OpenSSL loses FIPS 140-2 Certification (Or Not) 102
OhHellWithIt writes "Government Computer News reported on Tuesday that OpenSSL has lost FIPS 140-2 certification, only six months after receiving it. It sounds like bad news for those of us who would like to see open source gain more of a foothold in U.S. federal workplaces." Readers have updated this story with an update saying the certification has shifted again.
I'm guessing (Score:5, Funny)
Re:I'm guessing (Score:2, Insightful)
I of course, can't really back that up, but that's what it seems like to me.
Stupid Politics (Score:4, Interesting)
... NIST is not saying why the certificate was removed.
Stupid politics.
Re:Stupid Politics (Score:1)
Re:Stupid Politics (Score:4, Interesting)
Re:Stupid Politics (Score:1)
Re:Stupid Politics (Score:4, Insightful)
It should have nothing to do with the recipient of the certification; it should be based on whether the product meets certain well established and reasonable criteria, given the best information at the time.
Furthermore, it makes sense not to tell the world exactly what the vulnerability you found which caused the product to be decertified, until your agencies can stop using it, which is not overnight.
However.
What doesn't make sense is concealing this from the organization that obtained the certification to begin with, and presumably could save the Federal government much cost and inconvenience by addressing the problem. IN fact, it's terrible.
How can we know this wasn't done as favor to a political contributor?
We can't.
Even before 9/11, the stance of this administration has been that explaining its reasons for doing things -- only in certain situations mind you -- unduly hampered it's ability to get frank and unvarnished advice from industry. Leaving aside that no presidency in living memory ever felt this to be a problem, we have to decide. We either can know that our officials aren't taking payoffs, OR we deprive those officials of advice whose nature is such that if we knew what it was there would be a public scandal.
If that last sentence seems hard to parse, it's because it doesn't make any sense. The underlying premise is absurd: that public officials need to be able to do shameful things.
Re:Stupid Politics (Score:2)
Re:Stupid Politics (Score:2)
Yes, of course it always could lie. But you risk getting caught. The actual process of "substantiating security concerns" would leave a paper trail.
Especially when it comes to national security, you need to be able to prove that your product works.
Logically, if by "works" you mean "co
Re:Stupid Politics (Score:2)
What doesn't make sense is concealing this from the organization that obtained the certification to begin with, and presumably could save the Federal government much cost and inconvenience by addressing the problem. IN fact, it's terrible.
It makes sense to conceal it from the organization... temporarily. Until you get your machines switched over to some other secure system if you found a major security hole in theirs.
Although the
Re:Stupid Politics (Score:2)
I think you make a good point here. However, it's not clear that there is a plan for switching the machines over. The process is opaque, in a way that I think does not really do much for security.
Although the protocol was certified, that doesn't mean that every person in the organization which made it has passed a 'top-secret'
Re:Stupid Politics (Score:2)
Re:Stupid Politics (Score:2)
Biased Reporting (Score:2)
I haven't followed along with this project, but it doesn't sound that bad. There was a technical issue, they lost their cert. They fixed the technical issue and resubmitted. Screwiness ensues as their cert disappears, then reappears as suspended (which it already had been
Re:Stupid Politics (Score:1)
More like "stupid microsoft money".
Related Links (Score:1, Funny)
Weasel words (Score:3, Funny)
Then what honest reason is there for HAVING different terms?
Re:Weasel words (Score:3, Insightful)
Re:Weasel words (Score:1)
Reasons Not Given? (Score:5, Insightful)
This is one of the most ridiculous statements I've ever read. How is the problem supposed to be fixed if the vendor is never told what the problem is, and so what if it's proprietary? When I read a statement like this it suggests to me that there's doesn't have to be a method behind how they determine what's rejected and what's not, the person(s) deciding could have simply had a proprietary "I'm in a bad mood today and want to take it out on someone" reason.
Re:Reasons Not Given? (Score:2)
Re:Reasons Not Given? (Score:2, Informative)
They would not tell the person researching/writing the article why it was revoked.
Re:Reasons Not Given? (Score:5, Interesting)
I wrote a letter requesting the specific reason for this and was told that that information was proprietary and might disclose operational procedures.
So let's review. I give them almost 20 pages of documentation, agree that they can ask questions about me from family members, relatives,neighbors, etc., agree to let them do a credit check on me and contact other law enforcement agencies to see if I have a record, answer an entire booklet of psychological questions, undergo two polygraph tests, a blood test and urinalysis and they won't tell me how they came to their decistion because in doing so it might reveal how they gather the information.
