FIPS 140-2 library

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 12/19/2015 08:28 AM, Marcos Bontempo wrote:
> I want to exclude the private key if there is an attempt to violation.
> Has FIPS this functionality?

I think you have some misconceptions about what FIPS 140-2 is and isn't.
It is "magical pixie dust", not a technique or some specific type of
functionality.

FIPS 140-2 validation is a paper intensive formal process by which
specific implementations (software and/or devices) are given an official
government blessing (the "pixie dust").

FIPS 140-2 validated products are *not* more secure or better, by any
real-world metric, than equivalent non-validated products. In fact they
are rather manifestly *less* secure, in the sense of resistance to
malicious or accidental compromise. You can't do anything with FIPS
140-2 validated products you can do without, except for the entirely
non-technical objective of satisfying formal policy requirements.

So if you aren't forced to use validated products, just ask "how can I
do X securely" and leave FIPS 140-2 out of it. If you do need validated
products, then that requirement drives and constrains your choices and
real-world security is a secondary consideration, instead you must ask
"is there a validated product available that will allow X"? You can't
code your way to FIPS 140-2 validated status, you have to find and use
something that is already validated.

-Steve M.

-- 
Steve Marquess
OpenSSL Software Foundation
1829 Mount Ephraim Road
Adamstown, MD  21710
USA
+1 877 673 6775 s/b
+1 301 874 2571 direct
marquess at openssl.com
gpg/pgp key: http://openssl.com/docs/0x6D1892F5.asc


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux