Wan-Teh Chang wrote:
> 2008/10/6 Kai Engert <[EMAIL PROTECTED]>:
>   
>> Wan-Teh Chang wrote:
>>     
>>> - The password must be at least seven characters long.
>>> - The password must consist of characters from three or more character
>>>  classes (uppercase, lowercase, digits, etc.).
>>>
>>>       
>> NSS rejects abcDEF7 although it matches your above description.
>>     
>
> Sorry, I was too lazy to type the second requirement completely.
> It should read:
>
> - The password must consist of characters from three or more
>   character classes.  We define five character classes: digits (0-9),
>   ASCII lowercase letters, ASCII uppercase letters, ASCII
>   non-alphanumeric characters (such as space and punctuation
>   marks), and non-ASCII characters.  If an ASCII uppercase letter
>   is the first character of the password, the uppercase letter is not
>   counted toward its character class.  Similarly, if a digit is the
>   last character of the password, the digit is not counted toward
>   its character class.
>
> So the 7 at the end of abcDEF7 is not counted.  If you try
> 7abcDEF, it'll work.
>
> Wan-Teh
>   
Hi Wan-Teh,
thanks for the info.

Here is what I did using PSM in Firefox 3.0.3 on Fedora 8.
I started Firefox with a new profile. Then I opened "Security Devices" 
dialog.
I tried to enable the FIPS and I got "FIPS mode requires that you have a 
Master Password set for each security device. "
message.
SO, I  initialize the password of 'Software security Device" to 
'abcd1234'. Note that my password
does not follow your FIPS requirements.

Next, I enable the module for FIPS compliance and then I login to 
"internal key token". Everything works fine.
No exception yet.

Now, when I try to change the password  with new value "wxyz1234" and I 
failed to do so.
Only message is "Unable to change Master Password."
Then I follow your instruction and use '12ABcd34' and it successfully 
changes the password.

I guess that the problem is in documentation and the PSM GUI. The PSM 
GUI should have clearly stated 
the password policy requirement in the password change dialog window.
Also, NSS should  have enforced the FIPS password policy during the FIPS 
enablement. It should not
have enabled the internal token for FIPS with non-complaint password.

--
Subrata
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to