Kyle Hamilton wrote:
 On Mon, Mar 2, 2009 at 1:49 PM, Dr. Stephen Henson
 <st...@openssl.org> wrote:
> ... The set of FIPS comparible ciphersuites is represented by the
> string "FIPS".
>
> In FIPS mode you cannot select any other ciphersuites: non FIPS
> ciphersuites are disabled.

 Would it make any sense to allow an administrator to attempt to
 ensure FIPS-compliant mode via the use of the "FIPS" protocol string,
 making it an error if the library is not in FIPS mode?

Ummm, I'd say no. I've found the FIPS designation handy for checking to see if applications work with FIPS compatible algorithms, without being in FIPS mode or using validated software. Ironically I was doing that very check on a DoD web server just as your message arrived.

Note that while procurement of FIPS validated software is formally mandated in DoD, compliance is spotty. But even where non-validated crypto is used the FIPS compatible algorithms should still be utilized. Compliance in that regard is better, though still far from universal. I configure all crypto I work on for my DoD clients to use only the FIPS compatible algorithms. If nothing else that will ease an eventual transition to validated software.

 In FIPS mode, can specific FIPS-validated ciphers be enabled or
 disabled after the "FIPS" protocol string is provided?

Yes, and I'd argue that is as it should be. The "FIPS" label in that context is just shorthand for a set of algorithms.

-Steve M.

--
Steve Marquess
Veridical Systems, Inc.
marqu...@veridicalsystems.com




______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to