FIPS Validation: Difference between revisions
|  (Note products implementing FIPS mode NSS) | |||
| (120 intermediate revisions by 11 users not shown) | |||
| Line 1: | Line 1: | ||
| == NSS FIPS 140 | == NSS FIPS 140 validation == | ||
| Softoken is a component of [[NSS]], and has a separate version number. The most recent FIPS validated Softoken is 3.12.4 and is in '''NSS 3.12.4''' and '''NSS 3.12.5''' and '''NSS 3.12.6'''. Binaries are available [https://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/NSS_3_12_4_RTM/ | here]. | |||
| NSS softoken has completed FIPS 140 validation four times: 1997, 1999, 2002, 2007 and 2009. View [http://www.mozilla.org/projects/security/pki/nss/fips/ | NSS FIPS validation history ] here. View the [[FIPS2009]] validation here.   | |||
| This page documents our current NSS FIPS 140 validation. | |||
| == Platforms for 2011 == | |||
| * Level 1 | * Level 1 | ||
| ** RHEL  | ** RHEL '''6''' x86 32 bit (no AES-NI) | ||
| ** RHEL '''6''' x86 64 bit | |||
| *  | |||
| * | |||
| == Algorithms == | |||
| Plan is to validate all FIPS-approved algorithms that NSS implements and NIST has tests for. There are eight such algorithms.  | |||
| {| border="1" cellpadding="2" summary="Algorithms" | |||
| {| border="1" cellpadding="2" | |||
| |- | |- | ||
| !Algorithms !! Key Size !! Modes !!  | !Algorithms !! Key Size !! Modes !! Certificates | ||
| |- | |- | ||
| ! | ![http://csrc.nist.gov/groups/STM/cavp/documents/des/tripledesval.html TripleDES]  | ||
| | KO 1,2,3 (56,112,168) | | KO 1,2,3 (56,112,168) | ||
| || | || | ||
| TECB(e/d; KO 1,2,3)<br> | |||
| TCBC(e/d; KO 1,2,3) | |||
| ||   | ||   | ||
| Pending | |||
| |- | |- | ||
| ! AES   | ! [http://csrc.nist.gov/groups/STM/cavp/documents/aes/aesval.html AES]  | ||
| | 128/192/256 | | 128/192/256 | ||
| || | || | ||
| ECB(e/d; 128,192,256)<br> | |||
| CBC(e/d; 128,192,256) | |||
| ||   | ||   | ||
| Pending | |||
| |- | |- | ||
| ![http://csrc.nist.gov/publications/fips/fips180-2/fips180-2withchangenotice.pdf/ SHS (including all variants: SHA-1, SHA-256, SHA-384, and SHA-512)] | ![http://csrc.nist.gov/publications/fips/fips180-2/fips180-2withchangenotice.pdf/ SHS (including all variants: SHA-1, SHA-256, SHA-384, and SHA-512)] | ||
| [http://csrc.nist.gov/groups/STM/cavp/documents/shs/shaval.htm SHS]  | |||
| | | | | ||
| SHA-1   (BYTE-only)<br> | |||
| SHA-256 (BYTE-only)<br> | |||
| SHA-384 (BYTE-only)<br> | |||
| SHA-512 (BYTE-only) | |||
| || N/A ||   | || N/A ||   | ||
| Pending | |||
| |- | |- | ||
| ! HMAC | ! [http://csrc.nist.gov/groups/STM/cavp/documents/mac/hmacval.html HMAC] | ||
| |   | |   | ||
| HMAC-SHA1, HMAC-SHA256,<br> | |||
| HMAC-SHA384, HMAC-SHA512   | |||
| ||   | ||   | ||
| KeySize < BlockSize,<br> | |||
| KeySize = BlockSize,<br> | |||
| KeySize > BlockSize   | |||
| ||   | ||   | ||
| Pending | |||
| |- | |- | ||
| !  | ! [http://csrc.nist.gov/groups/STM/cavp/documents/drbg/drbgval.html DRBG]  | ||
| | N/A   | | N/A   | ||
| ||    | ||    | ||
| Hash_DRBG of [http://csrc.nist.gov/publications/nistpubs/800-90/SP800-90revised_March2007.pdf NIST SP 800-90] | |||
| ||   | ||   | ||
| Pending | |||
| |- | |- | ||
| ! DSA   | ! [http://csrc.nist.gov/groups/STM/cavp/documents/dss/dsaval.htm DSA]  | ||
| | 512-1024 || | | 512-1024 || | ||
| PQG(gen)MOD(1024);<br> | |||
| PQG(ver)MOD(1024);<br> | |||
| KEYGEN(Y)MOD(1024);<br> | |||
| SIG(gen)MOD(1024);<br> | |||
| SIG(ver)MOD(1024); | |||
| ||   | ||   | ||
| Pending | |||
| |- | |- | ||
| ! RSA   | ! [http://csrc.nist.gov/groups/STM/cavp/documents/dss/rsaval.html RSA]  | ||
| | 1024- | | 1024-8192 ||    | ||
| ALG[RSASSA-PKCS1_V1_5];  SIG(gen);    | ALG[RSASSA-PKCS1_V1_5];  SIG(gen);    | ||
| SIG(ver);   | SIG(ver);   | ||
| || | || | ||
| Pending | |||
| |- | |||
| ! [http://csrc.nist.gov/groups/STM/cavp/documents/dss/ecdsaval.html ECDSA] | |||
| (Extended ECC) | |||
