Entropy collection is outside the FIPS boundary. If you don't want to
modify the code, you can pass in -DDEVRANDOM using CFLAGS and set it to
whatever value you desire. For instance, maybe you have a hardware
device mapped to /dev/entropy that provides sufficient random data to
seed the DRBG.
On 09/23/2015 08:16 AM, Steve Marquess wrote:
> John, let me elaborate on my comment above by noting that the Cisco
> contribution includes a bunch of FIPS specific code for which there is
> no counterpart on the master branch (i.e. no place to put it). A
> version which worked on master with all t
Pull request 368 has KDF support for FIPS:
https://github.com/openssl/openssl/pull/368
I've already updated libsrtp to use this API for FIPS compliance. We would like
to contribute to other downstream projects as well. But it would help if
OpenSSL accepted this pull request.
-- Origina
Your first question should be presented to the Python developers that
provide support for OpenSSL. They would be the user of the OpenSSL
API. I'm not a Python expert, but somewhere they would have a native
layer that leverages the OpenSSL API. This native layer code would need
to invoke FIPS_mod
The following commit changed the behavior of checking the extended key
usage bits in a server certificate when using X509_PURPOSE_SSL_SERVER:
http://marc.info/?l=openssl-cvs&m=132759007026375&w=2
This commit was put into 1.0.2 on April 6, 2012. Therefore, 1.0.1 and
1.0.2 behave differently in th
Well, since you're using the fips-ecp tarball, you'll need to include
no-ec2m when configuring OpenSSL 1.0.2a. But this isn't why you're
seeing a fork error from fipsld.
I'm using Ubuntu 14.04 (Is there a 14.4?) and don't see any issue.
However, I'm not setting CC, FIPSLD and FIPSDIR. You shoul
Not sure.
Are you using blocking or non-blocking IO?
Have you tried SSL_MODE_AUTO_RETRY?
Do you notice a different return value from SSL_read() after a zero byte
read compared to other errors?
On 05/06/2015 07:12 PM, Bryan Call wrote:
> Do you know if there is a way from preventing a call to
That's the same symptom I see on 32-bit systems. It appears to be
caused by 5b38d54753acdabbf6b1d5e15d38ee81fb0612a2.
On 05/04/2015 09:21 AM, The Doctor wrote:
> This also occured in openssl-1.0.2-stable-SNAP-20150503
>
>
> Script started on Mon May 4 07:06:41 2015
> ns2.nl2k.ab.ca//usr/source/
ring BIO, like a BIO pair, data must be written into
>or retrieved out of the BIO before being able to continue.
>
>
> Thank you...
>
> -Bryan
>
>
>
>
>> On May 1, 2015, at 5:34 AM, John Foley wrote:
>>
>> Lock #1 is CRYPTO_LOCK_ERR, which I b
The changes to SSL_locking_callback() look good. But the code you've
added to SSL_CTX_add_extra_chain_cert_file() doesn't accomplish much.
You're checking if FIPS is on or off, then setting the FIPS mode to the
current setting, which is a no-op.
On 04/30/2015 09:49 PM, Bryan Call wrote:
> (plai
Lock #1 is CRYPTO_LOCK_ERR, which I believe is used for logging errors.
It appears your application is generating a lot of errors for some
reason. Never tried it myself, but you probably can't disable this lock
with multiple threads running. You should take a look at the error log
to identify th
n there are
> callbacks for type 39 and 40 locks (for OpenSSL 1.0.1 and 1.0.2)?
