Re: FIPS support with shared libraries on FreeBSD 9.1

2013-11-07 Thread Girish
I am facing the same issue and getting same error on FreeBED 9.1 as below.

FIPS routines:FIPS_check_incore_fingerprint:fingerprint does not
match:fips.c:232:  

 Only thing different is I am using openssl-fips-2.0.5. Did anyone get
solution for this problem?

--Girish



--
View this message in context: 
http://openssl.6102.n7.nabble.com/FIPS-support-with-shared-libraries-on-FreeBSD-9-1-tp44123p47256.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


RE: ssl handshake failure in 1.0.1 but not 1.0.0

2013-11-07 Thread Krzysztof Kwiatkowski

Do you still see an error if you specify one cipher? f.e. AES256-SHA?

On 2013-11-07 22:26, Dave Thompson wrote:

From: owner-openssl-users On Behalf Of Viktor Dukhovni
Sent: Thursday, November 07, 2013 11:02



On Thu, Nov 07, 2013 at 12:29:13PM +, Ben Arnold wrote:

> I am using SSL_CTX_set_client_cert_cb to provide the client
> certificate when needed.  I have a problem in that OpenSSL 1.0.1e
> does not trigger this callback for all websites that I expect it
> to, only some.  Instead on the failing sites there is an SSL
> handshake failure after the client verifies the server 
certificate:


You can test with s_client(1) and compare results.  Is your client
certificate an RSA certificate?  How many bits of public key?  Is
its signature SHA1 or SHA256?

OP's log shows protocol hasn't reached the CertReq -> ClientCert 
steps
so at this point nothing about the client cert should matter. (And in 
any
case the signature *on* the cert is by the CA key, unless it's self 
signed,
in which case using it for client-auth would be really silly. From 
the log,
unless OP "fixed" it, the server cert looks like a DIY CA, and if 
someone

does that for the server I would expect it for clients also.)

To OP: is the logged server cert info true? I note the log shows
the client verification of the server failed; did this website give 
you

a "custom" root to trust and did you simply not set that up
(or perhaps not in the environment you're testing in)?

> SSL read: error:140940E5:SSL routines:SSL3_READ_BYTES:ssl 
handshake

> failure, errno 0
>
> Interestingly if I compile against 1.0.0k then there is no failure
> and the callback *is* triggered for all sites (that I have tried
> so far anyway).

Sounds like a problem with TLSv1.2.  If your client certificate is
only 512-bits it may not be wide enough to sign a SHA384 digest,
or some other TLSv1.2 parameter issue.


Client hasn't even selected the cert yet. And although I agree
a PCAP is better in general than a less-complete program log,
just looking at the headers in the log you can see the client
offered TLSv1.2 (0303) but the server only accepted TLSv1 (0301)
so there definitely isn't any SHA-2 issue.

But something else related to TLSv1.2 does seem likely. Possibly
the new larger size (as OP observed), or the new extensions,
although the initial negotiation apparently worked fine with both.


Attaching a PCAP file of the traffic is much more useful than hex
packet dumps.  Capture the traffic with "tcpdump -s0 -w file ..."
and look with "wireshark -r file".  If you don't understand the
wireshark output, post the (binary) PCAP file containing just one
failed TLS handshake, perhaps also a PCAP file with a succesful
TLS handshake.

I do notice the second ClientHello -- in response to server request 
--

using 1.0.1 re-offers TLSv1.2. I thought it was good practice when
we know the server has previously rejected something not to re-offer 
it,
but I don't recall where I saw this and I might well be wrong. Even 
so

the server should negotiate down (as it did initially) or at minimum
send an alert, not just close.

To OP: If you can try to reproduce with s_client default (which is
TLSv1.2 or less) and again specifying -tls1 (or -no_tls1_2 
-no_tls1_1).

That might narrow it down pretty close.




