> my mailbox is flooded with your openssl mails

Yeah, those unexpected result can occur when you subscribe to a mailing list.

> I want to unsubscribe, please tell me how to go about it

Check at the bottom of each message where it says:

   openssl-users mailing list
   To unsubscribe: ...

Or, for the general instructions,
http://lmgtfy.com/?q=how+to+unsubscribe+from+a+mailing+list

On Tue, Mar 15, 2016 at 11:53 PM,  <rajesh_seetha...@thbs.com> wrote:
> I want to unsubscribe, please tell me how to go about it
>
> my mailbox is flooded with your openssl mails
>
> -----Original Message-----
> From: openssl-users-requ...@openssl.org
> Sent: Wednesday, March 16, 2016 9:18am
> To: openssl-users@openssl.org
> Subject: openssl-users Digest, Vol 16, Issue 26
>
> Send openssl-users mailing list submissions to
>         openssl-users@openssl.org
>
> To subscribe or unsubscribe via the World Wide Web, visit
>         https://mta.openssl.org/mailman/listinfo/openssl-users
> or, via email, send a message with subject or body 'help' to
>         openssl-users-requ...@openssl.org
>
> You can reach the person managing the list at
>         openssl-users-ow...@openssl.org
>
> When replying, please edit your Subject line so it is more specific
> than "Re: Contents of openssl-users digest..."
>
>
> Today's Topics:
>
>    1. Re: Verifying the sha1 of fipscanister.o with what is
>       embedded in libcrypto.so (Steve Marquess)
>    2. Re: Verifying the sha1 of fipscanister.o with what is
>       embedded in libcrypto.so (Jeremy Farrell)
>    3. Re: Verifying the sha1 of fipscanister.o with what is
>       embedded in libcrypto.so (Satya Das)
>    4. Re: Verifying the sha1 of fipscanister.o with what is
>       embedded in libcrypto.so (Mike Mohr)
>
>
> ----------------------------------------------------------------------
>
> Message: 1
> Date: Tue, 15 Mar 2016 19:05:34 -0400
> From: Steve Marquess <marqu...@openssl.com>
> To: openssl-users@openssl.org
> Subject: Re: [openssl-users] Verifying the sha1 of fipscanister.o with
>         what is embedded in libcrypto.so
> Message-ID: <56e8953e.30...@openssl.com>
> Content-Type: text/plain; charset=windows-1252
>
> On 03/15/2016 04:58 PM, Mike Mohr wrote:
>> During the linking process, parts of fipscanister.o are removed
>> (discarded) by the linker. Also, jumps and call instructions have their
>> operands changed (addresses are filled in or relocation information is
>> added) and the machine code is fundamentally altered.
>>
>> Imagine the linking process as something analogous to baking a cheese
>> quiche with tomatoes. The can of tomatoes you use (i.e., the
>> fipscanister.o file) is opened. The metal can is discarded along with
>> any liquid inside the can. Then the tomatoes are placed into the quiche
>> and baked. Melting cheese seeps into the tomatoes and the tomatoes are
>> physically deformed and soften. At the end you have a delicious quiche.
>> Can you get the original can of tomatoes back, in its unmodified form,
>> at this point? Can you identify exactly which can of tomatoes was used
>> to make this quiche, given only photos of all the cans prior to opening
>> them?
>
> To a rough first approximation this is true for object code, but the
> story is a little more nuanced for the OpenSSL FIPS Object Module. We
> create that in a way (the "monolithic" object module) that prevents the
> application link process from scrambling what would otherwise have been
> an assortment of object modules (in the software engineering sense, not
> FIPS-speak).
>
> The premain (native compilation) process, the "incore" utilities
> (cross-compilation), and the run-time POST integrity test all calculate
> exactly the same digest over exactly the same bits (in our case, the
> TEXT and RODATA segments). If the application link process rearranged
> any of that TEXT or RODATA then the runtime integrity test would fail.
>
> So very technically speaking the FIPS module is not fipscanister.o, but
> the TEXT and RODATA data within it.
>
> To use your analogy, the fipscanister.o "can" contains only one tomato
> which is an indigestible and indivisible blob that appears intact in the
> baked quiche. Bon App?tit..
>
> -Steve M.
>
> --
> Steve Marquess
> OpenSSL Validation Services, Inc.
> 1829 Mount Ephraim Road
> Adamstown, MD  21710
> USA
> +1 877 673 6775 s/b
> +1 301 874 2571 direct
> marqu...@openssl.com
> gpg/pgp key: http://openssl.com/docs/0x6D1892F5.asc
>
>
> ------------------------------
>
> Message: 2
> Date: Tue, 15 Mar 2016 23:37:21 +0000
> From: Jeremy Farrell <jeremy.farr...@oracle.com>
