pp_ca_v2.1
pp_ca_v2.1
pp_ca_v2.1
Version: 2.1
2017-12-01
National Information Assurance Partnership
1
Revision History
Version Date Comment
V1.0 2014-05-16 Initial draft
V1.1 2016-07-07 Formatting updates
and changes based on
TC feedback
V1.2 2016-10-26 Updates based on
additional TC feedback
and internal review
V2.0 2016-10-28 Second draft
V2.1 2017-12-01 Updates based on first
use in evaluation
2
Table of Contents
1 Introduction ................................................................................................................... 5
1.1 Overview ............................................................................................................................5
1.2 Terms .................................................................................................................................5
1.2.1 Common Criteria Terms ........................................................................................................ 5
1.2.2 Technology Terms ................................................................................................................. 6
1.3 Compliant Targets of Evaluation ..........................................................................................8
1.3.1 TOE Boundary ....................................................................................................................... 9
1.4 Use Cases .......................................................................................................................... 12
2 Conformance Claims ..................................................................................................... 13
3 Security Problem Description ........................................................................................ 14
3.1 Threats ............................................................................................................................. 14
3.2 Assumptions ..................................................................................................................... 14
3.3 Organizational Security Policies ......................................................................................... 15
4 Security Objectives ....................................................................................................... 16
4.1 Security Objectives for the TOE .......................................................................................... 16
4.2 Security Objectives for the Operational Environment ......................................................... 18
4.3 Security Objectives Rationale ............................................................................................ 20
5 Security Requirements .................................................................................................. 25
5.1 TOE Security Functional Requirements............................................................................... 25
5.1.1 Security Audit (FAU) ............................................................................................................ 27
5.1.2 Communications (FCO) ....................................................................................................... 34
5.1.3 Cryptographic Support (FCS) ............................................................................................... 36
5.1.4 User Data Protection (FDP) ................................................................................................. 39
5.1.5 Identification and Authentication (FIA) .............................................................................. 47
5.1.6 Security Management (FMT) .............................................................................................. 54
5.1.7 Protection of the TSF (FPT) ................................................................................................. 61
5.1.8 TOE Access (FTA) ................................................................................................................. 68
5.1.9 Trusted Path/Channels (FTP) .............................................................................................. 70
5.2 Security Assurance Requirements ...................................................................................... 71
5.2.1 Class ADV: Development..................................................................................................... 71
5.2.2 Class AGD: Guidance Documentation ................................................................................. 73
5.2.3 Class ALC: Life-Cycle Support .............................................................................................. 76
5.2.4 Class ASE: Security Target Evaluation ................................................................................. 77
5.2.5 Class ATE: Tests ................................................................................................................... 77
5.2.6 Class AVA: Vulnerability Analysis ........................................................................................ 79
A. Optional Requirements ................................................................................................... 81
A.1 Optional CA functionality .................................................................................................. 81
A.2 Auditable Events ............................................................................................................... 93
B. Selection-Based Requirements ........................................................................................ 95
3
B.1 Management of Subscriber Data........................................................................................ 95
B.2 Internal Audit Requirements ............................................................................................. 97
B.3 Base Cryptographic Requirements ................................................................................... 104
B.4 Password Handling Requirements.................................................................................... 134
B.5 Certificate Request Protocol ............................................................................................ 139
B.6 Certificate Status Information.......................................................................................... 152
B.7 Trusted Channel Options ................................................................................................. 154
B.8 Key Protection ................................................................................................................ 184
B.9 Auditable Events ............................................................................................................. 189
C. Objective Requirements ................................................................................................ 194
C.1 Controlled Export ................................................................................................................. 194
C.2 Enrollment over Secure Transport (EST) ................................................................................ 195
C.3 Certificate Enrollment ........................................................................................................... 197
D. Entropy Documentation and Assessment....................................................................... 197
E. References..................................................................................................................... 199
F. Acronyms ...................................................................................................................... 200
4
1 Introduction
1.1 Overview
Certification Authorities (CAs), and the infrastructure they support, form the basis for one of the primary
mechanisms for providing strong assurance of identity in online transactions. The widely placed trust in
CAs is at the heart of security mechanisms used to protect business and financial transactions online.
Notably, protocols using Transport Layer Security (TLS) rely on certificates issued by CAs to identify and
authenticate servers and clients in web transactions. Governments around the world rely on CAs to
identify parties involved in transactions with them.
However, historical high-profile security breaches at major CAs trusted by widely used operating systems
and browsers have highlighted both the critical role CAs play in securing electronic transactions, as well
as the need to strongly protect them from malicious attacks. Analyses have revealed that these security
breaches were often the result of insufficient security controls being in place on the computer systems
and networks at these CAs, and were sometimes exacerbated by weak record keeping. Third-party
auditing programs, whose role it was to verify that proper security controls were in place, were not
sufficient to identify these lapses in security.
This Protection Profile (PP) describing security requirements for a Certification Authority is intended to
provide a minimal, baseline set of requirements that are targeted at mitigating well defined and described
threats. These requirements support CA operations performed in accordance with the National Institute
of Standards and Technologies (NIST) Interagency or Internal Report (IR) 7924 (Second Draft), Reference
Certificate Policy, May 2014, referred to as the “NIST IR.” Terms
The following sections provide both Common Criteria and technology terms used in this PP.
Common Criteria (CC) Common Criteria for Information Technology Security Evaluation.
Common Evaluation Methodology Common Evaluation Methodology for Information Technology Security
(CEM) Evaluation.
Security Assurance Requirement A requirement for how the TOE’s proper implementation of the SFRs is
(SAR) verified by an evaluator.
Target of Evaluation (TOE) The product under evaluation. In this case, a certification authority.
5
TOE Security Functionality (TSF) The security functionality of the product under evaluation.
TOE Summary Specification (TSS) A description of how a TOE satisfies the SFRs in a ST.
Authorized An optional privileged user role which is delegated authority by the Certification
Organizational Authority Staff or RA Staff to manage a restricted set of certificates associated to
Representative (AOR) devices belonging to a particular organization.
Certificate Profile A set of configuration parameters that defines everything associated with a type of
certificate, in particular the contents (fields and extensions) of the generated
certificate.
Certification authority The set of hardware, software, firmware, or some combination thereof, that issues,
(CA) revokes, and manages public key certificates and certificate status information.
Confidentiality The property that sensitive information is not disclosed to unauthorized individuals,
entities or processes.
Critical security security-related information (e.g., secret and private cryptographic keys,
parameter (CSP) authentication data such as passwords and PINs) appearing in plaintext or otherwise
unprotected form and whose disclosure or modification can compromise the security
of a CA or the security of the information protected by the CA.
Cryptographic key A parameter used in conjunction with a cryptographic algorithm that determines:
Digital Signature A non-forgeable transformation of data that allows proof of the source (with
nonrepudiation) and verification of the integrity of that data.
6
Encrypted key A cryptographic key that has been encrypted with a key encrypting key, a PIN or a
password in order to disguise the value of the underlying plaintext key.
Error detection code A code computed from data and comprised of redundant bits of information designed
(EDC) to detect, but not correct, unintentional changes in the data.
Integrity The property that sensitive data has not been modified or deleted in an unauthorized
and undetected manner.
Key Encryption Key A key used to encrypt other keys, such as DEKs, or storage that contains keys.
(KEK)
Key sharing A multi-party computation (MPC) mechanism that allows two or more parties, each
with key components, to jointly produce a plaintext key without revealing any of the
key components.
Private key A cryptographic key used with a public key cryptographic algorithm, uniquely
associated with an entity, and not made public.
Privileged user An individual with access and login privileges on the CA.
Public key A cryptographic key used with a public key cryptographic algorithm, uniquely
associated with an entity, and which may be made public. (Public keys are not
considered CSPs.)
Public key certificate A set of data that unambiguously identifies an entity, contains the entity's public key,
is digitally signed by a trusted party, and binds the public key to the entity.
Public key A cryptographic algorithm that uses two related keys, a public key and a private key.
(asymmetric) The two keys have the property that, given the public key, it is computationally
cryptographic infeasible to derive the private key.
algorithm
Registration authority The set of hardware, software, firmware, or some combination thereof that is used to
(RA) validate the identity of a subscriber before instructing the CA to manipulate a
certificate on the subscriber’s behalf.
Root encryption key A key tied to hardware that is used to encrypt other keys such as KEKs.
(REK)
Secret key A cryptographic key used with a secret key cryptographic algorithm, uniquely
associated with one or more entities, and which shall not be made public. The use of
the term "secret" in this context does not imply a classification level rather the term
implies the need to protect the key from disclosure or substitution.
Secret key (symmetric) A cryptographic algorithm that uses a single, secret key for both encryption and
cryptographic decryption.
algorithm
Shared secret A token used by the CMC protocol to help provide identity proofing.
Subscriber A human or machine entity that is bound to one or more certificates maintained by
the CA.
7
1.2 Compliant Targets of Evaluation
A CA system is an entity that issues and manages public-key certificates. The CA is the primary component
of a public key infrastructure (PKI), which consists of programs, data formats, procedures, communication
protocols, security policies, and public key cryptographic mechanisms working together to enable people
in various locations to establish trust through secure communications. To achieve this goal, a PKI may
provide some or all of the following security management services:
Key generation/storage
Certificate generation, modification, re-key, renewal, and distribution
Re-issuance: A CA handles re-issuance of certificates when they expire, since certificates have a
finite validity period. Reissuance may be renewal of the current public key; rekey with a new
public key; or modification to other data in the public key certificate.
Revocation: The CA is also responsible for indicating, when notified via a subscriber or privileged
user, that a certificate should no longer be used or relied upon; this is referred to as revocation.
For example, a certificate needs to be revoked if an individuals’ private key is compromised or if
the CA issued the certificate to the wrong person. Identifiers of revoked certificates are stored on
an electronic list called a certificate revocation list (CRL). The CRL is digitally signed by the CA and
published to a repository accessible by the relying parties. The CRL is used to compare against
certificates to ensure a certificate is not invalid when used. Alternatively, a CA can provide a
Certificate Status Service (CSS) that provides revocation status responses to subscribers and
relying parties. The CSS’ revocation status information may be based on certificate history
information from the CA, a CRL from the CA, or a CRL retrieved from a repository. A CA must be
able to provide revocation status, but either approach is acceptable.
Distribution: The CA handles the publishing of certificates and CRLs that it issues to a repository.
The repository enables subscribers and relying parties to obtain subscriber certificates and CRLs
to perform functions such as encrypting emails and data to recipients or verifying signatures on
transactions. Typically, CRL location is advertised in the certificate itself as an HTTP pointer to
allow the relying parties to obtain the CRL.
Storage: The CA keeps a history of a subscriber’s previously issued and revoked certificates.
There are a number of optional functions that a CA may perform. For example, a CA may issue CRLs or
may provide a CSS that responds to certificate status requests from subscribers and relying parties. A CA
may generate public/private key pairs for subscribers, usually for encryption; this function may be
delegated to a different PKI component. In some cases, a CA will escrow private keys for encryption
8
certificates, a function typically delegated to a key escrow PKI component. If a CA handles subscriber key
generation and escrow, it should also keep a history of subscriber keys to support cases where an old
encryption key may be required to decrypt data. A CA may also be responsible for verifying subscriber
identities who request to interact with the CA. If the CA does not provide this functionality directly, it is
expected to interface with a registration authority (RA) that does.
