FIPS 201 (Federal Information Processing Standards Publication 201) is a United States federal government standard that specifies Personal Identity Verification (PIV) requirements for Federal employees and contractors.

FIPS 201 places specific requirements on OCSP Responders as specified below:

  • OCSP [RFC6960] status responders shall be implemented as a supplementary certificate status mechanism.
  • The OCSP status responses are digitally signed to support authentication and integrity using a public key and hash algorithm at least as large as that used to sign the certificate.
    • Note: It is the role of the ADSS Server operator to ensure that they configure an OCSP response signing key and hash algorithm that is at least as large as, or larger than, the key and hash algorithm size used by the CA which issued the target certificate (i.e. certificate being validated).  For further details on how to configure this within the OCSP Service see this page: Step 3 - Registering Trusted CAs for OCSP Service
  • The OCSP message can also be signed with a larger public key or hash algorithm that satisfies the requirements for signing new PIV information, as specified in Table 3-3 of SP 800-78-1:

Signature Generation Date

Public Key Algorithms and Key Sizes

Hash Algorithms

Padding Scheme

After 12/31/2010

RSA (2048, 3072, or 4096 bits)

SHA-256

PKCS #1 v1.5, PSS

ECDSA (Curve P-256)

SHA-256

N/A

ECDSA (Curve P-384)

SHA-384

N/A

.

  • The object identifiers specified in Table 3-4 in SP800-78-1 must be used in CRLs and OCSP messages to identify the signature algorithm:

Signature Algorithm

Object Identifier

RSA with SHA-1 and PKCS v1.5 padding

sha1WithRSAEncryption ::= {iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-1(1) 5}

RSA with SHA-256 and PKCS v1.5 padding

sha256WithRSAEncryption ::= {iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-1(1) 11}

RSA with SHA-256 and PSS padding

id-RSASSA-PSS ::= {iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-1(1) 10}

ECDSA with SHA-256

ecdsa-with-SHA256 ::= {iso(1) member-body(2) us(840) ansi-X9-62(10045) signatures(4) ecdsa-with-SHA2 (3) 2}

ECDSA with SHA-384

ecdsa-with-SHA384 ::= {iso(1) member-body(2) us(840) ansi-X9-62(10045) signatures(4) ecdsa-with-SHA2 (3) 3}

.

  • The cryptographic module used for signing [OCSP responses] shall be validated to FIPS 140-2 with an overall Security Level 2 (or higher).


The ADSS Server administrator can configure the OCSP service to meet all of the above requirements. ADSS Server has been interoperability tested with a range of FIPS 140-2 Level 2+ hardware cryptographic modules from various suppliers.  Any FIPS 140-2 Level 2+ hardware security module that implements the PKCS#11 interface should work with ADSS Server.  For further details on how to configure the FIPS 140-2 cryptographic module see this section of the manual: Creating a New Hardware Crypto Profile.


See also

Support for Multiple Trust Models

Multiple CA and Unique Certificate Validation Policies
Configuring the OCSP Service
Advanced Settings
Forwarding Modes
Access Control
Transactions Log Viewer
Logs Archiving
Alerts
Management Reporting
Optimising ADSS OCSP Server Performance
OCSP Service Interface URLs