Hi,

The team is enhancing the Cryptographic Framework to support a Security 
Level 2.  That level requires a Common Criteria certified OS.  Having it 
on by default would have to be a special case for that particular release..

Now taking off the project team hat...

In a world with an appetite for performance.  FIPS (regardless of 
Security Level) requires Power-On Self Tests and other tests that will 
degrade performance.  There are also boundaries which have to the 
verified before crypto operations can be performed.  I feel that you 
would see many more unhappy users than happy..

Also a FIPS validation requires a Security Policy that is a 
configuration the user must keep the system in, so no addition crypto 
cards or providers.   And for Level 1 and 2, it's not that the whole 
system is FIPS'ed, but just a set of supported APIs.

In general as FIPS 140-2 is, I don't believe it's practical by default..

Tony


Glenn Brunette wrote:
> 
> Given the strong push by U.S. and other governments, financial
> services organizations, etc. (inside and outside of the U.S.) to
> use FIPS approved algorithms, has there been any consideration
> to make FIPS-140 mode enabled by default?  I realize that in a
> global marketplace, this is likely a touchy issue, but I at least
> wanted to put the question on the table and hear from the project
> team and the community.
> 
> g
> 
> On 6/9/09 6:17 PM, Krishna Yenduri wrote:
>> I am sponsoring this fast track for Hai-May Chao. The timer
>> is set for 06/17/2009. Micro/patch binding is requested.
>>
>>
>> Template Version: @(#)sac_nextcase 1.68 02/23/09 SMI
>> This information is Copyright 2009 Sun Microsystems
>> 1. Introduction
>>      1.1. Project/Component Working Name:
>>      cryptoadm(1M) enhancement for FIPS-140 mode
>>      1.2. Name of Document Author/Supplier:
>>      Author: Hai-May Chao
>>                   Valerie Fenwick
>>                   Tony Scarpino
>>      1.3  Date of This Document:
>>     09 June, 2009
>>
>> 4. Technical Description
>>
>> 4.1 Proposal:
>>
>> Enhance cryptoadm interface to provide for enabling and disabling
>> of the FIPS-140 mode of operations in the Cryptographic Framework.
>>
>> 4.2 Description:
>>
>> The Cryptographic Framework team is planning on obtaining FIPS 140-2
>> certification. The cryptoadm command is the administrative front-end
>> interface to the framework. This case is intended to add new features
>> to cryptoadm(1M) that allow administrators to enable and disable the
>> FIPS-140 mode in the Cryptographic Framework. Hence, this case
>> represents the first set of changes to get prepared toward the FIPS
>> 140-2 evaluation process.
>>
>> There will be two FIPS-140 modes of operations in the framework: enabled
>> and disabled. The default FIPS-140 mode is disabled.
>>
>> When FIPS-140 mode is enabled, the Cryptographic Framework is put into
>> FIPS-140 mode of operations. The non-approved FIPS algorithms provided by
>> the user-level pkcs11_softtoken provider and the kernel software 
>> providers
>> will not be disabled. It is up to the consumers of the framework to be
>> responsible for using only FIPS approved algorithms and that will be
>> documented in the Security Policy. This meets FIPS 140 level 2 
>> requirements.
>>
>> As we start working with the certification lab, we anticipate there may
>> be additional changes needed and those changes should be internal to the
>> framework. The cryptoadm interface changes should stand by itself.
>>
>> The cryptoadm command will also be modified to display the active
>> FIPS-140 mode setting.
>>
>> 4.3  Interfaces:
>>
>>   The following new options are added to cryptoadm(1M) sub-commands
>>       cryptoadm list fips-140
>>       cryptoadm enable fips-140
>>       cryptoadm disable fips-140
>>
>>   Stability level is "committed".
>>   Release binding is Micro/Patch.
>>
>>
>> 4.4 Doc Impact:
>>
>>   The diff-marked cryptoadm(1M) man page is in the case directory.
>>
>> 5. Reference
>>
>> FIPS 140-2 Spec can be located at:
>> http://csrc.nist.gov/publications/PubsFIPS.html
>>
>> 6. Resources and Schedule
>>      6.4. Steering Committee requested information
>>         6.4.1. Consolidation C-team Name:
>>         ON
>>      6.5. ARC review type: FastTrack
>>      6.6. ARC Exposure: open
>>


Reply via email to