9
Figure 1 - TOE Boundary in Example PKI Architecture
This PP defines requirements only for CA system component(s) that issue and manage public key
certificates and certificate status information, to include interfaces to components not under the control
of the ST author that may be required to meet these requirements as shown in Figure 1.
While the functionality that the TOE is obligated to implement (in response to the described threat
environment) is discussed in detail in later sections, it is useful to give a brief description here. Compliant
TOEs will provide security functionality that addresses threats to the TOE and implements policies that
are imposed by law or regulation. Compliant TOEs must authenticate and validate certificate requests and
control the use of its private signature key(s) so that only valid, properly authorized certificates are issued;
it must validate and authenticate all revocation requests and provide accurate and up-to-date revocation
status information; and it must validate any requests for optional services (key generation, key escrow or
recovery), authenticate and determine authorization for such services according to applicable security
policies and ensure that only authorized services are performed. The TOE must protect itself from
common network attacks, limit the damage that could occur by privileged user error, and be able to
recover from damage that can occur via either network attacks or human error, to include reconstitution
of functionality necessary to maintain any and all certificates issued for the duration of their validity
periods in the case of TOE failure. The TOE must also offer auditing of a set of events that are associated
with security-relevant activity on the TOE, and these events must be retained for long-term storage even
in the event of a failure of the TOE. Audit storage should be reliable and extensible, although this could
be on a device that is distinct from the TOE. The TOE must offer some protection for common network
denial of service attacks and must also provide the ability to verify the source of updates to components
of the TOE.
10
A CA system which is the Target of Evaluation (TOE) of this PP may be a software package installed on a
general computing platform, a set of software packages installed on distributed general computing
platforms, or an integrated device including hardware and software. This PP makes no distinction in these
cases and imposes requirements on the TOE and/or Operational Environment to ensure that the
requirements can be met in any of these cases. Whenever the TOE depends on external components to
meet the requirements of this PP, those components are included in the Operational Environment and
the AGD_OPE and AGD_PRE sections of this PP describe requirements on the TOE to document these
dependencies. For example, the TOE provides cryptographic operations involved in the signing of
certificates, which may depend on an external cryptographic module such as a trusted computing module
(TPM) on the general computing platform or an external hardware security module (HSM).
The CA manages certificates by providing validity information, either via the issuance of Certificate
Revocation Lists (CRLs) or via a Certificate Status Service (CSS) that provides real-time responses to validity
queries. Because a CA acts as a trusted third party, and because recommended operations require
independent monitoring of its operations, the CA must maintain an audit record that can be reviewed.
This audit record may be maintained on the TOE, or on an external audit server.
The threats and security objectives apply generally to a CA system. In order to provide consistent
requirements for all TOEs, the requirements in Section 5 include selections to indicate where external
components may be used. The TOE platform, external cryptographic modules, external audit servers, and
external CSS that are not under the control of the security target (ST) author may be used to meet the
respective TOE requirements. In these cases, the ST author must provide evidence that the requirement
is met by the selected component. When external components are selected, this evidence is typically via
validation against an appropriate PP.
It is intended that the set of requirements in this PP is limited in scope in order to promote quicker, less
costly evaluations that provide some value to end users.
11
1.3 Use Cases
Requirements in this PP are designed to address the security problem for CA systems. The fundamental
usage of a CA system will not differ drastically based on the functionality it provides. Different TOEs may
vary because of the inclusion or exclusion of the various optional, objective, and selection-based
requirements defined in the annexes of this PP but they are all expected to be used in the same general
manner for the same general purposes.
12
2 Conformance Claims
Conformance Statement
To be conformant to this PP, an ST must demonstrate Exact Conformance, a subset of Strict
Conformance as defined in [CC] Part 1 (ASE_CCL). The ST must include all components in this PP that
are:
Unconditional (which are always required)
Selection-based (which are required when certain selections are chosen in the unconditional
requirements)
and may include components that are
Optional
Objective
Unconditional requirements are found in the main body of the document (Section 5), while
appendices contain the selection-based, optional, and objective requirements. The ST may iterate any
of these components but it must not introduce any additional component (e.g. from CC Part 2 or 3)
that is not defined in this PP.
CC Conformance Claims
This EP is conformant to Parts 2 (extended) and 3 (conformant) of Common Criteria Version 3.1,
Revision 5 [CC].
PP Claim
This PP does not claim conformance to any Protection Profile.
Package Claim
This PP does not claim conformance to any packages.
13
3 Security Problem Description
The security problem is described in terms of the threats that the TOE is expected to address, assumptions
about its operational environment, and any organizational security policies that the TOE is expected to
enforce.
3.1 Threats
T.PRIVILEGED_USER_ERROR
A privileged user or non-person entity (NPE) improperly exercises or adversely affects the TOE,
resulting in unauthorized services, ineffective security mechanisms, or unintended circumvention of
security mechanisms.
T.TSF_FAILURE
Security mechanisms of the TOE may fail, leading to a compromise of the TSF.
T.UNAUTHENTICATED_TRANSACTIONS
Relying parties within an information system depend on the TOE to accurately bind subjects to their
credentials for use in authenticating and providing privacy for transactions. Without the proper
binding provided by the TOE, relying parties cannot ensure adequate access controls on sensitive
information, ensure transactional integrity, ensure proper accountability, and/or enforce non-
repudiation.
T.UNAUTHORIZED_ACCESS
A malicious user, process, or external IT entity intentionally circumvents TOE security mechanisms.
T.UNAUTHORIZED_UPDATE
A malicious party attempts to supply the end user with an update to the product that may
compromise the security features of the TOE.
T.UNDETECTED_ACTIONS
Remote users or external IT entities may take actions that adversely affect the security of the TOE.
T.USER_DATA_REUSE
A malicious user, process, or external IT entity may gain access to user data that is not cleared when
resources are reallocated.
T.WEAK_CRYPTO
A weak hash or signature scheme may be compromised by an attacker and used to apply integrity
checks to malicious content so that it appears legitimate.
3.2 Assumptions
A.NO_GENERAL_PURPOSE
It is assumed that there are no general-purpose computing capabilities (e.g., compilers or user
applications) available on the TOE, other than those services necessary for the operation,
administration and support of the TOE.
A.PHYSICAL
Physical security, commensurate with the value of the TOE and the data it contains, is assumed to be
provided by the environment.
14
A.TRUSTED_ADMIN
TOE Administrators are assumed to follow and apply all administrator guidance in a trusted manner.
15
4 Security Objectives
In some cases, an objective is addressed only by requirements that are either selection-based or
optional. In these cases, if none of those requirements are included in the ST, the ST author does not
include that objective in the ST.
16
O.NON_REPUDIATION
The TOE will prevent a subscriber from avoiding accountability for sending a message by providing
evidence that the subscriber sent the message; and control communications from unknown source.
Addressed by: FCO_NRO_EXT.2, FCO_NRR_EXT.2 (selection-based), FIA_CMCC_EXT.1 (selection-
based), FIA_ESTC_EXT.1 (selection-based)
O.PROTECTED_COMMUNICATIONS
The TOE will provide protected communication channels for administrators, other parts of a
distributed TOE, and authorized IT entities. The TOE will protect data assets when they are being
transmitted to and from the TOE, including through intervening untrusted components.
Addressed by: FCS_CDP_EXT.1, FCS_CKM.1 (selection-based), FCS_CKM.2 (selection-based),
FCS_CKM_EXT.1(1) (selection-based), FCS_CKM_EXT.1(2) (selection-based), FCS_CKM_EXT.1(3)
(selection-based), FCS_CKM_EXT.1(4) (selection-based), FCS_CKM_EXT.4 (selection-based),
FCS_CKM_EXT.7 (selection-based), FCS_CKM_EXT.8 (selection-based), FCS_COP.1(1) (selection-
based), FCS_COP.1(2) (selection-based), FCS_COP.1(3) (selection-based), FCS_COP.1(4) (selection-
based), FCS_COP.1(5) (optional), FCS_HTTPS_EXT.1 (selection-based), FCS_IPSEC_EXT.1 (selection-
based), FCS_RBG_EXT.1 (selection-based), FCS_STG_EXT.1, FCS_TLSC_EXT.2 (selection-based),
FCS_TLSS_EXT.1 (selection-based), FDP_ITT.1 (selection-based), FIA_PSK_EXT.1 (selection-based),
FPT_ITT.1 (selection-based), FPT_KST_EXT.1, FPT_KST_EXT.2, FPT_SKP_EXT.1, FPT_SKY_EXT.1
(optional), FPT_SKY_EXT.2 (selection-based), FTP_ITC.1 (selection-based), FTP_TRP.1
O.RECOVERY
The TOE will have the capability to store and recover to a previous state at the direction of the
administrator (e.g., provide support for archival and recovery capabilities).
Addressed by: FCS_CDP_EXT.1, FCS_CKM_EXT.6 (selection-based), FPT_FLS.1, FPT_RCV.1
O.RESIDUAL_INFORMATION_CLEARING
The TOE will ensure that any data contained in a protected resource is not available when the resource
is reallocated.
Addressed by: FDP_RIP.1
O.SESSION_LOCK
The TOE will provide mechanisms that mitigate the risk of unattended sessions being hijacked.
Addressed by: FTA_SSL_EXT.1 (optional)
O.SYSTEM_MONITORING
The TOE will provide the capability to generate audit data. The TOE will record in audit records: date
and time of action and the entity responsible for the action.
Addressed by: FAU_ADP_EXT.1, FAU_GEN.1, FAU_GEN.2, FAU_SAR.1 (selection-based), FAU_SAR.3
(selection-based), FAU_GCR_EXT.1, FAU_SCR_EXT.1 (selection-based), FAU_SEL.1 (selection-based),
FAU_STG_EXT.1 (selection-based), FIA_UIA_EXT.1, FPT_STM.1
O.TOE_ADMINISTRATION
The TOE will provide mechanisms to ensure that only privileged users are able to log in and configure
the TOE, and provide protections for logged-in users. The TOE will ensure that administrative
responsibilities are separated across different roles in order to mitigate the impact of improper
administrative activities or unauthorized administrative access.
17
Addressed by: FIA_AFL.1 (selection-based), FIA_PMG_EXT.1 (selection-based), FIA_UAU.7 (selection-
based), FIA_UAU_EXT.1, FIA_UIA_EXT.1, FMT_MOF.1(1), FMT_MOF.1(2), FMT_MOF.1(3),
FMT_MOF.1(4), FMT_MOF.1(5), FMT_MTD.1, FMT_SMF.1, FMT_SMR.2, FPT_APW_EXT.1 (selection-
based), FTA_SSL_EXT.1 (optional), FTA_SSL.3 (optional), FTA_SSL.4
O.TSF_SELF_TEST
The TOE will provide integrity protection to detect modifications to firmware, software, and archived
data.
Addressed by: FPT_TST_EXT.1 (optional), FPT_TST_EXT.2 (optional)
Application Note: If this SFR is not claimed by the TOE, this functionality is expected to be satisfied by
the environmental objective OE.TRUSTED_PLATFORM.
O.VERIFIABLE_UPDATES
The TOE will provide the capability to help ensure that any updates to the TOE can be verified by the
administrator to be unaltered and from a trusted source.
Addressed by: FCS_CDP_EXT.1, FCS_COP.1(2) (selection-based), FIA_X509_EXT.2, FPT_TUD_EXT.1
OE.AUDIT_GENERATION
The Operational Environment provides a mechanism for the generation of portions of the audit data.
