Displaying 20 results from an estimated 6000 matches similar to: "OpenSSH FIPS 140-2 support using OpenSSL FIPS modules?"
2015 Dec 07
2
OpenSSH FIPS 140-2 support using OpenSSL FIPS modules?
Thanks Roumen.
I have few more questions below:
1. What version of OpenSSH can the patch be applied to? What branch should
I check out the patch?
2.
>Impact is not only for source code. Build process has to be updated as
well. Red Hat is based on "fipscheck".
What build process should be changed? What is fipscheck?
3. My understanding any application (such as OpenSSH) which need
2015 Dec 04
2
OpenSSH FIPS 140-2 support using OpenSSL FIPS modules?
Thanks Jakub.
How does this patch match the OpenSSH source version? Does the patch only
applicable to OpenSSH version 6.6.1, or does other version available as
well?
Thanks.
On Fri, Dec 4, 2015 at 4:26 AM, Jakub Jelen <jjelen at redhat.com> wrote:
>
> On 12/04/2015 03:26 AM, security veteran wrote:
>
>> 3. Is there a way to re-compile OpenSSH by turning on/off some flags
2015 Dec 07
2
OpenSSH FIPS 140-2 support using OpenSSL FIPS modules?
Thanks Roumen.
>Lets assume that application use OpenSSL FIPS validated module. FIPS mode
is activated in openssl command if environment variable OPENSSL_FIPS is
set. Similarly I use OPENSSL_FIPS environment variable to activate FIPS
mode. Code will call FIPS_mode_set(1) if crypto module is not FIPS mode.
Did you mean the FIPS patched OpenSSH server and client (such as
ssh-keygen) always
2007 Mar 01
2
OpenSSH use of OpenSSL in FIPS Mode
Now that OpenSSL has received FIPS 140-2 certification, does anyone know
if the work started a couple of years ago to allow OpenSSH to use
OpenSSL in FIPS mode will be reactivated?
Bill
2023 Mar 10
2
OpenSSH FIPS support
On Fri, Mar 10, 2023 at 10:27?AM Joel GUITTET
<jguittet.opensource at witekio.com> wrote:
> We currently work on a project that require SSH server with FIPS and
> using OpenSSL v3.
Gently: this is meaningless. You probably mean one of the following:
1. The SSH server implementation is required to use only cryptographic
algorithms that are FIPS-approved.
2. The SSH server
2004 Jun 04
2
Patch for FIPS 140 mode - take 3
Greetings.
(Third try at sending this, the first two seemed to disappear without a
trace.
Perhaps use of MS Outlook was the problem, even though in plain text...? Or
attachment too big (22Kb)? Would like to know...)
The final source code and documentation package for a FIPS 140 validated
mode
of OpenSSL was recently submitted. Once the final certification is
awarded by
NIST, in a month or
2010 Nov 25
3
Announce: new team member (to work on Mozilla NSS port)
Dear fellows,
As you have probably seen, NUT has had a recent boost through the help of
Eaton.
Frederic Bohe (contractor for Eaton France) has worked on Augeas, and is now
working the Windows port.
Chetan Agarwal, seconded by Prashi Gandi (both from Eaton India) are working
on XCP and quality / validation related projects.
I'm now pleased to announce that Emilien Kia (contractor for Eaton
2023 Mar 10
1
OpenSSH FIPS support
Hi Joel,
Joel GUITTET wrote:
> Hi,
> We currently work on a project that require SSH server with FIPS and using OpenSSL v3.
There is no way to work with OpenSSL v3 due to many reasons.
If you like to get FIPS capable secsh implementation compatible with OpenSSL FIPS validated modules 1.2 and 2.0 , RedHat ES, or Oracle Solaris you could use PKIX-SSH.
Regards,
Roumen Petrov
--
Advanced
2015 Dec 07
2
OpenSSH FIPS 140-2 support using OpenSSL FIPS modules?
On 12/04/2015 10:02 PM, security veteran wrote:
> Hi Jakub,
>
> Another question I have is, are there any changes in this patch RedHat
> Linux distribution specific? The reason I ask is, if I port the changes to
> other Linux distribution like Debian or Ubuntu, do you see any issues?
I don't think there is something distro-specific. Distro specific parts
are handled in other
2014 Feb 17
1
[ DRAFT PATCH ] - FIPS 140-2 patch for OpenSSH 6.5p1
Hi,
Here is FIPS 140-2 patch for OpenSSH 6.5p1. Since our expertise in OpenSSH
code is limited, request moderators to validate this patch and update as
required.
