FIPS 140-3 is still in draft and under review, but since certifications 
can take many months it is a good idea to monitor the situation and be 
prepared. Has anyone heard of any target dates for 14-3 release or do 
they know how it would impact our case?

Mehdi


On 06/09/09 22:53, Anthony Scarpino wrote:
> Hi,
> 
> The team is enhancing the Cryptographic Framework to support a Security 
> Level 2.  That level requires a Common Criteria certified OS.  Having it 
> on by default would have to be a special case for that particular release..
> 
> Now taking off the project team hat...
> 
> In a world with an appetite for performance.  FIPS (regardless of 
> Security Level) requires Power-On Self Tests and other tests that will 
> degrade performance.  There are also boundaries which have to the 
> verified before crypto operations can be performed.  I feel that you 
> would see many more unhappy users than happy..
> 
> Also a FIPS validation requires a Security Policy that is a 
> configuration the user must keep the system in, so no addition crypto 
> cards or providers.   And for Level 1 and 2, it's not that the whole 
> system is FIPS'ed, but just a set of supported APIs.
> 
> In general as FIPS 140-2 is, I don't believe it's practical by default..
> 
> Tony
> 
> 
> Glenn Brunette wrote:
>>
>> Given the strong push by U.S. and other governments, financial
>> services organizations, etc. (inside and outside of the U.S.) to
>> use FIPS approved algorithms, has there been any consideration
>> to make FIPS-140 mode enabled by default?  I realize that in a
>> global marketplace, this is likely a touchy issue, but I at least
>> wanted to put the question on the table and hear from the project
>> team and the community.
>>
>> g
>>
>> On 6/9/09 6:17 PM, Krishna Yenduri wrote:
>>> I am sponsoring this fast track for Hai-May Chao. The timer
>>> is set for 06/17/2009. Micro/patch binding is requested.
>>>
>>>
>>> Template Version: @(#)sac_nextcase 1.68 02/23/09 SMI
>>> This information is Copyright 2009 Sun Microsystems
>>> 1. Introduction
>>>      1.1. Project/Component Working Name:
>>>      cryptoadm(1M) enhancement for FIPS-140 mode
>>>      1.2. Name of Document Author/Supplier:
>>>      Author: Hai-May Chao
>>>                   Valerie Fenwick
>>>                   Tony Scarpino
>>>      1.3  Date of This Document:
>>>     09 June, 2009
>>>
>>> 4. Technical Description
>>>
>>> 4.1 Proposal:
>>>
>>> Enhance cryptoadm interface to provide for enabling and disabling
>>> of the FIPS-140 mode of operations in the Cryptographic Framework.
>>>
>>> 4.2 Description:
>>>
>>> The Cryptographic Framework team is planning on obtaining FIPS 140-2
>>> certification. The cryptoadm command is the administrative front-end
>>> interface to the framework. This case is intended to add new features
>>> to cryptoadm(1M) that allow administrators to enable and disable the
>>> FIPS-140 mode in the Cryptographic Framework. Hence, this case
>>> represents the first set of changes to get prepared toward the FIPS
>>> 140-2 evaluation process.
>>>
>>> There will be two FIPS-140 modes of operations in the framework: enabled
>>> and disabled. The default FIPS-140 mode is disabled.
>>>
>>> When FIPS-140 mode is enabled, the Cryptographic Framework is put into
>>> FIPS-140 mode of operations. The non-approved FIPS algorithms 
>>> provided by
>>> the user-level pkcs11_softtoken provider and the kernel software 
>>> providers
>>> will not be disabled. It is up to the consumers of the framework to be
>>> responsible for using only FIPS approved algorithms and that will be
>>> documented in the Security Policy. This meets FIPS 140 level 2 
>>> requirements.
>>>
>>> As we start working with the certification lab, we anticipate there may
>>> be additional changes needed and those changes should be internal to the
>>> framework. The cryptoadm interface changes should stand by itself.
>>>
>>> The cryptoadm command will also be modified to display the active
>>> FIPS-140 mode setting.
>>>
>>> 4.3  Interfaces:
>>>
>>>   The following new options are added to cryptoadm(1M) sub-commands
>>>       cryptoadm list fips-140
>>>       cryptoadm enable fips-140
>>>       cryptoadm disable fips-140
>>>
>>>   Stability level is "committed".
>>>   Release binding is Micro/Patch.
>>>
>>>
>>> 4.4 Doc Impact:
>>>
>>>   The diff-marked cryptoadm(1M) man page is in the case directory.
>>>
>>> 5. Reference
>>>
>>> FIPS 140-2 Spec can be located at:
>>> http://csrc.nist.gov/publications/PubsFIPS.html
>>>
>>> 6. Resources and Schedule
>>>      6.4. Steering Committee requested information
>>>         6.4.1. Consolidation C-team Name:
>>>         ON
>>>      6.5. ARC review type: FastTrack
>>>      6.6. ARC Exposure: open
>>>
> 
> _______________________________________________
> crypto-discuss mailing list
> crypto-discuss at opensolaris.org
> http://mail.opensolaris.org/mailman/listinfo/crypto-discuss

Reply via email to