OE.CERT_REPOSITORY
The Operational Environment provides a certificate repository for storage of certificates (and
optionally CRLs) issued by the TSF.
OE.CERT_REPOSITORY_SEARCH
The Operational Environment provides the ability to search a certificate repository for specific
certificate fields in certificates issued by the TSF and return the certificate and an identifier for the
certificate that can be used to search the audit trail for events related to that certificate.
OE.AUDIT_RETENTION
The Operational Environment provides mechanisms for retention of audit records for both normal
and extended retention periods.
OE.AUDIT_REVIEW
The Operational Environment provides a mechanism for the review of specified audit data.
OE.AUDIT_STORAGE
The Operational Environment provides a mechanism for the storage of specified audit data.
OE.CRYPTOGRAPHY
18
The Operational Environment provides cryptographic services that can be invoked by the TSF in order
to perform security functionality.
OE.KEY_ARCHIVAL
The Operational Environment provides the ability to use split knowledge procedures to enforce two-
party control to export keys necessary to resume CA functionality if the TSF should fail.
OE.NO_GENERAL_PURPOSE
There are no general-purpose computing capabilities (e.g., compilers or user applications) available
on the TOE, other than those services necessary for the operation, administration and support of the
TOE.
OE.PHYSICAL
Physical security, commensurate with the value of the TOE and the data it contains, is provided by the
environment.
OE.PUBLIC_KEY_PROTECTION
The Operational Environment provides protection for specified public keys associated with CA
functions.
OE.SESSION_PROTECTION_LOCAL
The Operational Environment provides the ability to lock or terminate local administrative sessions.
OE.SESSION_PROTECTION_REMOTE
The Operational Environment provides the ability to lock or terminate remote administrative sessions.
OE.TOE_ADMINISTRATION
The Operational Environment provides specified management capabilities required for the overall
operation of a Certificate Authority, and the ability to restrict access to a subset of the capabilities as
specified in the ST.
OE.TRUSTED_ADMIN
The administrator of the TOE is not careless, willfully negligent or hostile, and administers the
software within compliance of the applied enterprise security policy.
OE.TRUSTED_PLATFORM
The operating system on which the TOE has been installed is securely configured, regularly patched,
and not subject to unauthorized access.
19
4.3 Security Objectives Rationale
The following table illustrates the correspondence between the threats, assumptions, and organizational
security policies described in the security problem definition and the TOE/environmental objectives that
are satisfied in order to ensure that the threats are sufficiently mitigated by the TSF and the Operational
Environment.
Table 3 - Security Objective Mapping
20
OE.AUDIT_RETENTION [Remove if FAU_STG_EXT.2 is included in
The Operational Environment provides the ST]
mechanisms for retention of audit records
for both normal and extended retention
periods.
OE.SESSION_PROTECTION_LOCAL [Remove if FTA_SSL_EXT.1 is included in the
The Operational Environment provides the ST]
ability to lock or terminate local
administrative sessions.
OE.SESSION_PROTECTION_REMOTE [Remove if FTA_SSL.3 is included in the ST]
The Operational Environment provides the
ability to lock or terminate remote
administrative sessions.
OE.TOE_ADMINISTRATION [Remove if all administrative actions from
The Operational Environment provides O.TOE_ADMINISTRATION requirements are
specified management capabilities required performed directly by the TOE]
for the overall operation of a Certificate
Authority, and the ability to restrict access
to a subset of the capabilities as specified in
the ST
T.TSF_FAILURE O.TSF_SELF_TEST FPT_TST_EXT.1 (optional), FPT_TST_EXT.2
Security mechanisms of the TOE may fail, The TOE will provide the capability to test (optional)
leading to a compromise of the TSF. some subset of its security functionality to
ensure it is operating properly. The TOE will
provide integrity protection to detect
modifications to firmware, software, and
archived data.
OE.TRUSTED_PLATFORM [Remove if FPT_TST_EXT.1 and
The operating system on which the TOE has FPT_TST_EXT.2 are included in the ST]
been installed is securely configured,
regularly patched, and not subject to
unauthorized access.
21
OE.TOE_ADMINISTRATION [Remove if all administrative actions from
The Operational Environment provides O.CONFIGURATION_MANAGEMENT
specified management capabilities required requirements are performed directly by the
for the overall operation of a Certificate TOE]
Authority, and the ability to restrict access
to a subset of the capabilities as specified in
the ST
T.UNAUTHORIZED_ACCESS O.PROTECTED_COMMUNICATIONS FCS_CDP_EXT.1, FCS_CKM.1 (selection-
A malicious user, process, or external IT The TOE will provide protected based), FCS_CKM.2 (selection-based),
entity intentionally circumvents TOE communication channels for administrators, FCS_CKM_EXT.1(1) (selection-based),
security mechanisms. other parts of a distributed TOE, and FCS_CKM_EXT.1(2) (selection-based),
authorized IT entities. The TOE will protect FCS_CKM_EXT.1(3) (selection-based),
data assets when they are being transmitted FCS_CKM_EXT.1(4) (selection-based),
to and from the TOE, including through FCS_CKM_EXT.4 (selection-based),
intervening untrusted components. FCS_CKM_EXT.7 (selection-based),
FCS_CKM_EXT.8 (selection-based),
FCS_COP.1(1) (selection-based),
FCS_COP.1(2) (selection-based),
FCS_COP.1(3) (selection-based),
FCS_COP.1(4) (selection-based),
FCS_COP.1(5) (optional), FCS_HTTPS_EXT.1
(selection-based), FCS_IPSEC_EXT.1
(selection-based), FCS_RBG_EXT.1
(selection-based), FCS_STG_EXT.1,
FCS_TLSC_EXT.2 (selection-based),
FCS_TLSS_EXT.1 (selection-based),
FDP_ITT.1 (selection-based), FIA_PSK_EXT.1
(selection-based), FPT_ITT.1 (selection-
based), FPT_KST_EXT.1, FPT_KST_EXT.2,
FPT_SKP_EXT.1, FPT_SKY_EXT.1 (optional),
FPT_SKY_EXT.2 (selection-based), FTP_ITC.1
(selection-based), FTP_TRP.1
O.SESSION_LOCK FTA_SSL_EXT.1 (optional)
The TOE will provide mechanisms that
mitigate the risk of unattended sessions
being hijacked.
O.TOE_ADMINISTRATION FIA_AFL.1 (selection-based),
The TOE will provide mechanisms to ensure FIA_PMG_EXT.1 (selection-based),
that only privileged users are able to log in FIA_UAU.7 (selection-based),
and configure the TOE, and provide FIA_UAU_EXT.1, FIA_UIA_EXT.1,
protections for logged-in users. The TOE will FMT_MOF.1(1), FMT_MOF.1(2),
ensure that administrative responsibilities FMT_MOF.1(3), FMT_MOF.1(4),
are separated across different roles in order FMT_MOF.1(5), FMT_MTD.1, FMT_SMF.1,
to mitigate the impact of improper FMT_SMR.2, FPT_APW_EXT.1 (selection-
administrative activities or unauthorized based), FTA_SSL_EXT.1 (optional), FTA_SSL.3
administrative access. (optional), FTA_SSL.4
OE.CRYPTOGRAPHY [Remove if all cryptographic functionality is
The Operational Environment provides implemented by the TSF.]
cryptographic services that can be invoked
by the TSF in order to perform security
functionality.
OE.KEY_ARCHIVAL [remove from ST if FPT_SKY_EXT.1 is
The Operational Environment provides the included in ST]
ability to use split knowledge procedures to
enforce two-party control to export keys
necessary to resume CA functionality if the
TSF should fail.
OE.SESSION_PROTECTION_LOCAL [Remove if FTA_SSL_EXT.1 is included in the
The Operational Environment provides the ST]
ability to lock or terminate local
administrative sessions.
OE.SESSION_PROTECTION_REMOTE [Remove if FTA_SSL.3 is included in the ST]
The Operational Environment provides the
ability to lock or terminate remote
administrative sessions.
22
OE.TOE_ADMINISTRATION [Remove if all administrative actions from
The Operational Environment provides O.TOE_ADMINISTRATION requirements are
specified management capabilities required performed directly by the TOE]
for the overall operation of a Certificate
Authority, and the ability to restrict access
to a subset of the capabilities as specified in
the ST
T.UNAUTHORIZED_UPDATE O.VERIFIABLE_UPDATES FCS_CDP_EXT.1, FCS_COP.1(2) (selection-
A malicious party attempts to supply the The TOE will provide the capability to help based), FIA_X509_EXT.2, FPT_TUD_EXT.1
end user with an update to the product that ensure that any updates to the TOE can be
may compromise the security features of verified by the administrator to be
the TOE. unaltered and from a trusted source.
T.UNDETECTED_ACTIONS O.AUDIT_LOSS_RESPONSE FAU_ADP_EXT.1, FAU_STG.4
Remote users or external IT entities may The TOE will respond to possible loss of
take actions that adversely affect the audit records when audit trail storage is full
security of the TOE. or nearly full by restricting auditable events.
O.AUDIT_PROTECTION FAU_ADP_EXT.1, FAU_STG.1(1) (selection-
The TOE will protect audit records against based), FAU_STG.1(2) (selection-based),
unauthorized access, modification, or FAU_STG_EXT.2 (selection-based)
deletion to ensure accountability of user
actions.
O.SYSTEM_MONITORING FAU_ADP_EXT.1, FAU_GEN.1,
The TOE will provide the capability to FAU_GEN.2FAU_SAR.1 (selection-based),
generate audit data and send those data to FAU_SAR.3 (selection-based),
an external IT entity. The TOE will record in FAU_GCR_EXT.1, FAU_SCR_EXT.1 (selection-
audit records: date and time of action and based), FAU_SEL.1 (selection-based),
the entity responsible for the action. FAU_STG_EXT.1 (selection-based),
FIA_UIA_EXT.1, FPT_STM.1
OE.AUDIT_GENERATION [Remove if all audit functionality is
The Operational Environment provides a implemented by the TOE.]
mechanism for the generation of portions of
the audit data.
OE.AUDIT_STORAGE [Remove if all audit functionality is
The Operational Environment provides a implemented by the TOE.]
mechanism for the storage of specified
audit data.
OE.AUDIT_REVIEW [Remove if all audit functionality is
The Operational Environment provides a implemented by the TOE.]
mechanism for the review of specified audit
data.
OE.AUDIT_RETENTION [Remove if FAU_STG_EXT.2 is included in
The Operational Environment provides the ST]
mechanisms for retention of audit records
for both normal and extended retention
periods.
OE.CERT_REPOSITORY [Remove if Operational Environment is not
The Operational Environment provides a selected in FAU_GCR_EXT.1.]
certificate repository for storage of
certificates (and optionally CRLs) issued by
the TSF.
OE.CERT_REPOSITORY_SEARCH [Remove if FAU_SCR_EXT.1 is included in
The Operational Environment provides the the ST.]
ability to search a certificate repository for
specific certificate fields in certificates
issued by the TSF and return the certificate
and an identifier for the certificate that can
be used to search the audit trail for events
related to that certificate.
T.USER_DATA_REUSE O.RESIDUAL_INFORMATION_CLEARING FDP_RIP.1
A malicious user, process, or external IT The TOE will ensure that any data contained
entity may gain access to user data that is in a protected resource is not available
not cleared when resources are reallocated. when the resource is reallocated.
