Hi, The team is enhancing the Cryptographic Framework to support a Security Level 2. That level requires a Common Criteria certified OS. Having it on by default would have to be a special case for that particular release..
Now taking off the project team hat... In a world with an appetite for performance. FIPS (regardless of Security Level) requires Power-On Self Tests and other tests that will degrade performance. There are also boundaries which have to the verified before crypto operations can be performed. I feel that you would see many more unhappy users than happy.. Also a FIPS validation requires a Security Policy that is a configuration the user must keep the system in, so no addition crypto cards or providers. And for Level 1 and 2, it's not that the whole system is FIPS'ed, but just a set of supported APIs. In general as FIPS 140-2 is, I don't believe it's practical by default.. Tony Glenn Brunette wrote: > > Given the strong push by U.S. and other governments, financial > services organizations, etc. (inside and outside of the U.S.) to > use FIPS approved algorithms, has there been any consideration > to make FIPS-140 mode enabled by default? I realize that in a > global marketplace, this is likely a touchy issue, but I at least > wanted to put the question on the table and hear from the project > team and the community. > > g > > On 6/9/09 6:17 PM, Krishna Yenduri wrote: >> I am sponsoring this fast track for Hai-May Chao. The timer >> is set for 06/17/2009. Micro/patch binding is requested. >> >> >> Template Version: @(#)sac_nextcase 1.68 02/23/09 SMI >> This information is Copyright 2009 Sun Microsystems >> 1. Introduction >> 1.1. Project/Component Working Name: >> cryptoadm(1M) enhancement for FIPS-140 mode >> 1.2. Name of Document Author/Supplier: >> Author: Hai-May Chao >> Valerie Fenwick >> Tony Scarpino >> 1.3 Date of This Document: >> 09 June, 2009 >> >> 4. Technical Description >> >> 4.1 Proposal: >> >> Enhance cryptoadm interface to provide for enabling and disabling >> of the FIPS-140 mode of operations in the Cryptographic Framework. >> >> 4.2 Description: >> >> The Cryptographic Framework team is planning on obtaining FIPS 140-2 >> certification. The cryptoadm command is the administrative front-end >> interface to the framework. This case is intended to add new features >> to cryptoadm(1M) that allow administrators to enable and disable the >> FIPS-140 mode in the Cryptographic Framework. Hence, this case >> represents the first set of changes to get prepared toward the FIPS >> 140-2 evaluation process. >> >> There will be two FIPS-140 modes of operations in the framework: enabled >> and disabled. The default FIPS-140 mode is disabled. >> >> When FIPS-140 mode is enabled, the Cryptographic Framework is put into >> FIPS-140 mode of operations. The non-approved FIPS algorithms provided by >> the user-level pkcs11_softtoken provider and the kernel software >> providers >> will not be disabled. It is up to the consumers of the framework to be >> responsible for using only FIPS approved algorithms and that will be >> documented in the Security Policy. This meets FIPS 140 level 2 >> requirements. >> >> As we start working with the certification lab, we anticipate there may >> be additional changes needed and those changes should be internal to the >> framework. The cryptoadm interface changes should stand by itself. >> >> The cryptoadm command will also be modified to display the active >> FIPS-140 mode setting. >> >> 4.3 Interfaces: >> >> The following new options are added to cryptoadm(1M) sub-commands >> cryptoadm list fips-140 >> cryptoadm enable fips-140 >> cryptoadm disable fips-140 >> >> Stability level is "committed". >> Release binding is Micro/Patch. >> >> >> 4.4 Doc Impact: >> >> The diff-marked cryptoadm(1M) man page is in the case directory. >> >> 5. Reference >> >> FIPS 140-2 Spec can be located at: >> http://csrc.nist.gov/publications/PubsFIPS.html >> >> 6. Resources and Schedule >> 6.4. Steering Committee requested information >> 6.4.1. Consolidation C-team Name: >> ON >> 6.5. ARC review type: FastTrack >> 6.6. ARC Exposure: open >>