Zeroizing shared secrets and host keys

After you have reviewed the FIPS policy, use the fips zeroize all command to zeroize all plain text secrets, private keys and CSPs.

device# fips zeroize all

Syntax: [no] fips zeroize {all | shared-secret | host-keys}

The all option zeroizes all shared secrets and host keys. The shared-secret option zeroizes shared secret keys only. The host-keys option zeroizes host keys only.

It displays KCM key string deletion.

For example,key-string for key-id <key-id> under key chain <keychain-name> is deleted successfully.

For example, entering fips zeroize shared-secret command zeroizes only the shared secret keys of various networking protocols and host access passwords.

Note

Note

The fips zeroize all command may cause operational failure within networking protocols using shared secrets and should be used with careful consideration.

The default FIPS policy calls for the zeroization of all keys using the fips zeroize all command option. When you apply a less strict FIPS policy than the default, zeroize at your discretion.

Note

Note

If there are any errors displayed during zeroization for pending SSH or HTTPS sessions in use, then let the Crypto-officer clear the corresponding sessions by either disconnecting the clients remotely or by using the kill ssh or clear web-connection commands.
Note

Note

Run the clear ikev2 sa command to manually remove the connection once the FIPS mode is disabled.
Note

Note

The fips zeroize all command zeroizes all keys irrespective of the configured FIPS policy.

The following table lists the various keys used in the system that are zeroized in compliance with FIPS.

Table 1. Key zeroization

Keys used

IKEv2 DH Group-14 Private Key 2048 bit MODP

IKEv2 DH Group-14 Public Key 2048 bit MODP

IKEv2 DH Group-14 Shared Secret 2048 bit MODP

IKEv2 ECDH Group-19 Private Key (P-256)

IKEv2 ECDH Group-19 Public Key (P-256)

IKEv2 ECDH Group-19 Shared Secret (P-256)

IKEv2 ECDH Group-20 Private Key (P-384)

IKEv2 ECDH Group-20 Public Key (P-384)

IKEv2 ECDH Group-20 Shared Secret (P-384)

IKEv2 ECDSA Private Key (P-256)

IKEv2 ECDSA Private Key (P-384)

IKEv2 ECDSA Public Key (P-256)

IKEv2 ECDSA Public Key (P-384)

IKEv2 Encrypt/Decrypt Key

IKEv2 KDF State

IKEv2 Pre-Shared Key (PSK)

IKEv2/IPSec Authentication Key

IPsec ESP Encrypt/Decrypt Key

Local - Crypto-officer Password

Local - Port Administrator Password

Local - User Password

LP DRBG Internal State

LP DRBG Seed

LP DRBG Value C

LP DRBG Value V

LP DRBG Internal State

LP DRBG Seed

LP DRBG Value C

LP DRBG Value V

MKA Connectivity Association Key (CAK)

MKA Connectivity Key Name (CKN)

MKA Integrity Checksum Key (ICK)

MKA Key Encryption Key (KEK)

MKA Secure Association Key (SAK)

MKA SP800-108 KDF State

MP DRBG Internal State

MP DRBG Key

MP DRBG Seed

MP DRBG Value V

NTP secret

PKI SCEP Enrollment RSA 2048-bit Private Key

PKI SCEP Enrollment RSA 2048-bit Public Key

RADIUS Secret

SNMPv3 KDF State

SNMPv3 secret

SSHv2 Client RSA Private Key

SSHv2 Client RSA Public Key

SSHv2 DH Group-14 Peer Public Key 2048 bit MODP

SSHv2 DH Group-14 Private Key 2048 bit MODP

SSHv2 DH Group-14 Public Key 2048 bit MODP

SSHv2 DH Shared Secret Key (2048 bit)

SSHv2 Host RSA Private Key (2048 bit)

SSHv2 Host RSA Public Key (2048 bit)

SSHv2 KDF Internal State

SSHv2/SCP Authentication Key (HMAC-SHA-1, 160 bits)

SSHv2/SCP Session Keys (128, 192 and 256 bit (AES CBC and AES CTR)

TACACS+ Secret

TLS Authentication Key

TLS Host DH Group-14 Private Key 2048 bit MODP

TLS Host DH Group-14 Public Key 2048 bit MODP

TLS Host RSA Private Key (RSA 2048 bit)

TLS Host RSA Public Key (RSA 2048 bit)

TLS KDF Internal State

TLS Master Secret

TLS Peer DH Group-14 Public Key 2048 bit MODP

TLS Peer Public Key (RSA 2048 bit)

TLS Pre-Master Secret

TLS Session Key