Re: [openssl-users] Openssl FIPS uses /dev/urandom by default?

2015-11-12 Thread John Foley
Entropy collection is outside the FIPS boundary. If you don't want to modify the code, you can pass in -DDEVRANDOM using CFLAGS and set it to whatever value you desire. For instance, maybe you have a hardware device mapped to /dev/entropy that provides sufficient random data to seed the DRBG.

Re: [openssl-users] Key Deriviation Function Tests for TLS

2015-09-28 Thread John Foley
On 09/23/2015 08:16 AM, Steve Marquess wrote: > John, let me elaborate on my comment above by noting that the Cisco > contribution includes a bunch of FIPS specific code for which there is > no counterpart on the master branch (i.e. no place to put it). A > version which worked on master with all

Re: [openssl-users] Key Deriviation Function Tests for TLS

2015-09-22 Thread John Foley (foleyj)
Pull request 368 has KDF support for FIPS: https://github.com/openssl/openssl/pull/368 I've already updated libsrtp to use this API for FIPS compliance. We would like to contribute to other downstream projects as well. But it would help if OpenSSL accepted this pull request. --

[openssl-users] Extended key usage keyAgreement bit in certificate

2015-07-22 Thread John Foley
The following commit changed the behavior of checking the extended key usage bits in a server certificate when using X509_PURPOSE_SSL_SERVER: http://marc.info/?l=openssl-cvsm=132759007026375w=2 This commit was put into 1.0.2 on April 6, 2012. Therefore, 1.0.1 and 1.0.2 behave differently in

Re: [openssl-users] Building OpenSSL with FIPS crypto Module Linker forking too many processes

2015-06-05 Thread John Foley
Well, since you're using the fips-ecp tarball, you'll need to include no-ec2m when configuring OpenSSL 1.0.2a. But this isn't why you're seeing a fork error from fipsld. I'm using Ubuntu 14.04 (Is there a 14.4?) and don't see any issue. However, I'm not setting CC, FIPSLD and FIPSDIR. You

Re: [openssl-users] Performance problems with OpenSSL and threading

2015-05-07 Thread John Foley
Not sure. Are you using blocking or non-blocking IO? Have you tried SSL_MODE_AUTO_RETRY? Do you notice a different return value from SSL_read() after a zero byte read compared to other errors? On 05/06/2015 07:12 PM, Bryan Call wrote: Do you know if there is a way from preventing a call to

Re: [openssl-users] openssl-1.0.2-stable-SNAP-20150504 error

2015-05-04 Thread John Foley
That's the same symptom I see on 32-bit systems. It appears to be caused by 5b38d54753acdabbf6b1d5e15d38ee81fb0612a2. On 05/04/2015 09:21 AM, The Doctor wrote: This also occured in openssl-1.0.2-stable-SNAP-20150503 Script started on Mon May 4 07:06:41 2015

Re: [openssl-users] Performance problems with OpenSSL and threading

2015-05-01 Thread John Foley
... -Bryan On May 1, 2015, at 5:34 AM, John Foley fol...@cisco.com wrote: Lock #1 is CRYPTO_LOCK_ERR, which I believe is used for logging errors. It appears your application is generating a lot of errors for some reason. Never tried it myself, but you probably can't disable this lock

Re: [openssl-users] Performance problems with OpenSSL and threading

2015-05-01 Thread John Foley
Lock #1 is CRYPTO_LOCK_ERR, which I believe is used for logging errors. It appears your application is generating a lot of errors for some reason. Never tried it myself, but you probably can't disable this lock with multiple threads running. You should take a look at the error log to identify

Re: [openssl-users] Performance problems with OpenSSL and threading

2015-05-01 Thread John Foley
The changes to SSL_locking_callback() look good. But the code you've added to SSL_CTX_add_extra_chain_cert_file() doesn't accomplish much. You're checking if FIPS is on or off, then setting the FIPS mode to the current setting, which is a no-op. On 04/30/2015 09:49 PM, Bryan Call wrote:

Re: [openssl-users] Performance problems with OpenSSL and threading

2015-04-29 Thread John Foley
there are callbacks for type 39 and 40 locks (for OpenSSL 1.0.1 and 1.0.2)? -Bryan On Apr 28, 2015, at 10:22 AM, John Foley fol...@cisco.com mailto:fol...@cisco.com wrote: In the context of OpenSSL 1.0.1 or 1.0.2, this means FIPS_mode_set(1) has returned with a successful return value

Re: [openssl-users] Performance problems with OpenSSL and threading

2015-04-28 Thread John Foley
On Apr 24, 2015, at 4:17 PM, John Foley fol...@cisco.com mailto:fol...@cisco.com wrote: Some of the algorithms still invoke the FIPS flavor of the algorithm even when FIPS is disabled. For example, this code is from EVP_DigestUpdate(). int EVP_DigestUpdate(EVP_MD_CTX *ctx, const void *data

