|
|
e62613 |
diff -up openssl-1.0.2a/README.warning openssl-1.0.2a/README
|
|
|
e62613 |
--- openssl-1.0.2a/README.warning 2015-03-20 16:00:47.000000000 +0100
|
|
|
e62613 |
+++ openssl-1.0.2a/README 2015-03-21 09:06:11.000000000 +0100
|
|
|
e62613 |
@@ -5,6 +5,46 @@
|
|
|
e62613 |
Copyright (c) 1995-1998 Eric A. Young, Tim J. Hudson
|
|
|
e62613 |
All rights reserved.
|
|
|
e62613 |
|
|
|
e62613 |
+ WARNING
|
|
|
e62613 |
+ -------
|
|
|
e62613 |
+
|
|
|
e62613 |
+ This version of OpenSSL is built in a way that supports operation in
|
|
|
e62613 |
+ the so called FIPS mode. Note though that the library as we build it
|
|
|
e62613 |
+ is not FIPS 140-2 validated and the FIPS mode is present for testing
|
|
|
e62613 |
+ purposes only.
|
|
|
e62613 |
+
|
|
|
e62613 |
+ This version also contains a few differences from the upstream code
|
|
|
e62613 |
+ some of which are:
|
|
|
e62613 |
+ * The FIPS validation support is significantly different from the
|
|
|
e62613 |
+ upstream FIPS support. For example the FIPS integrity verification
|
|
|
e62613 |
+ check is implemented differently as the FIPS module is built inside
|
|
|
e62613 |
+ the shared library. The HMAC-SHA256 checksums of the whole shared
|
|
|
e62613 |
+ libraries are verified. Also note that the FIPS integrity
|
|
|
e62613 |
+ verification check requires that the libcrypto and libssl shared
|
|
|
e62613 |
+ library files are unmodified which means that it will fail if these
|
|
|
e62613 |
+ files are changed for example by prelink.
|
|
|
e62613 |
+ * If the file /etc/system-fips is present the integrity verification
|
|
|
e62613 |
+ and selftests of the crypto algorithms are run inside the library
|
|
|
e62613 |
+ constructor code.
|
|
|
e62613 |
+ * With the /etc/system-fips present the module respects the kernel
|
|
|
e62613 |
+ FIPS flag /proc/sys/crypto/fips and tries to initialize the FIPS mode
|
|
|
e62613 |
+ if it is set to 1 aborting if the FIPS mode could not be initialized.
|
|
|
e62613 |
+ With the /etc/system-fips present it is also possible to force the
|
|
|
e62613 |
+ OpenSSL library to FIPS mode especially for debugging purposes by
|
|
|
e62613 |
+ setting the environment variable OPENSSL_FORCE_FIPS_MODE.
|
|
|
e62613 |
+ * If the environment variable OPENSSL_NO_DEFAULT_ZLIB is set the module
|
|
|
e62613 |
+ will not automatically load the built in compression method ZLIB
|
|
|
e62613 |
+ when initialized. Applications can still explicitely ask for ZLIB
|
|
|
e62613 |
+ compression method.
|
|
|
e62613 |
+ * The library was patched so the certificates, CRLs and other objects
|
|
|
e62613 |
+ signed with use of MD5 fail verification as the MD5 is too insecure
|
|
|
e62613 |
+ to be used for signatures. If the environment variable
|
|
|
e62613 |
+ OPENSSL_ENABLE_MD5_VERIFY is set, the verification can proceed
|
|
|
e62613 |
+ normally.
|
|
|
e62613 |
+ * If the OPENSSL_ENFORCE_MODULUS_BITS environment variable is set,
|
|
|
e62613 |
+ the library will not allow generation of DSA and RSA keys with
|
|
|
e62613 |
+ other lengths than specified in the FIPS 186-4 standard.
|
|
|
e62613 |
+
|
|
|
e62613 |
DESCRIPTION
|
|
|
e62613 |
-----------
|
|
|
e62613 |
|