Welcome to the Knowledge Base and Support Portal

Community:
Stay updated with announcements, get answers from the community, and share your feature suggestions with us.

Support:
Get personalized support and access to a knowledge base for answers to questions as well as tips and tricks..

Downloads:
Download documentation, products, product updates, and helpful scripts.

 

SafeLogic Support Center

Mark Minnoch May 5 Announcements

On May 3, 2016, OpenSSL 1.0.2h was released to prevent a MITM attacker from using a padding oracle attack to decrypt traffic when the connection uses an AES CBC cipher and the server supports AES-NI.

SafeLogic made updated builds available to our deployed customers the same day that the new version was released. (Note: SafeLogic’s CryptoComply modules do not include the exploitable code.)

You may download the updated binaries through the KNOWLEDGE BASE tab on SafeLogic's Support Portal.

Click here for more info on bug from OpenSSL

Paul G July 9, 2015 Announcements

Regarding today’s OpenSSL announcement, a bug was discovered that affects versions 1.0.1 and 1.0.2.  While it is a severe vulnerability and requires patching, SafeLogic’s CryptoComply modules do not include the exploitable code.  We will, however, make available to our deployed customers updated builds that will restore full functionality for the patched versions.

Click here for more info on bug from OpenSSL

Paul G April 8, 2014 Announcements

If you're reading this you're probably already familiar with the "Heartbleed" vulnerability in certain versions of OpenSSL

The issue doesn't reside within our CryptoComply module. This issue is in the upstream OSSL stack, which is outside of the FIPS boundary. While there is no impact to FIPS, we know that customers are using our binaries built with ossl upstream. 

We responded and had new builds commencing within a few hours of the notice. Builds are available in the downloads area of the knowledge base. Binaries titled with prefix of "openssl101g-" are the patched versions (e.g., the 64-bit Linux build with CryptoComply is "openssl101g-linux-el6-x86_64"

We recommend that our customers migrate to this version if you're running CryptoComply with upstream OSSL compiled. 

Paul G January 15, 2014 Announcements

CryptoComply Server received FIPS 140 validation. Here is the link to the certificate:

http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/1401val2013.htm#2038

Paul G May 3, 2013 Announcements

CryptoComply Mobile received FIPS 140 validation this week. Here is the link to the certificate:

http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/1401val2013.htm#1938