[CentOS] easy way to stop old ssl's

Tue Oct 15 21:53:20 UTC 2019
Warren Young <warren at etr-usa.com>

On Oct 15, 2019, at 12:26 PM, Markus Falb <markus.falb at fasel.at> wrote:
> 
> I guess that I would get A rating from ssllabs.

None of my CentOS systems have Internet-facing HTTP, much less HTTPS, so I volunteer you to test it and report back. :)

> I read you saying that FIPS 140-2 is not good enough. Apart from age, why?

It requires that a conforming application speak only protocols that NIST has approved, and even then, you can only get FIPS 140-2 certification by submitting the software to a third-party validation service, which is very expensive and very time consuming.  (I’m seeing numbers like 9 months and US $100,000.)  After going through all of that, you aren’t allowed to make *any* changes to the covered parts of the software without going through another validation process.  

Let’s say you’re a software vendor and someone discovers a vulnerability not caught by the FIPS certification process.  You’re a good citizen, so you fix it quickly and release that fix promptly.  Then you must re-file for a new certification (more $$$) and then wait for the independent testing lab and NIST to take months to re-certify your software.  Meanwhile, those insisting on FIPS mode have to use the known-vulnerable version — which probably has a public CVE filed against it, thus cluing potential attackers into the problem — because the new one isn’t FIPS-certified yet.

For another example, elliptic curve crypto is currently getting very popular for various reasons, but not all common curve parameters are NIST-certifiable under FIPS 140-2.  If you must communicate with an ECC service using non-certified params, you either cannot run your app in FIPS mode or you have to separately get the other end to become FIPS-certified, which means abandoning those params, which might be better than what you can get under FIPS.

Again, I invite you to do a web search for people running into trouble trying to get FIPS-mode apps to communicate with non-FIPS-mode apps.  It’s not hard to find people running into problems here.

Here’s some I found:

    https://blogs.technet.microsoft.com/secguide/2014/04/07/why-were-not-recommending-fips-mode-anymore/
    https://blogs.oracle.com/security/fips-the-crypto-catch-22
    https://bugs.chromium.org/p/chromium/issues/detail?id=194867

If giants like Microsoft, Google, and Oracle are having trouble getting and maintaining their FIPS certifications, what hope do us little guys have?

If you don’t like responses from big corporations, here’s some clueful developers discussing the problems:

    https://news.ycombinator.com/item?id=7635321

I don’t have a problem with independent testing and such per se, but when it’s a regulatory gatekeeper to what software *can* be written and used, it’s a problem when it comes to security.  If we’ve learned anything about security in these past decades, it’s that fast reaction to vulnerabilities is critical.