>
> -Bryan
>
>
>
>
>> On Apr 28, 2015, at 10:22 AM, John Foley > <mailto:fol...@cisco.com>> wrote:
>>
>> In the context of OpenSSL 1.0.1 or 1.0.2, this means F
t; -Bryan
>
>
>
>
>> On Apr 24, 2015, at 4:17 PM, John Foley > <mailto:fol...@cisco.com>> wrote:
>>
>> Some of the algorithms still invoke the FIPS flavor of the algorithm
>> even when FIPS is disabled. For example, this code is from
>> EVP_DigestU
uot;, "FIPS_mode: %d", mode);
> mode = FIPS_mode();
> if (mode) {
> FIPS_mode_set(0);
> Debug("ssl", "FIPS_mode: %d", mode);
> }
> #endif
>
> [Apr 24 21:43:45.860] Server {0x7f7628146800} DEBUG: (ssl) FIPS_mode: 0
>
> -B
total contention: 1350 waiting: 1 file:
> /SourceCache/OpenSSL098/OpenSSL098-52.20.2/src/crypto/err/err_def.c
> line: 343 type: 1
>
>
> -Bryan
>
>
>
>
>> On Apr 23, 2015, at 4:46 PM, John Foley > <mailto:fol...@cisco.com>> wrote:
>>
>> Look
Looking at your call stack, it appears you're testing with FIPS mode
enabled. There's a lock in FIPS_selftest_failed() that's used to ensure
the crypto algorithms inside the FIPS boundary are not utilized until
after the POST has completed and passed. Unfortunately this lock remains
installed for
Are you packaging libcrypto.so into the APK yourself? The Android OS
comes with it's own resident copy of libcrypto. You can leverage this
from your app without having to package libcrypto into your
application. This assumes the version of libcrypto that comes with
Android meets your needs. Giv
I'm impressed you were able to do a FIPS build for Windows x64. I
didn't think this was possible. ;-)
This looks like the hash that FINGERPRINT_premain() spits out when the
signature hasn't been embedded into the binary. You may want to confirm
the signature is embedded during the build process
gt;
> 4280581268:error:140790E5:SSL routines:ssl23_write:ssl handshake
> failure:s23_lib.c:177:
>
>
>
> John.
>
>
>
> *From:*openssl-users [mailto:openssl-users-boun...@openssl.org] *On
> Behalf Of *John Foley
> *Sent:* 15 April 2015 16:45
> *To:* openss
0) + 4c
>
> 0004ee64 s_client_main (0, 0, 1, 2b4d64, 2f8ae0, 2f4280) + 7374
>
> 0001328c do_cmd (2eb3c8, 3, ffbffad0, 2b4638, 13e64, 2b3d78) + b8
>
> 00012f08 main (4, ffbffacc, 2eb3c8, 29fc00, 2b3d78, 2b49dc) + 3a4
>
> 00012a08 _start (0, 0, 0, 0, 0, 2b3d78) + 108
>
;
>
>
> Regards,
>
> John.
>
>
>
> *From:*openssl-users [mailto:openssl-users-boun...@openssl.org] *On
> Behalf Of *John Foley
> *Sent:* 15 April 2015 13:31
> *To:* openssl-users@openssl.org
> *Subject:* Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build i
Do you see the same stack trace when simply using the random number
generator:
./openssl rand 64
What if you simply use SHA1:
./openssl sha1
On 04/14/2015 12:17 PM, John Unsworth wrote:
>
> Is no-one interested at all about this problem? Or do I need to send
> it to another place?
>
>
>
>
Have you recompiled Apache? Or did you only recompile OpenSSL 1.0.2a?
There is no binary compatibility between 0.9.8 and 1.0.2. You'll need
to recompile Apache if you haven't done this. Or, possibly a newer
Apache binary (2.4.12) would work with your OpenSSL 1.0.2a build.
On 04/06/2015 03:
The 'make depend' regenerates the dependencies for the makefiles. The
dependencies will change depending on the configuration options you've
passed to OpenSSL. If you're new to using GNU make, here's a decent
explanation:
http://make.mad-scientist.net/papers/advanced-auto-dependency-generatio
We looked at this very briefly a couple of years ago. In theory, there
may be a way to achieve the goal as a loadable kernel module (a.k.a.
device driver). The idea would be to have a kernel module that provides
crypto support. This kernel module would be the FIPS object module,
with the FIP
We maintain our own derivative of OpenSSL and haven't had any
significant issues due to the code reformat. We simply run the reformat
script on our downstream derivative. We can then generate patch files
of our changes and reapply them to new OpenSSL releases. It was fairly
straight forward.