Re: [openssl-users] Performance problems with OpenSSL and threading

2015-04-24 Thread John Foley
) FIPS_mode: 0 -Bryan On Apr 24, 2015, at 10:56 AM, John Foley fol...@cisco.com mailto:fol...@cisco.com wrote: When you create the private key given to SSL_CTX, be sure to instantiate a private key for each thread as well. If you share the same key across all threads, this can introduce

Re: [openssl-users] Performance problems with OpenSSL and threading

2015-04-24 Thread John Foley
-52.20.2/src/crypto/err/err_def.c line: 343 type: 1 -Bryan On Apr 23, 2015, at 4:46 PM, John Foley fol...@cisco.com mailto:fol...@cisco.com wrote: Looking at your call stack, it appears you're testing with FIPS mode enabled. There's a lock in FIPS_selftest_failed() that's used to ensure

Re: [openssl-users] Performance problems with OpenSSL and threading

2015-04-23 Thread John Foley
Looking at your call stack, it appears you're testing with FIPS mode enabled. There's a lock in FIPS_selftest_failed() that's used to ensure the crypto algorithms inside the FIPS boundary are not utilized until after the POST has completed and passed. Unfortunately this lock remains installed for

Re: [openssl-users] Building libcrypto/libssl without symbolic link

2015-04-22 Thread John Foley
Are you packaging libcrypto.so into the APK yourself? The Android OS comes with it's own resident copy of libcrypto. You can leverage this from your app without having to package libcrypto into your application. This assumes the version of libcrypto that comes with Android meets your needs.

Re: [openssl-users] Fwd: Itanium problem

2015-04-17 Thread John Foley
I'm impressed you were able to do a FIPS build for Windows x64. I didn't think this was possible. ;-) This looks like the hash that FINGERPRINT_premain() spits out when the signature hasn't been embedded into the binary. You may want to confirm the signature is embedded during the build

Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

2015-04-15 Thread John Foley
Do you see the same stack trace when simply using the random number generator: ./openssl rand 64 What if you simply use SHA1: ./openssl sha1 somefile On 04/14/2015 12:17 PM, John Unsworth wrote: Is no-one interested at all about this problem? Or do I need to send it to another place?

Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

2015-04-15 Thread John Foley
Of *John Foley *Sent:* 15 April 2015 13:31 *To:* openssl-users@openssl.org *Subject:* Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken Do you see the same stack trace when simply using the random number generator: ./openssl rand 64 What if you simply use SHA1

Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

2015-04-15 Thread John Foley
, 2b3d78) + 108 Regards, John *From:*openssl-users [mailto:openssl-users-boun...@openssl.org] *On Behalf Of *John Foley *Sent:* 15 April 2015 15:10 *To:* openssl-users@openssl.org *Subject:* Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken How about

Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

2015-04-15 Thread John Foley
failure:s23_lib.c:177: John. *From:*openssl-users [mailto:openssl-users-boun...@openssl.org] *On Behalf Of *John Foley *Sent:* 15 April 2015 16:45 *To:* openssl-users@openssl.org *Subject:* Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken Looks like the crash

Re: [openssl-users] FW: Getting Apache to Recognize New OpenSSL Install

2015-04-06 Thread John Foley
Have you recompiled Apache? Or did you only recompile OpenSSL 1.0.2a? There is no binary compatibility between 0.9.8 and 1.0.2. You'll need to recompile Apache if you haven't done this. Or, possibly a newer Apache binary (2.4.12) would work with your OpenSSL 1.0.2a build. On 04/06/2015

Re: [openssl-users] OpenSSL Compile Issues (and general knowledge questions)

2015-03-27 Thread John Foley
The 'make depend' regenerates the dependencies for the makefiles. The dependencies will change depending on the configuration options you've passed to OpenSSL. If you're new to using GNU make, here's a decent explanation:

Re: [openssl-users] FIPS Linux kernel documentation ?

2015-03-26 Thread John Foley
We looked at this very briefly a couple of years ago. In theory, there may be a way to achieve the goal as a loadable kernel module (a.k.a. device driver). The idea would be to have a kernel module that provides crypto support. This kernel module would be the FIPS object module, with the

Re: [openssl-users] [openssl-announce] Forthcoming OpenSSL releases

2015-03-18 Thread John Foley
We maintain our own derivative of OpenSSL and haven't had any significant issues due to the code reformat. We simply run the reformat script on our downstream derivative. We can then generate patch files of our changes and reapply them to new OpenSSL releases. It was fairly straight forward.

Re: [openssl-users] Reg : SCEP using OPENSSL

2015-03-17 Thread John Foley
If it fits your needs, you may want to look into using EST (RFC 7030) instead of SCEP. EST is the replacement for SCEP. The SCEP draft was never ratified. The libest open source project implements RFC 7030 and uses OpenSSL. It's available at https://github.com/cisco/libest. On 03/17/2015

Re: [openssl-users] FIPS mode uses /dev/urandom ?

