[openssl/openssl] 8353b2: fips: document that the EdDSA algorithms are not-v...

Pauli noreply at github.com
Tue Jan 24 12:38:25 UTC 2023


  Branch: refs/heads/master
  Home:   https://github.com/openssl/openssl
  Commit: 8353b2dfacd723db5ba8b833b95e68e9600d1cf5
      https://github.com/openssl/openssl/commit/8353b2dfacd723db5ba8b833b95e68e9600d1cf5
  Author: Pauli <pauli at openssl.org>
  Date:   2023-01-24 (Tue, 24 Jan 2023)

  Changed paths:
    M doc/man7/OSSL_PROVIDER-FIPS.pod
    M doc/man7/fips_module.pod
    M doc/man7/migration_guide.pod

  Log Message:
  -----------
  fips: document that the EdDSA algorithms are not-validated

Ed25519 and Ed448 are included in the FIPS 140-3 provider for
compatibility purposes but are flagged as "fips=no" to prevent their accidental
use.  This therefore requires that applications always specify the "fips=yes"
property query to enforce FIPS correctness.

Reviewed-by: Tomas Mraz <tomas at openssl.org>
Reviewed-by: Hugo Landau <hlandau at openssl.org>
(Merged from https://github.com/openssl/openssl/pull/20079)


  Commit: 8948b5749410084ed1dfabf17a90df65efcf0f82
      https://github.com/openssl/openssl/commit/8948b5749410084ed1dfabf17a90df65efcf0f82
  Author: Pauli <pauli at openssl.org>
  Date:   2023-01-24 (Tue, 24 Jan 2023)

  Changed paths:
    M providers/fips/fipsprov.c

  Log Message:
  -----------
  Put X25519 and X448 back as approved algorithms

CMVP's answer when questioned about this being:

    X448 and X25519 uses Curve448 and Curve25519, respectfully, within an
    ECDH scheme.  Therefore, it is possible for a key agreement scheme
    that uses Curve448 and Curve25519 to be used in the approved mode
    and be viewed as an allowed algorithm if requirements of Scenario
    X2 of IG D.8 and IG A.2 are met (or Scenario 3 of D.F and IG C.A for
    FIPS 140-3).  The use of EdDSA in the approved mode is not permitted
    until FIPS 186-5 is published and part of CMVP guidance.

Reviewed-by: Tomas Mraz <tomas at openssl.org>
Reviewed-by: Hugo Landau <hlandau at openssl.org>
(Merged from https://github.com/openssl/openssl/pull/20079)


  Commit: d4e105f6d53002ebaac2caf0c723bbf734f4a21a
      https://github.com/openssl/openssl/commit/d4e105f6d53002ebaac2caf0c723bbf734f4a21a
  Author: Pauli <pauli at openssl.org>
  Date:   2023-01-24 (Tue, 24 Jan 2023)

  Changed paths:
    M CHANGES.md

  Log Message:
  -----------
  changes entry about non-approved FIPS algorithms

Reviewed-by: Tomas Mraz <tomas at openssl.org>
Reviewed-by: Hugo Landau <hlandau at openssl.org>
(Merged from https://github.com/openssl/openssl/pull/20079)


  Commit: d8523bf16205399363604c8fc90256791ad8c019
      https://github.com/openssl/openssl/commit/d8523bf16205399363604c8fc90256791ad8c019
  Author: Pauli <pauli at openssl.org>
  Date:   2023-01-24 (Tue, 24 Jan 2023)

  Changed paths:
    M test/fips-and-base.cnf

  Log Message:
  -----------
  test: note that a default property query must be included for FIPS validity

Reviewed-by: Tomas Mraz <tomas at openssl.org>
Reviewed-by: Hugo Landau <hlandau at openssl.org>
(Merged from https://github.com/openssl/openssl/pull/20079)


Compare: https://github.com/openssl/openssl/compare/bfd5680e6be7...d8523bf16205


More information about the openssl-commits mailing list