From 6e916e6715b10627ac34b4439397308e5be2109a Mon Sep 17 00:00:00 2001 From: Rob Austein Date: Sat, 24 Jul 2021 01:00:09 +0000 Subject: Clean up more links, convert to m.css theme (no JavaScript!) --- pelican/content/AlphaBoard.md | 2 +- pelican/content/DNSSEC-Requirements.md | 103 +++++++++++++++++++++++++++++++++ pelican/content/Dashboard.md | 32 +++++----- pelican/content/DevBridgeBoard.md | 2 +- pelican/content/NoisyDiode.md | 2 +- pelican/content/UpgradeToKSNG.md | 2 +- 6 files changed, 123 insertions(+), 20 deletions(-) create mode 100644 pelican/content/DNSSEC-Requirements.md (limited to 'pelican') diff --git a/pelican/content/AlphaBoard.md b/pelican/content/AlphaBoard.md index fe597b9..f0e0f1a 100644 --- a/pelican/content/AlphaBoard.md +++ b/pelican/content/AlphaBoard.md @@ -37,5 +37,5 @@ Modified: 2019-01-22 08:46 | 14 | Red | FPGA LED 3 | | 15 | Green | FPGA LED 1 | | 16 | Yellow | FPGA LED 2 | -| 17 | Blue | FPGA LED 0. [Toggles with sys_clk when FMC is active.](https://trac.cryptech.is/browser/core/comm/fmc/src/rtl/fmc_indicator.v) | +| 17 | Blue | FPGA LED 0. [Toggles with sys_clk when FMC is active.](https://git.cryptech.is/core/comm/fmc/tree/src/rtl/fmc_indicator.v) | | 18 | Green | Power OK | diff --git a/pelican/content/DNSSEC-Requirements.md b/pelican/content/DNSSEC-Requirements.md new file mode 100644 index 0000000..cef61c4 --- /dev/null +++ b/pelican/content/DNSSEC-Requirements.md @@ -0,0 +1,103 @@ +Title: DNSSEC/Requirements +Author: trac +Date: 2016-12-15 22:44 + +# DNSSEC Requirements + +## Questions + + +- Should we even support SHA-1? +- GOST? + + +## Must implement + +Target DNSSEC Algorithms: + + +- RSA/SHA-256 (RFC 5702) +- RSA/SHA-512 (RFC 5702) + + +Algorithms: + + +- Hash: SHA-256 +- Hash: SHA-512 +- Sign: RSA + + +Required PKCS11 Mechs: + + +- CKM_RSA_PKCS_KEY_PAIR_GEN +- CKM_SHA256_RSA_PKCS +- CKM_SHA512_RSA_PKCS +- CKM_RSA_PKCS (possible cross-check hash with CKM_SHA256 and CKM_SHA512 before signing) +- CKM_SHA256 +- CKM_SHA512 + + +## Should implement + +Target DNSSEC Algorithms: + + +- ECDSA/P-256/SHA-256 (RFC 6605) +- ECDSA/P-384/SHA-384 (RFC 6605) + + +Algorithms: + + +- Hash: SHA-256 +- Hash: SHA-384 +- Sign: P-256 +- Sign: P-384 + + +Required PKCS11 Mechs: + + +- CKM_EC_KEY_PAIR_GEN +- CKM_ECDSA_SHA256 +- CKM_ECDSA_SHA384 +- CKM_ECDSA (possible cross-check hash with CKM_SHA256 and CKM_SHA512 before signing) +- CKM_SHA256 +- CKM_SHA384 + + +## May implement + +Target DNSSEC Algorithms: + + +- RSA/SHA-1 (RFC 3110) +- GOST (RFC 5933) + + +Algorithms: + + +- Hash: SHA-1 +- Sign: RSA + + + +- Hash: GOST R 34.11-94 (RFC5831) +- Sign: GOST R 34.10-2001 (RFC5832) + + +Required PKCS11 Mechs: + + +- CKM_RSA_PKCS_KEY_PAIR_GEN +- CKM_RSA_PKCS (possible cross-check hash with CKM_SHA_1) +- CKM_SHA1_RSA_PKCS +- CKM_SHA_1 + + + +- CKM_GOSTR3410_KEY_PAIR_GEN +- CKM_GOSTR3410_WITH_GOSTR3411 diff --git a/pelican/content/Dashboard.md b/pelican/content/Dashboard.md index 83ecf75..4cba3a8 100644 --- a/pelican/content/Dashboard.md +++ b/pelican/content/Dashboard.md @@ -40,10 +40,10 @@ Date: 2016-12-15 22:44 | Component | Status | Repository | Comment | |---|---|---|---| -| SHA-1 | Done | [core/hash/sha1](GitRepositories/core/hash/sha1) | | -| SHA-256 | Done | [core/hash/sha256](GitRepositories/core/hash/sha256) | | -| SHA-512 | Done | [core/hash/sha512](GitRepositories/core/hash/sha512) | Support all four SHA-512/x modes defined in FIPS 180-4. | -| SHA-3 (Keccak ) | Started | [core/hash/sha3](GitRepositories/core/hash/sha3) | | +| SHA-1 | Done | [core/hash/sha1](https://git.cryptech.is/core/hash/sha1/about) | | +| SHA-256 | Done | [core/hash/sha256](https://git.cryptech.is/core/hash/sha256/about) | | +| SHA-512 | Done | [core/hash/sha512](https://git.cryptech.is/core/hash/sha512/about) | Support all four SHA-512/x modes defined in FIPS 180-4. | +| SHA-3 (Keccak ) | Started | [core/hash/sha3](https://git.cryptech.is/core/hash/sha3/about) | | | GOST R 34.11-2012 | Started | | | @@ -52,8 +52,8 @@ Date: 2016-12-15 22:44 | Component | Status | Repository | Comment | |---|---|---|---| -| AES | Done | [core/cipher/aes](GitRepositories/core/cipher/aes) | AES cipher core with support for 128 and 256 bit keys. | -| ChaCha | Done | [core/cipher/chacha](GitRepositories/core/cipher/chacha) | High speed stream cipher. Based on the Salsa20 stream cipher. | +| AES | Done | [core/cipher/aes](https://git.cryptech.is/core/cipher/aes/about) | AES cipher core with support for 128 and 256 bit keys. | +| ChaCha | Done | [core/cipher/chacha](https://git.cryptech.is/core/cipher/chacha/about) | High speed stream cipher. Based on the Salsa20 stream cipher. | @@ -61,11 +61,11 @@ Date: 2016-12-15 22:44 | Component | Status | Repository | Comment | |---|---|---|---| -| ModExp -8192 (RSA) | Done | [core/math/modexps6](GitRepositories/core/math/modexps6) | | +| ModExp -8192 (RSA) | Done | [core/math/modexps6](https://git.cryptech.is/core/math/modexps6/about) | | | Curve25519 | Started | | | | Ed25519 | Not started | | | | P-256, P-384 ECDSA | Started | | | -| GOST R 34.10-2001 | Started | | Core in provisional repo. Will be moved to the the hash core section.| +| GOST R 34.10-2001 | Started | | Core in provisional repo. Will be moved to the the hash core section.| @@ -73,9 +73,9 @@ Date: 2016-12-15 22:44 | Component | Status | Repository | Comment | |---|---|---|---| -| TRNG | Done | [core/rng/trng](GitRepositories/core/rng/trng) | Depends on SHA-512 and ChaCha | -| External Avalanche Entropy | Done | [core/rng/avalanche_entropy](GitRepositories/core/rng/avalanche_entropy) | [Hardware](GitRepositories/user/ft/stm32-avalanche-noise) and stand-alone PoC | -| Internal Ring Oscillator | Done | [core/rng/rosc_entropy](GitRepositories/core/rng/rosc_entropy) | | +| TRNG | Done | [core/rng/trng](https://git.cryptech.is/core/rng/trng/about) | Depends on SHA-512 and ChaCha | +| External Avalanche Entropy | Done | [core/rng/avalanche_entropy](https://git.cryptech.is/core/rng/avalanche_entropy/about) | [Hardware](https://git.cryptech.is/user/ft/stm32-avalanche-noise/about) and stand-alone PoC | +| Internal Ring Oscillator | Done | [core/rng/rosc_entropy](https://git.cryptech.is/core/rng/rosc_entropy/about) | | @@ -93,8 +93,8 @@ Date: 2016-12-15 22:44 | Component | Status | Repository | Comment | |---|---|---|---| -| Coretest | Done | [core/comm/coretest](GitRepositories/core/comm/coretest) | Command-response based core tester for HW accelerated core verification. | -| UART | Done | [core/comm/uart](GitRepositories/core/comm/uart) | Serial interface module used on the TerasIC C5G development board. | -| I2C | Done | [core/comm/i2c](GitRepositories/core/comm/i2c) | I2C interface module used on the Novena board. | -| EIM | Done | [core/comm/eim](GitRepositories/core/comm/eim) | Interface for the Freescale EIM memory interface used on the Novena board. | -| FMC | Done | [core/comm/fmc](GitRepositories/core/comm/fmc) | Interface for the STM32 FMC memory interface used on the dev-bridge and Alpha boards. | +| Coretest | Done | [core/comm/coretest](https://git.cryptech.is/core/comm/coretest/about) | Command-response based core tester for HW accelerated core verification. | +| UART | Done | [core/comm/uart](https://git.cryptech.is/core/comm/uart/about) | Serial interface module used on the TerasIC C5G development board. | +| I2C | Done | [core/comm/i2c](https://git.cryptech.is/core/comm/i2c/about) | I2C interface module used on the Novena board. | +| EIM | Done | [core/comm/eim](https://git.cryptech.is/core/comm/eim/about) | Interface for the Freescale EIM memory interface used on the Novena board. | +| FMC | Done | [core/comm/fmc](https://git.cryptech.is/core/comm/fmc/about) | Interface for the STM32 FMC memory interface used on the dev-bridge and Alpha boards. | diff --git a/pelican/content/DevBridgeBoard.md b/pelican/content/DevBridgeBoard.md index 8983da8..a9310c9 100644 --- a/pelican/content/DevBridgeBoard.md +++ b/pelican/content/DevBridgeBoard.md @@ -42,4 +42,4 @@ you want to avoid scraping them with the bolt head or the nut. I happen to be using a countersink-head bolt, which is beveled toward the shaft, but it's probably even better to use a nylon washer. -All the software, as well as flashing instructions, are at [GitRepositories/sw/stm32]({filename}GitRepositories/sw/stm32.md). +All the software, as well as flashing instructions, are at [sw/stm32](https://git.cryptech.is/sw/stm32.md). diff --git a/pelican/content/NoisyDiode.md b/pelican/content/NoisyDiode.md index d6567fd..2ee3711 100644 --- a/pelican/content/NoisyDiode.md +++ b/pelican/content/NoisyDiode.md @@ -29,4 +29,4 @@ The Cryptech project has to date made a couple of different hardware entropy sou Links: -[Raspberry-Pi / USB entropy source](GitRepositories/user/ft/stm32-avalanche-noise) +[Raspberry-Pi / USB entropy source](https://git.cryptech.is/user/ft/stm32-avalanche-noise/about) diff --git a/pelican/content/UpgradeToKSNG.md b/pelican/content/UpgradeToKSNG.md index 87288b6..3ed1afb 100644 --- a/pelican/content/UpgradeToKSNG.md +++ b/pelican/content/UpgradeToKSNG.md @@ -162,7 +162,7 @@ cryptech> masterkey set If the above procedure somehow goes horribly wrong and bricks your alpha, you can still recover, but you'll need an ST-LINK programmer. -There's some discussion of this at [GitRepositories/sw/stm32]({filename}GitRepositories/sw/stm32.md). +There's some discussion of this at [sw/stm32](https://git.cryptech.is/sw/stm32.md). Possible sources for the ST-LINK programmer and a suitable cable: -- cgit v1.2.3