William A. Rowe Jr. wrote:
> On 7/9/2010 9:05 AM, Steve Marquess wrote:
>   
>> Mark Parr wrote:
>>     
>>> Use of the FIPS OpenSSL is a mandated thing and not just something that we
>>> are looking to do for the fun of it.  In fact, the base OpenSSL was working
>>> fine using the "FIPS AES 256 encryption" in a non "FIPS Certified" mode.
>>>
>>> ...
>>>       
>> Yes, that was my assumption and the point I was trying to make: if you
>> want to build your product from source in a clean and logical way then
>> just leave the FIPS module creation out of it.  You will suffer less
>> hair-pulling and tooth gnashing.  If you must use the FIPS validated
>> module then IMHO your best approach is to build the validated module
>> *once*, by hand with careful documentation, and henceforth just use that
>> resulting validated binary. 
>>
>> Otherwise you're trying to perform what is effectively a ritual ceremony
>> in an inappropriate secular context:  from the CMVP perspective the
>> source code itself isn't validated, only the resulting binary when the
>> specific peculiar build process has been followed, i.e. the "ritual". 
>> Perform that ritual once and you have one validated module that you can
>> use many times -- perform it multiple times and you have multiple
>> different validated modules.
>>
>> Or, here's another way to look at it.  I can take the same source code
>> and generate binaries two different ways, one by following the ritual
>> and one by deviating from the ritual in some technically trivial way
>> (by, say, adding a superfluous "--prefix" config option).  The resulting
>> binaries are functionally identical by any technical test that could be
>> devised, yet one module is FIPS 140-2 validated and one isn't.
>>     
>
> That isn't to say that it can't be rpm'ed, and the infrequently updated
> fips canister (currently v1.2) can't be 'the dependency' for building
> openssl-fips.
>   

A good suggestion and one I should have spelled out:  build the FIPS
module by hand, stick the resulting binary in its own special RPM which
won't (and can't) change until a new validation is available.  Build
your application(s) -- including the "FIPS compatible" OpenSSL libraries
-- the usual way in their own RPMs having a dependency on the special
invariant FIPS module RPM.  I don't see much point in trying to do the
FIPS module build from source via a spec file, though.

-Steve M.

-- 
Steve Marquess
OpenSSL Software Foundation, Inc.
1829 Mount Ephraim Road
Adamstown, MD  21710
USA
+1 877-673-6775
marqu...@opensslfoundation.com
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to