RE: Need help - upgrading openssl version from 3.0.12 to 3.2.x version

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Tomas,

If we are using OpenSSL 3.2.x and during the build, if we use the command enable-fips and install OpenSSL, then we can't claim for fips compliance.
Is this understanding right?

OpenSSL FIPS provider module 3.0 (+ACM-4282) is tested only in 3.0.8 and 3.0.9 and that is the reason we should pick from these OpenSSL versions.
What is the OpenSSL FIPS provider module in the OpenSSL 3.2.x version?

Thanks,
Raghu


Internal Use - Confidential
-----Original Message-----
From: Prasad, PCRaghavendra
Sent: Thursday, February 29, 2024 8:23 PM
To: Tomas Mraz+ADs- Wall, Stephen+ADs- openssl-users+AEA-openssl.org
Subject: RE: Need help - upgrading openssl version from 3.0.12 to 3.2.x version

Hi Tomas,

If we migrate from 3.0.x to 3.2.x directly do we need to take care of any use cases, we are carrying OpenSSL (libcrypto and libssl) in our python application and use them during the encryption/decryption, handshake etc.

So should we take care of any specific things as part of the migration as it is a major change from 3.0.x to 3.2.x. ( will there be any specific code changes or config changes we as an application need to consider)

Thanks


-----Original Message-----
From: Tomas Mraz +ADw-tomas+AEA-openssl.org+AD4-
Sent: Tuesday, February 27, 2024 1:14 PM
To: Prasad, PCRaghavendra+ADs- Wall, Stephen+ADs- openssl-users+AEA-openssl.org
Subject: Re: Need help - upgrading openssl version from 3.0.12 to 3.2.x version


+AFs-EXTERNAL EMAIL+AF0-

For FIPS compliance you definitely need to use the validated version of a FIPS provider. Please see the instructions here +AFs-1+AF0- on how to combine the latest release with a validated FIPS provider version.

+AFs-1+AF0- https://urldefense.com/v3/+AF8AXw-https://github.com/openssl/openssl/blob/master/README-FIPS.md+AF8AXwA7ACEAIQ-LpKI+ACE-jLMp7kblHEfwy+AF8--l1pml2BUrIGyDrS0buy7NkQJ9AnH48CNuu5pkshNIHT4nJ8wBN0wuiDin47HZyuaShgEZPQ+ACQ- +AFs-github+AFs-.+AF0-com+AF0-

Tomas Mraz, OpenSSL

On Tue, 2024-02-27 at 05:55 +-0000, Prasad, PCRaghavendra wrote:
+AD4- Thanks, Tomas,
+AD4-
+AD4- So we can use OpenSSL 3.2.0 and enable fips during the build step and
+AD4- get the fips.so
+AD4-
+AD4- OR
+AD4-
+AD4- we should take the OpenSSL 3.2.0 code and then take the FIPS provider
+AD4- from the OpenSSL 3.0.8 or 3.0.9 and build, then get the fips.so,
+AD4- fipsmodule.cnf and combine with OpenSSL 3.2.0
+AD4-
+AD4- Thanks,
+AD4- Raghu
+AD4-
+AD4- -----Original Message-----
+AD4- From: openssl-users +ADw-openssl-users-bounces+AEA-openssl.org+AD4- On Behalf Of
+AD4- Tomas Mraz
+AD4- Sent: Tuesday, February 27, 2024 9:05 AM
+AD4- To: Wall, Stephen+ADs- openssl-users+AEA-openssl.org
+AD4- Subject: Re: Need help - upgrading openssl version from 3.0.12 to
+AD4- 3.2.x version
+AD4-
+AD4-
+AD4- +AFs-EXTERNAL EMAIL+AF0-
+AD4-
+AD4- On Mon, 2024-02-26 at 22:38 +-0000, Wall, Stephen wrote:
+AD4- +AD4- +AD4- Please note that we actually test running the 3.0.8 and 3.0.9
+AD4- +AD4- +AD4- validated versions of the FIPS provider with the 3.2 OpenSSL in
+AD4- +AD4- +AD4- the CI and it works. We are not aware of any problems with running
+AD4- +AD4- +AD4- the validated versions of the FIPS provider with the current
+AD4- +AD4- +AD4- OpenSSL versions.
+AD4- +AD4-
+AD4- +AD4- OK, so
+AD4- +AD4- https://urldefense.com/v3/+AF8AXw-https://github.com/openssl/openssl/issues/
+AD4- +AD4- 23400+AF8AXwA7ACEAIQ-LpKI+ACE-m4FTaZF0-kz3NQm8Y9WvC4n233dgbq01QmEc+AF8-C-
+AD4- +AD4- 2XrCWwWFFRtkaMjD
+AD4- +AD4- i6t8tcws2hmT529ayVVlzqPunWH8qZw+ACQ- +AFs-github+AFs-.+AF0-com+AF0- doesn't actually
+AD4- +AD4- prevent OpenSSL from working, it's just an issue with +AGA-openssl
+AD4- +AD4- fipsinstall+AGA-.  I hadn't followed it closely enough, just briefly
+AD4- +AD4- saw some some messages go past.
+AD4-
+AD4- Yeah, that issue is not really preventing the 3.0.x FIPS provider
+AD4- working with subsequent OpenSSL releases. It's just a matter of a
+AD4- minor FIPS compliance issue. (Depending on different views it might
+AD4- matter for the FIPS compliance or not.)
+AD4-
+AD4- +AD4- Good to know.  Will the same apply to the 140-3 module and OpenSSL
+AD4- +AD4- 3.2?
+AD4-
+AD4- Yes, that is and always was the intention. The FIPS provider is built
+AD4- in a way that it can be used with any other version and the same
+AD4- applies to third party providers.
+AD4-
+AD4- --
+AD4- Tom+AOEBYQ- Mr+AOE-z, OpenSSL
+AD4-

--
Tom+AOEBYQ- Mr+AOE-z, OpenSSL





[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux