This should probably be clarified: The application must only use
FIPS-approved modules for all cryptography.  However, most
FIPS-approved modules cost a lot of money -- there are two that do
not, but OpenSSL is the only one available for UNIX systems that does
not, and it's the only one that can be distributed in source form.

FIPS-approved modules, once put into FIPS mode (and thus running their
internal consistency checks), will only operate with FIPS-approved
algorithms.  (Interestingly, AES-256 is NOT an approved algorithm, as
AES only specifies 128 bits.)  The modules must be used in compliance
with their security policies.  Key data (and entropy) needs to be
overwritten in non-module memory as soon as possible.  Various other
issues exist as well.

To simplify things, "All cryptography must be done using OpenSSL FIPS
functions" is the easiest way to ensure that only FIPS-approved
algorithms and modes are used.  It's short, simple, and to the point.

-Kyle H

On 4/11/06, Lyon, Jay <[EMAIL PROTECTED]> wrote:
>
>
>
> The following appears in the FIPS 140-2 Validation presentation from Linux
> World Expo. (oss-institute.org/OpenSSL/LWE_040406_BOF.pdf)
>
>
>
> Page 23: FIPS mode requirements:
>
> * The application must use only OpenSSL for all cryptography.
>
>
>
> Where can I find this in the security policy?
>
>
>
> Are there any exceptions?  What if "other crypto" is also FIPS validated?
>
>
>
> What is the purpose of the requirement?
>
>
>
>
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to