I have a question about storage of private keys outside of the FIPS module and about CSPs in general -

In section 4.1, Rules of Operation, rule 10 is given as:

"Secret or private keys that are input or output from an application must be input or output in encrypted form using a FIPS approved algorithm".

What are the implications or this?
If keys are input in an encrypted form how do you decrypt them?
Doesn't the key you use to decrypt them have to be input into the application in an encrypted form too, how do you ever input an unencrypted key into your application to decrypt your encrypted keys?!

Is this rule implying that for your application to be FIPS 14-2 compliant you have to passphrase protect all your keys? Does a passphrase not count as a key when input into your application?


Also in section 4.4, Critical Security Parameters, OpenSSH is given as an example and it says:

"The persistent per-user CSPs (public and private keys) are stored in the ~/.ssh/ subdirectory and the application enforces the presence of appropriate permissions (private key owned by the user account and not world readable or group writable)"

This doesn't mention any kind of encryption for the keys (I believe encrypting private keys is optional in OpenSSH?).


So basically, what kind of protection do you have to have for private keys and CSPs to conform to the security policy?


- Mike.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to