Re: ssl teses forbidden in FIPS mode

2008-09-29 Thread David Jacobson
The Doctor wrote: On Thu, Sep 25, 2008 at 08:22:11AM -0400, Steve Marquess wrote: David Jacobson wrote: Tim Hudson wrote: The Doctor wrote: That being said, how do you get openssl to compile with FIPS and be backwards compatable at the same time? That is what the FIPS mode is for - the librar

Re: ssl teses forbidden in FIPS mode

2008-09-25 Thread Steve Marquess
The Doctor wrote: ... Note also that due to an implementation quirk you need to clear the currently set RNG when switching back into FIPS mode. It is not an implementation quirk, it is a requirement of FIPS 140. FIPS 140 requires that when switching modes all keys and "critical security parame

Re: ssl teses forbidden in FIPS mode

2008-09-25 Thread The Doctor
On Thu, Sep 25, 2008 at 08:22:11AM -0400, Steve Marquess wrote: > David Jacobson wrote: >> Tim Hudson wrote: >>> The Doctor wrote: That being said, how do you get openssl to compile with FIPS and be backwards compatable at the same time? >>> >>> That is what the FIPS mode is for - the lib

Re: ssl teses forbidden in FIPS mode

2008-09-25 Thread Steve Marquess
David Jacobson wrote: Tim Hudson wrote: The Doctor wrote: That being said, how do you get openssl to compile with FIPS and be backwards compatable at the same time? That is what the FIPS mode is for - the library built supports all algorithms and when in FIPS mode it disables the use of non-

Re: ssl teses forbidden in FIPS mode

2008-09-25 Thread David Jacobson
Tim Hudson wrote: The Doctor wrote: That being said, how do you get openssl to compile with FIPS and be backwards compatable at the same time? That is what the FIPS mode is for - the library built supports all algorithms and when in FIPS mode it disables the use of non-approved algorithms.

Re: ssl teses forbidden in FIPS mode

2008-09-23 Thread The Doctor
On Tue, Sep 23, 2008 at 06:46:31PM +0200, Dr. Stephen Henson wrote: > On Tue, Sep 23, 2008, The Doctor wrote: > > > On Tue, Sep 23, 2008 at 12:27:20PM +0200, Dr. Stephen Henson wrote: > > > On Mon, Sep 22, 2008, The Doctor wrote: > > > > > > > > > > > > > > > Apart from me, anyone else tried th

Re: ssl teses forbidden in FIPS mode

2008-09-23 Thread Dr. Stephen Henson
On Tue, Sep 23, 2008, The Doctor wrote: > On Tue, Sep 23, 2008 at 12:27:20PM +0200, Dr. Stephen Henson wrote: > > On Mon, Sep 22, 2008, The Doctor wrote: > > > > > > > > > > > Apart from me, anyone else tried the fipdso in their configuration > > > as extensively as I have? > > > > > > > The

Re: ssl teses forbidden in FIPS mode

2008-09-23 Thread The Doctor
On Tue, Sep 23, 2008 at 12:27:20PM +0200, Dr. Stephen Henson wrote: > On Mon, Sep 22, 2008, The Doctor wrote: > > > > > > > Apart from me, anyone else tried the fipdso in their configuration > > as extensively as I have? > > > > The fipsdso option isn't terribly useful for most users. To use

Re: ssl teses forbidden in FIPS mode

2008-09-23 Thread Dr. Stephen Henson
On Mon, Sep 22, 2008, The Doctor wrote: > > > Apart from me, anyone else tried the fipdso in their configuration > as extensively as I have? > The fipsdso option isn't terribly useful for most users. To use it you need a corresponding binary validated shared library installed. If you want t

Re: ssl teses forbidden in FIPS mode

2008-09-22 Thread The Doctor
On Tue, Sep 23, 2008 at 08:26:23AM +1000, Tim Hudson wrote: > The Doctor wrote: >> That being said, how do you get openssl to compile with FIPS >> and be backwards compatable at the same time? > > That is what the FIPS mode is for - the library built supports all > algorithms and when in FIPS mode

Re: ssl teses forbidden in FIPS mode

2008-09-22 Thread Tim Hudson
The Doctor wrote: That being said, how do you get openssl to compile with FIPS and be backwards compatable at the same time? That is what the FIPS mode is for - the library built supports all algorithms and when in FIPS mode it disables the use of non-approved algorithms. A single applicatio

Re: ssl teses forbidden in FIPS mode

2008-09-22 Thread Thor Lancelot Simon
On Sun, Sep 21, 2008 at 12:58:26PM +1000, Michael Gray wrote: > > > "Not Exactly"? Both TLS and SSLv3 both use SHA1 and MD5 in the PRF, which > is IMHO very cleaver as it requires both HASH functions to be broken. But, > the TLS PRF is a HMAC for both SHA1 and MD5 whereas SSLv3 is not. The > spe

Re: ssl teses forbidden in FIPS mode

2008-09-22 Thread The Doctor
On Sun, Sep 21, 2008 at 12:58:26PM +1000, Michael Gray wrote: > > > > On Sat, Sep 20, 2008 at 06:24:31AM +1000, Michael Gray wrote: > > > > > > TLS uses MD5 as well in the PRF. The PRF in SSLv3 is not a true HMAC > which > > > is a problem, but the reason for not using SSLv3 is FIPS regulation.

Re: ssl teses forbidden in FIPS mode

2008-09-22 Thread Michael Gray
> On Sat, Sep 20, 2008 at 06:24:31AM +1000, Michael Gray wrote: > > > > TLS uses MD5 as well in the PRF. The PRF in SSLv3 is not a true HMAC which > > is a problem, but the reason for not using SSLv3 is FIPS regulation. > > "Not Exactly". The TLS PRF uses *both* SHA1 and MD5, in a way which > i

Re: ssl teses forbidden in FIPS mode

2008-09-20 Thread Thor Lancelot Simon
On Sat, Sep 20, 2008 at 06:24:31AM +1000, Michael Gray wrote: > > TLS uses MD5 as well in the PRF. The PRF in SSLv3 is not a true HMAC which > is a problem, but the reason for not using SSLv3 is FIPS regulation. "Not Exactly". The TLS PRF uses *both* SHA1 and MD5, in a way which is carefully d

RE: ssl teses forbidden in FIPS mode

2008-09-19 Thread Michael Gray
> > > Is this correct for openssl 0.9.8 using FIPS? > > > > test SSL protocol > > test ssl3 is forbidden in FIPS mode > > *** IN FIPS MODE *** > > Available compression methods: > > 1: zlib compression > > SSLv3, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA > > 1 handshakes of 256 bytes d

RE: ssl teses forbidden in FIPS mode

2008-09-18 Thread David Schwartz
> Is this correct for openssl 0.9.8 using FIPS? > > test SSL protocol > test ssl3 is forbidden in FIPS mode > *** IN FIPS MODE *** > Available compression methods: > 1: zlib compression > SSLv3, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA > 1 handshakes of 256 bytes done > gmake[1]: ***