__
OpenSSL Project 
http://www.openssl.org
User Support Mailing List
openssl-users@openssl.org
Automated List Manager   
majord...@openssl.org

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


RE: ssl handshake failure in 1.0.1 but not 1.0.0

2013-11-07 Thread Dave Thompson
> From: owner-openssl-users On Behalf Of Viktor Dukhovni
> Sent: Thursday, November 07, 2013 11:02

> On Thu, Nov 07, 2013 at 12:29:13PM +, Ben Arnold wrote:
> 
> > I am using SSL_CTX_set_client_cert_cb to provide the client
> > certificate when needed.  I have a problem in that OpenSSL 1.0.1e
> > does not trigger this callback for all websites that I expect it
> > to, only some.  Instead on the failing sites there is an SSL
> > handshake failure after the client verifies the server certificate:
> 
> You can test with s_client(1) and compare results.  Is your client
> certificate an RSA certificate?  How many bits of public key?  Is
> its signature SHA1 or SHA256?
> 
OP's log shows protocol hasn't reached the CertReq -> ClientCert steps 
so at this point nothing about the client cert should matter. (And in any 
case the signature *on* the cert is by the CA key, unless it's self signed,
in which case using it for client-auth would be really silly. From the log,
unless OP "fixed" it, the server cert looks like a DIY CA, and if someone 
does that for the server I would expect it for clients also.)

To OP: is the logged server cert info true? I note the log shows 
the client verification of the server failed; did this website give you 
a "custom" root to trust and did you simply not set that up 
(or perhaps not in the environment you're testing in)?

> > SSL read: error:140940E5:SSL routines:SSL3_READ_BYTES:ssl handshake
> > failure, errno 0
> >
> > Interestingly if I compile against 1.0.0k then there is no failure
> > and the callback *is* triggered for all sites (that I have tried
> > so far anyway).
> 
> Sounds like a problem with TLSv1.2.  If your client certificate is
> only 512-bits it may not be wide enough to sign a SHA384 digest,
> or some other TLSv1.2 parameter issue.
> 
Client hasn't even selected the cert yet. And although I agree 
a PCAP is better in general than a less-complete program log,
just looking at the headers in the log you can see the client 
offered TLSv1.2 (0303) but the server only accepted TLSv1 (0301) 
so there definitely isn't any SHA-2 issue.

But something else related to TLSv1.2 does seem likely. Possibly 
the new larger size (as OP observed), or the new extensions,
although the initial negotiation apparently worked fine with both.

> Attaching a PCAP file of the traffic is much more useful than hex
> packet dumps.  Capture the traffic with "tcpdump -s0 -w file ..."
> and look with "wireshark -r file".  If you don't understand the
> wireshark output, post the (binary) PCAP file containing just one
> failed TLS handshake, perhaps also a PCAP file with a succesful
> TLS handshake.
> 
I do notice the second ClientHello -- in response to server request -- 
using 1.0.1 re-offers TLSv1.2. I thought it was good practice when 
we know the server has previously rejected something not to re-offer it,
but I don't recall where I saw this and I might well be wrong. Even so 
the server should negotiate down (as it did initially) or at minimum 
send an alert, not just close. 

To OP: If you can try to reproduce with s_client default (which is 
TLSv1.2 or less) and again specifying -tls1 (or -no_tls1_2 -no_tls1_1).
That might narrow it down pretty close. 



__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Re: sha256, was RE: SSL_set_msg_callback for application_data(23)

2013-11-07 Thread Viktor Dukhovni
On Thu, Nov 07, 2013 at 03:51:38PM -0500, Dave Thompson wrote:

> To support the (four original) SHA-2 hashes as such, yes.
> But: if you want to sign (and I think verify?) SHA2 and DSA or ECDSA, 
> you need the new signature/hash mechanism in 1.0.0, and if 
> you want TLSv1.2 suites using HMAC-SHA256/384 you need 1.0.1.

Furthermore, with OpenSSL 0.9.8, SSL_library_init() does not enable
the SHA2 digests.  You need OpenSSL_add_all_algorithms() or a
suitable subset for that.

So SSL/TLS applications based on 0.9.8 can't generally handle SHA2
digests in peer certificates.

