According to the comments from http://www.mail-archive.com/openssl-users@openssl.org/msg58912.html <http://www.mail-archive.com/openssl-users@openssl.org/msg58912.html>,
We should use EVP_Signxxx/EVP_Verifyxxx in FIPS mode.

I verified that if both SSHD and SSH are running in FIPS mode, and both are using EVP_Signxxx/EVPVerifyxxx,
then the verifications were successful.

However, the following scenario would fail in the signature verification,

For Server authentication (assume RSA key pair is used) - at the end of Key Exchange

SSHD (running in Non-FIPS mode) uses RSA_sign() to sign the signature
SSH (running in FIPS mode) use EVP_Verifyxxx() to verify SSHD's signature ==> incorrect signature


For Client authentication (assume RSA key pair is used) - after entering the passphrase

SSH (running in FIPS mode) use EVP_Signxxx() to sign the signature
SSHD (running in Non-FIPS mode) uses RSA_public_decrypt() ==> incorrect signature (hash mismatch)


Is it the normal behavior with expecting verification error? And why is it occurring?

Thanks,
Hai-May

Reply via email to