FIPS Validation: Difference between revisions
(Note products implementing FIPS mode NSS) |
|||
| (99 intermediate revisions by 10 users not shown) | |||
| Line 1: | Line 1: | ||
== NSS FIPS 140 | == NSS FIPS 140 validation == | ||
NSS has | Softoken is a component of [[NSS]], and has a separate version number. The most recent FIPS validated Softoken is 3.12.4 and is in '''NSS 3.12.4''' and '''NSS 3.12.5''' and '''NSS 3.12.6'''. Binaries are available [https://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/NSS_3_12_4_RTM/ | here]. | ||
NSS softoken has completed FIPS 140 validation four times: 1997, 1999, 2002, 2007 and 2009. View [http://www.mozilla.org/projects/security/pki/nss/fips/ | NSS FIPS validation history ] here. View the [[FIPS2009]] validation here. | |||
This page documents our current NSS FIPS 140 validation. | |||
== Platforms for 2011 == | |||
* Level 1 | * Level 1 | ||
** RHEL | ** RHEL '''6''' x86 32 bit (no AES-NI) | ||
** RHEL '''6''' x86 64 bit | |||
* | |||
* | |||
== Algorithms == | |||
Plan is to validate all FIPS-approved algorithms that NSS implements and NIST has tests for. There are eight such algorithms. | |||
{| border="1" cellpadding="2" summary="Algorithms" | |||
{| border="1" cellpadding="2" | |||
|- | |- | ||
!Algorithms !! Key Size !! Modes !! | !Algorithms !! Key Size !! Modes !! Certificates | ||
|- | |- | ||
![http://csrc.nist.gov/ | ![http://csrc.nist.gov/groups/STM/cavp/documents/des/tripledesval.html TripleDES] | ||
| KO 1,2,3 (56,112,168) | | KO 1,2,3 (56,112,168) | ||
|| | || | ||
TECB(e/d; KO 1,2,3)<br> | |||
TCBC(e/d; KO 1,2,3) | |||
|| | || | ||
Pending | |||
|- | |- | ||
! [http://csrc.nist.gov/ | ! [http://csrc.nist.gov/groups/STM/cavp/documents/aes/aesval.html AES] | ||
| 128/192/256 | | 128/192/256 | ||
|| | || | ||
ECB(e/d; 128,192,256)<br> | |||
CBC(e/d; 128,192,256) | |||
|| | || | ||
Pending | |||
|- | |- | ||
![http://csrc.nist.gov/publications/fips/fips180-2/fips180-2withchangenotice.pdf/ SHS (including all variants: SHA-1, SHA-256, SHA-384, and SHA-512)] | ![http://csrc.nist.gov/publications/fips/fips180-2/fips180-2withchangenotice.pdf/ SHS (including all variants: SHA-1, SHA-256, SHA-384, and SHA-512)] | ||
[http://csrc.nist.gov/ | [http://csrc.nist.gov/groups/STM/cavp/documents/shs/shaval.htm SHS] | ||
| | | | ||
SHA-1 (BYTE-only)<br> | |||
SHA-256 (BYTE-only)<br> | |||
SHA-384 (BYTE-only)<br> | |||
SHA-512 (BYTE-only) | |||
|| N/A || | || N/A || | ||
Pending | |||
|- | |- | ||
! [http://csrc.nist.gov/ | ! [http://csrc.nist.gov/groups/STM/cavp/documents/mac/hmacval.html HMAC] | ||
| | | | ||
HMAC-SHA1, HMAC-SHA256,<br> | |||
HMAC-SHA384, HMAC-SHA512 | |||
|| | || | ||
KeySize < BlockSize,<br> | |||
KeySize = BlockSize,<br> | |||
KeySize > BlockSize | |||
|| | || | ||
Pending | |||
|- | |- | ||
! [http://csrc.nist.gov/ | ! [http://csrc.nist.gov/groups/STM/cavp/documents/drbg/drbgval.html DRBG] | ||
| N/A | | N/A | ||
|| | || | ||
Hash_DRBG of [http://csrc.nist.gov/publications/nistpubs/800-90/SP800-90revised_March2007.pdf NIST SP 800-90] | |||
|| | || | ||
Pending | |||
|- | |- | ||
! [http://csrc.nist.gov/ | ! [http://csrc.nist.gov/groups/STM/cavp/documents/dss/dsaval.htm DSA] | ||
| 512-1024 || | | 512-1024 || | ||
PQG(gen)MOD(1024);<br> | |||
PQG(ver)MOD(1024);<br> | |||
KEYGEN(Y)MOD(1024);<br> | |||
SIG(gen)MOD(1024);<br> | |||
SIG(ver)MOD(1024); | |||
|| | || | ||
Pending | |||
|- | |- | ||
! [http://csrc.nist.gov/ | ! [http://csrc.nist.gov/groups/STM/cavp/documents/dss/rsaval.html RSA] | ||
| 1024- | | 1024-8192 || | ||
ALG[RSASSA-PKCS1_V1_5]; SIG(gen); | ALG[RSASSA-PKCS1_V1_5]; SIG(gen); | ||
SIG(ver); | SIG(ver); | ||
|| | || | ||
Pending | |||
|- | |||
! [http://csrc.nist.gov/groups/STM/cavp/documents/dss/ecdsaval.html ECDSA] | |||
(Extended ECC) | |||
| 163-571 || | |||
