glen beasley wrote:
Nelson B wrote:
What is the min/max password length when the module is operating in FIPS 140-2 mode?
Wan-Teh will have to answer that.  I think it has changed recently.
It seems that the requirements have changed since the last time NSS was
FIPS 140 evaluated, or at least our new test lab interprets them very
differently.
see: http://wiki.mozilla.org/Security_Policy#Specification_of_Roles

In FIPS mode, the NSS cryptographic module imposes the following requirements on the password.

   * The password must be at least seven characters long.
* The password must consist of characters from three or more character classes. We define five character classes: digits (0-9), ASCII lowercase letters, ASCII uppercase letters, ASCII non-alphanumeric characters (such as space and punctuation marks), and non-ASCII characters. If an ASCII uppercase letter is the first character of the password, the uppercase letter is not counted toward its character class. Similarly, if a digit is the last character of the password, the digit is not counted toward its character class.

Hrm...NSS 3.11.2 is *definately* not enforcing this. Today I went through our code and changed the password from "test" (which was working just fine) to "password" (which is now working just fine) on all of our databases. I'll wait for Wan-Teh to chime in before I go changing to the even stricter version. Maybe this is something that will only happen once 3.11.5 (The wiki says that's the version reserved for FIPS approval) is out.

I've read in the past somewhere something about needing to enforce the minimum password length for FIPS mode in the future as it's not being done now. I have some modules in FIPS mode and when I query the minimum password length with PK11_GetMinimumPwdLength it reports 7 but I am currently using a password of length 4 and everything is working just fine.

That doesn't sound right (to me).
Are you sure you're running in FIPS mode?

$ modutil -list -dbdir certs
Using database directory certs...

Listing of PKCS #11 Modules
-----------------------------------------------------------
  1. NSS Internal FIPS PKCS #11 Module
         slots: 1 slot attached
        status: loaded

         slot: NSS FIPS 140-2 User Private Key Services
        token: NSS FIPS 140-2 Certificate DB

The above is output from one of our databases, but all but one (for testing purposes) are in FIPS mode because we explicitly added a check, PK11_IsFIPS(), and the code throws an error if a database is not operating in FIPS mode.

Thanks,
Dave
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to