Thanks for your prompt response . Do you have the name of the patch to share
with us?

Thanks
Anamitra


On 2/23/11 1:42 PM, "Dr. Stephen Henson" <st...@openssl.org> wrote:

> On Wed, Feb 23, 2011, anmajumd wrote:
> 
>> 
>> We recently built  FIPS compliant openssl 0.9.8q. Earlier we were using
>> 0.9.8l . With ssh binaries linked to FIPS compliant OpenSSL 0.9.8q, when
>> running the OpenSSH client, connection setup fails during verification of
>> the server key. 
>> We did not not run into this SSH issue with 0.9.8l. Has anything  changed
>> between 0.9.8l and 0.9.8q that would cause this?
>> 
>> The call to OpenSSL that ultimately fails is RSA_public_decrypt().  Has it
>> somehow been tightened up .
>> 
> 
> Yes, you aren't allowed to call RSA_public_decrypt() directly in FIPS mode:
> instead you have to use the EVP interface for EVP_Verify*(). There is a patch
> which changes the ssh code to use EVP instead (while still being compatible
> with other versions of OpenSSL).
> 
> Due to a bug the restriction wasn't enforced in some versions of OpenSSL.
> 
> Steve.
> --
> Dr Stephen N. Henson. OpenSSL project core developer.
> Commercial tech support now available see: http://www.openssl.org
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           majord...@openssl.org

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to