IM
If it fits your needs, you may want to look into using EST (RFC 7030)
instead of SCEP. EST is the replacement for SCEP. The SCEP draft was
never ratified. The libest open source project implements RFC 7030 and
uses OpenSSL. It's available at https://github.com/cisco/libest.
On 03/17/2015 12:
You don't even need to modify e_os.h. You can just pass in a new value
for DEVRANDOM using the gcc -D compiler option. For instance, maybe you
have a hardware device mapped to a Linux device file called
/dev/entropy1. You can override DEVRANDOM to use this device without
modifying any OpenSSL co
On 02/20/2015 12:30 PM, Steve Marquess wrote:
> On 02/20/2015 10:52 AM, John Foley wrote:
>> Appendix E.2 in the FIPS 2.0 users guide
>> (https://www.openssl.org/docs/fips/UserGuide-2.0.pdf) contains blank
>> pages on pages 134-136. Is this intentional? It appears the
Appendix E.2 in the FIPS 2.0 users guide
(https://www.openssl.org/docs/fips/UserGuide-2.0.pdf) contains blank
pages on pages 134-136. Is this intentional? It appears the iOS build
instructions starting on page 133 are incomplete.
___
openssl-users m
Tried again using the 20140613 snapshot and it's now working. Thanks
for committing the fix yesterday.
On 06/12/2014 11:35 AM, John Foley wrote:
> Using the 201406012 snapshot on the 1.0.2 branch, I'm seeing an error
> while trying to build for the VC-WIN32 target. The co
Using the 201406012 snapshot on the 1.0.2 branch, I'm seeing an error
while trying to build for the VC-WIN32 target. The compiler is VS2010.
Can anyone confirm this is the correct build procedure?
perl Configure VC-WIN32
ms\do_nasm.bat
nmake -f ms\ntdll.mak
The error is:
cl /Fotmp32dl
We plan to publish an open source EST stack in the near future. This
will support both client-side and server-side capabilities. The code
will be hosted here:
https://github.com/cisco/libest
I've also recently setup an EST test server, which is available here:
http://ec2-54-204-91-178.compute-
There were several commits to the 0_9_8 trunk after the 0.9.8y release
last week that appear to be related to CVE-2013-0169. Will there be a
forthcoming 0.9.8z release as a result? Or are these commits not needed
to mitigate CVE-2013-0169?
Thank you.
<>
Now that 1.0.1 has been released, will there be any future maintenance
releases on the 0.9.8 branch? For instance, will any vulnerabilities
found in the future be addressed on 0.9.8? Or is the 0.9.8 branch
effectively "end of life" at this time?
Thank you.
<>
Looking at OpenSSL_add_all_ciphers() in crypto/evp/c_allc.c, AES-CCM
mode is not in the list of ciphers added. Has this cipher intentionally
been omitted, or is this a bug?
<>
Does anyone know why the CertificateVerify message is still limited to a
max size of 514 bytes?
http://www.mail-archive.com/openssl-dev@openssl.org/msg13520.html
Is there any risk with increasing this to 4096 bytes?
Thank you.
None of the ECDH-RSA cipher suites appear to work in 0.9.8r. Yet they
work in 1.0.0. Is this expected?
Looking at s3_lib.c, all the older DH-RSA cipher suites are disabled
(SSL_CIPHER->valid=0). But the ECDH-RSA ciphers listed in s3_lib.c are
enabled. This leads to the following questions:
1.
Does the OpenSSL OCSP stack support IPv6 in version 0.9.8r?
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager
Is there a known bug with ECDH_RSA key exchange cipher suites in
0.9.8r? For instance, using cipher suite ECDH-RSA-AES128-SHA in 0.9.8r
does not work. But it does work in 1.0.0d. This is tested using the
following command:
ssltest -tls1 -cert servercert.pem -key serverkey.pem -cipher
ECDH-RSA-A
Section 4.2.1 of the FIPS User Guide states...
Per the conditions of the FIPS 1402 validation only two configuration
commands may
be used:
./config fipscanisterbuild
or
./config fipscanisterbuild noasm
However, section 4.2.2 states...
Note that fipscanister.o can either be staticall
41 matches
Mail list logo