T.WEAK_CRYPTO O.PROTECTED_COMMUNICATIONS FCS_CDP_EXT.1, FCS_CKM.1 (selection-
A weak hash or signature scheme may be The TOE will provide protected based), FCS_CKM.2 (selection-based),
compromised by an attacker and used to communication channels for administrators, FCS_CKM_EXT.1(1) (selection-based),
23
apply integrity checks to malicious content other parts of a distributed TOE, and FCS_CKM_EXT.1(2) (selection-based),
so that it appears legitimate. authorized IT entities. The TOE will protect FCS_CKM_EXT.1(3) (selection-based),
data assets when they are being transmitted FCS_CKM_EXT.1(4) (selection-based),
to and from the TOE, including through FCS_CKM_EXT.4 (selection-based),
intervening untrusted components. FCS_CKM_EXT.7 (selection-based),
FCS_CKM_EXT.8 (selection-based),
FCS_COP.1(1) (selection-based),
FCS_COP.1(2) (selection-based),
FCS_COP.1(3) (selection-based),
FCS_COP.1(4) (selection-based),
FCS_COP.1(5) (optional), FCS_HTTPS_EXT.1
(selection-based), FCS_IPSEC_EXT.1
(selection-based), FCS_RBG_EXT.1
(selection-based), FCS_STG_EXT.1,
FCS_TLSC_EXT.2 (selection-based),
FCS_TLSS_EXT.1 (selection-based),
FDP_ITT.1 (selection-based), FIA_PSK_EXT.1
(selection-based), FPT_ITT.1 (selection-
based), FPT_KST_EXT.1, FPT_KST_EXT.2,
FPT_SKP_EXT.1, FPT_SKY_EXT.1 (optional),
FPT_SKY_EXT.2 (selection-based), FTP_ITC.1
(selection-based), FTP_TRP.1
O.VERIFIABLE_UPDATES FCS_CDP_EXT.1, FCS_COP.1(2) (selection-
The TOE will provide the capability to help based), FIA_X509_EXT.2, FPT_TUD_EXT.1
ensure that any updates to the TOE can be
verified by the administrator to be
unaltered and from a trusted source.
OE.CRYPTOGRAPHY [Remove if all cryptographic functionality is
The Operational Environment provides implemented by the TSF.]
cryptographic services that can be invoked
by the TSF in order to perform security
functionality.
OE.KEY_ARCHIVAL [remove from ST if FPT_SKY_EXT.1 is
The Operational Environment provides the included in ST]
ability to use split knowledge procedures to
enforce two-party control to export keys
necessary to resume CA functionality if the
TSF should fail.
P.ACCESS_BANNER O.DISPLAY_BANNER FTA_TAB.1
The TOE shall display an initial banner The TOE will display an advisory warning
describing restrictions of use, legal regarding use of the TOE.
agreements, or any other appropriate
information to which users consent by
accessing the TOE.
24
5 Security Requirements
The Security Functional Requirements (SFRs) included in this section are derived from Part 2 of the
Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 4, with additional
extended functional components.
The CC defines operations on Security Functional Requirements: assignments, selections, assignments
within selections and refinements. This document uses the following font conventions to identify the
operations defined by the CC:
Refinement Operation (denoted by bold text) is used to add details to a requirement, and
thus further restricts a requirement.
Selection (denoted by italicized text): is used to select one or more options provided by the
[CC] in stating a requirement.
Assignment operation (denoted by italicized text) is used to assign a specific value to an
unspecified parameter, such as the length of a password. Showing the value in square
brackets indicates assignment.
Iteration operation: are identified with a number inside parentheses (e.g. “(1)”).
Extended SFRs: are identified by having a label “EXT” after the SFR name.
25
generation. Certificate value,
certificate object
identifier].
FDP_CER_EXT.2 Linking of Success: [selection: Extended
certificate to Certificate value,
certificate certificate object
request identifier], [selection:
Certificate request, link
to certificate request
object identifier].
Failure: Reason for
failure, [selection:
Certificate request, link
to Certificate request
object identifier].
FDP_CER_EXT.3 Failed certificate Reason for failure. Normal
approvals. [selection: Certificate
request, link to
Certificate request object
identifier].
FDP_CSI_EXT.1 None. None. N/A
FDP_RIP.1 None. None. N/A
FIA_X509_EXT.1 Failed certificate None. Normal
validations.
FIA_X509_EXT.2 Failed None. Normal
authentications.
FIA_UAU_EXT.1 All uses of the Origin of the attempt Normal
authentication (e.g., IP address).
mechanism used
for access to TOE
related
functions.
FIA_UIA_EXT.1 All use of the Provided user identity. Normal
identification Origin of the attempt
and (e.g., IP address).
authentication
mechanism used
for TOE related
roles.
FMT_MOF.1(1) None. None. N/A
FMT_MOF.1(2) None. None. N/A
FMT_MOF.1(3) None. None. N/A
FMT_MOF.1(4) None. None. N/A
FMT_MOF.1(5) None. None. N/A
FMT_MTD.1 None. None. N/A
FMT_SMF.1 None. None. N/A
FMT_SMR.2 Modifications to Modifications to the Extended
the group of group of users that are
users that are part of a role.
part of a role.
FPT_FLS.1 Invocation of Indication that the TSF Normal
failures under has failed with the type
26
this of failure that occurred.
requirement.
FPT_KST_EXT.1 None. None. N/A
FPT_KST_EXT.2 All unauthorized Identifier of user or Normal
attempts to use process that attempted
TOE secret and access.
private keys.
FPT_RCV.1 The fact that a TSF failure types that are Extended
failure or service available on recovery.
discontinuity
occurred.
Resumption of
the regular
operation.
FPT_SKP_EXT.1 None. None. N/A
FPT_STM.1 Changes to the The old and new values Normal
time. for the time.
FPT_TUD_EXT.1 Initiation of Version number. Extended
update.
FTA_SSL.4 The termination None. Normal
of an interactive
session.
FTA_TAB.1 None. None. N/A
FTP_TRP.1 Initiation of the Identification of the Normal
trusted channel. claimed user identity.
Termination of
the trusted
channel.
Failures of the
trusted path
functions.
Application Note: If any audit functions (e.g. storage, review) are accomplished by the TOE
communicating over a network connection with a physically external audit server,
then the ST author must include FTP_ITC.1 with "audit server" selected. If the TOE
relies on the Operational Environment to provide some of the TOE’s auditing
functionality, the ST author is expected to identify whether each of the auditable
events for the claimed SFRs are implemented by the TOE or by the Operational
Environment, along with the specific environmental component that provides the
auditing functionality if applicable. The ST author should refer to the right-most
column of Table 4 through Table 6 and complete these fields accordingly.
27
If any audit review is performed by an auditor through an interface provided by
the TSF, then FAU_SAR.1 and FAU_SAR.3 in Annex B.2 will be included in the ST by
the ST author.
Audit records stored within the TOE boundary that are generated due to audit
events marked “extended” in tables 4, 5, and 6 that are included in the ST, then
FAU_STG.1(2) will be included in the ST by the ST author.
If the TSF initiates the storage of the audit data (that is, it generates audit data
that will be stored either by the TOE or the OE), then FAU_STG_EXT.1 will be
included in the ST by the ST Author.
Audit records for the TSF are divided into two sets of events, whose retention
periods might be significantly different operationally. Generally, information
necessary to maintain an issued certificate or to determine the circumstances of
a certificate issuance is required to be available at least as long as the validity of
an issued certificate, and perhaps longer according the statutes, laws, or policies
applicable to the issuance and intended use of a particular certificate. Other audit
data is typically retained only to support normal operations. The ‘Retention’
column in Table 4 (as well as Tables 5 and 6 for the optional and selection-based
SFRs) indicates whether the audit record is intended to be used for ‘normal’
(shorter-term) or ‘extended’ (longer-term) purposes.
For the FDP_CER_EXT.2 audit event, the intent is that auditing is performed only
once incoming data are recognized by the TOE as a “request”. Cases where
incoming data are rejected before they are processed as “requests” by the TOE
(and thus the action “fails”) do not need to be audited by the FDP_CER_EXT.2
audit event.
Assurance Activity
TSS
The evaluator shall examine the TSS and operational guidance in order to verify
that they describe each of the relevant auditable events, how audit records of
these events are formatted, and what component of the TOE or Operational
Environment is responsible for handling these events.
For those auditable events that are generated by the TOE and stored within the
TOE boundary, the assurance activities are included for the relevant selection-
based audit SFRs.
Test
For any auditable events that are handled by the TOE’s Operational
Environment, the evaluator shall demonstrate that these events are auditable.
28
Testing that audit records associated with an SFR are generated is performed
in conjunction with testing the SFR.
Application Note: While there is a requirement that a certificate repository exists and the TOE stores
all certificates (and CRLs, if selected in FCO_NRO_EXT.2.2) it generates in that
repository, the repository can physically be within the TOE or within (and provided
by storage in) the OE. If the repository is provided by the TOE (that is, it is within
the TOE boundary), then the first item in the first selection is chosen. If the storage
is provided by the OE, then the second item in the first selection is chosen. It
should be noted that the physical implementation of the certificate repository is
left to the vendor; for instance, it can be a standalone store, or incorporated
within the audit trail.
Assurance Activity
TSS
The evaluator shall examine the TSS to determine that it describes the
certificate repository. If the certificate repository is provided by the OE, the
evaluator shall check the TSS to ensure it describes the interfaces invoked by
the TOE to store certificates (and CRLs).
Test
The evaluator shall perform the following tests:
Test 1: The evaluator shall generate a certificate to be stored in the
repository. The evaluator shall confirm that the certificate is stored in
the certificate repository.
Test 2 (conditional): If “CRLs” are selected in the SFR, the evaluator
shall generate a CRL and verify that it is stored in the certificate
repository.
29
d) [Specifically defined auditable events listed in Table 4 through Table 6]].
Application Note: The ST author will include a consolidated table of auditable events for all
mandatory, optional, and selected components in the ST per FAU_ADP_EXT.1 that
will indicate the component that is responsible for producing the audit event.
There are three cases for the generational of audit events. The audit event is
generated by the TSF; the audit event is generated on initiation by the TOE, but
the OE is involved in some or all of the actual generation of the audit event; and
the audit event is generated entirely by the OE without prompting from the TOE.
The first two cases are covered by this requirement. Additionally, the start-up of
the TOE functions and all administrative actions that performed either by or
through the TOE are required to be auditable. If all of the audit records are
generated by the TOE, or if the audit records are either generated entirely by the
TOE and entirely by the OE (that is, none of the audit records are generated by
invoking the OE), then “no other actions” is chosen in the selection. The meaning
of “specifically defined auditable events…” in item d refers to events in the table
produced by FAU_ADP_EXT.1 that indicate they are generated in whole or part of
the TSF.
FAU_GEN.1.2 Refinement: The TSF shall [selection: include, invoke the Operational
Environment to include] within each audit record at least the following
information:
a) Date and time of the event, type of event, subject identity, and the outcome
(success or failure) of the event; and
b) For each audit event type, based on the auditable event definitions of the
functional components included in the PP/ST, [information specified in
column three of Table 4 through Table 6].
Application Note: As with the previous component, the ST author should update Table 4 above with
any additional information generated. "Subject identity" in the context of this
requirement could either be the administrator's user ID or the affected network
interface, for example.