> To: openssl-users@openssl.org
> Subject: Re: [openssl-users] Verifying the sha1 of fipscanister.o with
>         what is embedded in libcrypto.so
> Message-ID: <56e89cb1.90...@oracle.com>
> Content-Type: text/plain; charset="windows-1252"; Format="flowed"
>
> On 15/03/2016 21:24, Satya Das wrote:
>> Even if a vendor letter is good for CMVP, how is the vendor supposed to know 
>> ?
>
> By remembering whether or not he followed the required procedure; it's
> the only way for him to know.
>
>> I would say openssl should give such a tool so that vendor and the testing 
>> Lab can know such things. It is more than critical that the applications 
>> link to the intended crypto module.
>
> You miss the point. It is no more or less critical that 'the application
> link to the intended crypto module' than countless other things. Many of
> the other things cannot be checked by running a tool. How would a tool
> check that the vendor had executed 'make' at the appropriate stage as
> opposed to (say) '/usr/bin/make'? How would a tool check that the vendor
> had got the original tar file from the OSF CD rather than by downloading it?
>
>> This convoluted and complex object module linking etc. with 207 page user 
>> guide is specific to openssl's approach to FIPS, and therefore should be 
>> addressed by the project. It should not come down to some vendor document 
>> written in good faith.
>
> How can it come down to anything else? What other possible means are
> there for a customer to know that an OpenSSL-based product is FIPS 140-2
> validated?
>
> --
> J. J. Farrell
> Not speaking for Oracle.
>
> -------------- next part --------------
> An HTML attachment was scrubbed...
> URL: 
> <http://mta.openssl.org/pipermail/openssl-users/attachments/20160315/9378caa8/attachment-0001.html>
>
> ------------------------------
>
> Message: 3
> Date: Wed, 16 Mar 2016 00:38:39 +0000
> From: Satya Das <sa...@attivonetworks.com>
> To: "openssl-users@openssl.org" <openssl-users@openssl.org>
> Subject: Re: [openssl-users] Verifying the sha1 of fipscanister.o with
>         what is embedded in libcrypto.so
> Message-ID:
>         
> <bl2pr07mb24047327c36cffea5bc19beed7...@bl2pr07mb2404.namprd07.prod.outlook.com>
>
> Content-Type: text/plain; charset="us-ascii"
>
> Steve,
>
> How does one get a hold of the embedded signature in libcrypto.so ?
>
> Thanks
>
> -----Original Message-----
> From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of 
> Steve Marquess
> Sent: Tuesday, March 15, 2016 3:54 PM
> To: openssl-users@openssl.org
> Subject: Re: [openssl-users] Verifying the sha1 of fipscanister.o with what 
> is embedded in libcrypto.so
>
> On 03/15/2016 05:24 PM, Satya Das wrote:
>> Hello Steve,
>>
>> Even if a vendor letter is good for CMVP, how is the vendor supposed
>> to know ?
>
> Ummm, because the vendor is the one who created the validated module.
> Only that vendor can know for sure how the module was created, because the 
> FIPS 140-2 requirements have non-technical procedural elements (think of 
> those as ideological or spiritual elements).
>
> Note that in this context "vendor" refers to the entity that created the 
> validated module and submitted it for FIPS 140-2 validation. The company that 
> uses the FIPS module in their product is a "user", not a "vendor", with 
> respect to the validated module.
>
>> I would say openssl should give such a tool so that vendor and the
>> testing Lab can know such things. It is more than critical that the
>> applications link to the intended crypto module. This convoluted and
>> complex object module linking etc. with 207 page user guide is
>> specific to openssl's approach to FIPS, and therefore should be
>> addressed by the project. It should not come down to some vendor
>> document written in good faith.
>
> But it necessarily always comes down to a vendor document, for *any* 
> validated module, not just the OpenSSL FIPS module.. I've tried and failed 
> now several times to articulate why that is so and can't think of any new way 
> to present it, but it is simply not possible to do what you want; there is no 
> such thing as a magical pixie dust detector. We cannot make one; no one can.
>
> -Steve M.
>
> --
> Steve Marquess
> OpenSSL Validation Services, Inc.
> 1829 Mount Ephraim Road
> Adamstown, MD  21710
> USA
> +1 877 673 6775 s/b
> +1 301 874 2571 direct
> marqu...@openssl.com
> gpg/pgp key: http://openssl.com/docs/0x6D1892F5.asc
> --
> openssl-users mailing list
> To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
>
>