Um, yeah.
Re:Reasons Not Given? (Score:3, Funny)
Dear Smooth Wombat,
You had heroin in your system and traces of anally absorbed KY Jelly.
Regards,
Three Letter Agency
Re:Reasons Not Given? (Score:5, Funny)
Recommendation: REJECT
Reason:
Psych models predict subject shows high likelihood
of revealing operational procedures to Slashdot
Re:Reasons Not Given? (Score:2, Insightful)
think about it, if they told you why they rejected you, you could tell someone else what to do in order to pass that part of the test, thus jeopardising the validity of future tests.
Re:Reasons Not Given? (Score:2)
Yeah, because polygraphs have such a great reputation for validity, right?
You can learn to make them show whatever answer you want, and they can return false positives on people not lying. When you can't trust the answer in either direction, it doesn't say much for the test.
The courts don't accept polygraphs as evidence for a reason. It doesn't exactly give me the warm-n'-fuzzies that the so-called "intelligence" community doesn't have the same level o
Re:Reasons Not Given? (Score:2)
Because the Scientologists would charge more than the poligraphers?
My understanding of the FIPS140 program is that they are required to give reasons for rejection. It is ten years since I did one but that was the case then.
There is a difference though between providing an instant reply in email and spending a couple of months crafting a
Re:Reasons Not Given? (Score:1)
perhaps the testers just took the polygraph readings with a grain of salt; perhaps they used them purely to measure stress rather than to detect lies; perhaps they used the polygraph readings in conjunction with other lie detection measures such as body language and voice stress. the thing is they arent going to tell you what happened one way or the other,
Re:Reasons Not Given? (Score:2)
Re:Reasons Not Given? (Score:2)
And then there's the oppenheimer moments: Doin' cool stuff that is given a usage scenario that seems noble/harmless enough, but losing sleep as you consider all the ways yo
Re:Reasons Not Given? (Score:2)
Since I was absolutely truthful when asked every question my only thoughts would be either:
1) because I was truthful they didn't want someone like me
2) the polygraph had no idea how to handle complete honesty.
Either way, with the way things have gone since then, I'm glad I didn't get the position.
Reasons were given, but not to the public. (Score:1)
I don't know what the specific problem is with their module validation, but it's probably more of a paperwork issue than a technical problem. There
Re:Reasons Not Given? (Score:2)
This is one of the most ridiculous statements I've ever read. How is the problem supposed to be fixed if the vendor is never told what the problem is, and so what if it's proprietary?
I believe the answer is, you hire a consulting group who just happens to be buddies with the department in question. After paying them a pile of money, they get whatever agency to "certify" your software in some ridiculous and meaningless way. It is just the normal price of doing business in the sector.
One piece of software
I got this in the fips-nis-update mailing list (Score:5, Informative)
http://oss-institute.org/index.php?option=content
OpenSSL Module Certification Number 642: back on again...
To: OSSI
From: DOMUS IT Labs
RE: Status of OpenSSL Module (Certification #642)
I received a call this afternoon (Tuesday, July 18, 2006) from the NIST side from the CMVP. They have indicated that certificate #642 had incorrectly been marked as "revoked" during the web site update on Friday 14-Jul-2006. The CMVP has returned the certificate to its "not available" status and posted the following explanation regarding the terminology:
If a validation certificate is marked not available, the module is no longer available for procurement, but may still be retained and used to demonstrate compliance to FIPS 140-1 or FIPS 140-2.
If a validation certificate is marked as revoked, the module validation is no longer valid and may not be referenced to demonstrate compliance to FIPS 140-1 or FIPS 140-2.
Refer to http://csrc.nist.gov/cryptval/140-1/1401val.htm [nist.gov]
Updated and resubmission continues on previous schedule.
----
it's never boring, that I can promise you.
stay tuned.
jmw
--
John M. Weathersby, Jr.
Executive Director
Open Source Software Institute
www.oss-institute.org
tel: 601.427.0152
Ad maiorem dei gloriam (AMDG)
Audentes fortuna juvat
Re:I got this in the fips-nis-update mailing list (Score:2)
Re:I got this in the fips-nis-update mailing list (Score:3, Interesting)
Saving$ are for Sucker$ (Score:4, Informative)
Just speculating here, but maybe it is due to 'competition' by a high-priced commercial alternative that was pushed through by lobbyists?
Why save US taxpayers hundreds of thousands of dollars when you can benefit yourself and rack up huge profits for your corporate friends?
