenSSL 1.0.2 started to support Linux-aarch64, but our products need OpenSSL FIPS as well. My question is when OpenSSL FIPS will be supported on Linux-aarch64? Thanks in advance

Re: [openssl-users] QNX cross-compiled openssl with fips

2015-04-03 Thread Piotr Łobacz
pisze: > Ok, whith few modifications to fipsld++ i can now link to libcrypto.so > and libcrypto.a and applications are working correctly, but mine problem > still persists because if i would like to dlopen my shared library > compiled with static libcrypto.a and i'll try to run fi

Re: [openssl-users] QNX cross-compiled openssl with fips

2015-04-03 Thread Piotr Łobacz
Ok, whith few modifications to fipsld++ i can now link to libcrypto.so and libcrypto.a and applications are working correctly, but mine problem still persists because if i would like to dlopen my shared library compiled with static libcrypto.a and i'll try to run fips mode from that library

Re: [openssl-users] QNX cross-compiled openssl with fips

2015-04-01 Thread Piotr Łobacz
Yeah i have tried with it and modified it. But mine problem is that i am cross-compiling. I have used incore to generate digest and it works with qcc and i386-pc-nto-qnx6.4.0-gcc. But with i386-pc-nto-qnx6.4.0-g++ and QCC which is for c++ it does not work it generates bad digest. What is a problem

Re: [openssl-users] QNX cross-compiled openssl with fips

2015-04-01 Thread Piotr Łobacz
12:41 +0200, Piotr Łobacz pisze: > Ok i have finally managed to cross-compile openssl with fips for QNX > platform. What i did wass modifing the fipsld script not to input this > magical number[ $? -ne 42 ] && exit $? and the returned output of > "${FIPS_SIG}" -ex

Re: [openssl-users] FIPS errors: finding causes for failure

2015-04-01 Thread Dr. Stephen Henson
On Wed, Apr 01, 2015, jonetsu wrote: > Hello, > >   As part of development, still using the fips_hmac test code, this time on a > target unit using 1.0.1e, the following errors are shown at the console: > > 3069614096:error:2D088086:FIPS > routines:FIPS_s

[openssl-users] FIPS errors: finding causes for failure

2015-04-01 Thread jonetsu
Hello,   As part of development, still using the fips_hmac test code, this time on a target unit using 1.0.1e, the following errors are shown at the console: 3069614096:error:2D088086:FIPS routines:FIPS_selftest_x931:selftest failed:fips_rand_selftest.c:171: 3069614096:error:2D082086:FIPS

Re: [openssl-users] QNX cross-compiled openssl with fips

2015-03-31 Thread Piotr Łobacz
Ok i have finally managed to cross-compile openssl with fips for QNX platform. What i did wass modifing the fipsld script not to input this magical number[ $? -ne 42 ] && exit $? and the returned output of "${FIPS_SIG}" -exe "${TARGET}" was saved in SIG variable, beca

Re: [openssl-users] FIPS Linux kernel documentation ?

2015-03-27 Thread Henrik Grindal Bakken
Steve Marquess writes: >> Are you certain? For a user-space component like OpenSSL, this is >> obviously true, but I think you could argue that a kernel module's >> "Operational Environment" has no relation to the Linux distro, only to >> the kernel it's loaded by and the hardware architecture (

Re: [openssl-users] FIPS Linux kernel documentation ?

2015-03-27 Thread Steve Marquess
On 03/27/2015 04:45 AM, Henrik Grindal Bakken wrote: > Steve Marquess > writes: > >>> If the CMVP bureaucracy insists on a specific kernel version >>> for the platform number, this should be one of the "Long Term >>> Support" kernel releases to maximize longevity (assuming that >>> regular OS pat

Re: [openssl-users] QNX cross-compiled openssl with fips

2015-03-27 Thread Piotr Łobacz
Another problem is that compiled cross-compiled OpenSSL with fips should start in its own prompt but it only spews the expected signature and exits. I have modified fipsld scripts as shown in the manual and this does not help. Incore was used from the tarball but maybe i have to use some special

Re: [openssl-users] FIPS Linux kernel documentation ?

2015-03-27 Thread Henrik Grindal Bakken
Steve Marquess writes: >> If the CMVP bureaucracy insists on a specific kernel version >> for the platform number, this should be one of the "Long Term >> Support" kernel releases to maximize longevity (assuming that >> regular OS patching within a version number is still accepted >> as "same pla

Re: [openssl-users] FIPS Linux kernel documentation ?

2015-03-26 Thread Jakob Bohm
kernel module (a.k.a. device driver). The idea would be to have a kernel module that provides crypto support. This kernel module would be the FIPS object module, with the FIPS boundary drawn around the kernel module. This would be loaded at run time like any other device driver when FIPS mode needed

Re: [openssl-users] FIPS Linux kernel documentation ?

2015-03-26 Thread Steve Marquess
e (a.k.a. >>> device driver). The idea would be to have a kernel module that provides >>> crypto support. This kernel module would be the FIPS object module, >>> with the FIPS boundary drawn around the kernel module. This would be >>> loaded at run time like

Re: [openssl-users] FIPS: Any setup required for using a default DRBG ?

2015-03-26 Thread jonetsu
> From: jonetsu > Date: 03/26/15 11:11 >   Is FIPS_mode_set(1) taking care of setting up a default DRBG ?  Yes. It does.  When using post_cb() from fips_test_suite.c in for instance the fips_hmac.c demo, with only but a FIPS_mode_set(1) call, it is reported that the four DRBGs are tested:

Re: [openssl-users] FIPS Linux kernel documentation ?

2015-03-26 Thread Jakob Bohm
provides crypto support. This kernel module would be the FIPS object module, with the FIPS boundary drawn around the kernel module. This would be loaded at run time like any other device driver when FIPS mode needed to be enabled. There is likely some kernel work required to allow the ciphers in the

Re: [openssl-users] FIPS Linux kernel documentation ?

2015-03-26 Thread Steve Marquess
On 03/26/2015 01:00 PM, Marcus Meissner wrote: > ... >> >> Unfortunately FIPS 140-2 validation conflicts rather violently with open >> source software (and with software engineering best practice in general, >> for that matter). Even if some benevolent benefactor ponied

Re: [openssl-users] FIPS Linux kernel documentation ?

2015-03-26 Thread Marcus Meissner
On Thu, Mar 26, 2015 at 10:57:28AM -0400, Steve Marquess wrote: > On 03/25/2015 06:26 PM, jone...@teksavvy.com wrote: > > On Wed, 25 Mar 2015 17:03:04 -0400 > > Steve Marquess wrote: > > > >> I wasn't aware the Linux kernel (the real one, not proprietary >

Re: [openssl-users] FIPS Linux kernel documentation ?

2015-03-26 Thread Steve Marquess
This kernel module would be the FIPS object module, > with the FIPS boundary drawn around the kernel module. This would be > loaded at run time like any other device driver when FIPS mode needed to > be enabled. > > There is likely some kernel work required to allow the ciphers i

<    3   4   5   6   7   8   9   10   11   12   >