Re: OpenSSL FIPS 140-2 validation

2008-11-25 Thread joshi chandran
Hi Last release of openssl fips 1.1.2 was not allowing shared library generation of fips capable openssl 9.7m .whether openssl fips 1.2 will allow shared library generation when compiled with fips capable openssl 0.9.8j? Thanks Joshi On Thu, Nov 20, 2008 at 1:52 PM, Dr. Stephen Henson

Re: OpenSSL FIPS 140-2 validation

2008-11-25 Thread Dr. Stephen Henson
On Tue, Nov 25, 2008, joshi chandran wrote: Hi Last release of openssl fips 1.1.2 was not allowing shared library generation of fips capable openssl 9.7m .whether openssl fips 1.2 will allow shared library generation when compiled with fips capable openssl 0.9.8j? Yes it will. Steve.

Re: OpenSSL FIPS 140-2 validation

2008-11-20 Thread Dr. Stephen Henson
On Thu, Nov 20, 2008, joshi chandran wrote: Hi , I have a different requirement . I want to release openssl 0.9.8j has normal openssl release . i donot want to release fips capable openssl . if i remove the fips option in configure will it generate the normal openssl (with out fips

Re: OpenSSL FIPS 140-2 validation

2008-11-19 Thread Dr. Stephen Henson
On Tue, Nov 18, 2008, Brad House wrote: I'm pretty ignorant when it comes to FIPS, is this a limitation of the FIPS requirements itself or a limitation of OpenSSL's FIPS validation? It is a FIPS requirement. Any idea how many root CAs use MD2WithRSAEncryption or any way to work around

Re: OpenSSL FIPS 140-2 validation

2008-11-19 Thread joshi chandran
Hi , I have a different requirement . I want to release openssl 0.9.8j has normal openssl release . i donot want to release fips capable openssl . if i remove the fips option in configure will it generate the normal openssl (with out fips capabability) including all the functionality that are in

OpenSSL FIPS 140-2 validation

2008-11-18 Thread OpenSSL
Good news for developers and vendors of software for the U.S. and Canadian government market where FIPS 140-2 validated cryptography is required. The OpenSSL FIPS Object Module, a software component compatible with the OpenSSL API, has been FIPS 140-2 validated (see certificate #1051 and Security

Re: OpenSSL FIPS 140-2 validation

2008-11-18 Thread Kyle Hamilton
I dunno who I'm supposed to give feedback to, but this format of FIPS announcement needs some work. First, the subject line doesn't say anything about the version of the FIPS module that has been validated. (In this case, it should be something like OpenSSL FIPS 140-2 validation for module v1.2

Re: OpenSSL FIPS 140-2 validation

2008-11-18 Thread Dr. Stephen Henson
On Tue, Nov 18, 2008, Kyle Hamilton wrote: Second, it doesn't describe which version of the OpenSSL API that the newly-validated module supports. (in this case, it supports v0.9.8 (and requires 0.9.8i onward), but I dunno about 0.9.7?) Providing compatibility with a version bump in the API

Re: OpenSSL FIPS 140-2 validation

2008-11-18 Thread Brad House
Second, it doesn't describe which version of the OpenSSL API that the newly-validated module supports. (in this case, it supports v0.9.8 (and requires 0.9.8i onward), but I dunno about 0.9.7?) Providing compatibility with a version bump in the API is significant enough that it should be called

Re: OpenSSL FIPS 140-2 validation

2008-11-18 Thread Dr. Stephen Henson
On Tue, Nov 18, 2008, Brad House wrote: Second, it doesn't describe which version of the OpenSSL API that the newly-validated module supports. (in this case, it supports v0.9.8 (and requires 0.9.8i onward), but I dunno about 0.9.7?) Providing compatibility with a version bump in the API is

Re: OpenSSL FIPS 140-2 validation

2008-11-18 Thread Brad House
Finally, I'm getting X509_V_ERR_CERT_SIGNATURE_FAILURE errors when in fips mode during SSL negotiation, but the same binary, simply telling it via a config setting not to enter fips mode, works fine. This is to ssl3.vitalps.net:5003, specifically, but I don't have any reason to believe other

RE: OpenSSL FIPS 140-2 validation

2008-11-18 Thread David Schwartz
The problem is the root CA uses MD2WithRSAEncryption as a signature algorithm and that is prohibited in FIPS mode. I'm pretty ignorant when it comes to FIPS, is this a limitation of the FIPS requirements itself or a limitation of OpenSSL's FIPS validation? The former. FIPS does not

Re: OpenSSL FIPS 140-2 validation

2008-11-18 Thread Brad House
The problem is the root CA uses MD2WithRSAEncryption as a signature algorithm and that is prohibited in FIPS mode. I'm pretty ignorant when it comes to FIPS, is this a limitation of the FIPS requirements itself or a limitation of OpenSSL's FIPS validation? The former. FIPS does not allow the