I am trying to test the Fips capable openssl and when i am testing it i am
getting some error

openssl req -x509 -newkey rsa:2048 -out $HOME/exampleca/cacert.pem -outform
PEM

Generating a 2048 bit RSA private key
....................................................................................+++
......+++
writing new private key to '//exampleca/private/cakey.pem'
Enter PEM pass phrase:
Verifying - Enter PEM pass phrase:
-----
digest.c(150): OpenSSL internal error, assertion failed: Digest update
previous FIPS forbidden algorithm error ignored
IOT/Abort trap(coredump)

There is another error also when i am issuing the smime command

Data Base Updated
openssl smime -encrypt -in /server_req/mail.txt -des3 -out
/server_req/mail.enc /exampleca/certs/01.pem

in smime command
Enter pass phrase for /server_req/server_priv_key.pem:
unable to load signing key file
704646:error:0608008D:digital envelope routines:EVP_DigestInit:disabled for
fips:digest.c:237:
704646:error:06065064:digital envelope routines:EVP_DecryptFinal:bad
decrypt:evp_enc.c:509:
704646:error:0906A065:PEM routines:PEM_do_header:bad decrypt:pem_lib.c:423:


Does this means that this function (EVP_DigestInit)  is not supported by
fips mode

Please help me

Thanks

Joshi

On Thu, Sep 25, 2008 at 5:55 AM, Steve Marquess
<[EMAIL PROTECTED]>wrote:

> David Schwartz wrote:
> > In many cases, FIPS actually results in (you might reasonably think, at
> least) reduced security. ...
> >
> > C) Quasi-FIPS. All FIPS rules are followed, except where it is genuinely
> believed that these rules reduce security or are unreasonably impractical.
> For example, obvious bugfixes might be allowed, even if the code hadn't been
> re-FIPS checked. In the case of OpenSSL, you might allow changes to
> optimization or code generation flags. An "obviously correct" optimized SHA1
> algorithm might be used, even if it hasn't been approved yet. (Or if it
> wasn't selected for the platform due to a detection bug.)
> >
> IMHO it's hard to argue that FIPS *validated* software isn't clearly
> less secure in a real world sense, simply due to the fact that the
> validation process by its very nature provides heavy disincentives to
> the aggressive and proactive pursuit of suspected security vulnerabilities.
>
> Frankly you shouldn't use FIPS validated software unless specifically
> required to for formal policy compliance reasons.
>
> Use of FIPS *compliant* cryptography (strong crypto and FIPS approved
> algorithms) is another matter, but then you're not artificially
> constraining your options for identifying and correcting implementation
> vulnerabilities.
>
> -Steve M.
>
> --
> Steve Marquess
> Open Source Software institute
> [EMAIL PROTECTED]
>
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           [EMAIL PROTECTED]
>



-- 
Regards
Joshi Chandran

Reply via email to