What I thought the topic was originally about was providing guidance to
developers on dealing with randomness, should they choose to do that.  My
point was only that there are valid reasons a developer might be forced to
deal with randomness rather than depend on the OS, and public-sector
certification is one such reason.

I know it sounds like paper pushing, but the people writing Common Criteria
profiles really are trying to get vendors to do the right thing.  They are
also open to feedback from the vendor and developer community, and within
the last year the CC community has started "technical communities" which are
open to participation from anyone - for just that purpose.  So if they are
doing the wrong thing, there is an opportunity to correct them.

In the case of entropy specifically, if you believe what is written here:
https://www.niap-ccevs.org/pp/pp_nd_v1.1-add3.pdf
...it has done some good.  By simply requiring vendors to think about the
problem, it got them to uncover deficiencies and make improvements.  BTW
this is a useful document to read to understand what the government folks
are going after when it comes to entropy.

But back to your question:

>So - how important is it that any new work in the IETF on
>this topic be consistent with a requirement for implementations
>to be evaluated via such schemes?

Not important.  The government certification people mandate that vendors
implement IETF standards, not the other way around.  Sometimes they pick
subsets - for example "Product SHALL implement TLS 1.2, but only with
specific ciphersuites (things based on various combinations of AES, RSA,
ECDSA, ECDHE, etc.)"  But no, I don't think we should let their requirements
drive standards activity.

-Jon


--
Jon Green
[email protected]
http://www.hosed.org


-----Original Message-----
From: Stephen Farrell [mailto:[email protected]] 
Sent: Thursday, January 23, 2014 1:57 AM
To: [email protected]; 'Krisztián Pintér'
Cc: [email protected]
Subject: evaluating stuff (was: Re: [dsfjdssdfsd] Any plans for drafts or
discussions on here?)


(Great to see the discussion re-started, but I guess we can
afford more than one subject line:-)

On 01/23/2014 03:54 AM, [email protected] wrote:
> Those of us who deal with FIPS 140 and Common Criteria are now being asked
> to document entropy sources,

First, my sympathies for having to deal with that.

But I do wonder to what extent we're finding such evaluations
really useful. I know they are formal form-filling requirements
in various contexts, but I'm not so sure I'm that comfortable
treating them as a first order requirement when it comes to
things we do in the IETF.

I have seen a number of credible arguments that such schemes,
as applied to crypto implementations, are actually counter-
productive.

So - how important is it that any new work in the IETF on
this topic be consistent with a requirement for implementations
to be evaluated via such schemes?

My take would be that that's not hugely important and should
lose out to "doing the right thing," but given that some folks
do need to suffer such evaluations, we should think about 'em
but treat any evaluation-scheme-specific requirements only as
nice-to-have level requirements.

I expect vendors who are forced into doing it might disagree
though.

S.

_______________________________________________
dsfjdssdfsd mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dsfjdssdfsd

Reply via email to