PKG: CURVES( ALL-P ALL-K ALL-B );<br> | |||
PKV: CURVES( ALL-P ALL-K ALL-B );<br> | |||
SIG(gen): CURVES( ALL-P ALL-K ALL-B );<br> | |||
SIG(ver): CURVES( ALL-P ALL-K ALL-B ); | |||
|| | |||
Not In 2011 Validation | |||
|- | |||
! [http://csrc.nist.gov/groups/STM/cavp/documents/dss/ecdsaval.html ECDSA] | |||
(Basic ECC) | |||
| 256-521 || | |||
PKG: CURVES( ALL-P P-256 P-384 P-521 );<br> | |||
PKV: CURVES( ALL-P P-256 P-384 P-521 );<br> | |||
SIG(gen): CURVES( ALL-P P-256 P-384 P-521 );<br> | |||
SIG(ver): CURVES( P-256 P-384 P-521 ); | |||
|| | |||
Not In 2011 Validation | |||
|} | |} | ||
== Dependant Bugs == | |||
{| border="1" cellpadding="2" summary="Dependent Bugs" | |||
{| border="1" cellpadding="2" | |||
|- | |- | ||
! Bug !! Description !! Completed | ! Bug !! Description !! Completed | ||
|- | |- | ||
| | ||| || | ||
| | |} | ||
== Testing Lab == | |||
[http://www.saic.com/infosec/testing-accreditation/ SAIC ] | |||
== FIPS 140 Information == | |||
[http://csrc.nist.gov/cryptval/ NIST Cryptographic Module Validation Program ] | |||
[http://csrc.nist.gov/CryptoToolkit/ NIST Crypto Toolkit ] | |||
== NSS FIPS 140-2 Validation Docs == | |||
[[ NSSCryptoModuleSpec | NSS FIPS 140-2 Validation Docs ]] | |||
== FIPS 140-2 Derived Test Requirements (DTR) == | |||
| | [[ FIPS 140-2 Vendor Requirement Docs | FIPS 140-2 Derived Test Requirements (DTR) ]] | ||
== | == Vendor Information == | ||
This validation is supported and maintained by the following corporations: | |||
Red Hat, Inc.: http://www.redhat.com/about/contact/ | |||
== | == Products Implementing FIPS 140-2 Validated NSS == | ||
* [https://www.redhat.com Red Hat Enterprise Linux] ([https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/security_guide/sect-security_guide-federal_standards_and_regulations-federal_information_processing_standard#enabling-fips-mode Documentation]) | |||
[[ | <BR> | ||
[[Category:NSS]] | |||
Latest revision as of 20:19, 20 November 2017
NSS FIPS 140 validation
Softoken is a component of NSS, and has a separate version number. The most recent FIPS validated Softoken is 3.12.4 and is in NSS 3.12.4 and NSS 3.12.5 and NSS 3.12.6. Binaries are available | here.
NSS softoken has completed FIPS 140 validation four times: 1997, 1999, 2002, 2007 and 2009. View | NSS FIPS validation history here. View the FIPS2009 validation here.
This page documents our current NSS FIPS 140 validation.
Platforms for 2011
- Level 1
- RHEL 6 x86 32 bit (no AES-NI)
- RHEL 6 x86 64 bit
Algorithms
Plan is to validate all FIPS-approved algorithms that NSS implements and NIST has tests for. There are eight such algorithms.
| Algorithms | Key Size | Modes | Certificates |
|---|---|---|---|
| TripleDES | KO 1,2,3 (56,112,168) |
TECB(e/d; KO 1,2,3) |
Pending |
| AES | 128/192/256 |
ECB(e/d; 128,192,256) |
Pending |
| SHS (including all variants: SHA-1, SHA-256, SHA-384, and SHA-512) |
SHA-1 (BYTE-only) |
N/A |
Pending |
| HMAC |
HMAC-SHA1, HMAC-SHA256, |
KeySize < BlockSize, |
Pending |
| DRBG | N/A |
Hash_DRBG of NIST SP 800-90 |
Pending |
| DSA | 512-1024 |
PQG(gen)MOD(1024); |
Pending |
| RSA | 1024-8192 |
ALG[RSASSA-PKCS1_V1_5]; SIG(gen); SIG(ver); |
Pending |
| ECDSA
(Extended ECC) |
163-571 |
PKG: CURVES( ALL-P ALL-K ALL-B ); |
Not In 2011 Validation |
| ECDSA
(Basic ECC) |
256-521 |
PKG: CURVES( ALL-P P-256 P-384 P-521 ); |
Not In 2011 Validation |
Dependant Bugs
| Bug | Description | Completed |
|---|---|---|
Testing Lab
FIPS 140 Information
NIST Cryptographic Module Validation Program
NSS FIPS 140-2 Validation Docs
NSS FIPS 140-2 Validation Docs
FIPS 140-2 Derived Test Requirements (DTR)
FIPS 140-2 Derived Test Requirements (DTR)
Vendor Information
This validation is supported and maintained by the following corporations:
Red Hat, Inc.: http://www.redhat.com/about/contact/
Products Implementing FIPS 140-2 Validated NSS