OpenSSH use of OpenSSL in FIPS Mode
Joshua Hill
josh-lists at untruth.org
Tue Mar 6 04:46:26 EST 2007
On Sun, Mar 04, 2007 at 05:13:10PM -0800, Stan Kladko wrote:
> Ask the vendor to supply a signed
> letter stating their application, product or module is a validated module or
> incorporates a validated module, the module provides all the cryptographic
> services in the solution, and reference the modules validation certificate
> number."
And that last part is the rub.
> A typical network protocol, such as IPSec/IKE, TLS, SSH, S-MIME or 802.11
> protocol family may provide a complex variety of services. Some of such
> services may have cryptographic nature and utilize Approved or allowed for
> use cryptographic algorithms, such as encryption, decryption, signatures,
> hashes, message digests and others. Other services provided by a network
> protocol may be of non-cryptographic nature, such as packet routing, packet
> assembly/disassembly, defragmentation, radio and link layer communications,
> firewalling, network address translation, address resolution, quality of
> service, re-transmission and others.
Though there may exist certain protocols that combine security and
non-security relevant functionality, the vast majority of IPSec/IKE,
TLS and SSHv2 _is_ security relevant from a FIPS 140 perspective.
> "Both IPSEC and EFS in Windows 2000, XP, and Server 2003 use the FIPS-140-1
> or FIPS 140-2 (as appropriate) evaluated Kernel Mode Cryptographic Module to
> encrypt the traffic packet data and file contents respectively if configured
> appropriately with the selections of FIPS compliant algorithms."
>
> A review of the Kernel Module Security Policy then shows that the module's
> services are specified as services performing cryptographic algorithms
> supported by IPSec/IKE(such as encryption/decryption and key agreement) and
> not as providing a full IPSec/IKE protocol impelementation. This could again
> serve as an illustration of the fact that non-cryptographic services of a
> particular protocol are in many cases implemented outside of a cryptographic
> module.
I think that we agree that one could design a module that does implement
all of the security relevant portions of a protocol. Is it done in the
case of Microsoft's Kernel Module? I have no idea, and I wouldn't care
to speculate.
Is this the case for OpenSSL's validated module, a case where literally
anyone with a bit of time on their hands can look at the module and
determine precisely what the module is (and is not) doing? I don't
think so.
In particular, within SSHv2 and TLS there are key agreement protocols.
(If we want to get all reference, you'll note that these protocols
are listed in FIPS 140-2's IG 7.1). As key establishment protocols are
security relevant, and thus the code that implements them must be included
within a FIPS boundary. Does it have to be included within the OpenSSL
sub-module? No, of course not. But if this functionality exists within
the "IT device", it does need to be included within SOME FIPS module.
Josh
More information about the openssh-unix-dev
mailing list