-- 
Viktor.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


RE: sha256, was RE: SSL_set_msg_callback for application_data(23)

2013-11-07 Thread Patetta, Nicholas
Yes, I need to sign and verify so 1.0.0 or 1.0.1 even better.  Thanks so much 
for the info.

-Original Message-
From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of Dave Thompson
Sent: Thursday, November 07, 2013 3:52 PM
To: openssl-users@openssl.org
Subject: sha256, was RE: SSL_set_msg_callback for application_data(23)

To support the (four original) SHA-2 hashes as such, yes.
But: if you want to sign (and I think verify?) SHA2 and DSA or ECDSA, you need 
the new signature/hash mechanism in 1.0.0, and if you want TLSv1.2 suites using 
HMAC-SHA256/384 you need 1.0.1.

> -Original Message-
> From: owner-openssl-us...@openssl.org [mailto:owner-openssl-
> us...@openssl.org] On Behalf Of Martin Hecht
> Sent: Thursday, November 07, 2013 07:20
> To: openssl-users@openssl.org
> Subject: Re: SSL_set_msg_callback for application_data(23)
>
> openssl >= 0.9.8
>
> On 06.11.2013 17:08, Patetta, Nicholas wrote:
> > Anyone know which version of OPENSSL is needed to support SHA256?


__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


RE: How do I sign an input using the V2.1 and not V1.5 version

2013-11-07 Thread Dave Thompson
If you mean the RSA-PSS scheme that was added in PKCS#1 v2.1, that isn't
supported by rsautl.

Try pkeyutl with -pkeyopt rsa_padding_mode:pss .

 

Remember that the PKCS#1 v2.1 standard still includes the original (v1_5)
and OAEP schemes 

which rsautl does support.

 

The man page and usage message for rsautl both say the default is -pkcs
meaning the v1_5 scheme.

 

 

From: owner-openssl-us...@openssl.org
[mailto:owner-openssl-us...@openssl.org] On Behalf Of Ameet Lann
Sent: Thursday, November 07, 2013 10:14
To: 'openssl-users@openssl.org'
Subject: *** Spam *** How do I sign an input using the V2.1 and not V1.5
version

 

Hi,

We are trying to work with the openssl with the v2.1 and not the v1.5 from
the command line. 

 

But it is not documented anywhere how to tell the openssl to work with one
version or the other. 

 

For example we run the command:

openssl rsautl -sign in sha256.bin -out signature.bin -inkey my_key.pem

 

But we have no idea what version is used in doing this operation.

 

So can you help us.

 

Best regards,

Ameet Lann

 

 



sha256, was RE: SSL_set_msg_callback for application_data(23)

2013-11-07 Thread Dave Thompson
To support the (four original) SHA-2 hashes as such, yes.
But: if you want to sign (and I think verify?) SHA2 and DSA or ECDSA, 
you need the new signature/hash mechanism in 1.0.0, and if 
you want TLSv1.2 suites using HMAC-SHA256/384 you need 1.0.1.

> -Original Message-
> From: owner-openssl-us...@openssl.org [mailto:owner-openssl-
> us...@openssl.org] On Behalf Of Martin Hecht
> Sent: Thursday, November 07, 2013 07:20
> To: openssl-users@openssl.org
> Subject: Re: SSL_set_msg_callback for application_data(23)
> 
> openssl >= 0.9.8
> 
> On 06.11.2013 17:08, Patetta, Nicholas wrote:
> > Anyone know which version of OPENSSL is needed to support SHA256?


__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


How do I sign an input using the V2.1 and not V1.5 version

2013-11-07 Thread Ameet Lann
Hi,
We are trying to work with the openssl with the v2.1 and not the v1.5 from the 
command line.

But it is not documented anywhere how to tell the openssl to work with one 
version or the other.

For example we run the command:
openssl rsautl -sign in sha256.bin -out signature.bin -inkey my_key.pem

But we have no idea what version is used in doing this operation.

So can you help us.