The ST author chooses whether the information is put into the audit record by the
TSF or the OE via the selection; it is permissible to be a combination of both. It
may be the case that when the TSF generates an audit record, some or all of the
information listed in the SFR are actually put into the audit record by the OE. In
these cases, “invoke the Operational Environment to record” should be selected.
OE.AUDIT_GENERATION will be included in the ST if the OE is selected in any of
the FAU_GEN elements or listed in the last column in table 4.
Assurance Activity
TSS
30
The evaluator shall ensure that the TSS describes every audit event type
mandated by the PP and that the description of the fields contains the
information required in FAU_GEN.1.2, and the additional information specified
in Tables 4 through 6, depending on the characterization of the SFR associated
with the particular event as mandatory, optional, or selection-based.
The evaluator shall also ensure that the TSS describes all cases where the
generation of ephemeral key pairs is not audited for FCS_CKM.1.
Guidance
The evaluator shall examine the operational guidance to ensure that it
describes the audit mechanism, lists all of the auditable events and provides a
format for audit records. Each audit record format type must be covered, along
with a brief description of each field.
The evaluator shall also make a determination of the administrative actions
that are relevant in the context of this PP. The evaluator shall examine the
operational guidance and make a determination of which administrative
commands, including subcommands, scripts, and configuration files, are
related to the configuration (including enabling or disabling) of the
mechanisms implemented in the TOE that are necessary to enforce the
requirements specified in the PP. The evaluator shall document the
methodology or approach taken while determining which actions in the
operational guidance are security relevant with respect to this PP. The
evaluator may perform this activity as part of the activities associated with
ensuring the operational guidance satisfies the requirements in accordance
with AGD_OPE.
The evaluator shall check that audit review tools are described in the
operational guidance and conform to the requirements of FAU_SAR.1.
When the Operational Environment is selected in FAU_GEN.1.1 or
FAU_GEN.1.2, the evaluator shall examine the operational guidance to ensure
the configuration of the Operational Environment necessary to generate the
required elements, and instructions on how to examine the various audit
records is provided.
Test
The evaluator shall test the TOE’s ability to correctly generate audit records by
having the TOE generate audit records for the events listed in Table 4, any
events in Table 5 and Table 6 that correspond with the optional and selection-
based SFRs claimed in the Security Target, startup of the audit functions (or
startup of the TOE if audit functionality is not enabled or disabled
independently of the TOE), and administrative actions. This should include all
instances of an event. The evaluator shall test that audit records are generated
for the establishment and termination of a channel for each of the
cryptographic protocols contained in the ST. For administrative actions, the
31
evaluator shall test that each action determined by the evaluator above to be
security relevant in the context of this PP is auditable.
When verifying the test results, the evaluator shall use audit review tools in
conformance of FAU_SAR.1 and the operational guidance. The evaluator shall
ensure the audit records generated during testing match the format specified
in the operational guidance, and that the fields in each audit record have the
proper entries and that the audit records are provided in a manner suitable for
interpretation. The evaluator shall also ensure the ability to apply searches of
audit data based on the type of event, the user responsible for causing the
event, and identity of the applicable certificate. When the Operational
Environment is selected in FAU_GEN.1.1 or FAU_GEN.1.2, the evaluator shall
follow the operational guidance to configure the Operational Environment as
specified in the TSS and identify the audit records used and audit information
assigned to each audit record. The evaluator shall then inspect the indicated
audit records for audit information assigned to each audit record indicated.
Note that the testing here can be accomplished in conjunction with the testing
of the security mechanisms directly. For example, testing performed to ensure
that the operational guidance provided is correct verifies that AGD_OPE.1 is
satisfied and should address the invocation of the administrative actions that
are needed to verify the audit records are generated as expected.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE's ST. Justification must be provided for those platforms that were excluded
from testing.
Application Note: As with FAU_GEN.1.2, if the TSF initiates the generation of the audit event, but
the OE is responsible for associating the user ID with that event (if appropriate for
that event), then the ST author selects “invoke the Operational Environment to
associate” for this SFR.
Assurance Activity
32
FAU_STG.4 Prevention of Audit Data Loss
FAU_STG.4.1 Refinement: The TSF shall [prevent audited events, except those taken by the
Auditor] and [assignment: other actions to be taken in case of audit storage
failure] if the audit trail cannot be written to.
Application Note: This requirement applies to the TOE regardless of whether the audit trail is stored
within the TOE boundary (e.g. the audit trail is full) or on an external system in the
Operational Environment (e.g. the connection to a remote audit repository is
broken). In either case, the ST author is expected to describe how the TSF is made
aware of any such failures and how it behaves in response.
Assurance Activity
TSS
The evaluator shall examine the TSS to ensure it describes the behavior of the
TSF and what actions can be performed by the Auditor, if any, when the audit
trail is full.
Guidance
The evaluator shall examine the operational guidance to ensure it describes
what having a full audit trail means and how an Auditor recognizes that this has
occurred. The evaluator shall also examine the operational guidance to ensure
it includes remedial steps for correcting the issue.
Test
The evaluator shall perform the following tests. Test 1 is performed regardless
of where the audit repository is stored, since it is testing the capability of the
TOE to react to an indication that the repository is full. Test 2 is only executed
in cases where an external repository is supported, and tests the ability of the
TOE to detect when the connection to the repository becomes unavailable.
Test 1: The evaluator shall cause the audit trail to become full, verify
that the TSF behaves as documented in the TSS, and verify that a
privileged user can perform the documented remedial steps.
33
5.1.2 Communications (FCO)
FCO_NRO_EXT.2.2 The TSF shall provide proof of origin for certificate status information it issues in
accordance with the digital signature requirements in [selection: CRLs (RFC 5280),
OCSP (RFC 6960), [assignment: other OCSP standards]] and FCS_COP.1(2).
FCO_NRO_EXT.2.3 The TSF shall require and verify proof of origin for certificate requests it receives
[selection: CMC using mechanisms in accordance with FIA_CMCS_EXT.1, EST using
mechanisms in accordance with FIA_ESTS_EXT.1].
FCO_NRO_EXT.2.4 The TSF shall require and verify proof of origin for public keys contained in
certificate requests it receives via [selection: proof-of-possession mechanisms in
CMC using mechanisms in accordance with FIA_CMCS_EXT.1, proof-of-possession
mechanisms in EST in accordance with FIA_ESTS_EXT.1].
FCO_NRO_EXT.2.5 The TSF shall [selection: require and verify proof of origin for revocation requests
it receives via [selection: CMC using mechanisms in accordance with
FIA_CMCS_EXT.1, EST using optional “full CMC” functionality in accordance with
FIA_ESTS_EXT.1], [assignment: support manual processes for revocation requests
and responses]].
Application Note: The TOE is responsible for providing proof of origin for information it issues and
verifying proof of origin for information it receives. Based on what is chosen in the
selection for FCO_NRO_EXT.2.2, the applicable requirements from Annex B (i.e.,
FDP_CRL_EXT.1, FDP_OCSPG_EXT.1) must be included. Based on what is chosen
in the selections for FCO_NRO_EXT.2.3-FCO_NRO_EXT.2.5, the applicable
requirements from Annex B (i.e., FIA_CMCS_EXT.1, FIA_ESTS_EXT.1) must be
included.
A TOE that supports both EST and CMC and can obtain revocation requests via
one of the protocols would be in compliance with FCO_NRO_EXT.2.5. Manual
process to support revocation requests and responses are claimed and described
if EST does not support full CMC requests and CMC is not claimed.
Assurance Activity
34
TSS
The evaluator shall examine the TSS to ensure it describes the mechanisms
used for generating proof of origin and the security-relevant information to
which the mechanism applies. The TSS shall describe how the TSF relates the
identity and other specified attributes of the originator of the information to
the security relevant portions of the information to which the evidence applies.
The TSS shall also describe how verification of the proof of origin of information
for all security-relevant information is performed and shall also specify the
cases in which verification of proof of origin is performed.
For TOEs that only support EST, and do not support revocation requests under
either CMC or EST, the TSS must describe the mechanism used to determine
whether to revoke certificates.
For TOEs that select “support manual processes for revocation requests and
responses,” the evaluator shall ensure the TSS describes those processes.
Guidance
If configurable, evaluator shall examine the operational guidance to ensure it
defines how to configure the applicable algorithms used for providing and
verifying proof of origin as defined in FCS_COP.1(2).
For TOEs that only support EST, and do not support revocation requests under
either CMC or EST, the evaluator shall examine the guidance to ensure it
describes support for privileged user functionality as part of this mechanism.
For TOEs that select “support manual processes for revocation requests and
responses,” the evaluator shall ensure the operational guidance provides a
description of the processes the administrators are to follow. The evaluator
shall ensure these are consistent with the descriptions of these processes in
the TSS.
Test
The evaluator shall perform the following tests for each request format
selected and for each request supported:
TOE is online (requires establishment of a client capable of generating
certificate requests and has a valid HTTPS connection to the TOE):
Test 1: For each supported request, the evaluator shall generate and
submit a properly authenticated request to the TOE and verify the
responses are signed.
Test 2: For each supported request, the evaluator shall generate
requests that are unsigned, submit to the TOE, and verify that the TOE
rejects the request.
35
Test 3: For each supported request, the evaluator shall generate
requests that have an invalid signature based on the RFC, submit to the
TOE, and verify that the TOE rejects the request.
Test 4: For each supported request, the evaluator shall generate
requests that are not signed by authorized entities, submit to the TOE,
and verify that the TOE rejects the request.
Test 5: For each supported request using password based
authentication, the evaluator shall use invalid passwords and verify
that the TSF rejects the requests.
Test 6: For each proof of possession mode supported, the evaluator
shall generate an otherwise valid request but modify the proof of
possession value. The evaluator shall submit the modified request and
verify that the TSF rejects the request.
Transport test:
Test 7: For each supported request message, the evaluator shall send
an otherwise valid request using HTTP rather than HTTPS and shall
verify the TSF rejects the request.
TOE is offline:
Test 8: With the TOE in offline mode, the evaluator shall log into the
TOE locally as the CA Operations Staff role and perform tests 1-4
above.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE's ST. Justification must be provided for those platforms that were excluded
from testing.
Application Note:
36
Cryptographic functionality can be provided entirely by the TOE, entirely by the
Operational Environment, or by both. The SFRs that detail the cryptographic
functionality are contained in Annexes A, B, and C; these SFRs are included in the
ST depending on selections in other SFRs that describe the mandated and optional
functionality that requires cryptographic functions (for instance, the inclusion of
TLS). The appropriate selection for whether the cryptographic functionality is
implemented by the TOE or by the OE is made for each of the SFRs in the Annex
when instantiated in the ST. If both the TSF and OE work together to provide the
required cryptography for the TOE, iterate this SFR once for the TSF and once of
the OE, and list the specific SFRs implemented by each. In aggregate, all
cryptographic SFRs required by the TOE should be listed.
The only exception to this case is where the cryptographic function is implemented
in the OE and there is no direct TSF invocation for that function. For instance, if
the DRBG is implemented by an HSM that is in the OE, that the TOE only invokes
the HSM for higher-level cryptographic functions (such as “create key”, “sign
certificate”, etc.), then (in that case) FCS_RBG_EXT.1 would not appear in any
iteration of the FCS_CDP_EXT.
