Mark Phalan wrote:
 ...

> As you noted the incorporation of fipscanister.o in a FIPS capable
> OpenSSL displaces the corresponding FIPS allowed algorithms of the
> latter.  While we retain functional equivalence (goal 1 above) any
> platform optimizations or other improvements of the newer
> implementations are lost.  The nature of this interface is such
> that we can't easily avoid this displacement within the constraints
>  of the existing fipscanister.o interface and 0.9.8 versioning
> rules.

 Do you think delivering two versions of libcrypto in this case is a
 reasonable workaround?

It's the simplest solution in your case, even though it's the outcome our design hoped to avoid.

> I should also note that developments in FIPS 140-2 testing
> requirements for 2010 mean that even the existing v1.2 module will
> no longer be compliant.  The commercial vendors who have been
> obtaining "private label" validations based on v1.2 will find that
> those validations will no longer be rubber stamp formalities as is
> the case today.

 Can you point me to more information about this? Does this mean that
 delivering a FIPS Capable OpenSSL (v1.2) as part of an OS will be
 essentially worthless to users of that OS in 2010?

Well, I have a mixed track record in forecasting future CMVP actions so take my speculations accordingly.

The CMVP typically does not revoke or invalidate extant validations simply because the criteria for new validations have changed (though I should note past OpenSSL FIPS Object Module validations have been effectively revoked). So presumably the current #1051 validation will remain in effect through 2010 for those electing to use it directly. Emphasis on presumably, as the OpenSSL open source based validations are *not* typical. So assuming you base your deliverables on already awarded validated products you *should* be OK.

However, it has been common practice for vendors to take the same v1.2 source code and documentation and obtain their own copy-cat or "private label" validation. There are a number of practical and marketing reasons why such duplicate validations are desirable (minimizing the risk of exposure to the fate of validations #642 and #733 being first and foremost). Those copy-cat validations will no longer be possible with the as-is v1.2 source.

At one point in time we thought that we would have, though sponsorships brokered by the Open Source Software Institute, long term funding for an ongoing series of periodic (annual or semi-annual) "rolling" validations. That would have maintained availability of a reasonably current product for direct use or as a model for private label use, and would also have allowed us to work in the desired architectural changes over several validations. Unfortunately that prospect fell through and at this point we have no plans for any future validations.

Private label validations will continue but will require increasing amounts of modification to the v1.2 source code and documentation as the validation requirements are extended. We could merge those changes back into the shared baseline code and docs, but to date we have received very few contributions of that sort. So what is currently a community resource will gradually revert back to a roll-your-own situation, same as it was before the first open source based validation.

-Steve M.

--
Steve Marquess
The OpenSSL Software Foundation, Inc.
1829 Mount Ephraim Road
Adamstown, MD  21710
USA
+1 877-673-6775
marqu...@opensslfoundation.com
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       openssl-dev@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to