FIPS provider too conservative with legacy checks?

Thomas Dwyer III thomas.dwyer at oracle.com
Fri Jun 9 18:27:21 UTC 2023


Our organization signs image artifacts with 2048-bit DSA keys before 
releasing them to the field. Some of these signatures fail to verify 
when using the OpenSSL 3.0 FIPS provider. It turns out that while most 
of our signing keys are (L,N)=(2048,256), two early keys created long 
ago are (2048,160) and the signatures that fail to verify were created 
with these keys. Disabling security checks in the configuration file 
resolves this but I'd prefer not do that and inadvertently let something 
else non-compliant go undetected.

I discovered this code in providers/common/securitycheck.c:

         /*
          * For Digital signature verification DSA keys with < 112 bits of
          * security strength (i.e L < 2048 bits), are still allowed for 
legacy
          * use. The bounds given in SP800 131Ar2 - Table 2 are
          * (512 <= L < 2048 and 160 <= N < 224)
          */
         if (!sign && L < 2048)
             return (L >= 512 && N >= 160 && N < 224);

I am by no means an expert in cryptography but this logic does not seem 
to match my interpretation of the spec which for legacy use allows:

     ((512 <= L < 2048) or (160 <= N < 224))

with "or" being the operative word here. OpenSSL is making this an "and" 
condition. Doesn't 800-131Ar2 allow (2048,160) when verifying a DSA 
signature, or am I misreading the spec?


Thanks,
Tom.III
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://mta.openssl.org/pipermail/openssl-users/attachments/20230609/2f6b015b/attachment.htm>


More information about the openssl-users mailing list