Assurance Activity
TSS
If the TSF invokes interfaces to a cryptographic module in the Operational
Environment to provide the necessary cryptographic functionality, the
evaluator shall review the TSS to ensure that it specifies the interfaces that
are invoked, and the cryptographic provider of the functionality. The
evaluator shall review the TSS and verify that all cryptographic SFRs required
by the ST—through inclusion of (other) mandatory and optional SFRs--are
included.
Other required TSS activities are associated with the cryptographic SFRs
themselves.
Guidance
Required Guidance activities are associated with the cryptographic SFRs
themselves.
Test
37
Required Test activities are associated with the cryptographic SFRs
themselves.
Application Note: This requirement ensures that persistent secret keys and private keys are stored
securely when not in use. If some secrets/keys are manipulated by the TOE and
others are manipulated by the environment, then both of the selections can be
specified by the ST author and the ST author must identify in the TSS those keys
which are manipulated by the TOE and those by the environment.
If the TOE is an application, and not a dedicated server, then it should store its
private keys in the environment-provided key storage.
The ST author is responsible for selecting the manner in which the keys are stored
and where they are stored in the selections above.
This SFR applies only to keys that are relevant to the requirements in the PP/ST; it
does not apply to keys that have no bearing on CA PP functionality.
Assurance Activity
TSS
Regardless of whether this requirement is met by the TOE or the Operational
Environment, the evaluator will check the TSS to ensure that it lists each
persistent secret and private key needed to meet the requirements in the ST.
For each of these items, the evaluator will confirm that the TSS lists for what
purpose it is used, and how it is stored.
Guidance
There are no AGD assurance activities for this requirement beyond what is
necessary to satisfy the requirements in [CEM].
Test
There are no ATE assurance activities for this requirement beyond what is
necessary to satisfy the requirements in [CEM].
Equivalency
38
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
FDP_CER_EXT.1.2 The TSF shall generate certificates using profiles that comply with requirements
for certificates as specified in IETF RFC 5280, “Internet X.509 Public Key
Infrastructure Certificate and Certificate Revocation List (CRL) Profile”, while
ensuring that the following conditions are met:
39
another certificate issued by the CA when the other certificate also contains the
requested public key; it is not acceptable that requests for certificates containing
different public keys result in the same subject key identifier - as this would
contradict the definition of the subject key identifier included in the RFC: "The
subject key identifier extension provides a means of identifying certificates that
contain a particular public key." This is not possible if the value is not unique to
the public keys it issues.
The SFR refines RFC 5280 by requiring all certificate profiles used by the TOE be
configurable to include the subject key identifier; the RFC only requires it for CA
certificates. The RFC indicates a CA SHOULD provide subject key identifiers for end
entity certificates.
When a single instance of the TOE represents multiple CAs, it is acceptable that a
subject key identifier issued by one CA match the subject key identifier of another
CA, whether implemented within the TOE or as a separate instance.
FDP_CER_EXT.1.3 The TSF shall be able to generate at least 20 bits of random for use in issued
certificates to be included in [selection: serialNumber, notBefore, notAfter] fields,
where the random values are generated in accordance with FCS_RBG_EXT.1.
Application Note: The requirement applies only to the issuance of X.509 v3 certificates. An optional
requirement in Annex A allows for the issuance of X.509 certificates other than
V3.
Assurance Activity
TSS
The evaluator shall examine the TSS to ensure it describes the certificate profile
function in accordance with FDP_CER_EXT.1.1 The TSS shall describe how
certificate profiles are configured and then selected to issue certificates in
accordance with FDP_CER_EXT.1.2. The evaluator shall also ensure that the TSS
describes how the TSF ensures that a certificate-requesting subject possesses
the applicable private key. Finally, the evaluator shall ensure that the TSS
describes how 20 bits of random are generated in accordance with
FDP_CER_EXT.1.3 and which certificate fields are involved.
Guidance
40
The evaluator shall examine the operational guidance to ensure that
instructions are available to configure certificate profiles used for certificate
generation in accordance with this requirement. The operational guidance
shall also specify how to configure proof of possession and, if applicable, how
to configure unique serial number generation.
Test
The evaluator shall perform the following tests for each supported certificate
format:
Test 1: The evaluator shall configure a certificate profile using the
available guidance, request a certificate using the profile, and then
examine the certificate contents to ensure it matches the configured
certificate profile.
Test 2: The evaluator shall specifically examine the certificate
generated in Test 1 to ensure that it satisfies all field constraints in
FDP_CER_EXT.1.2.
Test 3: The evaluator shall test the fields “d”, “e”, “f”, and “i” in
FDP_CER_EXT.1.2 as follows:
Field “d”: The evaluator shall send a request with a
subjectPublicKeyInfo that is allowed by the profile, and observe the
request succeeds. The evaluator shall then send a request with a
subjectPublicKeyInfo that is not allowed by the profile, and observe
that the request is rejected (or the value that is put into the certificate
is what was in the profile).
Field “e”: The evaluator shall send a request with a KeyUsage that is
allowed by the profile, and observe the request succeeds. The
evaluator shall then send a request with a KeyUsage that is not allowed
by the profile, and observe that the request is rejected (or the value
that is put into the certificate is what was in the profile).
Field “f”: The evaluator shall send requests to show that the CA accepts
requests that provide an identifier in either one or both of the subject
and subjectAltName fields, but rejects requests that do not provide an
identifier for either one of those fields.
Field “i”: For each EKU listed in section 4.2.1.12 of RFC 5280, the
evaluator performs the following tests. The evaluator shall send a
request with a KeyUsage that is consistent (as documented in section
4.2.1.12 of RFC 5280) with the profile EKU, and observe the request
succeeds. The evaluator shall then send a request with a KeyUsage
that is not consistent (as documented in section 4.2.1.12 of RFC 5280)
with the profile EKU, and observe that the request is rejected. The
evaluator shall send the EKU to a profile with a consistent KeyUsage
(but no specified EKU) and observe the request succeeds. The
41
evaluator shall send the EKU to a profile with an inconsistent KeyUsage
(but no specified EKU) and observe the request is rejected.
Test 4: For each extendedKeyUsage value defined in section 4.2.1.12
of RFC 5280, the evaluator shall attempt to configure a certificate
profile with each inconsistent keyUsage for that extendedKeyUsage
field. If the CA rejects the attempt to create such a profile, then the
test succeeds. If the creation of such a profile is allowed, the evaluator
shall submit a certificate request using the profile, and show that the
TSF does not issue the certificate.
Test 5: The evaluator shall configure a certificate profile and create a
certificate request that violates the validity period setting in the
configured profile (e.g., notBefore precedes the current time, the
combination of notBefore and notAfter is beyond the validity period
setting). The evaluator shall submit the certificate request using the
profile and verify that the TSF rejects the request.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
Application Note: This requirement ensures that the TOE provides linkage between submitted
requests and issued certificates.
Assurance Activity
TSS
The evaluator shall examine the TSS to ensure it describes the linkage between
submitted requests and issued certificates.
Guidance
The evaluator shall examine the operational guidance to ensure it contains
instructions for how to trace a submitted request to an issued certificate and
vice versa via the TOE’s interface.
Test
The evaluator shall perform the following test:
Test 1: The evaluator shall configure a certificate profile using the available
guidance and request a certificate using the profile as a subscriber. The
evaluator shall then assume the CA Operations role and verify that a linkage
between submitted certificate requests and issued certificates is provided.
42
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
Application Note: Certificate profiles are defined in accordance with FDP_CER_EXT.1. The various
iterations of FMT_MOF.1 define the roles that are allowed to approve the issuance
of certificates.
Assurance Activity
TSS
The evaluator shall examine the TSS to ensure it describes the certificate
issuance approval function, including the available interfaces that must be
used.
The evaluator shall examine the operational guidance to ensure that it contains
instructions for any configuration aspects of the certificate issuance approval
function and the steps needed to perform an approval.
Test
The evaluator shall perform the following test:
43
Test 3: The evaluator shall attempt to construct one or more certificate
requests that violate the rules for automatic approval, and shall verify that
the requested certificates are not issued.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
FDP_CSI_EXT.1.2 The TSF shall support the approval of changes to the status of a certificate by
[selection: RA, CA operations staff, rules].
Application Note: Based on the selection, the ST author must choose the appropriate requirements
from Annex B.
The ST should specify the format used to supply certificate status information. If
other OCSP standard is selected, only current standards shall be selected, the RFC
shall be referenced, and any optional features within the RFC shall be specified.
The various iterations of FMT_MOF.1 defines the role or roles authorized to
approve changes to a certificate’s status.
The “changes” referenced in FDP_CSI_EXT.1.2 are the revocation requests
received by the TOE.
Assurance Activity
44
TSS
The evaluator shall examine the TSS to ensure it describes the certificate status
function and applicable formats, in accordance with this requirement, that can
be used to issue certificate status. The TSS must reflect the selection made by
the ST author as well as the selection-based requirements from Annex B.
For TOEs that support OCSP, the TOE’s ST shall specify the OCSP standard and
the ST author shall ensure that a description of the format is available.
The evaluator shall also ensure that the TSS describes the process for approving
changes to the status of a certificate, including the interfaces that must be
used.
If the TOE supports the configuration of certificate status information, the
evaluator shall examine the operational guidance to ensure that instructions
are available to configure the certificate status function to utilize the formats
identified in FDP_CSI_EXT.1.1.
Guidance
The evaluator shall examine the operational guidance to ensure that it contains
instructions for any configuration aspects of the certificate status change
approval function and the steps needed to perform an approval.
Test
Based on the selection, the evaluator shall perform the applicable tests
associated with the requirements in Annex C:
Test 3: For each selected certificate status format, the evaluator shall
revoke a valid certificate from the TOE. The evaluator shall then cause
the TOE to issue certificate status information. The evaluator shall
check the certificate status information to verify that it reflects that the
certificate is revoked.
45
to the TOE. The evaluator shall access the TOE using the defined
interface and verify that the submitted request is in the appropriate
queue. The evaluator shall approve the certificate status change
request. The evaluator shall then cause the TOE to issue certificate
status information. The evaluator shall check the certificate status
information to verify that it reflects the state of the certificate.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
Application Note: “Resources” in the context of this requirement are any data buffers used to
implement certificate authority functions, including network communications
with the Certificate Authority. The concern is that a buffer or memory area might
be reused in subsequent function or communication channel resulting in
inappropriate disclosure of sensitive data. Note that this requirement applies only
to resources that the TSF controls. “Objects” refers to any sensitive data objects
that are under control of the TSF, such as subscribers’ personally identifiable
information.
The first selection should include ‘Operational Environment’ if the TSF depends on
a component of the OE to store and protect TSF data. The ST should specify the
component and any interface used to meet this requirement.
Assurance Activity
TSS
The evaluator shall examine the TSS to ensure that, at a minimum, it describes
how the previous information content is made unavailable, and at what point
in the buffer processing this occurs.
Guidance
There are no AGD assurance activities for this requirement beyond what is
necessary to satisfy the requirements in [CEM].
Test
There are no ATE assurance activities for this requirement beyond what is
necessary to satisfy the requirements in [CEM].
46
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
FIA_X509_EXT.1 lists the rules for validating certificates. The ST author shall select
whether revocation status is verified using OCSP or CRLs. Depending on this
selection, the appropriate CRL or OCSP requirements from Annex B must be
included.
47
Whenever TLS or HTTPS is used by the TSF to protect communications originating
from external IT entities, certificates used to perform authentication must be
validated to contain the Client Authentication purpose extendedKeyUsage.
