FIPS Design Assurance: Difference between revisions

From MozillaWiki
Jump to navigation Jump to search
Line 1: Line 1:
===Configuration Management===
===Configuration Management===
NSS is maintained according to the development standards and rules of the Mozilla Foundation. The CVS version control system is used for maintaining all changes to the source files of NSS. NSS source files are contained within four directories within the mozilla.org CVS repository. Each file is tracked with a revision number and a complete change history is maintained. Releases are given a CVS tag when the release is published. A source file is identified by its fully qualified pathname within the source tree and the revision number or CVS tag. NSS source includes all makefiles and scripts used to build the NSS release on every platform supported.
NSS is maintained according to the development standards and rules of the Mozilla Foundation. The CVS version control system is used for maintaining all changes to the source files of NSS. NSS source files are contained within four directories within the mozilla.org CVS repository. Each file is tracked with a revision number and a complete change history is maintained. Releases are given a CVS tag when the release is published. A source file is identified by its fully qualified pathname within the source tree and the revision number or CVS tag. NSS source includes all makefiles and scripts used to create the NSS release on every platform supported.


NSS Documentation is published on www.mozilla.org and developer.mozilla.org. www.mozilla.org is maintained by CVS. developer.mozilla.org is maintained by wiki. The wiki keeps a history of changes by time stamp for each wiki page and image.
NSS Documentation is published on www.mozilla.org, wiki.mozilla.org, and developer.mozilla.org. www.mozilla.org is maintained by CVS. wiki.mozilla.org and developer.mozilla.org are maintained by wiki. The wiki keeps a history of changes by time stamp for each wiki page and image.


===Installation===
===Installation===

Revision as of 22:10, 5 June 2006

Configuration Management

NSS is maintained according to the development standards and rules of the Mozilla Foundation. The CVS version control system is used for maintaining all changes to the source files of NSS. NSS source files are contained within four directories within the mozilla.org CVS repository. Each file is tracked with a revision number and a complete change history is maintained. Releases are given a CVS tag when the release is published. A source file is identified by its fully qualified pathname within the source tree and the revision number or CVS tag. NSS source includes all makefiles and scripts used to create the NSS release on every platform supported.

NSS Documentation is published on www.mozilla.org, wiki.mozilla.org, and developer.mozilla.org. www.mozilla.org is maintained by CVS. wiki.mozilla.org and developer.mozilla.org are maintained by wiki. The wiki keeps a history of changes by time stamp for each wiki page and image.

Installation

NSS releases are available from mozilla.org's FTP site as compressed (zipped) tar files. The file is expanded into a file system subtree in a location that is suitably secured using the capabilities of the local operating system.

Typically, at this point, an application is configured to use NSS libraries from this subtree. Such configuration is not specified here but consists of the following steps which can also be performed with NSS command line utilities.

  • Initialize the certificate and private key data bases.
  • Import certificates which are to be used by the application into the data base.
  • Put the NSS cryptographic module into FIPS mode see Approved Mode of Operation and Rule #36 for information on accomplishing this programatically and via command line utilities.

Components

All components of the crytpographic module are contained within two libraries, softtokn3 and freebl3, as described in Section 1 . The combined role which is supported is realized entirely within these two libraries. Each of these libraries is shipped with a checksum file containing a signed SHA-1 hash of the library file. When NSS is started in FIPS mode the loader recomputes the hash and verifies the signature. Initialization fails if the signature is not valid.

A list of software modules is here .

Functions

After installation and setup the Crypto officer must ensure the integrity of the cryptographic module during normal periods of operation. The following rules should be adhered to.

  1. Physical security of the computer and peripherals must be maintained.
  1. Access to the files and directories where NSS is installed must restricted to the Crypto officer via the access mechanisms of the host operating system.
  1. Access to the memory space of the running crypto application must be secure from snooping.
  1. Certificate data base passwords must be secured.
  1. Private key material that is imported to or exported from the crypto module, e.g. in PKCS #12 files, must be encrypted and the passwords protected.

There is no proprietary guidance for the NSS crypto module.