openssl-fips configure parameters to force IANA cipher suite compliance

classic Classic list List threaded Threaded
2 messages Options
Reply | Threaded
Open this post in threaded view
|

openssl-fips configure parameters to force IANA cipher suite compliance

OpenSSL - User mailing list

I want to build an openssl-fips canister to force IANA cipher suite compliance.  

 

With the help of an openssl-iana mapping (https://testssl.sh/openssl-iana.mapping.html) I can identify the corresponding OpenSSL cipher suites.

 

IANA                                                                                                                                                                     OpenSSL

TLS_RSA_WITH_AES_128_CBC_SHA as defined in RFC 5246                                                           [0x2f] AES128-SHA          

TLS_RSA_WITH_AES_128_CBC_SHA256 as defined in RFC 5246                                                    [0x3c] AES128-SHA256

TLS_RSA_WITH_AES_256_CBC_SHA256 as defined in RFC 5246                                                    [0x3d] AES256-SHA256

TLS_RSA_WITH_AES_256_GCM_SHA384 as defined in RFC 5288                                                  [0x9d] AES256-GCM-SHA384

 

TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 as defined in RFC 5246                                         [0x67] DHE-RSA-AES128-SHA256

TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 as defined in RFC 5246                                         [0x6b] DHE-RSA-AES256-SHA256

TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 as defined in RFC 5288                                       [0x9f] DHE-RSA-AES256-GCM-SHA384

 

TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 as defined in RFC 5289                               [0xc023] ECDHE-ECDSA-AES128-SHA256

TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 as defined in RFC 5289                             [0xc02b] ECDHE-ECDSA-AES128-GCM-SHA256

TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 as defined in RFC 5289                               [0xc024] ECDHE-ECDSA-AES256-SHA384

TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 as defined in RFC 5289                             [0xc02c] ECDHE-ECDSA-AES256-GCM-SHA384

 

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 as defined in RFC 5289                                    [0xc027] ECDHE-RSA-AES128-SHA256

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 as defined in RFC 5289                                  [0xc02f] ECDHE-RSA-AES128-GCM-SHA256    

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 as defined in RFC 5289                                    [0xc028] ECDHE-RSA-AES256-SHA384

TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 as defined in RFC 5289                                  [0xc030] ECDHE-RSA-AES256-GCM-SHA384

 

How would I configure openssl-fips to force this precise compliance, eliminating all other cipher suites?

 

Thank you.

 

--Larry

C++ Developer

Reply | Threaded
Open this post in threaded view
|

Re: openssl-fips configure parameters to force IANA cipher suite compliance

OpenSSL - User mailing list
On 02/07/2019 22:13, Larry Jordan via openssl-users wrote:
>
> I want to build an openssl-fips canister to force IANA cipher suite
> compliance.
>
> With the help of an openssl-iana mapping
> (https://testssl.sh/openssl-iana.mapping.html) I can identify the
> corresponding OpenSSL cipher suites.
>
Not sure what you mean?  To my knowledge IANA doesn't (and has no authority
to) define TLS compliance requirements.  They merely keep a database of
various numbers and names assigned in Internet standards ("Internet Assigned
Numbers Authority").

And the openssl-fips canister is a very specific, legally defined exact
binary
that has gone through expensive US-government tests to allow use by said US
government, with absolutely no changes permitted, even to fix security bugs!

Now it so happens that since long before there were any Internet standards
for SSL/TLS, the OpenSSL/SSLeay family of libraries have used slightly
different names for the numbered cipher suites, especially the ones that
existed before official IETF standards were established.

The key spelling differences obviously being:

1. OpenSSL doesn't put TLS_ in front and _WITH_ in the middle of all the
   names, because that just gets in the way when administrators type in
   configuration changes on their servers.

2. OpenSSL uses dash, not underscore.

3. Because it was the historic default, OpenSSL lets you omit the "RSA_" and
   CBC_ in those cipher suite names.

4. OpenSSL omits the _ or - between AES and the bit count, just like IETF
   already does with SHA.

5. For triple-DES (once the strongest common algorithm, and thus still
   needed to talk to older systems), OpenSSL historically considered it a
   variant of the CBC mode for DES, not a variant of DES for CBC mode.
    Thus the oldest 3DES_CBC cipher suites use DES-CBC3 in their names,
   while the new ones follow IETF naming.  Similarly, DHE_ is spelled EDH-
   in older suites.

6. Whatever user interface a program runs on top of OpenSSL can display the
   names however it wants.

7. If a program wants to map the IETF names to the OpenSSL names, it can
   probably start by doing the string substitutions in differences 1 to 4
   above, then add some special cases for things like
      TLS_DHE_RSA_WITH_3DES_CBC_SHA maps via rules to
      DHE-RSA-3DES-CBC-SHA which maps via special case lookup to
      EDH-RSA-DES-CBC3-SHA

8. To be absolutely sure you handle all known cases, you have to find the
   OpenSSL source file that defines the names and check it against the IANA
   database of cipher suite numbers from IETF standards and non-IETF
extensions
   (Such as Camelia and GOST cipher suites).


> IANA OpenSSL
>
> TLS_RSA_WITH_AES_128_CBC_SHA as defined in RFC 5246 [0x2f] AES128-SHA
>
> TLS_RSA_WITH_AES_128_CBC_SHA256 as defined in RFC 5246 [0x3c]
> AES128-SHA256
>
> TLS_RSA_WITH_AES_256_CBC_SHA256 as defined in RFC 5246 [0x3d]
> AES256-SHA256
>
> TLS_RSA_WITH_AES_256_GCM_SHA384 as defined in RFC 5288 [0x9d]
> AES256-GCM-SHA384
>
> TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 as defined in RFC 5246 [0x67]
> DHE-RSA-AES128-SHA256
>
> TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 as defined in RFC 5246 [0x6b]
> DHE-RSA-AES256-SHA256
>
> TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 as defined in RFC 5288 [0x9f]
> DHE-RSA-AES256-GCM-SHA384
>
> TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 as defined in RFC
> 5289                               [0xc023] ECDHE-ECDSA-AES128-SHA256
>
> TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 as defined in RFC
> 5289                             [0xc02b] ECDHE-ECDSA-AES128-GCM-SHA256
>
> TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 as defined in RFC
> 5289                               [0xc024] ECDHE-ECDSA-AES256-SHA384
>
> TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 as defined in RFC
> 5289                             [0xc02c] ECDHE-ECDSA-AES256-GCM-SHA384
>
> TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 as defined in RFC 5289 [0xc027]
> ECDHE-RSA-AES128-SHA256
>
> TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 as defined in RFC
> 5289                                  [0xc02f] ECDHE-RSA-AES128-GCM-SHA256
>
> TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 as defined in RFC 5289 [0xc028]
> ECDHE-RSA-AES256-SHA384
>
> TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 as defined in RFC
> 5289                                  [0xc030] ECDHE-RSA-AES256-GCM-SHA384
>
> How would I configure openssl-fips to force this precise compliance,
> eliminating all other cipher suites?
>
> Thank you.
>
> --Larry
>
> C++ Developer
>


Enjoy

Jakob
--
Jakob Bohm, CIO, Partner, WiseMo A/S.  https://www.wisemo.com
Transformervej 29, 2860 Søborg, Denmark.  Direct +45 31 13 16 10
This public discussion message is non-binding and may contain errors.
WiseMo - Remote Service Management for PCs, Phones and Embedded