Best regards,
Ameet Lann




RE: about openldap client ssl

2013-11-07 Thread Robbie Mingfu Zhang

Hi:

When I use SSL authentication in LDAP client, If I set the "TLSVerifyClient 
demand" on openldap server side, then I'll got below error

(set TLSVerifyClient as never/allow/try, I can login, but will have 
authentication failure in LDAP log)

LS trace: SSL3 alert write:fatal:handshake failure
TLS trace: SSL_accept:error in SSLv3 read client certificate B
TLS trace: SSL_accept:error in SSLv3 read client certificate B
TLS: can't accept: error:140890C7:SSL routines:SSL3_GET_CLIENT_CERTIFICATE:peer 
did not return a certificate.
527b9a89 connection_read(16): TLS accept failure error=-1 id=1028, closing
527b9a89 connection_close: conn=1028 sd=16

Server config:
TLSCipherSuite   HIGH:MEDIUM:+SSLv2:+SSLv3
TLSCACertificateFile /opt/etc/openldap/cert/CA.crt
TLSCertificateFile /opt/etc/openldap/cert/ldap1.test.com.crt
TLSCertificateKeyFile /opt/etc/openldap/cert/ldap1.test.com.key
TLSVerifyClient demand

Client config:
uri  ldaps://ldap1.test.com:636
bind_policy soft
ldap_version 3
base dc=test,dc=com
TLS_CACERT/opt/etc/openldap/CA.crt
TLS_CERT  /opt/etc/openldap/ldap1.test.com.crt
TLS_KEY   /opt/etc/openldap/ldap1.test.com.key
TLS_REQCERT demand

Any idea from you?


about openldap client ssl

2013-11-07 Thread Robbie Mingfu Zhang
Hi:

If I set the "TLSVerifyClient demand" on openldap server side, then I'll got 
below error

(set TLSVerifyClient as never/allow/try, I can login, but will have 
authentication failure in LDAP log)

LS trace: SSL3 alert write:fatal:handshake failure
TLS trace: SSL_accept:error in SSLv3 read client certificate B
TLS trace: SSL_accept:error in SSLv3 read client certificate B
TLS: can't accept: error:140890C7:SSL routines:SSL3_GET_CLIENT_CERTIFICATE:peer 
did not return a certificate.
527b9a89 connection_read(16): TLS accept failure error=-1 id=1028, closing
527b9a89 connection_close: conn=1028 sd=16

Server config:
TLSCipherSuite   HIGH:MEDIUM:+SSLv2:+SSLv3
TLSCACertificateFile /opt/etc/openldap/cert/CA.crt
TLSCertificateFile /opt/etc/openldap/cert/ldap1.test.com.crt
TLSCertificateKeyFile /opt/etc/openldap/cert/ldap1.test.com.key
TLSVerifyClient demand

Client config:
uri  ldaps://ldap1.test.com:636
bind_policy soft
ldap_version 3
base dc=test,dc=com



Re: Read keys written with PEM_write_RSAPublicKey(), via command-line

2013-11-07 Thread Dimitrios Apostolou

On Thu, 7 Nov 2013, Dr. Stephen Henson wrote:

On Thu, Nov 07, 2013, Dimitrios Apostolou wrote:



how can I read the details of a public key written by
PEM_write_RSAPublicKey()? I have tried all the "openssl pkey" and
"openssl rsa" combinations without much success, unfortunately.



If possible you should use PEM_write_RSA_PUBKEY instead.

Otherwise for OpenSSL 1.0.0 and later you can use the (currently undocumented:
about to fix that) -RSAPublicKey_in option.



It works:

openssl rsa  -in $FILENAME -pubin -RSAPublicKey_in -text

Dear Steve, you're a lifesaver. Thanks!

Dimitris

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Re: ssl handshake failure in 1.0.1 but not 1.0.0

2013-11-07 Thread Viktor Dukhovni
On Thu, Nov 07, 2013 at 12:29:13PM +, Ben Arnold wrote:

> I am using SSL_CTX_set_client_cert_cb to provide the client
> certificate when needed.  I have a problem in that OpenSSL 1.0.1e
> does not trigger this callback for all websites that I expect it
> to, only some.  Instead on the failing sites there is an SSL
> handshake failure after the client verifies the server certificate:

You can test with s_client(1) and compare results.  Is your client
certificate an RSA certificate?  How many bits of public key?  Is
its signature SHA1 or SHA256?

