Finally, I'm getting X509_V_ERR_CERT_SIGNATURE_FAILURE errors when in
fips mode during SSL negotiation, but the same binary, simply telling
it via a config setting not to enter fips mode, works fine.  This
is to ssl3.vitalps.net:5003, specifically, but I don't have any reason
to believe other addresses would be different.  This was with the
resultant 0.9.8j-pre CVS release compiled against the fipscanister from
v1.2, haven't tried with the v1.2-generated library directly.

The problem is the root CA uses MD2WithRSAEncryption as a signature algorithm
and that is prohibited in FIPS mode.

I'm pretty ignorant when it comes to FIPS, is this a limitation of the
FIPS requirements itself or a limitation of OpenSSL's FIPS validation?

Also, how do you find out the signature algorithm used for the root CA?
I don't see it listed when trying to connect using
openssl s_client -connect host:port -CAfile mycafile.pem

Any idea how many root CAs use MD2WithRSAEncryption or any way to work
around it?  It appears to be a Verisign cert ...

Thanks.

-Brad
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       openssl-dev@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to