On Wed, Jul 16, 2014, Jason Schultz wrote:

> According to this wiki page:
> 
> http://wiki.openssl.org/index.php/FIPS_mode_and_TLS
> 
> When in FIPS mode, SHA1 signatures can not be used when using the TLS 1.2
> protocol: "If that wasn't enough there's another complication. For TLS v1.2
> you have to restrict the supported signature algorithms to exclude SHA1,
> allowing only SHA256 and above." However, our application is in FIPS mode,
> and I am successfully opening a connection using only cipher "AES256-SHA".
> 

That's SHA1 used for HMAC, not for digital signatures.

> And Section 2.6.2: "It is the responsibility of the application developer to
> ensure that only FIPS algorithms are used when in FIPS mode." To furthur
> complicate things, several days ago I had observed handshakes failing in
> this situation, with the following errors in the OpenSSL Error Queue on the
> client side: error:0409A09E:rsa routines:PKEY_RSA_VERIFY:operation not
> allowed in fips modeerror:0D0C5006:asn1 encoding
> routines:ASN1_item_verify:EVP liberror:14090086:SSL
> routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed Are we seeing
> a case where sometimes OpenSSL fails to prevent non-FIPS algorithms and
> sometimes does not, for whatever reason?  Thanks in advance.                  
>                   

That error could be caused by the peer using an invalid message digest in FIPS
mode. For example MD5.

Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to