> I have a general query regarding FIPS mode.
> I am running an simple openssl https server based on openssl
> that services https requests from window clients.
Is it in FIPS mode, yes or not? If not, then you cannot claim it is FIPS
compliant.
> I have the following setting in my windows XP
Hello all,
I have a general
query regarding FIPS mode. I am running an simple openssl https server based
on
openssl that services https requests from window clients. I have the following
setting in my windows XP "Use FIPS comliant
algorithms for
encryption, hashing and signing set to 1" .
mode so that only FIPS approved security functions can be
used.
Carl
- Original Message -
From: Koripella Srinivas
To: openssl-users@openssl.org
Sent: Thursday, February 19, 2009 10:01 AM
Subject: FIPS Server
Hello all,
I have a general query regarding FIPS mode. I am
Hello all,
I have a general
query regarding FIPS mode. I am running an simple openssl https server based
on
openssl that services https requests from window clients. I have the following
setting in my windows XP "Use FIPS comliant
algorithms for
encryption, hashing and signing set to 1" .
Hello all,
I have a general
query regarding FIPS mode. I am running an simple openssl https server based
on
openssl that services https requests from window clients. I have the following
setting in my windows XP "Use FIPS comliant
algorithms for
encryption, hashing and signing set to 1" .
; there any way for the client to tell that it is speaking with a non fips
> server.?
That depends on the implementation. There are many ways, but they're outside
the scope of FIPS itself.
For example, suppose you're part of a military organization. Your
certificates can include
on fips mode which speaks and suports all the
> ciphers (including the FIPS ciphers) .Now for a FIPS validated client is
> there any way for the client to tell that it is speaking with a non fips
> server.? If not the server could claim to be FIPS compliant and trick the
> client while i
a FIPS validated client is
there any way for the client to tell that it is speaking with a non fips
server.? If not the server could claim to be FIPS compliant and trick the
client while in reality it is not FIPS compliant but is just speaking fips
ciphers that the client proposes. Is the above
On Sun, Feb 22, 2009 at 7:56 AM, smitha daggubati wrote:
> Thanks David and kyle for your time.
> Kyle,
> "though current practice includes "procurement", not necessarily
> "implementation"
> I did not understand the above statement? Can you elaborate..
>
> thanks
> Srinivas
In order for the US F
>> FIPS validated cryptography is mandated on endpoints which handle
>> sensitive information by the US Federal Government (though current
>> practice includes "procurement", not necessarily "implementation").
> Thanks David and kyle for your time.
> Kyle,
> "though current practice includes "pro
Thanks David and kyle for your time.
Kyle,
"though current practice includes "procurement", not necessarily
"implementation"
I did not understand the above statement? Can you elaborate..
thanks
Srinivas
On Sat, Feb 21, 2009 at 3:11 AM, Kyle Hamilton wrote:
> Default OpenSSL can understand and
Default OpenSSL can understand and speak the cryptographic algorithms
that FIPS can validate. This does not mean that it is FIPS validated.
(For example, if it can accept MD5 for anything other than
establishing the premaster secret, it's not FIPS validated or even
FIPS validatable.) This is an
> Hello all,
> I have a general query regarding FIPS mode. I am running an simple openssl
> https server based on openssl that services https requests from window
> clients. I have the following setting in my windows XP "Use FIPS comliant
> algorithms for encryption, hashing and signing set to 1"
Hello all,
I have a general query regarding FIPS mode. I am running an simple openssl
https server based on openssl that services https requests from window
clients. I have the following setting in my windows XP "Use FIPS comliant
algorithms for encryption, hashing and signing set to 1" .
Using IE
14 matches
Mail list logo