Thanks Steve.
Is there a standard documentation, which says these are FIPS compliant
ciphers / macs / kex algorithms.

Meaning I would need to know, if aes128-cbc is FIPS compliant/ aes128-ctr
is FIPS compliant.
Similarly for macs, kex algorithms as well.



On Wed, Jul 16, 2014 at 4:47 PM, Steve Marquess-3 [via OpenSSL] <
ml-node+s6102n52085...@n7.nabble.com> wrote:

> On 07/15/2014 09:38 AM, Sadhana wrote:
>
> > Hello All,
> >
> >  I have a requirement to make Openssh FIPS compliant. It would be really
> > helpful, if you could answer the
> > below question and correct me if I am wrong.
> >
> > I also understand there is a module called as fipscanister.o is
> introduced
> > in Openssl.
> > This ensures, FIPS compliancy. This also, exposes the API FIPS_mode and
> > FIPS_set_mode.
> > We have already integrated openssl with fipscanister.o.
> >
> > Is there any way by which, Openssh  can make use of fipscanister module
> > directly?
> >
> > I understand, Openssh needs to call FIPS_mode, FIPS_set_mode to ensure
> it
> > operates in FIPS mode.
> > I understand, few of the ciphers, MACs, kex algorithms are fips
> compliant
> > and few others are not.
> > Hence, openssh code has to be modified to allow only those which are
> fips
> > compliant.
> >
> > Are there any more stuff which needs to be done?
>
> Yes. Converting an application to use the "FIPS capable" OpenSSL and
> qualify as using a FIPS 140-2 validated crypto module *can* be as simple
> as adding a FIPS_mode_set() call. However, modifying OpenSSH for FIPS
> 140-2 compliance is non-trivial as OpenSSH implements a number of
> cryptographic operations outside of OpenSSL. It's not enough that only
> cryptographic algorithms allowed by FIPS 140-2 are used, those crypto
> operations must be performed *within* a validated module.
>
> Or in other words, an application which hopes to claim to satisfy the
> USG/DoD requirements for FIPS 140-2 validated cryptography must use
> validated module(s) for all relevant cryptography. The "FIPS capable"
> OpenSSL libraries satisfy that requirement but only if OpenSSL is used
> exclusively.
>
> You can find a patch at
>
>
>
> http://opensslfoundation.com/export/openssh/openssh-6.0p1.fips-revised.patch
>
> which adapts a now obsolete version of OpenSSH to use the FIPS capable
> OpenSSL. New inlined cryptography has been added since then so I suspect
> additional non-trivial work will be necessary. I haven't been keeping
> track but other newer patches may be available elsewhere.
>
> Also note than in a U.S. DoD context you'll probably need x.509 support
> as well (this is available in patches from Roumen Petrov).
>
> -Steve M.
>
> --
> Steve Marquess
> OpenSSL Software Foundation, Inc.
> 1829 Mount Ephraim Road
> Adamstown, MD  21710
> USA
> +1 877 673 6775 s/b
> +1 301 874 2571 direct
> [hidden email] <http://user/SendEmail.jtp?type=node&node=52085&i=0>
> [hidden email] <http://user/SendEmail.jtp?type=node&node=52085&i=1>
> gpg/pgp key: http://openssl.com/docs/0xCE69424E.asc
>
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    [hidden email]
> <http://user/SendEmail.jtp?type=node&node=52085&i=2>
> Automated List Manager                           [hidden email]
> <http://user/SendEmail.jtp?type=node&node=52085&i=3>
>
>
> ------------------------------
>  If you reply to this email, your message will be added to the discussion
> below:
>
> http://openssl.6102.n7.nabble.com/Making-Open-SSH-FIPS-compliant-tp52064p52085.html
>  To unsubscribe from Making Open SSH FIPS compliant, click here
> <http://openssl.6102.n7.nabble.com/template/NamlServlet.jtp?macro=unsubscribe_by_code&node=52064&code=c2FkaGFuYS4xMkBnbWFpbC5jb218NTIwNjR8LTQ1NjA5NzMw>
> .
> NAML
> <http://openssl.6102.n7.nabble.com/template/NamlServlet.jtp?macro=macro_viewer&id=instant_html%21nabble%3Aemail.naml&base=nabble.naml.namespaces.BasicNamespace-nabble.view.web.template.NabbleNamespace-nabble.view.web.template.NodeNamespace&breadcrumbs=notify_subscribers%21nabble%3Aemail.naml-instant_emails%21nabble%3Aemail.naml-send_instant_email%21nabble%3Aemail.naml>
>




--
View this message in context: 
http://openssl.6102.n7.nabble.com/Making-Open-SSH-FIPS-compliant-tp52064p52092.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.

Reply via email to