> SSL read: error:140940E5:SSL routines:SSL3_READ_BYTES:ssl handshake
> failure, errno 0
> 
> Interestingly if I compile against 1.0.0k then there is no failure
> and the callback *is* triggered for all sites (that I have tried
> so far anyway).

Sounds like a problem with TLSv1.2.  If your client certificate is
only 512-bits it may not be wide enough to sign a SHA384 digest,
or some other TLSv1.2 parameter issue.

Attaching a PCAP file of the traffic is much more useful than hex
packet dumps.  Capture the traffic with "tcpdump -s0 -w file ..."
and look with "wireshark -r file".  If you don't understand the
wireshark output, post the (binary) PCAP file containing just one
failed TLS handshake, perhaps also a PCAP file with a succesful
TLS handshake.

-- 
Viktor.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Problem with TLS 1.2 client

2013-11-07 Thread Krzysztof Kwiatkowski
Hello,

I'm having quite weird problem with openssl (head version). I'm doing
following test:

Step 1:
./openssl s_client -connect some.server.org:443 -cipher "DEFAULT"

I'm getting following error:
CONNECTED(0003)
140453250619072:error:140790E5:SSL routines:ssl23_write:ssl handshake
failure:s23_lib.c:177:

In the tcpdump I see that ClientHello is sent and then server closes
connection (FIN, FIN-ACK, ACK)

Then I try
./openssl s_client -connect some.server.org:443 -cipher "ALL"
This works perfectly, I get certificate & following session details:
Protocol  : TLSv1.2
Cipher: DHE-RSA-AES256-GCM-SHA384

As you can see above, server accepts cipher DHE-RSA-AES256-GCM-SHA384.
But when I try to specify this cipher on command line:
./openssl s_client -connect some.server.org:443 -cipher
"DHE-RSA-AES256-GCM-SHA384"

... again remote server closes remote connection.

Unfortunately I don't know what kind of software is running on server
side and it seems like problem is there. 
I've tried to reproduce such problem with few old versions of openssl
but with no success. Also I've checked gnutls-cli and it works OK.

Does anybody has any guess what could potentially cause this problem?

PS: my version of openssl s_client has patch for PR#2771 (the one
committed today)

Kris


__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Re: Read keys written with PEM_write_RSAPublicKey(), via command-line

2013-11-07 Thread Dr. Stephen Henson
On Thu, Nov 07, 2013, Dimitrios Apostolou wrote:

> 
> how can I read the details of a public key written by
> PEM_write_RSAPublicKey()? I have tried all the "openssl pkey" and
> "openssl rsa" combinations without much success, unfortunately.
> 

If possible you should use PEM_write_RSA_PUBKEY instead.

Otherwise for OpenSSL 1.0.0 and later you can use the (currently undocumented:
about to fix that) -RSAPublicKey_in option.

Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Read keys written with PEM_write_RSAPublicKey(), via command-line

2013-11-07 Thread Dimitrios Apostolou

Hello list,

how can I read the details of a public key written by 
PEM_write_RSAPublicKey()? I have tried all the "openssl pkey" and "openssl 
rsa" combinations without much success, unfortunately.


Thanks in advance,
Dimitris

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Re: RHEL rpm and FIPS validation

2013-11-07 Thread Robert W Weaver
Steve Marquess  wrote on 11/07/2013
09:02:05 AM:
> >   Is there a basis for asserting FIPS 140 validation with
> > openssl-0.9.8e-26.el5_9.1|(none), or must the original RPM be used?
>
> You'll need to ask Red Hat; it's their proprietary validation. From a
> quick glance it appears to be a knock-off of the open source based
> OpenSSL FIPS Object module you're probably confusing it with.

