On Thu, Jul 23, 2009 at 12:51:53PM +0200, Dr. Stephen Henson wrote:

> Yes in FIPS mode non-compliant ciphersuites are disabled and so should never
> be seen. If there is some way to use them which is triggering this in
> unmodified OpenSSL 0.9.8k I'd like to know what it is as that's a bug which
> should be fixed.

I have not seen the wpa_supplicant changes in question (but would be
interested in them if the author would be willing to open source them),
so I cannot be sure on what is happening here, but this sounds like
non-TLS use of MD5 for some other WPA use case (e.g., EAPOL-Key
integrity check when using TKIP). EAP-TLS (and PEAP/TTLS/FAST for that
matter) do not allow SSLv2 or SSLv3 to be used and wpa_supplicant
enables only TLSv1 for them.

As far as the non-TLS options are concerned, I would suggest using WPA2
with CCMP in order to get rid of some MD5 uses. I would be surprised if
you could make the end pass whatever criteria FIPS has unless you do
this.

-- 
Jouni Malinen                                            PGP id EFC895FA
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to