Default OpenSSL can understand and speak the cryptographic algorithms
that FIPS can validate.  This does not mean that it is FIPS validated.
 (For example, if it can accept MD5 for anything other than
establishing the premaster secret, it's not FIPS validated or even
FIPS validatable.)  This is an interoperability issue -- OpenSSL tries
to be interoperable, as much as it can.  (This is in marked contrast
to other implementations, such as Windows's up to and including Server
2003.)

FIPS validated cryptography is mandated on endpoints which handle
sensitive information by the US Federal Government (though current
practice includes "procurement", not necessarily "implementation").

You cannot claim FIPS validation at your server simply because it can
talk to FIPS-validated clients.  Your server must also be
FIPS-validated, which means that it must use a validated cryptographic
module in accordance with that module's security policy.

-Kyle H

On Thu, Feb 19, 2009 at 10:23 PM, smitha daggubati <smithad...@gmail.com> wrote:
> Hello all,
> I have a general query regarding FIPS mode. I am running an  simple openssl
> https server based on openssl that services https requests from window
> clients. I have the following setting in my windows XP "Use FIPS comliant
> algorithms for encryption, hashing and signing set to 1" .
> Using IE on a windows xp client with the above setting i am able to
> communicate with a openssl command line https server. I dont have  FIPS
> enabled on my opessl command line tool. Then how come i am able to handle
> requests from a windows machine which has the FIPS setting to 1.
>
> Now is it ok to say i am FIPS compliant on the server side becaause i am
> handling FIPS requests from clients?
>
> thanks in advance for your time.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to