Verifying the sha1 of fipscanister.o with what is embedded in libcrypto.so

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello Jakob,

Thank you for the information. So what you are saying is the object module build that generated the SHA1s are not the ones that are embedded. That makes sense.

So then what would be the best way to validate the build to have consumed the right object files ? Is there a way to generate the embedded sha1 sum from a given fipscanister.o (or other artefacts from object module build process) ? 

Also how do I locate the embedded sha1 in so ? Is it a symbol I should look for in gdb ?

Thanks.

________________________________________
From: openssl-users <openssl-users-bounces@xxxxxxxxxxx> on behalf of Jakob Bohm <jb-openssl@xxxxxxxxxx>
Sent: Monday, March 14, 2016 10:38 PM
To: openssl-users at openssl.org
Subject: Re: Verifying the sha1 of fipscanister.o with what is embedded in libcrypto.so

Let me explain this a bit more clearly:

The fipscanister.o file (like any other .o file) contains
two things:

1. The actual code and constant data (if any) that needs
   to go in the final .so or program file.  This is what
   will eventually be hashed to produce the embedded sha1
   check.

2. Relocation information on how the linker should adjust
   the code to indicate its location in the .so file (and
   in memory on some platforms) and how other parts of the
   .so file shall be adjusted to indicate the location of
   the code in fipscanister.o.  This data is used and
   removed when creating the copy of the fips canister in
   the .so or program file.

Therefore an sha-1 sum of the fipscanister.o file will
include more (and different) bytes than the fips canister
inside the final .so file, and will thus not match the
sha-1 sum that needs to be embedded inside that .so file.

Also for some build targets, the fips canister inside
the final .so file will similarly not match the in-
memory fips canister in the running program, which is
what the embedded sha-1 sum must match.

Using a 3rd party build script which downloads the source
code from somewhere beyond your control cannot be used as
a secure way to build anything supposedly secure.  Such
build scripts are fundamentally insecure and should not
be used.

On 15/03/2016 05:26, Satya Das wrote:
>
> Hello Ethan,
>
> I am tweaking the centos rpmspec to use my fips object module.  That
> seems to be downloading source tar ball, patching etc.
>
> Please note that the sha1 of the so is not so interesting as the
> embedded sha1 check inside so (when one calls FIPS_mode_set).
> Essentially if I can get the embedded sha1in the so, I can compare
> that with the sha1 I have as part of the object module I have built. I
> am assuming the embedded sha1 is that of fipscanister.o.
>
> Hope that makes sense ?
>
> Thanks.
>
>
> From: Ethan Rahn
> Sent: Monday, March 14, 6:11 PM
> Subject: Re: [openssl-users] Verifying the sha1 of fipscanister.o with
> what is embedded in libcrypto.so
> To: openssl-users at openssl.org
>
> Is there a reason why you cannot build it from a controlled build
> environment and record the hash of the final .so?
>
> It seems that it would be pretty non-trivial if not impossible to pull
> a .o file from a .so in the exact same format that it went in, such
> that you could check the hash. Being able to check if a .c file is in
> the same state in the .so afterwards seems pretty much impossible
> given all the things that would change in the code with compiling and
> linking in between the .c state and the final .so state.
>
> On Mon, Mar 14, 2016 at 5:30 PM, Satya Das <satya at attivonetworks.com
> <mailto:satya at attivonetworks.com>> wrote:
>
>> Hello,
>>
>> I have a simple problem I am trying to solve. I have built a fips
>> capable openssl shared object (.so). I also have the sha1 hash of the
>> fipscanister.o in a file called fipscanister.o.sha1. I also have the
>> sha1 hash of fips_premain.c in a file called fips_premain.c.sha1. In
>> order to make sure the build is good, I want to make sure that the
>> .so was indeed built with these versions of fipscanister.o and
>> fips_premain.
>>
>> Is there a way to do this ? I am on centos 6.6 x86_64 and linking to
>> object module 2.0.11 from openssl 1.0.1e with patches.
>>
>>

Enjoy

Jakob
--
Jakob Bohm, CIO, Partner, WiseMo A/S.  https://www.wisemo.com
Transformervej 29, 2860 S?borg, Denmark.  Direct +45 31 13 16 10
This public discussion message is non-binding and may contain errors.
WiseMo - Remote Service Management for PCs, Phones and Embedded

--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux