Author dmalcolm
Recipients dmalcolm, gps, pitrou
Date 2010-07-02.19:46:44
SpamBayes Score 0.00797751
Marked as misclassified No
Message-id <>

> First, is it only with 2.7 or 2.6?
I've seen this with both 2.6 tarball builds and SVN trunk; in both cases against openssl-1.0.0-1.[

> Second, I don't really get the point of the FIPS mode. The PDF you linked to seems full of bureaucratic jargon.

> Third, I can't reproduce under Mandriva, but perhaps it's because it's using OpenSSL 1.0.0 (which the PDF says isn't supported).
Thanks for the info.  This is my fault, sorry.  I'm using openssl-1.0.0-1 on Fedora; on doublechecking I see that we appear to be carrying various patches in our openssl packages, which I assume are a backport from a more recent version of the FIPS support:
(see ); I'll see if I can get more information from other Fedorans to verify this, and on what version of openssl upstream this is equivalent to.

> Fourth, if MD5 is insecure and FIPS disables insecure algorithm, then why should hashlib allow MD5 hashing when FIPS mode is enabled?
My understanding is that some sites wish to prohibit the use of MD5 as an authentication mechanism, but don't need to prohibit it where the use is not "cryptography", e.g. to compute an index into a hash table where intentionally induced hash collisions can not break the application's security.

> Fifth, please take a look at the OpenSSL initialization routine in _sslmodule.c and try to transplant it to the hashlib initialization routine:

Done; with the attached patch to SVN trunk, I don't need the initial "import ssl" to reproduce the segfault; the following will segfault (in the same place):
OPENSSL_FORCE_FIPS_MODE=1 gdb --args ./python -c "import hashlib; m = m = hashlib.md5(); m.update('abc')"
Date User Action Args
2010-07-02 19:46:47dmalcolmsetrecipients: + dmalcolm, pitrou, gps
2010-07-02 19:46:47dmalcolmsetmessageid: <>
2010-07-02 19:46:45dmalcolmlinkissue9146 messages
2010-07-02 19:46:44dmalcolmcreate