LibreSSL 2.2.2 Released 33
An anonymous reader writes: LibreSSL 2.2.2 has been released. According to the release notes: "This release marks the end of the OpenBSD 5.8 development cycle,
featuring expanded portable build support, code improvements, removal of obsolete workarounds....The LibreSSL project continues improvement of the codebase to reflect modern, safe programming practices. We welcome feedback and improvements from the broader community. Thanks to all of the contributors who helped make this release possible." This is the first LibreSSL release that has completely removed SSLv3 support.
Is it FIPS certified? (Score:5, Interesting)
Re: (Score:3, Insightful)
I'm no expert, but didn't LibreSSL remove support for some algorithms mandated by FIPS that are known to be insecure? I could be wrong, but I have the impression that it can't be certified because the standard itself is compromised.
Re: (Score:3)
I'm no expert, but didn't LibreSSL remove support for some algorithms mandated by FIPS that are known to be insecure? I could be wrong, but I have the impression that it can't be certified because the standard itself is compromised.
As I understand it, FIPS dictates that if encryption is used, the encryption used must be FIPS certified. If they remove cipher X, then clearly you're not using cipher X and it doesn't need to be FIPS certified. I don't think FIPS dictates the list of required available ciphers, just the list of allowed ciphers.
I reserve the right to be wrong and corrected, mind.
Re: (Score:2, Informative)
You are correct. You may not include a disallowed cipher suite, but you are free to omit any you desire if you feel them to be insecure.
Re:Is it FIPS certified? (Score:4, Interesting)
Generally, FIPS certification would only include things you do, and mandate how to do them. For example, if you implement AES256-GCM, you will have to demonstrate that it is implemented according to the standard - NIST SP 800-38D, but you don't have to implement it.
Re:Is it FIPS certified? (Score:5, Informative)
We have a viable alternative. It's called NSS from Mozilla, and it's free of all patent encumberments that have plagued LibreSSL/OpenSSL/SSLeay to this day. It also offers FIPS compliance.
https://wiki.mozilla.org/NSS [mozilla.org]
Re: (Score:2)
Re: (Score:2)
OpenSSL does have a permissive license, but several of the algorithms are inappropriately and probably illegally included in that "license" because they aren't legitimate implementations, like IDEA, RC4 (arcfour), and RC6.
Re: (Score:1)
Re: (Score:1)
OpenBSD has already said they aren't going to pay for FIPS certification. The developers have no interest. However, that does not stop interested parties from working together to fund a FIPS certification project for LibreSSL. I nominate you to start it, since you want it so badly.
Re: (Score:3)
Re: (Score:2)
> you still have to have someone create test harnesses, write docs and so on.
Right, someone like... an "interested party".
Re: (Score:1)
No, it isn't, and it probably never will be. They've already said that they're not going to bother with pointless box-ticking exercises in security theater like FIPS.
Re: (Score:3)
As analogy, lets say you discovered cure for cancer that can be made at home from 5$-worth of household supplies. Until you get it FDA approved, people would still die from cancer.
Re:Is it FIPS certified? (Score:4, Informative)
Re: (Score:2)
Re: (Score:3)
Re: (Score:3)
...FIPS main goal is to mitigate people from making preventable mistakes from home-cooking crypto primitives. ...
The main goal of FIPS should be secure systems in today's dynamic security environment. Note the word "dynamic". Can FIPS move quickly enough?
Re: (Score:2)
...the common flaws and big disasters of this time were those created by so-called 'security professionals'...
Watching the OpenSSL fiasco unfold, what it looked like to me was that the OpenSSL project was all but taken over by some "security professionals" who were determined to continue sucking at the teat of FIPS consulting work.
.
They had no incentive to make OpenSSL secure, the only incentive they did have was to make OpenSSL complicated enough so that FIPS consultants were needed in order to gain FIPS certification.
Re: (Score:1)
What scares me is the number of OTHER libraries out there like this. Basically 'maintenance only'. Where the maintenance is just enough to get their next project done. We have built thousands of these little critters into our infrastructure that have not seen updates in years. The cleanup the LibreSSL guys are doing is basically dragging a project from 1992 into 2015. Using modern C constructs and a modern CRT. Throwing out CRT hacks that were needed because some platform had a crap CRT.
How many other
Re: (Score:2, Informative)
pfft. One of the complaints about openssl was that it tacked on code just to gain FIPS certification. So it gets certified, but now is still loaded with obsolete, insecure cruft that makes it less secure and vulnerable to attacks. In which case, its FIPS certification status is meaningless in terms of providing real security.
Re: (Score:2)
And you know what, if government red tape and paranoia against the people it was meant to serve has caused the government's systems to be more vulnurable to hackers from abroad, they got what was coming for them.
I feel bad for the government employees who had their personal information compromised. I don't feel bad for having official correspondences and documents that otherwise would be encrypted exposed due to security holes.
If the government wants their systems secure, they're going to have to work to ma
Re: (Score:2)
Re: (Score:2)
Non-FIPS-140 compliance is a feature, not a bug. FIPS 140 compliance means you've hacked your code to meet a long checklist of somewhat arbitrarily-chosen requirements, of which the majority don't make things any better (unless you had a really crappy product to start with), or even any sense in some cases, and some which make things a lot worse (e.g. mandated removal of fork-protection for the CSPRNG).
So if you want a secure alternative to OpenSSL, use LibreSSL. If you want braindead checkbox compliance
LibreTLS (Score:1)
since they're updating the whole code and project to the modern century (and even removing SSLv3), shouldn't they really be calling the project LibreTLS?