Further reading: http://www.boston.com/news/local/maine/articles/2
"Audit finds iPods, dog booties on Homeland Security credit cards By Lara Jakes Jordan, Associated Press Writer | July 19, 2006
WASHINGTON --Wielding government-issued credit cards, Homeland Security employees racked up hundreds of thousands of dollars in unjustified expenses last year, including booties for rescue dogs, iPods, designer rain jackets and beer-making equipment, a congressional audit shows."
Re:Saving$ are for Sucker$ (Score:1)
Re:Info (Score:1)
I would say that for better or for worse, Steve is as heavily vested in Linux/Unix and FOSS as any of your most vocal supporters here on Slashdot. The notion of him bowing down to some pressure to replace OpenSSL with some other vendors implementation is just beyond conceivable.
Re:In current news... (Score:4, Interesting)
Weathersby said the problems have been corrected and the workaround submitted to the certifying laboratory, Domus IT Security Laboratory of Ottawa, for re-evaluation.
Weathersby said the results of the re-evaluation would be submitted to CMVP for a final review and reinstatement of the certificate.
Seems like we're in for a wait.
FOIA? National Security?? (Score:3, Informative)
Could someone explain how a flaw discovered in public source code is "proprietary"?!
Are they saying they can't tell anyone what's wrong with it because it would reveal some sort of flaw in SSL to 'terrorists'? Will this stand up to the Freedom of Information Act?
And then.. if the developers via divine intervention determine what the problem is, does this mean they can't put comments in the open source describing it?!
Rediculous.
Re:FOIA? National Security?? (Score:1, Insightful)
Re:FOIA? National Security?? (Score:3, Informative)
Why would the OpenBSD project make public announcements on behalf of the seperate OpenSSL pro
Re:FOIA? National Security?? (Score:1)
It's just like that "Ars" company that ran that Digita site and that Technica site.
Re:FOIA? National Security?? (Score:2)
That's because (Score:3, Funny)
Politics != Security (Score:5, Insightful)
This doesn't bother me so much on its face; OpenSSL can only get better after this intense review. What bothers me is that the "opposing forces" are not likely receiving the same level of scrutiny and yet presumably are fully certified for sensitive information by the US government.
But of course they can't release the code for everyone else to review. People might steal their ideas, right? So how do we know they are secure rather than "mostly secure"? Or even worse, that they are "sort of secure, but the right people were taken out to dinner."
Re:Politics != Security (Score:2)
Re: Thank you proprietary competitors! (Score:2)
If you work within the DoD (Score:2)
this is good. (Score:1)
Re:this is good. (Score:1)
So, don't get discouraged; changes will be made, recertification will happen, and OpenSSL will emerge better for the experience!
Re:this is good. (Score:2)
Re:this is good. (Score:2)
Strange (Score:1)
FTA:
"The certificate apparently was suspended in June when questions were raised about the validated module's interaction with outside software elements."
"NIST is not saying why the certificate was removed."
Sounds like an inside job to me
ahem (Score:1, Troll)
It means nothing other than your implementation of an algo is correct. It doesn't mean you used it right.
Tom
Re:ahem (Score:1, Troll)
Tom
Re:ahem! (Score:2)
FIPS certification is largely meaningless outside of RNG and EM testing.
Tom
Re:ahem (Score:2)
Tom
Certifiably Broken (Score:2)
I'm not surprised that this procurement certification is broken. Bush's top procurement official got bus [google.com]
FYI: Openssl FIPS Details (Score:2)
Also keep in mind the Openssl project can't modify the fips-certified code parts. It would have to go back for certification and I doubt Novell/HP and ? want to pay for that again and again.
It would be interesting to hear if distros (or any users) are building and using it in applications in the FIPS mode.
Obligatory link: http://oss-institute.org/fips-faq.html [oss-institute.org]
Re:FYI: Openssl FIPS Details (Score:1)
Mozilla NSS is open-source and FIPS140-1 validated (Score:1)
I would like to point out however that Mozilla's NSS (Network Security Services) library is also open-source, performs much of the same functions as OpenSSL, and has been previously FIPS140-1 validated several times - the first validation was over 5 years ago. A FIPS140-2 validation is ongoing. See http://www.mozilla.org/projects/security/pki/nss/f ips/ [mozilla.org] fo
Big deal.... (Score:2)
Let the companies buy an SSL approved mechanism, they have the cash. We sell an appliance that has SSL built in, the cost of the appliance can be up to 250k and above.