Thanks for the rapid and insightful response!

--woody

--

 Dr. Robert "Woody" GBS Cybersecurity & 
 Weaver Privacy 

 IT Security Architect  Cell: 301-524-8138  



--
Shick's Law:
There is no problem a good miracle can't solve.

Re: FIPS_mode_set wrapper not available on pre-1.0.1 versions

2013-11-07 Thread Dr. Stephen Henson
On Wed, Nov 06, 2013, Karthik Krishnamurthy wrote:

> I have an application built across various Unix flavors that uses
> OpenSSL for SSL/TLS communication. I wanted to enable FIPS mode for my
> application. But, it seems like not all OpenSSL version provides the
> FIPS_mode_set wrapper function.
> 
> Basically, I want to be able to seamlessly call FIPS_mode_set and
> based on whether the libcrypto.so that gets loaded at runtime was
> built with OPENSSL_FIPS or not, it should return 1 or 0. This is
> something that OpenSSL 1.0.1 and later provides due to the presence of
> FIPS_mode_set wrapper available in o_fips.c. How could I achieve
> something like this in older OpenSSL versions?
> 
> One obvious way is to dlopen the OpenSSL library and then later dlsym
> FIPS_mode_set. Is there another way to accomplish this?
> 

FIPS_mode_set is only present in FIPS capable versions of OpenSSL 0.9.8:
there it is implemented in the validated module itself.

OpenSSL versions of OpenSSL 1.0.1 and later always include an FIPS_mode_set
function but it just returns an error if OpenSSL isn't FIPS capable.

So without modifying OpenSSL dlopen/dlsym would work on other versions of
OpenSSL.

Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


FIPS_mode_set wrapper not available on pre-1.0.1 versions

2013-11-07 Thread Karthik Krishnamurthy
I have an application built across various Unix flavors that uses
OpenSSL for SSL/TLS communication. I wanted to enable FIPS mode for my
application. But, it seems like not all OpenSSL version provides the
FIPS_mode_set wrapper function.

Basically, I want to be able to seamlessly call FIPS_mode_set and
based on whether the libcrypto.so that gets loaded at runtime was
built with OPENSSL_FIPS or not, it should return 1 or 0. This is
something that OpenSSL 1.0.1 and later provides due to the presence of
FIPS_mode_set wrapper available in o_fips.c. How could I achieve
something like this in older OpenSSL versions?

One obvious way is to dlopen the OpenSSL library and then later dlsym
FIPS_mode_set. Is there another way to accomplish this?

Thanks,
Karthik
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Re: RHEL rpm and FIPS validation

2013-11-07 Thread Steve Marquess
On 11/07/2013 08:39 AM, Robert W Weaver wrote:
> Greetings,
> 
>   Apologies if this has been covered before, but I couldn't find it in a
> search.
> 
>   I'm trying to deploy FIPS 140 validated crypto to a RHEL 5 box as part
> of a FISMA covered project.
> 
>   I think the relevant policy is
> http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp1320.pdf
> which states "The version of the RPM containing the validated module is
> version 0.9.8e-22.el5_8.3."
> 
>   The rpm has moved on, and the version the support person wants to use
> is openssl-0.9.8e-26.el5_9.1|(none) .
> 
>   Is there a basis for asserting FIPS 140 validation with
> openssl-0.9.8e-26.el5_9.1|(none), or must the original RPM be used?

You'll need to ask Red Hat; it's their proprietary validation. From a
quick glance it appears to be a knock-off of the open source based
OpenSSL FIPS Object module you're probably confusing it with.

An alternative is to use the OpenSSL FIPS Object Module 1.2 (cert #1051)
or preferably the newer 2.0 module (cert #1747). You can use either of
those to create your own RPM.

-Steve M.

