OpenSSL Receives FIPS 140-2 Validation 46
Argon writes "Close on heals of NewsForge reporting about Government Agency dragging its heels on OpenSSL validation comes the news that OpenSSL receives FIPS Certification. More details are available at the Open Source Institute site which has been driving the effort to get OpenSSL certified.
FIPS 140-2 certification allows software using the certified version of OpenSSL to get into various Government departments previously not possible, thus increasing penetration of Free Software in Government."
Re: (Score:1)
"Pending" for 2 weeks (Score:5, Informative)
From http://www.oss-institute.org/ [oss-institute.org]
Two points to remember please: a) the validation is still considered
"pending" until it is posted on the NIST site...in no more than 2
weeks from the announcement date -- NIST official protocol, and b)
the validation does not immediately solve all FIPS 140-2 compliance
issues.
The big thing available now is "OpenSSL Security Policy Version 1.0"
http://oss-institute.org/images/OpenSSL_SecurityP
This document is required as a part of the FIPS 140-2 validation
process. It describes the OpenSSL FIPS cryptographic module in
relation to FIPS 140-2 requirements. The companion document
OpenSSL FIPS 140-2 User Guide (Reference 14)is a technical
reference for developers using, and system administrators
installing, the OpenSSL FIPS software, for use in risk assessment
reviews by security auditors, and as a summary and overview for
program managers.
The "validated OpenSSL USER GUIDE" will be available within two weeks
of the announcement date.
No sign yet of OpenSSL 0.9.7j on the openssl site.
There is an email list available for updates:
http://mail.oss-institute.org/mailman/listinfo/fi
Annoying license (Score:2, Informative)
OpenSSL essentially uses the BSD license w/attribution, which makes it difficult to use with GPLd projects, unless you use the version provided by your distro -- which isn't always desireable.
non-Viral == Annoying??? (Score:5, Insightful)
OpenSSL is one of those cool projects that would be so much cooler if it weren't for the stupid license that makes it a PITA to actually employ in a product. OpenSSL essentially uses the BSD license w/attribution, which makes it difficult to use with GPLd projects, unless you use the version provided by your distro -- which isn't always desireable.
Okay, maybe this is a question of semantics, but since when did a non-viral open source license qualify as "annoying"?
Re:non-Viral == Annoying??? (Score:2)
Re:non-Viral == Annoying??? (Score:2)
Re:non-Viral == Annoying??? (Score:2)
Okay, maybe this is a question of semantics, but since when did a non-viral open source license qualify as "annoying"?
The OpenSSL license is just as "viral" as the GPL (actually, it's copyright that's viral, but I'll ignore that). The attribution clause "infects" any software which uses OpenSSL. In many cases, OpenSSL's restriction is less constraining than the restrictions in the GPL, but it is a restriction, and it does annoy some people -- mainly those using free software licenses that don't allow t
Mod parent uninformative (Score:2)
BSD License is strictly less demanding, and you CAN use any BSD library or project inside a GPL project without ANY problems with licenses. This is because BSD License doesn't prevent distribution of source code with a product, and GPL requires it. BSD License doesn't care about the software-is-free dogma thingy in the
Re: Mod Reply clueless (Score:3, Informative)
The original BSD license included an "Advertising Clause". That advertising clause is incompatabile with the GPL (because it adds additional restrictions to your use and distribution of the software) and is a rather annoying and useless artifact.
The University of California removed the advertising clause in 1999. OpenSSL and its predessessor, SSLeay, require attribution on all marketing material.
Here is the original BSD license... clause 3 is the advertising clause:
* Copyright (c) 1982, 1986, 1990, 1
Re: Mod Reply clueless (Score:2)
Though it's inconvenient, I don't see how the clause makes it strictly incompatible with GPL. Anyone know why it says so in http://www.gnu.org/philosophy/license-list.html [gnu.org] ?
Re: Mod Reply clueless (Score:2)
"NetBSD comes with a long list of different sentences, required by the various licenses for parts of the system. In a 1997 version of NetBSD, I counted 75 of these sentences. I would not be surprised if the list has grown by now."
Say Apache required those 75 attribution sentences, and say someone at IBM working on the IBM HTTP server (based on Apache) erroneously mangled or deleted a few of those attributions. Now IBM can be sued for
Re: Mod Reply clueless (Score:2)
Besides, which is more restrictive, the "obnoxious BSD advertising clause" or the GPL "conspicuously" clause?
Re: Mod Reply clueless (Score:2)
Re: Mod Reply clueless (Score:2)
Is this different, and why?
Re:Annoying license (Score:3, Insightful)
Re:Annoying license (Score:2)
So will this end gnutls ? (Score:2, Interesting)
But what I do find frustrating is when
Re:So will this end gnutls ? (Score:2)
I know it's terrible isn't it? You've got FreeBSD, NetBSD, OpenBSD and all the others - wha
Re:So will this end gnutls ? (Score:2, Insightful)
You yourself listed beeing not free (enough) as one of the reasons you do not claim nonsense
I personally don't mind there beeing 2 projects, if any one dies we still have the other one.
Re:So will this end gnutls ? (Score:3, Insightful)
Think of it as the computer equivilent to a kit car. Impractical and done mainly for the benifit of the person doing it. Every once in a while someone creating a one off car comes up with something really innovative, but most of the time it is just a single persons hobby that no one really cares about.
