Mehdi Bonyadi wrote:
> FIPS 140-3 is still in draft and under review, but since 
> certifications can take many months it is a good idea to monitor the 
> situation and be prepared. Has anyone heard of any target dates for 
> 14-3 release or do they know how it would impact our case?

If the precedent set by 140-2 holds, then certifications of 140-2 will 
still be valid after 140-3 is approved.  And IIRC, there will probably 
be a transition period where products can still be evaluated as 140-2.

    - Garrett
>
> Mehdi
>
>
> On 06/09/09 22:53, Anthony Scarpino wrote:
>> Hi,
>>
>> The team is enhancing the Cryptographic Framework to support a 
>> Security Level 2.  That level requires a Common Criteria certified 
>> OS.  Having it on by default would have to be a special case for that 
>> particular release..
>>
>> Now taking off the project team hat...
>>
>> In a world with an appetite for performance.  FIPS (regardless of 
>> Security Level) requires Power-On Self Tests and other tests that 
>> will degrade performance.  There are also boundaries which have to 
>> the verified before crypto operations can be performed.  I feel that 
>> you would see many more unhappy users than happy..
>>
>> Also a FIPS validation requires a Security Policy that is a 
>> configuration the user must keep the system in, so no addition crypto 
>> cards or providers.   And for Level 1 and 2, it's not that the whole 
>> system is FIPS'ed, but just a set of supported APIs.
>>
>> In general as FIPS 140-2 is, I don't believe it's practical by default..
>>
>> Tony
>>
>>
>> Glenn Brunette wrote:
>>>
>>> Given the strong push by U.S. and other governments, financial
>>> services organizations, etc. (inside and outside of the U.S.) to
>>> use FIPS approved algorithms, has there been any consideration
>>> to make FIPS-140 mode enabled by default?  I realize that in a
>>> global marketplace, this is likely a touchy issue, but I at least
>>> wanted to put the question on the table and hear from the project
>>> team and the community.
>>>
>>> g
>>>
>>> On 6/9/09 6:17 PM, Krishna Yenduri wrote:
>>>> I am sponsoring this fast track for Hai-May Chao. The timer
>>>> is set for 06/17/2009. Micro/patch binding is requested.
>>>>
>>>>
>>>> Template Version: @(#)sac_nextcase 1.68 02/23/09 SMI
>>>> This information is Copyright 2009 Sun Microsystems
>>>> 1. Introduction
>>>>      1.1. Project/Component Working Name:
>>>>      cryptoadm(1M) enhancement for FIPS-140 mode
>>>>      1.2. Name of Document Author/Supplier:
>>>>      Author: Hai-May Chao
>>>>                   Valerie Fenwick
>>>>                   Tony Scarpino
>>>>      1.3  Date of This Document:
>>>>     09 June, 2009
>>>>
>>>> 4. Technical Description
>>>>
>>>> 4.1 Proposal:
>>>>
>>>> Enhance cryptoadm interface to provide for enabling and disabling
>>>> of the FIPS-140 mode of operations in the Cryptographic Framework.
>>>>
>>>> 4.2 Description:
>>>>
>>>> The Cryptographic Framework team is planning on obtaining FIPS 140-2
>>>> certification. The cryptoadm command is the administrative front-end
>>>> interface to the framework. This case is intended to add new features
>>>> to cryptoadm(1M) that allow administrators to enable and disable the
>>>> FIPS-140 mode in the Cryptographic Framework. Hence, this case
>>>> represents the first set of changes to get prepared toward the FIPS
>>>> 140-2 evaluation process.
>>>>
>>>> There will be two FIPS-140 modes of operations in the framework: 
>>>> enabled
>>>> and disabled. The default FIPS-140 mode is disabled.
>>>>
>>>> When FIPS-140 mode is enabled, the Cryptographic Framework is put into
>>>> FIPS-140 mode of operations. The non-approved FIPS algorithms 
>>>> provided by
>>>> the user-level pkcs11_softtoken provider and the kernel software 
>>>> providers
>>>> will not be disabled. It is up to the consumers of the framework to be
>>>> responsible for using only FIPS approved algorithms and that will be
>>>> documented in the Security Policy. This meets FIPS 140 level 2 
>>>> requirements.
>>>>
>>>> As we start working with the certification lab, we anticipate there 
>>>> may
>>>> be additional changes needed and those changes should be internal 
>>>> to the
>>>> framework. The cryptoadm interface changes should stand by itself.
>>>>
>>>> The cryptoadm command will also be modified to display the active
>>>> FIPS-140 mode setting.
>>>>
>>>> 4.3  Interfaces:
>>>>
>>>>   The following new options are added to cryptoadm(1M) sub-commands
>>>>       cryptoadm list fips-140
>>>>       cryptoadm enable fips-140
>>>>       cryptoadm disable fips-140
>>>>
>>>>   Stability level is "committed".
>>>>   Release binding is Micro/Patch.
>>>>
>>>>
>>>> 4.4 Doc Impact:
>>>>
>>>>   The diff-marked cryptoadm(1M) man page is in the case directory.
>>>>
>>>> 5. Reference
>>>>
>>>> FIPS 140-2 Spec can be located at:
>>>> http://csrc.nist.gov/publications/PubsFIPS.html
>>>>
>>>> 6. Resources and Schedule
>>>>      6.4. Steering Committee requested information
>>>>         6.4.1. Consolidation C-team Name:
>>>>         ON
>>>>      6.5. ARC review type: FastTrack
>>>>      6.6. ARC Exposure: open
>>>>
>>
>> _______________________________________________
>> crypto-discuss mailing list
>> crypto-discuss at opensolaris.org
>> http://mail.opensolaris.org/mailman/listinfo/crypto-discuss


Reply via email to