-- 
Steve Marquess
OpenSSL Software Foundation, Inc.
1829 Mount Ephraim Road
Adamstown, MD  21710
USA
+1 877 673 6775 s/b
+1 301 874 2571 direct
marqu...@opensslfoundation.com
marqu...@openssl.com
gpg/pgp key: http://openssl.com/docs/0xCE69424E.asc
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Re: Is aesni-intel module required for openssl

2013-11-07 Thread Dr. Stephen Henson
On Wed, Nov 06, 2013, sarav.sars wrote:

> Is it necessary to load aesni-intel module like 'modprobe aesni-intel' ? 
> Loading this module makes no difference in openssl speed output. 
> 
> openssl speed -elapsed -evp aes-128-cbc 
> 
> before loading aesni-intel module 
> 
> type 16 bytes 64 bytes256 bytes   1024 bytes   8192
> bytes 
> aes-128-cbc 561737.40k   598685.65k   610372.15k   610802.35k  
> 611521.88k 
> 
> after loading aesni-intel module 
> 
> type 16 bytes 64 bytes256 bytes   1024 bytes   8192
> bytes 
> aes-128-cbc 563835.61k   598692.84k   608343.64k   610805.42k  
> 611524.61k 
> 

Which version of OpenSSL are you using? The latest (1.0.1) includes direct
AES-NI support in the software algorithm implementation and not via ENGINE.

You can shut off AES-NI support via the environment variable OPENSSL_ia32cap:
for example:

OPENSSL_ia32cap=~0x202 openssl speed -evp aes-128-cbc

Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


RHEL rpm and FIPS validation

2013-11-07 Thread Robert W Weaver


Greetings,

  Apologies if this has been covered before, but I couldn't find it in a
search.

  I'm trying to deploy FIPS 140 validated crypto to a RHEL 5 box as part of
a FISMA covered project.

  I think the relevant policy is
http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp1320.pdf
which states "The version of the RPM containing the validated module is
version 0.9.8e-22.el5_8.3."

  The rpm has moved on, and the version the support person wants to use is
openssl-0.9.8e-26.el5_9.1|(none) .

  Is there a basis for asserting FIPS 140 validation with
openssl-0.9.8e-26.el5_9.1|(none), or must the original RPM be used?

advTHANKSance,

--woody

--

 Dr. Robert "Woody" GBS Cybersecurity &
 Weaver Privacy

 IT Security Architect  Cell: 301-524-8138



--
Shick's Law:
There is no problem a good miracle can't solve.

Re: Seeding the PRNG failed

2013-11-07 Thread meetpraveenkumar
Did a truss on the command and see some srandom error.

kioctl(5, 22528, 0x, 0x) Err#25 ENOTTY
kioctl(5, 22528, 0x, 0x) Err#25 ENOTTY
statx("/dev/srandom", 0x0FFDC3F0, 176, 0) Err#2  ENOENT

This srandom device is currently not present. Not sure if this is causing
the seeding to fail.
If this device needs to be setup, can you please point me to where I can
find some info on how to set this up.




--
View this message in context: 
http://openssl.6102.n7.nabble.com/Seeding-the-PRNG-failed-tp47193p47215.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Re: SSL_set_msg_callback for application_data(23)

2013-11-07 Thread Martin Hecht
openssl >= 0.9.8

On 06.11.2013 17:08, Patetta, Nicholas wrote:
> Anyone know which version of OPENSSL is needed to support SHA256?  Thanks.
>
>
>
> -Original Message-
> From: owner-openssl-us...@openssl.org 
> [mailto:owner-openssl-us...@openssl.org] On Behalf Of Raullen Chai
> Sent: Tuesday, November 05, 2013 3:27 PM
> To: openssl-users@openssl.org
> Subject: SSL_set_msg_callback for application_data(23)
>
> Hi,
>
> I've noticed that a callback mechanism is provided to observe protocol 
> messages, i.e., 
> https://www.openssl.org/docs/ssl/SSL_CTX_set_msg_callback.html .
>
> However,  application_data(23)  cannot be monitored using this callback 
> function. Wondering if there is a similar callback for
> application_data(23) ?
>
> Appreciated!
> --
> --
> Best Regards
> (Raullen) Qi Chai
> __
> OpenSSL Project http://www.openssl.org
> User Support Mailing Listopenssl-users@openssl.org
> Automated List Manager   majord...@openssl.org
> __
> OpenSSL Project http://www.openssl.org
> User Support Mailing Listopenssl-users@openssl.org
> Automated List Manager   majord...@openssl.org


__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


DH parameters distributed with OpenSSL

2013-11-07 Thread Fedor Brunner
Hello,
there are two sets of DH parameters, is there a difference?

