rajan chittil wrote:
... .I have seen in some fips enabled library, if one application gets into fips mode , whole library will be in fips mode and all the application in the system will be in fips mode.

That would be a strange library.

is this true for openssl ? Is the fips enabled at system level or application .
The OpenSSL FIPS Object Module v1.2 (fipscanister.o) is an object module, i.e. static code. It remains entirely private to the process that contains it, and so what that process does with it can't affect other processes.

If you embed fipscanister.o in a shared library, as most will do and as is done automatically when building a "FIPS capable" OpenSSL distribution, then it behaves like a shared library. The read-only data and code are shared by all applications on the system that map that library. The private copies of writable data belong to the respective processes that map and make calls to the library, and again what one process does with the API has absolutely no effect on other processes.

That said...

At this point in time the people who worry about FIPS 140 validated products at all generally think only in terms of achieving "buzzword compliance" for specific applications. By "buzzword compliance" I mean that in practice the emphasis is almost exclusively on establishing paperwork compliance with policy requirements mandating acquisition of validated products, in order to market (as a vendor) or procure (as a program manager) a specific product. Considerations of actually *running* said products in FIPS mode are generally very secondary or absent. Likewise consideration of cryptography not singled out for scrutiny as requiring FIPS validation (e.g. kernel crypto, well known products using crypto in apparently incidental ways) is minimal. As an exercise for the reader, take a poll of the ciphersites accepted by many government and DoD web servers today which indicate that said servers obviously can't be in FIPS mode. I've long been amused by the fact that *none* of the HTTPS proxies I've seen that are proliferating throughout the U.S. DoD enforce use of FIPS compatible ciphers. FIPS validation for now is a paper chase, not an operational reality.

But, in anticipation of a future time when FIPS mode might become an operational reality we designed the OpenSSL FIPS Object Module to potentially support a system-wide global FIPS mode switch. If all the applications on a system use a FIPS capable OpenSSL library, and if all those applications use the OPENSSL_config() call, then FIPS mode could be enabled for all such applications in one fell swoop by appropriate options in the system-wide openssl_conf file. System vendors could also ship the same binary code to all customers, with only those customers desiring FIPS mode changing that global configuration to enable it.

That may happen someday, but for now it's just one application at a time.

-Steve M.

--
Steve Marquess
Open Source Software institute
marqu...@oss-institute.org

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to