Alcatel-Lucent 7450 Basic System Configuration Manual page 198

Ethernet service switch /service router /extensible routing system
Hide thumbs Also See for 7450:
Table of Contents

Advertisement

System Initialization
To support FIPS-140-2, an HMAC-SHA-1 integrity check is performed to verify the integrity
of the software images. The following file is included in the TIMOS-m.n.Yz software bundle
containing the hmac-sha-1 signature:
During the loading of the cpm.tim or both.tim, a HMAC-SHA-1 check is performed to ensure
that the calculated HMAC-SHA-1 of the loaded image matches that stored in the hmac-
sha1.txt file.
The HMAC-SHA-1 check is performed on the data loaded from the .tim file. Note that when
configuring the primary-image, secondary-image and tertiary-image, the hmac-sha1.txt file
must exist in the same directory as the .tim files. If the load has been verified correctly from
the HMAC-SHA-1 integrity check, the load continues to bootup as normal. If the load is not
verified by the HMAC-SHA-1 integrity check, the image load will fail.
After the HMAC-SHA-1 integrity check passes, the nodes continues its normal bootup
sequence including reading the config.cfg file and loading the configuration. The config.cfg
file used to boot the node in FIPS-140-2 mode must not contain any configuration that is not
supported in FIPS-140-2 mode. If such configuration is present in the config.cfg file when
the node boots, the node will load the config.cfg file until the location of the offending
configuration and then halt the configuration at that point. Upon a failure to load the
config.cfg file, a failure message is printed on the console.
Enabling FIPS-140-2 restricts the ability to configure and use cryptographic algorithms and
functions that are not FIPS approved. FIPS-140-2 impacts the ability to configure SSH,
SNMP and certificates. Please refer to the System Management guide for details of FIPS-140-
2 related items.
In addition, signature algorithms of the following combinations only are approved for FIPS:
198
Cryptographic module conditional tests are executed when required during normal
operation of associated when using FIPS-140-2 approved algorithms.
When configuring user-defined encryption or authentication keys, CLI will prompt
for the key to be re-entered. If the re-entered key does not match the original, the CLI
command will be canceled. This affects several protocols and applications.
hmac-sha1.txt
FIPS-140 Approved - Digital Signature Standard (DSS)
→ DSA
→ RSA
→ ECDSA
FIPS-140 Approved - Secured Hash Standard (SHS)
→ SHA-1
→ SHA-224
Basic System Configuration Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

77507950

Table of Contents