With the nominal distribution and reproduction cost of software however, each creation has a
Is the end of RSA Security (the company)? (Score:3, Interesting)
Re:Is the end of RSA Security (the company)? (Score:3, Interesting)
Does an OpenSSL FIPS 140-2 module signal the end of RSA Security. Other than their SecureID tokens RSA do not seem to have a lot more to offer.
FIPS 140-2 is basically a standard correctly and security of an algorithm. OpenSSL implements things like the RSA algorithm, and their implementation has been certified as "safe" for government use to a certain level of assurance. This doesn't have anything to do with RSA Security (the company), SecureID, or anythin
YAY (Score:2, Funny)
What is FIPS Validation?
I assume.... (Score:2)
Because under FIPS, the only allowable algorithms are 3DES-CBC for encryption and SHA1 for HMAC.
If you allow anything else to be used, it is not "FIPS compliant".
Re:I assume.... (Score:4, Informative)
Could you cite your sources? From what I can tell, the FIPS [nist.gov] 140-2 [nist.gov] list of Approved Security Functions [nist.gov] includes AES, and Triple-DES, as well as (curiously) DES and Skipjack[1].
For AES, the ciphers can be operated in the ECB, CBC, CFB, OFB, CTR [nist.gov], CMAC [nist.gov], and CCM [nist.gov] modes of operation.
Approved hash functions include SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512. Keyed hashing must be done using HMAC, but you can use various DES MACs, as well as CCM mode, for message authentication.
Interestingly, what this basically means is that FIPS 140-2 compliance does not imply that your system is secure. All it means is that the government can use it.
[1] Can somebody please check this? I vaguely remember DES and Skipjack being withdrawn, but I can't find the documentation for that.
Re:I assume.... (Score:2)
Memory, which in this case appears to have been slightly faulty.
Anyway, my point was that OpenSSL supports an awful lot of stuff that you're not going to be able to use in a FIPS compliant system.
How is that going to be handled? Some kind of switch or a separate distribution? I know that where I work we have our own distribution of OpenSSL without any of the funky ECC stuff (because it's patented up the wazoo by Certicom and we don't want to get sued) or the really weak algorithm
Re: (Score:2)
Re:I assume.... (Score:4, Informative)
Because under FIPS, the only allowable algorithms are 3DES-CBC for encryption and SHA1 for HMAC.
If you allow anything else to be used, it is not "FIPS compliant".
Two issues. Firstly, AES is acceptable these days for the symmetric cipher and that is supported in TLS. Secondly, the strict requirements about what ciphers are available does not, as far as I know, apply if it's just a FIPS 140-2 level 1 validation which is basically a validation that the FIPS certified ciphers in the library function as required. If they have gone for FIPS 140-2 level 2 then then any key management functionality (such as key wrapping) must use FIPS certified ciphers but one can usually still allow users to use other ciphers. This is important since SSL requires both MD5 and SHA-1 for some of it's obscure MAC functions.
Level 1 (Score:3, Interesting)
The article notes that OpenSSL has achieved level 1, "the lowest of four possible validation levels". It should be noted, however, that level 1 is also the only level achievable by a software implementation. Level 2 requires physical "tamper evidence", which isn't achievable without something physical on which the tampering would be evident. Just for completeness, level 3 and level 4 require different degrees of "tamper resistance".
Re:Level 1 (Score:2)
This is not the case. There are several software implementations that have achieved FIPS 140 level 2 validation, more notably the Netscape Security Services (NSS) library which is now maintained by the Mozilla team: http://www.mozilla.org/projects/security/pki/ [mozilla.org]
Re:Level 1 (Score:4, Informative)
Re:Level 1 (Score:3, Informative)
Sort of. To be tested, a software module has to be deployed on some specific piece of hardware conforming to some defined tamper evident/resistant properties. A level 1 certification means that the selected platform didn't have the requisite properties. That doesn't have anything to do with the quality or security of the software, however, it just means that whoever was paying for the certification didn't want to pay for the more expensive hardware and testing.
So I guess I should have said "a software
This could be BIG (Score:5, Informative)
As a side note, it never seemed as if Microsoft's failure to get CC validations promptly ever slowed down IIS or XP deployments, but it's been a major roadblock for any other systems to get through DITSCAP if there was any possible reason to deny the request.
FIPS accreditation removes the final roadblock for open source in the federal government. Now there is not a single valid policy or security requirement that can block deployments of open source systems.
Also of note is that since anyone can use OpenSSL, small development shops are no longer held hostage to Certicom's expensive licensing schemes if they want to deploy FIPS compliant solutions. It used to be financially daunting to sell software to the government that included crypto, and this created a nice, safe sandbox for the small set of approved vendors to charge outrageous prices for FIPS compliant solutions. Now they have to compete with open source, which will likely bring costs down considerably for anyone required to deploy only FIPS compliant solitions.
Another poster mentioned that this restricted the choice of encryption algorithms to 3DES. That is incorrect. FIPS 140-2 is an AES implementation, specifically because of concerns over 3DES' long-term viability. There are no approved 3DES implementations under FIPS 140-2.
Cool! (Score:3, Interesting)
Free Software "penetration" (Score:2)
Why no 1.0 (Score:2)
Church of Newsforge (Score:2)