Thanks Glen for the information.

On Apr 24, 5:57 pm, Glen Beasley <glen.beas...@sun.com> wrote:
> ksreedha...@gmail.com wrote:
> > On Apr 24, 10:03 am, Wan-Teh Chang <w...@google.com> wrote:
>
> >> On Thu, Apr 23, 2009 at 1:51 PM,  <ksreedha...@gmail.com> wrote:
>
> >>> Hello,
>
> >>> I am using Mozilla JSS provider from Java.
>
> >>> JSS 4.2.5
> >>> NSS 3.11.4
> >>> NSPR 4.6.4
>
> >>> When the FIPS RNG continuous tests fail, what is the behavior in NSS/
> >>> JSS. What does it return. do we get an java exception to the calling
> >>> function.
>
> >>> For example, when Java code tries to establish a TLS Socket session,
> >>> and this continuous tests fail during random number generation, do we
> >>> get an exception to the socket creation code.
>
> >> I guess so.  In FIPS mode, once the continuous RNG test fails, the
> >> NSS software crypto module ("softoken") enters an error state, and
> >> all subsequent crypto operations will fail.  I don't know how these
> >> NSS errors will be reflected in Java, but JSS definitely won't be able
> >> to do TLS.
>
> >> Wan-Teh- Hide quoted text -
>
> >> - Show quoted text -
>
> > Thanks Wan for the reply.
>
> > I was also certain that JSS will not able to do TLS but it would be
> > helpful if a distinct exception/error is thrown incase of continuous
> > tests fail. It seems we need to flag/log these messages.
>
> Understand that it very unlikely that the NSS 3.11.4 FIPS RNG would
> fail, but
> if the RNG continuous test failed, NSS would consider that a critical
> error, and would go
> into error state setting SEC_ERROR_LIBRARY_FAILURE and would allow no
> further cryptographic operation, until NSS was re-initialized. All JSS
> method requesting the NSS module to perform an operation would result
> with an exception, most likely with
> org.mozilla.jss.crypto.TokenRuntimeException
> but this Exception is not guaranteed for all methods.
>
> > If any one can point me what kind of errors will be thrown, that would
> > be great.
>
> > Otherwise I may have to tweak the nss code.
>
> you're welcome to tweak that NSS code but understand that would break
> NSS 3.11.4 FIPS compliance.
> meaning if you want to tweak the NSS code, you would have to submit a
> patch,  have patch pass review, and
> then have the release with that included patch pass a FIPS validation.
>
> if you want the JSS Exception consistent you would be tweaking the JSS
> code (not NSS), and providing patch for JSS.
>
> But right now I don't see the point. The JSS layer is FIPS compliant
> because it requests the NSS cryptographic module to perform any and all
> cryptographic operations. If the RNG continuous test fail the NSS
> cryptographic module enters an error state and is not usable. A java
> application configured to be FIPS compliant using JSS/NSS would be
> unusable for cryptographic operations until re-initialized. If the user
> configured NSS to audit data the user would view the configured log files.
>
> see Access to Audit Data in the NSS security 
> policy:http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp814.pdf
>
> -glen
>
>
>
> > Thanks,
> > Sreedhar
>
>
>
>  smime.p7s
> 6KViewDownload- Hide quoted text -
>
> - Show quoted text -- Hide quoted text -
>
> - Show quoted text -

-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to