FIPS Operational Environment

From MozillaWiki
Jump to navigation Jump to search

Maintaining Software Integrity

Describe the checksum (.chk) files.

Configuring Discretionary Access Control

On Linux and Solaris, discretionary access control can be configured by setting the access permission bits of the files appropriately. The access permission bits can be specified when the files are created, or they can be modified later.

NSS creates the database files with the 0600 permission bits, making them readable and writable by the owner only.

The Crypto Officer (the operator who installs the NSS library files) should use the chmod command to set the access permission bits of the NSS library files appropriately.

  • specify the set of roles that can execute stored cryptographic software: all users. For example, "chmod a+rx libsoftokn3.so".
  • specify the set of roles that can modify (i.e., write, replace, and delete) cryptographic programs: the owner only. For example, "chmod u+w libsoftokn3.so; chmod go-w libsoftokn3.so".
  • specify the set of roles that can modify (i.e., write, replace, and delete) cryptographic data (e.g., cryptographic keys and audit data), CSPs, and plaintext data: NSS databases can only be modified by the owner. Audit data can only be modified by the root user.
  • specify the set of roles that can read cryptographic data (e.g., cryptographic keys and audit data), CSPs, and plaintext data: NSS databases can only be read by the owner. Audit data can only be read by the root user.
  • specify the set of roles that can enter cryptographic keys and CSPs: N/A. NSS does not support manual entry of cryptographic keys and CSPs.