> Brian Smith wrote:
> > (Because of Firefox Sync, we are now always going to have crypto
> > features that won't work in FIPS mode.)
> Sigh, ignoring FIPS mode in a feature, is usually a red flag. It means
> you are handling CSP's where you really shouldn't be. Firefox Sync
> *CAN* be implemented in FIPS mode, and we should work to make sure
> that happens.

Because of the way key exchange and key entry are done in Firefox Sync, even if 
it worked in FIPS mode, it wouldn't be FIPS compliant. Because of usability 
constraints, Sync will use an unapproved key exchange mechanism (J-PAKE). And, 
it also allows manual key entry. For compatibility with previous versions we 
also have to support encryption/authentication keys derived from weaker keys 
via PBKDF2, though the new Sync crypto design will avoid PBKDF2 for new users.

> FIPS mode isn't just a check box. If you *CAN'T* work in FIPS mode, it
> usually means you need to take another look at your architecture.

I am more-or-less a "In NIST We Trust" kind of guy and I am very interested in 
finding a usable key-exchange mechanism that doesn't require an unapproved 
algorithm like J-PAKE and which meets the other contraints imposed upon 
Sync--namely that the Sync server shouldn't have access to the plaintext of the 
data it stores and that setup must be easy & secure without requiring huge 
amounts of manual entry by the user. Compliance with FIPS 140 in letter and in 
spirit would be a huge plus. Suggestions are welcome.

I will post an overview of the plan for sync crypto to this mailing list soon 
for interested people to review.

Cheers,
Brian
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to