PGNet wrote:
...

Ok.

So , e.g. (reading the UserGuide now ...), to ensure that all ssh <->
ssh comms between boxes were limited correctly to fips-only algo
usages, in "openssl.cnf", I'd specifically add:

 # Openssh section
 openssh_conf = openssh_options
 ...
 [ openssh_options ]
 alg_section = algs
 ...
 [ algs ]
 fips_mode = yes

yes?

Yes, though with a caveat: the application (OpenSSH in this instance) still begs for some source modifications to handle exceptions. For one thing the ssh_config and sshd_config files might contain illegal ciphersuite specifications at runtime. Stock OpenSSH doesn't even default to a FIPS compatible ciphersuite. The FIPS capable OpenSSL with FIPS mode enabled will reject attempts to use non-allowed algorithms, but that rejection will not necessarily occur at the appropriate place from the perspective of the end user. Worse, we (or at least I) do not know that OpenSSH correctly checks the return codes from all OpenSSL API calls; if not some very undesirable behavior could result.

Long story short, OpenSSH really needs some source mods to gracefully invoke and run in FIPS mode. Several people, myself included, have created patches to that end. Note I also specifically discuss OpenSSH in the User Guide.

Of course, if you don't plan to actually run in FIPS mode and just need buzzword compliance (often the case) then what you plan should work.

-Steve M.

--
Steve Marquess
Open Source Software institute
marqu...@oss-institute.org

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to