FIPS compile issue with Perl on Windows

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 04/18/2016 08:25 PM, Jakob Bohm wrote:
> On 19/04/2016 01:51, Steve Marquess wrote:
>> On 04/18/2016 04:05 PM, Leaky wrote:
>>>>> plus you're constrained by the
>>>>> requirements of the Security Policy to build the module with precisely
>>>>> the commands:
>>>>>
>>>>>   gunzip -c openssl-fips-2.0.12.tar.gz | tar xvf -
>>>>>   cd openssl-fips-2.0.12
>>>>>   ./config
>>>>>   make
>>> Silly question... I know that you should only run the above commands,
>>> but
>>> can you deviate from the unzip tool, i.e. use 7zip?
>>>
>>> ...
>>
>> There is no point in attempting to do the usual configuration management
>> and software version control on the contents of the
>> openssl-fips-2.0.12.tar.gz tarball. You CANNOT change the content; there
>> can be no changes to manage!!!
> Almost true.  If it wasn't banned by the FIPS security policy, checking in
> the uncompressed tarball could be used to efficiently manage and track new
> upstream releases of the tarball and to document which exact upstream FIPS
> cannister source code (and hence corresponding validation date) was
> incorporated into which product version (an aspect of FIPS compliance which
> someone might want to audit

Well, the righteous way to track the "exact upstream FIPS cannister
source code" is by the SHA1 digest of the tarball that is documented in
the Security Policy.

> 
> But alas, as you clarify below, this is not permitted by the OpenSSL FIPS
> security policy directly incorporated into the validation.
> 
> The slightly less efficient idea of putting the compressed tarball into
> the configuration control repository (which in this case *is* tracking the
> build configuration, not the code versions) is probably (I am not sure)
> againstthe policy that the tarball must be taken "securely" from the
> physical CD mailed out by the OpenSSL foundation.

Per the CMVP internal storage and transmission of the official tarball
within the end user organization is not subject to any special
requirements, once that organization has received the official
snail-mailed CD disk. So for instance the east coast office of vendor
XYZ could copy the openssl-fips-2.0.12.tar.gz tarball off of the
official CD onto the corporate internal network, where it could be
retrieved and used by the west coast office. So by that logic you could
stash the complete tarball in an internal repository.

That doesn't make a lot of sense, but hey it's FIPS 140-2. The CMVP was
most insistent on the snail-mailed CD requirement during the #1747
validation -- resolution of that "secure distribution" issue held up the
validation by a couple of months -- but I can't help but notice that
several "Alternative Scenario 1A/1B" validations granted since then
(which are supposedly carbon copy clones) have been allowed to omit the
snail-mail CD requirement. So even the CMVP itself is confused by this
requirement.

> So the thing that can probably be put into a repository is the binary
> FIPSCannister.o file along with copies of any documents certifying how,
> where, from what and by whom said FIPS cannister was built.

Exactly, and this is my recommendation (per section 5.5 of the FIPS
module User Guide).

-Steve M.

-- 
Steve Marquess
OpenSSL Validation Services, Inc.
1829 Mount Ephraim Road
Adamstown, MD  21710
USA
+1 877 673 6775 s/b
+1 301 874 2571 direct
marquess at openssl.com
gpg/pgp key: http://openssl.com/docs/0x6D1892F5.asc


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux