Mehdi Bonyadi wrote: > FIPS 140-3 is still in draft and under review, but since > certifications can take many months it is a good idea to monitor the > situation and be prepared. Has anyone heard of any target dates for > 14-3 release or do they know how it would impact our case?
If the precedent set by 140-2 holds, then certifications of 140-2 will still be valid after 140-3 is approved. And IIRC, there will probably be a transition period where products can still be evaluated as 140-2. - Garrett > > Mehdi > > > On 06/09/09 22:53, Anthony Scarpino wrote: >> Hi, >> >> The team is enhancing the Cryptographic Framework to support a >> Security Level 2. That level requires a Common Criteria certified >> OS. Having it on by default would have to be a special case for that >> particular release.. >> >> Now taking off the project team hat... >> >> In a world with an appetite for performance. FIPS (regardless of >> Security Level) requires Power-On Self Tests and other tests that >> will degrade performance. There are also boundaries which have to >> the verified before crypto operations can be performed. I feel that >> you would see many more unhappy users than happy.. >> >> Also a FIPS validation requires a Security Policy that is a >> configuration the user must keep the system in, so no addition crypto >> cards or providers. And for Level 1 and 2, it's not that the whole >> system is FIPS'ed, but just a set of supported APIs. >> >> In general as FIPS 140-2 is, I don't believe it's practical by default.. >> >> Tony >> >> >> Glenn Brunette wrote: >>> >>> Given the strong push by U.S. and other governments, financial >>> services organizations, etc. (inside and outside of the U.S.) to >>> use FIPS approved algorithms, has there been any consideration >>> to make FIPS-140 mode enabled by default? I realize that in a >>> global marketplace, this is likely a touchy issue, but I at least >>> wanted to put the question on the table and hear from the project >>> team and the community. >>> >>> g >>> >>> On 6/9/09 6:17 PM, Krishna Yenduri wrote: >>>> I am sponsoring this fast track for Hai-May Chao. The timer >>>> is set for 06/17/2009. Micro/patch binding is requested. >>>> >>>> >>>> Template Version: @(#)sac_nextcase 1.68 02/23/09 SMI >>>> This information is Copyright 2009 Sun Microsystems >>>> 1. Introduction >>>> 1.1. Project/Component Working Name: >>>> cryptoadm(1M) enhancement for FIPS-140 mode >>>> 1.2. Name of Document Author/Supplier: >>>> Author: Hai-May Chao >>>> Valerie Fenwick >>>> Tony Scarpino >>>> 1.3 Date of This Document: >>>> 09 June, 2009 >>>> >>>> 4. Technical Description >>>> >>>> 4.1 Proposal: >>>> >>>> Enhance cryptoadm interface to provide for enabling and disabling >>>> of the FIPS-140 mode of operations in the Cryptographic Framework. >>>> >>>> 4.2 Description: >>>> >>>> The Cryptographic Framework team is planning on obtaining FIPS 140-2 >>>> certification. The cryptoadm command is the administrative front-end >>>> interface to the framework. This case is intended to add new features >>>> to cryptoadm(1M) that allow administrators to enable and disable the >>>> FIPS-140 mode in the Cryptographic Framework. Hence, this case >>>> represents the first set of changes to get prepared toward the FIPS >>>> 140-2 evaluation process. >>>> >>>> There will be two FIPS-140 modes of operations in the framework: >>>> enabled >>>> and disabled. The default FIPS-140 mode is disabled. >>>> >>>> When FIPS-140 mode is enabled, the Cryptographic Framework is put into >>>> FIPS-140 mode of operations. The non-approved FIPS algorithms >>>> provided by >>>> the user-level pkcs11_softtoken provider and the kernel software >>>> providers >>>> will not be disabled. It is up to the consumers of the framework to be >>>> responsible for using only FIPS approved algorithms and that will be >>>> documented in the Security Policy. This meets FIPS 140 level 2 >>>> requirements. >>>> >>>> As we start working with the certification lab, we anticipate there >>>> may >>>> be additional changes needed and those changes should be internal >>>> to the >>>> framework. The cryptoadm interface changes should stand by itself. >>>> >>>> The cryptoadm command will also be modified to display the active >>>> FIPS-140 mode setting. >>>> >>>> 4.3 Interfaces: >>>> >>>> The following new options are added to cryptoadm(1M) sub-commands >>>> cryptoadm list fips-140 >>>> cryptoadm enable fips-140 >>>> cryptoadm disable fips-140 >>>> >>>> Stability level is "committed". >>>> Release binding is Micro/Patch. >>>> >>>> >>>> 4.4 Doc Impact: >>>> >>>> The diff-marked cryptoadm(1M) man page is in the case directory. >>>> >>>> 5. Reference >>>> >>>> FIPS 140-2 Spec can be located at: >>>> http://csrc.nist.gov/publications/PubsFIPS.html >>>> >>>> 6. Resources and Schedule >>>> 6.4. Steering Committee requested information >>>> 6.4.1. Consolidation C-team Name: >>>> ON >>>> 6.5. ARC review type: FastTrack >>>> 6.6. ARC Exposure: open >>>> >> >> _______________________________________________ >> crypto-discuss mailing list >> crypto-discuss at opensolaris.org >> http://mail.opensolaris.org/mailman/listinfo/crypto-discuss