Krishna Yenduri wrote: > Hai-May Chao wrote: > > The proposal looks good. >> ... >> >> c. When disable/enable fips command is issued from cryptoadm, >> we make sure that the following places are sync'ed: >> pkcs11.conf, kcf.conf and the global variable in kernel indicating >> the FIPS status. >> > > What happens during boot? Do we look at both pkcs11.conf and kcf.conf > and then issue a "cryptoadm enable fips", if needed? > > What happens if for some reason, pkcs11.conf and kcf.conf are > in disagreement (say system panicked before kcf.conf could be updated)?
Yes, I noticed that too.. one configuration location would be better, unless there is some functionality that I'm missing by having it separate.. >> >> c. Keeping pkcs11_kernel enabled >> >> We don't disable pkcs11_kernel as pkcs11_kernel and KCF are inside >> the crypto boundary. It is what is plugged into KCF that is the issue, >> such as ncp and n2cp that should be disabled, but not pkcs11_kernel. >> > > Do we document that the admin should disable ncp and n2cp before doing > "cryptoadm enable fips" OR do we do it as part of the "cryptoadm enable > fips" > processing? I would think documentation would be the right thing.. We'll never know if it's fips approved hardware or not.. An idea would be to have a message displayed after the 'cryptoadm enable fips' command to call out the providers: # cryptoadm enable fips The following may not be FIPS certified hardware. Please verify if they are and that they are in FIPS mode: ncp/0 mca/0 # the same could be done with userland providers that are not softtoken.