./crypto/dh/dh2048.pem
./crypto/dh/dh512.pem
./crypto/dh/dh192.pem
./crypto/dh/dh4096.pem
./crypto/dh/dh1024.pem

./apps/dh2048.pem
./apps/dh512.pem
./apps/dh4096.pem
./apps/dh1024.pem

In DH parameters in ./apps there reference to "Assigned Number for SKIP
Protocols", where can be the document downloaded?

Thanks


__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


DH parameters distributed with OpenSSL

2013-11-07 Thread Fedor Brunner
Hello,
there are two sets of DH parameters, that is the difference?

./crypto/dh/dh2048.pem
./crypto/dh/dh512.pem
./crypto/dh/dh192.pem
./crypto/dh/dh4096.pem
./crypto/dh/dh1024.pem
./apps/dh2048.pem
./apps/dh512.pem
./apps/dh4096.pem
./apps/dh1024.pem

In DH parameters in ./apps there reference to "Assigned Number for SKIP
Protocols" (http://www.skip-vpn.org/spec/numbers.html) . The site down,
where can be the document downloaded?

Thanks



signature.asc
Description: OpenPGP digital signature


RE: Is aesni-intel module required for openssl

2013-11-07 Thread Carl Young

>From 
https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Security_Guide/ch03s02s03.html

check with root running "openssl engine -c -tt"

Carl


From: owner-openssl-us...@openssl.org [owner-openssl-us...@openssl.org] on 
behalf of sarav.sars [sarav.s...@gmail.com]
Sent: 07 November 2013 05:48
To: openssl-users@openssl.org
Subject: Is aesni-intel module required for openssl

Is it necessary to load aesni-intel module like 'modprobe aesni-intel' ?
Loading this module makes no difference in openssl speed output.

openssl speed -elapsed -evp aes-128-cbc

before loading aesni-intel module

type 16 bytes 64 bytes256 bytes   1024 bytes   8192
bytes
aes-128-cbc 561737.40k   598685.65k   610372.15k   610802.35k
611521.88k

after loading aesni-intel module

type 16 bytes 64 bytes256 bytes   1024 bytes   8192
bytes
aes-128-cbc 563835.61k   598692.84k   608343.64k   610805.42k
611524.61k




--
View this message in context: 
http://openssl.6102.n7.nabble.com/Is-aesni-intel-module-required-for-openssl-tp47216.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Re: [openssl-users] Is aesni-intel module required for openssl

2013-11-07 Thread Erwann Abalea

The Linux kernel module isn't necessary for OpenSSL.

--
Erwann ABALEA

Le 07/11/2013 06:48, sarav.sars a écrit :

Is it necessary to load aesni-intel module like 'modprobe aesni-intel' ?
Loading this module makes no difference in openssl speed output.



__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Is aesni-intel module required for openssl

2013-11-07 Thread sarav.sars
Is it necessary to load aesni-intel module like 'modprobe aesni-intel' ? 
Loading this module makes no difference in openssl speed output. 

openssl speed -elapsed -evp aes-128-cbc 

before loading aesni-intel module 

type 16 bytes 64 bytes256 bytes   1024 bytes   8192
bytes 
aes-128-cbc 561737.40k   598685.65k   610372.15k   610802.35k  
611521.88k 

after loading aesni-intel module 

type 16 bytes 64 bytes256 bytes   1024 bytes   8192
bytes 
aes-128-cbc 563835.61k   598692.84k   608343.64k   610805.42k  
611524.61k 




--
View this message in context: 
http://openssl.6102.n7.nabble.com/Is-aesni-intel-module-required-for-openssl-tp47216.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org