Hi
We are migrating from 1.1.1 to 3.x openssl. We also need to support FIPs cipher and FIPs mode.
My question is do we need to use the API the OSSL_PROVIDER_load. If we directly EVP_default_properties_enable_fips what are the implications.
Thanks and Regards
Darshan
--
You received this message because you are subscribed to the Google Groups "openssl-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to openssl-user...@openssl.org.
To view this discussion visit https://groups.google.com/a/openssl.org/d/msgid/openssl-users/PH0PR15MB4526934B9B0CE1696B7785EEA762A%40PH0PR15MB4526.namprd15.prod.outlook.com.
Hi Darshan,
Need an additional clarification on:
OSSL_PROVIDER_load(NULL, "fips");
EVP_set_default_properties(NULL, "fips=yes");
Thanks for the response.
However the original question remains unanswered. Can you help me understand whether we need to use both OSSL_PROVIDER_load(NULL, "fips"); EVP_default_properties_enable_fips
If we directly use the EVP_default_properties_enable_fips will FIPS be enabled.
Warm Regards
Darshan
From: openss...@openssl.org <openss...@openssl.org>
On Behalf Of Viktor Dukhovni
Sent: Monday, June 2, 2025 12:04 PM
To: openss...@openssl.org
Subject: [External]Re: Migration from 1.1.1 to 3.x
[External Sender]
On Mon, Jun 02, 2025 at 11: 36: 49AM +0530, madhu bajpai wrote: > Need an additional clarification on: > > OSSL_PROVIDER_load(NULL, "fips"); EVP_set_default_properties(NULL, > "fips=yes"); > > Are above two functions adequate
On Mon, Jun 02, 2025 at 11:36:49AM +0530, madhu bajpai wrote:
> Need an additional clarification on:
>
> OSSL_PROVIDER_load(NULL, "fips"); EVP_set_default_properties(NULL,
> "fips=yes");
>
> Are above two functions adequate for FIPS compliance or if we need
> additional changes? Like APIs to explicitly mention "fips=yes” e.g.
> EVP_MD_fetch(NULL, "SHA2-256", "fips=yes");
>
> Is there any reference checklist to ensure FIPS compliance?
>
> We have recently built FIPS module for iOS and since we had to
> generate the install-mac at runtime, had to enable default provider
> via openssl.cnf. Should be disable it for any accidental fallback?
Quoting README-FIPS.md:
If you need a FIPS validated module then you must ONLY generate a
FIPS provider using OpenSSL versions that have valid FIPS
certificates. A FIPS certificate contains a link to a Security
Policy, and you MUST follow the instructions in the Security Policy
in order to be FIPS compliant.
The security policy for the 3.0 module:
https://urldefense.com/v3/__https://csrc.nist.gov/projects/cryptographic-module-validation-program/certificate/4282__;!!AlswS5g!no6ebcGfxc24lR6R5lGYBcLb2L_ChCmr0m982N3boorZyXVwUIG5A2y84KEU_T35nWkGHZjOXcNtA-4A423krqowM9Dt$
Can be found in:
https://urldefense.com/v3/__https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/security-policies/140sp4282.pdf__;!!AlswS5g!no6ebcGfxc24lR6R5lGYBcLb2L_ChCmr0m982N3boorZyXVwUIG5A2y84KEU_T35nWkGHZjOXcNtA-4A423kriFjBppw$
You may want to consider the 3.1 (FIPS 140-3)module:
https://urldefense.com/v3/__https://csrc.nist.gov/projects/cryptographic-module-validation-program/certificate/4985__;!!AlswS5g!no6ebcGfxc24lR6R5lGYBcLb2L_ChCmr0m982N3boorZyXVwUIG5A2y84KEU_T35nWkGHZjOXcNtA-4A423krii6ajZ3$
https://urldefense.com/v3/__https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/security-policies/140sp4985.pdf__;!!AlswS5g!no6ebcGfxc24lR6R5lGYBcLb2L_ChCmr0m982N3boorZyXVwUIG5A2y84KEU_T35nWkGHZjOXcNtA-4A423krk6u71mj$
Any informal answers you get on this list are unauthoritative and should
nto be used as a basis for deciding whether your deployment is
FIPS-compliant.
--
Viktor.
-- You received this message because you are subscribed to the Google Groups "openssl-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to openssl-user...@openssl.org.
You may enable FIPS system wide without writing any special code by using the openssl.conf configuration file. If you explicitly enable the fips and base providers, and do not enable the default provider, all openssl cryptographic operations are done in FIPS mode. For example:
.include /path/to/your/fipsmodule.cnf
[openssl_init]
providers = provider_sect
alg_section = algorithm_sect
# List of providers to load
[provider_sect]
# default = default_sect
# The fips section name should match the section name inside the
# included fipsmodule.cnf.
fips = fips_sect
base = base_sect
[base_sect]
activate = 1
--
You received this message because you are subscribed to the Google Groups "openssl-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to
openssl-user...@openssl.org.
We are doing this in RHEL 9.4. My understanding is RHEL itself will be providing the FIPS module
Thanks and Regards
Darshan
From: The Doctor <doc...@doctor.nl2k.ab.ca>
Sent: Monday, June 2, 2025 5:35 PM
To: Mody, Darshan Arvindkumar (Darshan) <darsh...@avaya.com>
Cc: openss...@openssl.org
Subject: [External]Re: Migration from 1.1.1 to 3.x
[External Sender]
On Mon, Jun 02, 2025 at 04: 28: 33AM +0000, Mody, Darshan Arvindkumar (Darshan) wrote: > Hi > > We are migrating from 1. 1. 1 to 3. x openssl. We also need to support FIPs cipher and FIPs mode. > > My question is do we need to use
On Mon, Jun 02, 2025 at 04:28:33AM +0000, Mody, Darshan Arvindkumar (Darshan) wrote:
> Hi
>
> We are migrating from 1.1.1 to 3.x openssl. We also need to support FIPs cipher and FIPs mode.
>
> My question is do we need to use the API the OSSL_PROVIDER_load. If we directly EVP_default_properties_enable_fips what are the implications.
>
> Thanks and Regards
> Darshan
>
On which OS are you doing this?
>
> --
> You received this message because you are subscribed to the Google Groups "openssl-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an email to openssl-user...@openssl.org.
> To view this discussion visit https://urldefense.com/v3/__https://groups.google.com/a/openssl.org/d/msgid/openssl-users/PH0PR15MB4526934B9B0CE1696B7785EEA762A*40PH0PR15MB4526.namprd15.prod.outlook.com__;JQ!!AlswS5g!ntNgs951OKbap3z9-touK-MwKye3Tsw4AyMFSblOBnoz7sRx95tVSLnReJv4R5lhbtvZP7FHQiohv6HDwkPCwUIJ$.Thanks for the response.
With RHEL do we need to make additional changes to the openssl.cnf file?
Thanks and Regards
Darshan
From: Alicja Kario <hka...@redhat.com>
Sent: Wednesday, June 4, 2025 6:53 PM
To: Mody, Darshan Arvindkumar (Darshan) <darsh...@avaya.com>
Cc: openss...@openssl.org
Subject: Re: [External] Migration from 1.1.1 to 3.x
For the FIPS module in RHEL to be working in approved configuration, the whole system needs to be switched to FIPS mode. When that is done, the OpenSSL in RHEL will automatically load the fips. so provider and change the default properties to