On 05/13/09 09:51, Hai-May Chao wrote:
> Anthony Scarpino wrote:
>> Krishna Yenduri wrote:
>>>
>>> KY-7    kcf section and the next section
>>>
>>> See KY-5. Some of the kernel modules (e.g. sha1) are loaded by the time
>>> kcfd starts since they are needed very early on during boot. So, you 
>>> will
>>> need some other mechanism to do POST checks on them.
>>
>> If they are accessing the module directly, that is outside the 
>> boundary.  We are validating the Crypto Framework as defined by the 
>> usage via the APIs.. The same situation you describe holds true to 
>> libmd.  If FIPS has failed, we cannot stop someone from accessing 
>> libmd, we only prevent the use of PKCS#11 interfaces via 
>> pkcs11_softtoken.. That's will be part of the Security Policy..
>>
>
> Krishna,
>
> You meant kcf module could be loaded and in use before cryptosvc has 
> begun, right?

 Yes.

> as some module depends on kcf. For the case of 
> random_get_pseudo_bytes(), it would
> be called before kcfd. If true, we could always do POST at 
> initialization of a module
> for that.

 OK. Note though that you don't know if FIPS mode is set at that time.
 I guess you can do the test all the time, if it is a cheap operation or
 find a way to get the FIPS mode setting value earlier.

-Krishna


Reply via email to