> > The problem is the root CA uses MD2WithRSAEncryption as a
> > signature algorithm
> > and that is prohibited in FIPS mode.

> I'm pretty ignorant when it comes to FIPS, is this a limitation of the
> FIPS requirements itself or a limitation of OpenSSL's FIPS validation?

The former. FIPS does not allow the use of algorithms not considered
adequately secure. A general-purpose SSL application intended to
interoperate on the Internet should not be using FIPS mode.

> Also, how do you find out the signature algorithm used for the root CA?
> I don't see it listed when trying to connect using
> openssl s_client -connect host:port -CAfile mycafile.pem

Save the cert, and do this:

openssl x509 -text < MyCertFile.pem | grep Algorithm

Make sure all the algorithms you see are FIPS-approved.

> Any idea how many root CAs use MD2WithRSAEncryption or any way to work
> around it?  It appears to be a Verisign cert ...

The workaround is not to use FIPS in an application designed to interoperate
with non-FIPS applications. The public Internet infrastructure just is not
FIPS.

Unless you have absolutely no choice, you should not attempt strict FIPS
compliance. The downsides are massive.

> -Brad

DS


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       openssl-dev@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to