It should be noted that in all cases, the validation is expected to end in a trusted
root certificate.
FIA_X509_EXT.1.2 The TSF shall only treat a certificate as a CA certificate if the basicConstraints
extension is present and the CA flag is set to TRUE.
Application Note: This requirement applies to certificates that are used and processed by the TSF
and restricts the certificates that may be added to the Trust Anchor Database.
Assurance Activity
TSS
The evaluator shall examine the TSS to ensure it describes where the check of
validity of the certificates takes place. The evaluator shall ensure the TSS also
provides a description of the certificate path validation algorithm for each
certificate format supported by the TOE.
Guidance
There are no AGD assurance activities for this requirement beyond what is
necessary to satisfy the requirements in [CEM].
Test
The evaluator shall perform the following tests in conjunction with the other
Certificate Services assurance activities, including the use cases in
FIA_X509_EXT.2.1. The tests for the extendedKeyUsage rules are performed in
conjunction with the uses that require those rules.
Test 1: The evaluator shall demonstrate that validating a certificate
without a valid certification path results in the function (application
validation, trusted channel setup, or trusted software update) failing.
The evaluator shall then load a certificate or certificates needed to
validate the certificate to be used in the function, and demonstrate
that the function succeeds. The evaluator then shall delete one of the
certificates, and show that the function fails.
Test 2: The evaluator shall demonstrate that validating an expired
certificate anywhere in a certificate path results in the function failing.
Test 3: The evaluator shall test that the TOE can properly handle
revoked certificates –conditional on whether CRL or OCSP is selected;
if both are selected, and then a test is performed for each method. The
48
evaluator has to only test one up in the trust chain (future revisions
may require to ensure the validation is done up the entire chain). The
evaluator shall ensure that a valid certificate is used, and that the
validation function succeeds. The evaluator shall then attempt the test
with a certificate that will be revoked (for each method chosen in the
selection) and verify that the validation function fails.
Test 4: The evaluator shall construct a certificate path, such that the
certificate of the CA issuing the CA’s certificate does not contain the
basicConstraints extension. The validation of the certificate path fails.
Test 5: The evaluator shall construct a certificate path, such that the
certificate of the CA issuing the CA’s certificate has the cA flag in the
basicConstraints extension not set. The validation of the certificate
path fails.
Test 6: The evaluator shall construct a certificate path, such that the
certificate of the CA issuing the CA’s certificate has the cA flag in the
basicConstraints extension set to TRUE. The validation of the certificate
path succeeds.
Test 7: The evaluator shall modify a single byte in the certificate and
verify that the certificate fails to validate.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
Application Note: The ST author‘s selection of trusted communication channel is expected to match
the selections in FTP_TRP.1.1 and FTP_ITC.1.1 (if FTP_ITC.1 is included in the ST).
Certificates may optionally be used for integrity verification (FPT_TST_EXT.2) and
other uses.
FIA_X509_EXT.2.2 When the TSF cannot determine the current revocation status of a certificate, the
TSF shall [selection: allow the administrator to choose whether to accept the
certificate, accept the certificate, not accept the certificate].
Application Note: The TSF may rely on the Operational Environment to perform certificate handling
functionality in cases where the TOE relies on an environmental component to
49
provide trusted remote communications. If the ST author selects SSH, the TSF shall
be validated against the Extended Package for Secure Shell.
FIA_X509_EXT.2.3 The TSF shall not establish a trusted communication channel if the peer certificate
is deemed invalid.
Application Note: Trusted communication channels include any of IPsec, TLS, or HTTPS, performed
by the TSF. Validity is determined by the certificate path, the expiration date, and
the revocation status in accordance with RFC 5280.
Assurance Activity
TSS
The evaluator shall examine the TSS to ensure it describes the certificate(s)
used by the TOE, the different uses for each certificate, and how the TSF
chooses which certificates to use. The evaluator shall examine the TSS to
confirm that it describes the behavior of the TOE when a connection cannot be
established during the validity check of a certificate used in establishing a
trusted channel.
Guidance
The evaluator shall examine the operational guidance to ensure clear
instructions for configuring the operating environment so that the TOE can use
the certificates which are provided. If the requirement is that the administrator
is able to specify the default action if the peer certificate is deemed invalid,
then the evaluator shall ensure that the operational guidance contains
instructions on how this configuration action is performed.
Test
The evaluator shall perform the following tests:
Test 1: For each function listed in FIA_X509_EXT.2.1 that requires the
use of certificates the evaluator shall demonstrate that using a
certificate without a valid certification path results in the function
failing. Using the operational guidance, the evaluator shall then load a
certificate or certificates needed to validate the certificate to be used
in the function, and demonstrate that the function succeeds. The
50
evaluator then shall delete one of the certificates, and show that the
function fails.
Test 2: The evaluator shall demonstrate that using a valid certificate
that requires certificate validation checking to be performed in at least
some part by communicating with a non-TOE entity. The evaluator
shall then manipulate the environment so that the TOE is unable to
verify the validity of the certificate, and observe that the action
selected in FIA_X509_EXT.2.2 is performed. If the selected action is
administrator-configurable, then the evaluator shall follow the
operational guidance to determine that all supported administrator-
configurable options behave in their documented manner.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
Assurance activities for this requirement are covered under those for
FIA_UIA_EXT.1. If other authentication mechanisms are specified, the
evaluator shall include those methods in the activities for FIA_UIA_EXT.1.
51
authentication, if there are some available to non-TOE entities, these should be
listed in the assignment statement; otherwise “no other actions” should be
selected.
FIA_UIA_EXT.1.2 The TSF shall require each user to be successfully identified and authenticated
before allowing any other TSF-mediated actions on behalf of that user, including
subscriber certificate renewal, subscriber revocation requests, privileged user
access, [selection: no other actions, [assignment: other TSF-mediated actions]].
FIA_UIA_EXT.1.3 For subscriber actions, the TSF shall verify that the DN of the certificate presented
by the subscriber for authentication matches that of the certificate being affected
by the subscriber’s actions.
Application Note: Authentication can be password-based through the local console or through a
protocol that supports passwords (such as SSH), or certificates (such as TLS).
Certificate renewal and certificate revocation requests can be performed by
subscribers with valid certificates and are limited to actions on those certificates;
subscribers cannot renew or revoke other users’ certificates. Privileged user access
requires further authentication. If there are other actions available to
authenticated users, these should be listed in the assignment; otherwise, “no
other actions” should be selected.
Assurance Activity
TSS
The evaluator shall examine the TSS to ensure it describes the logon process
for each logon method (local, remote (HTTPS, SSH, etc.)) supported for the TOE.
This description shall contain information pertaining to the credentials
allowed/used, any protocol transactions that take place, and what constitutes
a “successful logon”.
The evaluator shall examine the TSS to determine that it describes all actions
that can be performed prior to I&A as well as all actions that require successful
I&A, and by whom these actions can be performed. Any constraints on these
services shall be documented in the TSS.
Guidance
The evaluator shall examine the operational guidance to determine that any
necessary preparatory steps (e.g., establishing credential material such as pre-
shared keys, tunnels, certificates, etc.) to logging in are described. For each
supported login method, the evaluator shall ensure the operational guidance
provides clear instructions for successfully logging on. If configuration is
necessary to ensure the services provided before login are limited, the
evaluator shall determine that the operational guidance provides sufficient
instruction on limiting all allowed services. The evaluator shall examine the
operational guidance to verify that it describes how to configure the
constraints on each type of subscriber self-service request.
52
Test
The evaluator shall perform the following tests for each method by which
privileged users access the TOE (local and remote), as well as for each type of
credential supported by the access method in accordance with the
authentication mechanisms listed in FIA_UAU_EXT.1:
Test 1: The evaluator shall use the operational guidance to
configure the appropriate credential supported for the access
method. For that credential/access method, the evaluator shall
show that providing correct I&A information results in the ability
to access the system, while providing incorrect information results
in denial of access.
53
5.1.6 Security Management (FMT)
Application Note: FMT_MOF.1 has been broken up into several iterations to define the specific
management functions that are available to each of the roles defined by
FMT_SMR.2. The FMT_MOF.1 iterations restrict some functions to a particular
role, and allow the ST author to choose the role to which other functions may be
restricted through selections in a particular iteration. The ST author should select
those security management functions that belong to the roles supported by the
TOE. All TSF management functions need to be specified as being able to be
performed by at least one of the defined roles.
Application Note: It is likely that some combination of the TOE and its Operational Environment are
collectively responsible for implementing these management functions. In such
cases, the ST author should specify, for each function, the component that
enforces it.
Assurance Activity
Testing for this requirement is defined under FMT_MOF.1(4). The only
difference between the iterations of FMT_MOF.1 is the specific set of
management functions that are available to each administrative role. Testing
for this SFR is conducted sufficiently thoroughly if the evaluator can
demonstrate that the assigned role can perform only the functions specified in
the SFR.
54
FMT_MOF.1(2) Management of Security Functions Behavior (CA/RA Functions)
FMT_MOF.1.1(2) Refinement: The [selection: TSF, Operational Environment] shall restrict the
ability to
55
1. perform destruction of sensitive data when no longer needed;
[selection:
2. participate as a second party for archival and recovery;
3. import a key share to support recovery of a CA signing key;
4. perform encrypted export of private or secret key or critical data] to
[selection: Administrators, Auditor, CA Operations staff].
Application Note: It is acceptable to have the auditor participate in archive and recovery of the key
as one of the parties in a 'two party' procedure; in the current key archive
requirements, any participant (including the auditor) only gains access to key
shares (but cannot access the key).
Assurance Activity
TSS
The evaluator shall examine the TSS to ensure it identifies the restrictions
consistent with this requirement. For every function specified across all
iterations, the TSS must specify how the restriction is achieved and how (by
role or some other specified mechanism). This applies whether the ST author
selects “TSF” or “Operational Environment” in the first SFR selection.
Guidance
If the role restriction mechanism is configurable, the evaluator shall examine
the operational guidance to determine that the necessary instructions to meet
each iteration of the FMT_MOF.1 requirement for the TOE in its evaluated
configuration are provided. This applies only to management functions
implemented by or accessible through the TSF.
Test
Testing only applies to functions implemented by or accessible through the TSF.
The evaluator shall, for each management function, assume the role defined
for that function and demonstrate that the assigned role can perform the
functions. The evaluator shall, for each management function, assume each
role not assigned to that function, attempt to use the function, and verify that
the TSF does not permit it.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s evaluated configuration in the ST. Justification must be provided for
those platforms that were excluded from testing. Note that this must explicitly
cover functionality for capabilities implemented by the Operational
Environment, if “Operational Environment” is selected.
56
Delete entries from the audit trail
[selection:
Search the audit trail
Set or change the retention period parameter for audit records requiring
extended retention]
to [auditors].
Assurance Activity
Testing for this requirement is defined under FMT_MOF.1(4). The only
difference between the iterations of FMT_MOF.1 is the specific set of
management functions that are available to each administrative role. Testing
for this SFR is conducted sufficiently thoroughly if the evaluator can
demonstrate that the assigned role can perform only the functions specified in
the SFR.
Application Note: The word “manage” includes but is not limited to create, initialize, view, change
default, modify, delete, clear, and append. This requirement is intended to be the
“default” requirement for management of TSF data; other iterations of FMT_MTD
should place different restrictions or operations available on the specifically-
identified TSF data. TSF data includes cryptographic information as well;
managing these data would include the association of a cryptographic protocol
with an interface, for instance. The specifics of management of data associated
with defined operations are contained in the FMT_MOF iterations.
