Standards Compliance

  • Functionality
  • Interoperability
  • Cryptographic Standards
  • IPv6 Support
SecretAgent 5/6/7 use ISC-developed implementations of the following standards-compliant cryptographic schemes and protocols. (Release 7.0 and above contain cryptographic modules built upon our FIPS 140-2 Validated CDK 8.0. NIST algorithm certificates may be viewed by clicking the appropriate link below or those in this table. The CDK's FIPS 140-2 Validatoin Certificate #3105 is here .)

Encryption Algorithms:

Key Exchange Mechanisms:

  • RSA (generates 1024/2048/4096/8192-bit keys; supports all recipient key sizes from 512 to 16384 bits; ANSI X9.31; IEEE 1363-2000; RFC2313; PKCS#1v1.5);
  • Diffie-Hellman (1024/2048/4096-bit keys; ANSI X9.42-1998; IEEE 1363-2000)
  • ECDH (supports 163/233/283/409/571-bit NIST curves in char. 2, 192/224/256/384/521-bit NIST curves in char. p; FIPS 186-3; ANSI X9.42-1988; IEEE 1363-2000); [NIST KAS Certificate #85]

Digital Signature Schemes:

Message Authentication Codes:

Public Key Infrastructure Support:

  • X.509 version 3 RSA, DSA, or ECC certificates (from binary or base64-encoded ASN.1 DER files, or PKCS#7 files)
  • Generates self-signed X.509 certificates for use without a PKI; supports browser-based enrollment for use with an existing PKI (the command line version can generate PKCS#10 RSA/DSA/ECC certificate requests to support additional enrollment scenarios)
  • Optional CRL support (may be made mandatory using PolicyAgent)
  • IETF PKIX key usage certificate extensions (encrypt-and-sign, encrypt-only, sign-only)
  • LDAP repository access for certificate retrieval/certificate status; optional OCSP support
  • Local and network certificate database access

Encoding & Compression Options:

  • A Lempel-Ziv variant (LZSS) is provided for the optional compression of plaintext prior to encryption
  • A base64 encoding function is provided for the optional encoding of ciphertext
  • MSP output (SDN.701; requires a FORTEZZA card and special SecretAgent build)

Secure File/Disk Erasure:

  • integrated file erasure and free space wiping utility conforms to the latest
    Department of Defense National Industrial Security Program OManual (NISPOM) January 1995 (DoD 5220.22-M, Section 8-306, Clearing and Sanitization Matrix method d: "Overwrite all addressable locations with a character, its complement, then a random character and verify.")

PKIX Compliance and DoD PKI Interoperability Testing

SecretAgent uses standard X.509 version 3 certificates with optional chain validation and CRL checking in compliance with RFC3280. On most platforms, SecretAgent 5.x can generate standard PKCS#10 certificate requests (for use with an existing CA) or X.509 version 3 self-signed certificates (for operation without a formal PKI). We have performed interoperability testing with all major Certificate Authorities and PKI vendors (e.g., Entrust, RSA, Verisign, XCert).

In October 2002, SecretAgent 5.6 for Windows passed interoperability testing at DISA's JITC PKE Certification Lab at Ft. Huachuca and received formal certification of full compliance with the DoD PKI. (JITC's Interoperability Test Summary.) The JITC test was based on NIST's "Conformance Testing of Relying Party Client Certificate Path Procesing Logic," Version 1.07, Sept. 28, 2001. SecretAgent releases 5.7-5.10 also pass these tests. SecretAgent 6.0.3 was recertified as fully interoperable with the DoD PKI on February 2, 2010. According to the new certification memo, JITC has found SecretAgent to be compliant with "the applicable requirements defined in Department of Defense Class 3 Public Key Infrastructure Public Key-Enabled Application Requirements," 1.0, 13 July 2000.
JITC logo

SecretAgent 5.8–5.10 and 6.x were designed for full compliance with the recently expanded NIST "Public Key Interoperability Test Suite (PKITS) Certificate Path Validation," Version 1.0, Sept. 2, 2004. The Path Validation Modules (PVMs) in these builds are also "(Federal) Bridge-Enabled," satisfying all requirements in Sections 3 and 4 of NIST Draft Special Publication 800-XXX, NIST Recommendation for X.509 Path Validation, Version 0.5, May 3, 2004.

File Formats

In addition to the native .sa5 file format supported by SecretAgent on all platforms, Release 6.0 (as well as 5.7 and above for Windows, UNIX, and Mac OS X) support the following:

  • S/MIME v3 CMS (RFC3852) — encrypt/decrypt/sign/validate; support for enveloped and detached signatures included

Releases 5.7–5.9 for Windows also supported:

  • OpenPGP (RFC2440) — certificate-based encrypt/decrypt only; OpenPGP signatures are not supported

CMS support provides interoperability with several S/MIME v3 clients, such as Microsoft Outlook Express and OpenSSL. OpenPGP support provides interoperability with PGP 6/7/8, Gnu Privacy Guard, and other RFC2440-compliant applications. OpenPGP interoperability matrix.

Standards Compliance

SecretAgent 5.6 and above fully satisfy NIST FIPS 140-2 as well as DoD/CNSS NSTISSP No. 11 acquisition requirements for COTS security and information assurance products.

FIPS 140-2 logo
CNSS logo
JITC logo

For the list of cryptographic schemes employed by SecretAgent 5.x and 6.x, see the next tab.

IPv6 Support in SecretAgent

In general, SecretAgent supports IPv6 addressing wherever IPv4 addressing is supported. If IPv6 support is not provided by the underlying operating system (either because the OS does not support IPv6 or because the IPv6 stack for the operating system or network adapter has not been properly configured), SecretAgent will recognize IPv6 addresses, but not use IPv6 transport mechanisms.

SecretAgent running on Windows XP SP3, Windows Vista, Window 7 or Windows 8 does fully support IPv6 in both pure and mixed environments.