> I have a general query regarding FIPS mode.

> I am running an  simple openssl https server based on openssl
> that services https requests from window clients.

Is it in FIPS mode, yes or not? If not, then you cannot claim it is FIPS 
compliant.

> I have the following setting in my windows XP "Use FIPS comliant
> algorithms for encryption, hashing and signing set to 1" .

This does exactly what it says. It forces XP system components to only use 
FIPS-compliant *algorithms*. Note that using FIPS-compliant algorithms is one 
requirement for FIPS compliance, but it is far from the only one.

> Using IE on a windows xp client with the above setting i am able to
> communicate with a openssl command line https server. I dont have
> FIPS enabled on my opessl command line tool. Then how come i am able
> to handle requests from a windows machine which has the FIPS setting to 1.

The premise on which this question is based on simply completely incorrect. 
FIPS is not a remote interrogation protocol. It's a way of ensuring that 
cryptographic algorithms, as used in an endpoint, are secure and reliable.

Everything is working because the Windows machines are certified secure and 
reliable and the server hasn't failed. That's all that's required for things to 
work.

My bank can have the best security in the world, and I can write my ATM pin on 
my card and leave it at the local McDonald's. The bank can be super secure and 
can still interoperate with morons.

> Now is it ok to say i am FIPS compliant on the server side becaause i
> am handling FIPS requests from clients?

No. A FIPS-compliant endpoint will not use non-FIPS-allowed algorithms. But 
there is much more to FIPS-compliance than simply using only permitted 
algorithms.

DS


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to