Krishna Yenduri wrote:
> Hai-May Chao wrote:
> 
>  The proposal looks good.
>> ...
>>
>>    c. When disable/enable fips command is issued from cryptoadm,
>>       we make sure that the following places are sync'ed:
>>       pkcs11.conf, kcf.conf and the global variable in kernel indicating
>>       the FIPS status.
>>   
> 
>  What happens during boot? Do we look at both pkcs11.conf and kcf.conf
>  and then issue a "cryptoadm enable fips",  if needed?
> 
>  What happens if for some reason,  pkcs11.conf and kcf.conf are
>  in disagreement (say system panicked before kcf.conf could be updated)?

Yes, I noticed that too.. one configuration location would be better, 
unless there is some functionality that I'm missing by having it separate..

>>
>>    c. Keeping pkcs11_kernel enabled
>>
>>       We don't disable pkcs11_kernel as pkcs11_kernel and KCF are inside
>>       the crypto boundary. It is what is plugged into KCF that is the issue,
>>       such as ncp and n2cp that should be disabled, but not pkcs11_kernel.
>>   
> 
>  Do we document that the admin should disable ncp and n2cp before doing
>  "cryptoadm enable fips" OR do we do it as part of the "cryptoadm enable 
> fips"
>  processing?

I would think documentation would be the right thing.. We'll never know 
if it's fips approved hardware or not.. An idea would be to have a 
message displayed after the 'cryptoadm enable fips' command to call out 
the providers:

# cryptoadm enable fips
The following may not be FIPS certified hardware.  Please verify if they 
are and that they are in FIPS mode:
   ncp/0
   mca/0
#

the same could be done with userland providers that are not softtoken.




Reply via email to