| | 163-571 || | |||
| PKG: CURVES( ALL-P ALL-K ALL-B );<br> | |||
| PKV: CURVES( ALL-P ALL-K ALL-B );<br> | |||
| SIG(gen): CURVES( ALL-P ALL-K ALL-B );<br> | |||
| SIG(ver): CURVES( ALL-P ALL-K ALL-B ); | |||
| ||  | |||
| Not In 2011 Validation | |||
| |- | |||
| ! [http://csrc.nist.gov/groups/STM/cavp/documents/dss/ecdsaval.html ECDSA] | |||
| (Basic ECC) | |||
| | 256-521 || | |||
| PKG: CURVES( ALL-P P-256 P-384 P-521 );<br> | |||
| PKV: CURVES( ALL-P P-256 P-384 P-521 );<br> | |||
| SIG(gen): CURVES( ALL-P P-256 P-384 P-521 );<br> | |||
| SIG(ver): CURVES( P-256 P-384 P-521 ); | |||
| ||  | |||
| Not In 2011 Validation | |||
| |} | |} | ||
| == Dependant Bugs == | |||
| {| border="1" cellpadding="2" summary="Dependent Bugs" | |||
| {| border="1" cellpadding="2" | |||
| |- | |- | ||
| ! Bug !! Description !! Completed   | ! Bug !! Description !! Completed   | ||
| |-   | |-   | ||
| | | |||  ||   | ||
| |} | |} | ||
| == Testing Lab == | |||
| [http://www. | [http://www.saic.com/infosec/testing-accreditation/ SAIC ] | ||
| == FIPS 140 Information == | |||
| [http://csrc.nist.gov/cryptval/ NIST Cryptographic Module Validation Program ]   | [http://csrc.nist.gov/cryptval/ NIST Cryptographic Module Validation Program ]   | ||
| Line 201: | Line 128: | ||
| [[ FIPS 140-2 Vendor Requirement Docs | FIPS 140-2 Derived Test Requirements (DTR) ]] | [[ FIPS 140-2 Vendor Requirement Docs | FIPS 140-2 Derived Test Requirements (DTR) ]] | ||
| == Vendor Information == | |||
| This validation is supported and maintained by the following corporations: | |||
| Red Hat, Inc.: http://www.redhat.com/about/contact/ | |||
| == Products Implementing FIPS 140-2 Validated NSS == | |||
| * [https://www.redhat.com Red Hat Enterprise Linux] ([https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/security_guide/sect-security_guide-federal_standards_and_regulations-federal_information_processing_standard#enabling-fips-mode Documentation]) | |||
| <BR> | |||
| [[Category:NSS]] | |||
Latest revision as of 20:19, 20 November 2017
NSS FIPS 140 validation
Softoken is a component of NSS, and has a separate version number. The most recent FIPS validated Softoken is 3.12.4 and is in NSS 3.12.4 and NSS 3.12.5 and NSS 3.12.6. Binaries are available | here.
NSS softoken has completed FIPS 140 validation four times: 1997, 1999, 2002, 2007 and 2009. View | NSS FIPS validation history here. View the FIPS2009 validation here.
This page documents our current NSS FIPS 140 validation.
Platforms for 2011
- Level 1
- RHEL 6 x86 32 bit (no AES-NI)
- RHEL 6 x86 64 bit
 
Algorithms
Plan is to validate all FIPS-approved algorithms that NSS implements and NIST has tests for. There are eight such algorithms.
| Algorithms | Key Size | Modes | Certificates | 
|---|---|---|---|
| TripleDES | KO 1,2,3 (56,112,168) | TECB(e/d; KO 1,2,3) | Pending | 
| AES | 128/192/256 | ECB(e/d; 128,192,256) | Pending | 
| SHS (including all variants: SHA-1, SHA-256, SHA-384, and SHA-512) | SHA-1   (BYTE-only) | N/A | Pending | 
| HMAC | HMAC-SHA1, HMAC-SHA256, | KeySize < BlockSize, | Pending | 
| DRBG | N/A | Hash_DRBG of NIST SP 800-90 | Pending | 
| DSA | 512-1024 | PQG(gen)MOD(1024); | Pending | 
| RSA | 1024-8192 | ALG[RSASSA-PKCS1_V1_5]; SIG(gen); SIG(ver); | Pending | 
| ECDSA (Extended ECC) | 163-571 | PKG: CURVES( ALL-P ALL-K ALL-B ); | Not In 2011 Validation | 
| ECDSA (Basic ECC) | 256-521 | PKG: CURVES( ALL-P P-256 P-384 P-521 ); | Not In 2011 Validation | 
Dependant Bugs
| Bug | Description | Completed | 
|---|---|---|
Testing Lab
FIPS 140 Information
NSS FIPS 140-2 Validation Docs
FIPS 140-2 Derived Test Requirements (DTR)
FIPS 140-2 Derived Test Requirements (DTR)
Vendor Information
This validation is supported and maintained by the following corporations:
Red Hat, Inc.: http://www.redhat.com/about/contact/
Products Implementing FIPS 140-2 Validated NSS