Patrick Patterson wrote:
Hello Patrick:

I can't answer most of your questions, but have a question for you:

Why are you trying to make all applications FIPS? FIPS is usually only applied for a particular application (such as making a Web server that is part of a Registration Authority application handle it's keys in the FIPS required method, as required by a CP), and not for an entire host.

I've never run into a situation where you'd have to have ALL applications on a host run in FIPS mode - I've seen hosts that are required to be run in CC EAL evaluated mode, but never have all apps run in FIPS mode.

So I guess I'm just very confused about what you are trying to accomplish, and why you would ever need to do this (no-one WANTS to run in FIPS mode, it's just something that a policy MAKES us do :)

My guess is that you only have to make a very small subset of all applications work in FIPS mode to accomplish what you are trying to do, and then set up the rest of the host according to the CC EAL profile that you are trying to run at.

A quick response now and I'll circle back to Patrick's questions later as time permits.

Ground zero for FIPS 140-2 CMVP is the U.S. Federal government and the DoD where procurement of FIPS validated cryptography is (nominally) mandated *everywhere* (NSTISSIP #11 and other policy scripture). I say "nominally" because much non-validated crypto is still used in that environment in violation of that mandate. But time is running out for non-compliant applications and my DoD clients are seeing ever increasing pressure to comply.

So a means of globally enabling FIPS mode for all crypto on a host is indeed highly desirable for program managers, procurement officers, vendors, etc. in the federal government and DoD arena.

To that end Dr. Steve Henson has added a FIPS option to the OPENSSL_config function and openssl_conf configuration file. Using that mechanism an O/S distribution vendor could in principle ship one product to all customers, and those customers required to use FIPS mode could globally enable it in one swell foop without having to diddle dozens of separate configuration files.

However in practice most OpenSSL based applications will require some source code tweaks to run with FIPS mode enabled and claim compliance with the validation requirements. So far (to my knowledge) only Stunnel supports a FIPS mode off the shelf, though patches for mod_ssl and OpenSSH are in circulation. It's my hope that in time such support will be widespread and the global openssl_conf FIPS switch will be usable.

-Steve M.

--
Steve Marquess
Open Source Software Institute
marqu...@oss-institute.org

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to