2015-03-12 Thread John Foley
You don't even need to modify e_os.h. You can just pass in a new value for DEVRANDOM using the gcc -D compiler option. For instance, maybe you have a hardware device mapped to a Linux device file called /dev/entropy1. You can override DEVRANDOM to use this device without modifying any OpenSSL

[openssl-users] Blank pages in FIPS 2.0 user guide

2015-02-20 Thread John Foley
Appendix E.2 in the FIPS 2.0 users guide (https://www.openssl.org/docs/fips/UserGuide-2.0.pdf) contains blank pages on pages 134-136. Is this intentional? It appears the iOS build instructions starting on page 133 are incomplete. ___ openssl-users

Re: [openssl-users] Blank pages in FIPS 2.0 user guide

2015-02-20 Thread John Foley
On 02/20/2015 12:30 PM, Steve Marquess wrote: On 02/20/2015 10:52 AM, John Foley wrote: Appendix E.2 in the FIPS 2.0 users guide (https://www.openssl.org/docs/fips/UserGuide-2.0.pdf) contains blank pages on pages 134-136. Is this intentional? It appears the iOS build instructions starting

Re: 1.0.2 VC-WIN32 build failure?

2014-06-13 Thread John Foley
Tried again using the 20140613 snapshot and it's now working. Thanks for committing the fix yesterday. On 06/12/2014 11:35 AM, John Foley wrote: Using the 201406012 snapshot on the 1.0.2 branch, I'm seeing an error while trying to build for the VC-WIN32 target. The compiler is VS2010. Can

1.0.2 VC-WIN32 build failure?

2014-06-12 Thread John Foley
Using the 201406012 snapshot on the 1.0.2 branch, I'm seeing an error while trying to build for the VC-WIN32 target. The compiler is VS2010. Can anyone confirm this is the correct build procedure? perl Configure VC-WIN32 ms\do_nasm.bat nmake -f ms\ntdll.mak The error is: cl

Re: Anyone implementing RFC 7030: Enrollment over Secure Transport (EST)?

2014-03-26 Thread John Foley
We plan to publish an open source EST stack in the near future. This will support both client-side and server-side capabilities. The code will be hosted here: https://github.com/cisco/libest I've also recently setup an EST test server, which is available here:

0.9.8z?

2013-02-12 Thread John Foley
There were several commits to the 0_9_8 trunk after the 0.9.8y release last week that appear to be related to CVE-2013-0169. Will there be a forthcoming 0.9.8z release as a result? Or are these commits not needed to mitigate CVE-2013-0169? Thank you. attachment: foleyj.vcf

Maintenance releases on 0.9.8

2012-03-17 Thread John Foley
Now that 1.0.1 has been released, will there be any future maintenance releases on the 0.9.8 branch? For instance, will any vulnerabilities found in the future be addressed on 0.9.8? Or is the 0.9.8 branch effectively end of life at this time? Thank you. attachment: foleyj.vcf

AES-CCM mode in 1.0.1-beta2

2012-02-03 Thread John Foley
Looking at OpenSSL_add_all_ciphers() in crypto/evp/c_allc.c, AES-CCM mode is not in the list of ciphers added. Has this cipher intentionally been omitted, or is this a bug? attachment: foleyj.vcf

CertificateVerify message size hard-coded to 514 bytes

2011-11-28 Thread John Foley
Does anyone know why the CertificateVerify message is still limited to a max size of 514 bytes? http://www.mail-archive.com/openssl-dev@openssl.org/msg13520.html Is there any risk with increasing this to 4096 bytes? Thank you.

Support for ECDH-RSA cipher suites in 0.9.8

2011-11-05 Thread John Foley
None of the ECDH-RSA cipher suites appear to work in 0.9.8r. Yet they work in 1.0.0. Is this expected? Looking at s3_lib.c, all the older DH-RSA cipher suites are disabled (SSL_CIPHER-valid=0). But the ECDH-RSA ciphers listed in s3_lib.c are enabled. This leads to the following questions: 1.

IPv6 support with OCSP

2011-09-22 Thread John Foley
Does the OpenSSL OCSP stack support IPv6 in version 0.9.8r? __ OpenSSL Project http://www.openssl.org User Support Mailing Listopenssl-users@openssl.org Automated List Manager

ECDH-RSA key exchange support (rfc 4492)

2011-08-12 Thread John Foley
Is there a known bug with ECDH_RSA key exchange cipher suites in 0.9.8r? For instance, using cipher suite ECDH-RSA-AES128-SHA in 0.9.8r does not work. But it does work in 1.0.0d. This is tested using the following command: ssltest -tls1 -cert servercert.pem -key serverkey.pem -cipher

FIPS statically linked canister

2011-04-12 Thread John Foley
Section 4.2.1 of the FIPS User Guide states... Per the conditions of the FIPS 140­2 validation only two configuration commands may be used: ./config fipscanisterbuild or ./config fipscanisterbuild no­asm However, section 4.2.2 states... Note that fipscanister.o can either be