What I thought the topic was originally about was providing guidance to developers on dealing with randomness, should they choose to do that. My point was only that there are valid reasons a developer might be forced to deal with randomness rather than depend on the OS, and public-sector certification is one such reason.
I know it sounds like paper pushing, but the people writing Common Criteria profiles really are trying to get vendors to do the right thing. They are also open to feedback from the vendor and developer community, and within the last year the CC community has started "technical communities" which are open to participation from anyone - for just that purpose. So if they are doing the wrong thing, there is an opportunity to correct them. In the case of entropy specifically, if you believe what is written here: https://www.niap-ccevs.org/pp/pp_nd_v1.1-add3.pdf ...it has done some good. By simply requiring vendors to think about the problem, it got them to uncover deficiencies and make improvements. BTW this is a useful document to read to understand what the government folks are going after when it comes to entropy. But back to your question: >So - how important is it that any new work in the IETF on >this topic be consistent with a requirement for implementations >to be evaluated via such schemes? Not important. The government certification people mandate that vendors implement IETF standards, not the other way around. Sometimes they pick subsets - for example "Product SHALL implement TLS 1.2, but only with specific ciphersuites (things based on various combinations of AES, RSA, ECDSA, ECDHE, etc.)" But no, I don't think we should let their requirements drive standards activity. -Jon -- Jon Green [email protected] http://www.hosed.org -----Original Message----- From: Stephen Farrell [mailto:[email protected]] Sent: Thursday, January 23, 2014 1:57 AM To: [email protected]; 'Krisztián Pintér' Cc: [email protected] Subject: evaluating stuff (was: Re: [dsfjdssdfsd] Any plans for drafts or discussions on here?) (Great to see the discussion re-started, but I guess we can afford more than one subject line:-) On 01/23/2014 03:54 AM, [email protected] wrote: > Those of us who deal with FIPS 140 and Common Criteria are now being asked > to document entropy sources, First, my sympathies for having to deal with that. But I do wonder to what extent we're finding such evaluations really useful. I know they are formal form-filling requirements in various contexts, but I'm not so sure I'm that comfortable treating them as a first order requirement when it comes to things we do in the IETF. I have seen a number of credible arguments that such schemes, as applied to crypto implementations, are actually counter- productive. So - how important is it that any new work in the IETF on this topic be consistent with a requirement for implementations to be evaluated via such schemes? My take would be that that's not hugely important and should lose out to "doing the right thing," but given that some folks do need to suffer such evaluations, we should think about 'em but treat any evaluation-scheme-specific requirements only as nice-to-have level requirements. I expect vendors who are forced into doing it might disagree though. S. _______________________________________________ dsfjdssdfsd mailing list [email protected] https://www.ietf.org/mailman/listinfo/dsfjdssdfsd