Regards,
Manish Jagtap
2002 Sep 27
2
FIPS 140-2 certification
Hello everyone!
I work for a company that uses OpenSSH to remotely support systems we've
sold. Since some of our clients are US Dept. of Defense hospitals, our
access to these servers needs to comply with a whole range of
requirements and standards. At this point it's looking like the SSH
daemon needs to be FIPS 140-2 compliant, and the only package that is
certified is F-Secure.
2010 Mar 15
1
5.4p1 and FIPS 140-2
My office is working with government contracts, and it appears that they
are wanting FIPS enabled OpenSSL and OpenSSH is coming in the next year.
We have been able to compile OpenSSL to create the container, but all
the diffs to enable FIPS 140-2 in OpenSSH are for 5.3p1. Will the diffs
from:
https://bugzilla.mindrot.org/attachment.cgi?id=1789&action=edit
build in 5.4p1 will a little
2018 Mar 16
3
using sshd in fips mode
Hi,
We would like to use openssh in fips mode. It looks it is not provided as a
configurable option through sshd_config, Are there plans to do incorporate
such change.
Do we have to change openssh code for now until the option is provided.
If sshd is operating in fipsmode, does it provide additional errors/audits
to indicate failures such as pair wise consistency failed during on of the
sshd
2008 Apr 21
3
FIPS 140-2 OpenSSL(2007) patches
Hi,
I am happy to (re)send a set of patches for compiling OpenSSH 4.7p1 with
FIPS 140-2 OpenSSL.
These are based on previously reported patches by Steve Marquess
<marquess at ieee.org> and Ben Laurie <ben at algroup.co.uk>,
for ver. OpenSSH 3.8.
Note that these patches are NOT OFFICIAL, and MAY be used freely by
anyone.
Issues [partially] handled:
SSL FIPS Self test.
RC4,
2023 Aug 17
21
[Bug 3603] New: ssh clients can't communicate with server with default cipher when fips is enabled at server end
https://bugzilla.mindrot.org/show_bug.cgi?id=3603
Bug ID: 3603
Summary: ssh clients can't communicate with server with default
cipher when fips is enabled at server end
Product: Portable OpenSSH
Version: 9.4p1
Hardware: All
OS: Linux
Status: NEW
Severity: critical
2013 Oct 10
3
FIPS 140-2 patch for openssh 6.3.p1
Hi,
Is FIPS 140-2 patch for openssh 6.3.p1 available somewhere or do I have to
make one using
http://www.openssl.com/export/openssh/openssh-6.0p1.fips-revised.patch ?
Regards,
Manish
2011 Aug 03
0
OpenSSH and FIPS 140-2
Does anyone knows why in some OpenSSH patches for FIPS we have something like:
SSLeay_add_all_algorithms();
if (FIPS_mode() && !FIPSCHECK_verify(NULL, NULL)) {
fprintf(stderr,
"FIPS integrity verification test failed.\n");
exit(3);
}
This block of code is always in main() soon after starting
service/client. Why are they
2013 Sep 10
4
[Bug 1647] Implement FIPS 186-3 for DSA keys
https://bugzilla.mindrot.org/show_bug.cgi?id=1647
mackyle at gmail.com changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |mackyle at gmail.com
--- Comment #2 from mackyle at gmail.com ---
RFC 6668 [1] (2012-07) updated RFC 4253 adding the SHA-256 data
2013 Sep 10
4
[Bug 1647] Implement FIPS 186-3 for DSA keys
https://bugzilla.mindrot.org/show_bug.cgi?id=1647
mackyle at gmail.com changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |mackyle at gmail.com
--- Comment #2 from mackyle at gmail.com ---
RFC 6668 [1] (2012-07) updated RFC 4253 adding the SHA-256 data
2011 Jun 28
3
FIPS 140-2 compliance
I''ve just posted a feature request
<http://projects.puppetlabs.com/issues/8120> relating to FIPS 140-2
compliance. I''m pointing to it here on the mailing list because I listed
there five places where Puppet (nay, Ruby!) crashed while I was testing
a deployment using FIPS mode on all hosts. It crashed because it tried
to use MD5, and OpenSSL in FIPS mode doesn''t let