> ------------------------------
>
> Message: 4
> Date: Tue, 15 Mar 2016 20:48:36 -0700
> From: Mike Mohr <akih...@gmail.com>
> To: openssl-users@openssl.org
> Subject: Re: [openssl-users] Verifying the sha1 of fipscanister.o with
>         what is embedded in libcrypto.so
> Message-ID:
>         <CAJe-LUgN7ucT4St_L=ok_HHEDPYP+jqcVRiV3vLVS=buwus...@mail.gmail.com>
> Content-Type: text/plain; charset="utf-8"
>
> There isn't necessarily any embedded signature in a shared object.  In many
> cases, there won't be one.  If your shared object was built with a new
> enough version of GCC, hasn't been fully stripped, and its note section has
> not been removed during the build process, you can get a SHA-1 checksum
> from the binary like this:
> michael@osiris:~$ readelf -n /usr/lib/x86_64-linux-gnu/libcrypto.so
>
> Displaying notes found at file offset 0x000001c8 with length 0x00000024:
>   Owner                 Data size Description
>   GNU                  0x00000014 NT_GNU_BUILD_ID (unique build ID
> bitstring)
>     Build ID: 1e5fca06588d1d7c0f8f4b16c82611e6be697fb2
>
> The GNU linker generates this value, but for the details of how it is
> calculated you'd probably have to refer to the gcc source code.  Depending
> on what is being hashed, you may or may not be able to re-calculate that
> value at a later time.
>
> Caveat emptor: the build id was likely not designed to prove that the
> executable code is unmodified.  Its stated goal is to identify repeatable
> builds on the same host with the same tools.
>
> "As long as politics is the shadow cast on society by big business, the
> attenuation of the shadow will not change the substance."
>
> Dewey, J. (2008). *The later works of John Dewey, 1925 - 1953* (Volume 6,
> page 163). Carbondale, IL: Southern Illinois University Press.
>
> On Tue, Mar 15, 2016 at 5:38 PM, Satya Das <sa...@attivonetworks.com> wrote:
>
>> Steve,
>>
>> How does one get a hold of the embedded signature in libcrypto.so ?
>>
>> Thanks
>>
>> -----Original Message-----
>> From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf
>> Of Steve Marquess
>> Sent: Tuesday, March 15, 2016 3:54 PM
>> To: openssl-users@openssl.org
>> Subject: Re: [openssl-users] Verifying the sha1 of fipscanister.o with
>> what is embedded in libcrypto.so
>>
>> On 03/15/2016 05:24 PM, Satya Das wrote:
>> > Hello Steve,
>> >
>> > Even if a vendor letter is good for CMVP, how is the vendor supposed
>> > to know ?
>>
>> Ummm, because the vendor is the one who created the validated module.
>> Only that vendor can know for sure how the module was created, because the
>> FIPS 140-2 requirements have non-technical procedural elements (think of
>> those as ideological or spiritual elements).
>>
>> Note that in this context "vendor" refers to the entity that created the
>> validated module and submitted it for FIPS 140-2 validation. The company
>> that uses the FIPS module in their product is a "user", not a "vendor",
>> with respect to the validated module.
>>
>> > I would say openssl should give such a tool so that vendor and the
>> > testing Lab can know such things. It is more than critical that the
>> > applications link to the intended crypto module. This convoluted and
>> > complex object module linking etc. with 207 page user guide is
>> > specific to openssl's approach to FIPS, and therefore should be
>> > addressed by the project. It should not come down to some vendor
>> > document written in good faith.
>>
>> But it necessarily always comes down to a vendor document, for *any*
>> validated module, not just the OpenSSL FIPS module. I've tried and failed
>> now several times to articulate why that is so and can't think of any new
>> way to present it, but it is simply not possible to do what you want; there
>> is no such thing as a magical pixie dust detector. We cannot make one; no
>> one can.
>>
>> -Steve M.
>>
>> --
>> Steve Marquess
>> OpenSSL Validation Services, Inc.
>> 1829 Mount Ephraim Road
>> Adamstown, MD  21710
>> USA
>> +1 877 673 6775 s/b
>> +1 301 874 2571 direct
>> marqu...@openssl.com
>> gpg/pgp key: http://openssl.com/docs/0x6D1892F5.asc
>> --
>> openssl-users mailing list
>> To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
>> --
>> openssl-users mailing list
>> To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
>>
> -------------- next part --------------
> An HTML attachment was scrubbed...
> URL: 
> <http://mta.openssl.org/pipermail/openssl-users/attachments/20160315/1f301ce5/attachment.html>
>
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Reply via email to