Assurance Activity
TSS
The evaluator shall examine the TSS to determine that, for each administrative
function identified in the operational guidance; those that are accessible
through an interface prior to administrator log-in are identified. For each of
these functions, the evaluator shall also confirm that the TSS details how the
ability to manipulate the TSF data through these interfaces is disallowed for
non-administrative users.
Guidance
The evaluator shall examine the operational guidance to determine that each
of the TSF-data-manipulating functions implemented in response to the
requirements of this PP is identified, and that configuration information is
provided to ensure that only administrators have access to the functions.
Test
57
The evaluator shall ensure that all TSF data specified in the ST can be managed
in the ways specified in the ST by Administrators, and that non-administrative
roles are not authorized to manage TSF data. This activity may be performed in
the course of performing other testing and does not necessarily need to be
done as a separate test.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
58
Application Note: Some TOE functions require the use of the Operational Environment. The ST
author simply must make clear in the ST what management functions are
performed by the TOE itself or which are performed by the TOE in conjunction with
its environment.
Except as indicated below, the security management functions for FMT_SMF.1 are
distributed throughout the PP and are included as part of the requirements in
FMT_MOF.1 and any cryptographic management functions specified in the
reference standards. Compliance to these requirements satisfies compliance with
FMT_SMF.1.
Assurance Activity
TSS
There are no TSS assurance activities for this requirement beyond what is
necessary to satisfy the requirements in [CEM].
Guidance
The evaluator shall check to make sure that every management function
mandated by the PP is described in the operational guidance and that the
description contains the information required to perform the management
duties associated with the management function.
Test
In the course of performing the testing activities for the evaluation, the
evaluator shall use all supported interfaces, although it is not necessary to
repeat each test involving an administrative action with each interface. The
evaluator shall ensure, however, that each supported method of administering
the TOE that conforms to the requirements of this PP be tested; for instance,
if the TOE can be administered through a local hardware interface; SSH; and
TLS/HTTPS; then all three methods of administration must be exercised during
the evaluation team’s test activities.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s evaluated configuration in the ST. Justification must be provided for
those platforms that were excluded from testing. Note that this must explicitly
cover guidance instructions and functionality for capabilities implemented by
the Operational Environment, if “Operational Environment” is selected.
Administrator,
Auditor,
59
CA Operations Staff,
[selection: RA Staff, Authorized Organizational Representative, no other
roles]]
FMT_SMR.2.2 Refinement: The TSF and [selection: Operational Environment, no other
component] shall be able to associate users with roles.
No identity is authorized to assume both an Auditor role and any of the other
roles in FMT_SMR.2.1; and
No identity is authorized to assume both a CA Operations Staff role and any
of the other roles in FMT_SMR.2.1]
are satisfied.
Application Note: This document specifies five roles: Administrator, Auditor, CA Operations Staff,
Registration Authority, and Authorized Organizational Representative. However,
the TOE is not required to maintain all six roles.
Assurance Activity
TSS
The evaluator shall examine the TSS to ensure it identifies the roles, the
privileges granted to and limitations of each role, and whether they are
implemented by the TOE or by the TOE in conjunction with its environment.
The evaluator shall also examine the TSS to ensure it describes the interfaces
available to each role and how role separation is ensured.
Guidance
The evaluator shall examine the AGD documents to ensure they contain
instructions for using either the TOE or the TOE in conjunction with its
environment to assign roles to the corresponding users.
The evaluator shall review the operational guidance to ensure that it contains
instructions for how the roles connect to and perform operations on the TOE
and which interfaces are supported.
Test
The evaluator shall perform the following tests:
Test 1: For each supported role, the evaluator shall assume the role
and connect to the TOE as specified in the AGD documentation. The
evaluator shall verify that the role can perform the documented
operations.
60
Test 2: The evaluator shall attempt to assume the Auditor role in
conjunction with any other role as defined in FMT_SMR.2.1 and shall
verify it is not possible.
Test 3: The evaluator shall attempt to assume the CA Operations Staff
role in conjunction with any other role as defined in FMT_SMR.2.1 and
shall verify it is not possible.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
Application Note: The intent of this requirement is to prevent the use of failed randomization and
other events that can compromise the operation of the CA. This means that the
TOE must be able to attain a secure/safe state when any of the identified failures
occurs. If the TOE should encounter a failure in the middle of a critical operation,
the TOE should not just quit operating, leaving key material and user data
unprotected.
Assurance Activity
TSS
The evaluator shall examine the TSS to determine that the TOE’s
implementation of the fail secure functionality is documented. The evaluator
shall first examine the TSS section to ensure that all failure modes specified in
the ST are described. The evaluator shall then ensure that the TOE will attain a
secure state after inserting each specified failure mode type. The evaluator
shall review the TSS to determine that the definition of secure state is defined
and is suitable to ensure protection of key material and user data.
61
Guidance
The evaluator shall examine the operational guidance to ensure it describes
the actions that might occur and provides remedial instructions for the
administrator.
Test
The evaluator shall perform the following test:
Test 1: The evaluator shall attempt to cause each documented failure
to occur and shall verify that the actions taken by the TSF are those
specified in FPT_FLS.1.1. For those failures that the evaluator cannot
cause, the evaluator shall provide a justification to explain why the
failure could not be induced.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
Application Note: Keys include all TOE secret and private keys, as well as any user secret and private
keys. The intent of this optional requirement is to prevent the keys from being
exported during an archive event authorized by the TOE user or administrator.
If TSF keys are stored in the OE, the TSF requires support of the OE to meet this
requirement. The Operational Environment shall be selected and the specific
components used shall be described in the TSS.
Assurance Activity
TSS
The evaluator shall examine the TSS to ensure it lists all keys that are not
exported from the TOE for all platforms listed in the TOE’s ST.
Guidance
There are no AGD assurance activities for this requirement beyond what is
necessary to satisfy the requirements in [CEM].
Test
The evaluator shall perform the following test:
Test 1: The evaluator shall access the export interface of the TOE and
shall verify that the interface prevents the export of all keys listed in
the TSS.
62
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
Application Note: The intent of this requirement is to protect TSF private and secret keys from both
unauthorized users and unprivileged processes. Users should not be able to access
the keys through “normal” interfaces.
Assurance Activity
TSS
The evaluator shall examine the TSS to ensure it describes how unauthorized
use of TSF private and secret keys is prevented for both users and processes.
Guidance
The evaluator shall examine the AGD guidance to ensure it contains
instructions for configuring the TOE or Operational Environment to prevent
unauthorized access to TSF secret and private keys by users or processes.
Test
The evaluator shall perform the following test:
Test 1: The evaluator shall assume each of the non-Administrator
roles supported by the TOE and shall attempt to use the available
TOE interface to access the keys. The evaluator shall verify that
these attempts fail.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
Application Note: This requirement ensures that the TSF can determine that the TOE is started up
without protection compromise and can recover without protection compromise
after discontinuity of operations. Anticipated failures include actions that result in
a system crash, media failures, or discontinuity of operations caused by erroneous
63
administrative action or lack of erroneous administrative action. The data that
needs to be restored includes the TSF keys needed for signature, the Trust Anchor
Database, keys needed for management of certificates, all signed certificates, and
any certificate status information.
Assurance Activity
TSS
The evaluator shall examine the TSS to determine that it describes how the TOE
enters a maintenance mode after a failure and the possible actions that can
take place while in that mode.
Guidance
The evaluator shall examine the AGD guidance to ensure it contains
instructions for restoring the TOE to a secure state when it enters the
maintenance mode, including the steps necessary to perform while in this
state.
Test
The evaluator shall perform the following test:
Test 1: The evaluator shall attempt to cause each documented
failure to occur and shall verify that the result of this failure is that
the TSF enters a maintenance mode. The evaluator shall also verify
that the maintenance mode can be exited and the TSF can be
restored to a secure state. This testing may be performed in
conjunction with FPT_FLS.1.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
Application Note: The intent of the requirement is that an administrator is unable to read or view
the identified keys through “normal” interfaces. While it is understood that the
administrator could directly read memory to view these keys, to do so is not a
trivial task and may require substantial work on the part of an administrator.
Since the administrator is considered a trusted agent, it is assumed they would
not endeavor in such an activity.
Assurance Activity
64
TSS
Regardless of whether this requirement is met by the TOE or the Operational
Environment, the evaluator shall examine the TSS to determine that it details
each persistent private and secret key needed to meet the requirements in the
ST. For each of these items, the evaluator shall confirm that the TSS details how
any secret or private keys are stored and that they are unable to be viewed
through an interface designed specifically for that purpose, as outlined in the
application note. If these values are not stored in plaintext, the TSS shall
describe how they are protected/obscured.
Guidance
The evaluator shall examine the AGD guidance to ensure it contains any
necessary instructions for configuring the TOE or Operational Environment to
support this requirement.
Test
The evaluator shall perform the following test:
Test 1: The evaluator shall assume each of the non-Administrator
roles supported by the TOE and shall attempt to use the available
TOE interface to read the keys specified by the TOE. The evaluator
shall verify that these attempts fail.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
Application Note: The TSF is expected to use time data for accuracy in signing and verification
activities. Depending on the functionality provided by the TOE, it may also use
time data for accurate generation of audit logs and secure communications that
have a time component.
Assurance Activity
TSS
The evaluator shall examine the TSS to ensure that it lists each security function
that makes use of time. The TSS provides a description of how the time is
maintained and considered reliable in the context of each of the time related
functions.
65
Guidance
The evaluator shall examine the operational guidance to ensure it instructs the
administrator how to set the time. If the TOE supports the use of a network
time protocol (NTP) server, the operational guidance shall describe how a
communication path is established between the TOE and the NTP server, and
any configuration of the NTP client on the TOE to support this communication.
Test
The evaluator shall perform the following tests:
Test 1: The evaluator shall use the operational guidance to set the
time. The evaluator shall then use an available interface to observe
that the time was set correctly.
Test 2: [conditional] If the TOE supports the use of an NTP server;
the evaluator shall use the operational guidance to configure the
NTP client on the TOE, and set up a communication path with the
NTP server. The evaluator will observe that the NTP server has set
the time to what is expected. If the TOE supports multiple
protocols for establishing a connection with the NTP server, the
evaluator shall perform this test using each supported protocol
claimed in the operational guidance.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
FPT_TUD_EXT.1.2 The TSF shall [selection: implement, interface with the Operational Environment
to implement] the ability to provide Administrators the ability to initiate updates
to TOE firmware/software.
FPT_TUD_EXT.1.3 The TSF shall [selection: implement, interface with the Operational Environment
to implement] the ability to verify firmware/software updates to the TOE using a
digital signature prior to installing those updates.
FPT_TUD_EXT.1.4 The TSF shall [selection: implement, interface with the Operational Environment
to implement] the ability to verify the digital signature whenever the software or
firmware is externally loaded into the TOE and if verification fails, the TSF shall
[assignment: action to be taken if the verification fails].
Application Note: The digital signature mechanism referenced in the third element is the one
specified in FCS_COP.1(2).
66
Assurance Activity
TSS
The evaluator shall verify that the TSS section of the ST describes all TSF
software update mechanisms for updating the system software. The evaluator
shall verify that the description includes a digital signature verification of the
software before installation and that installation fails if the verification fails.
The evaluator shall verify that all software and firmware involved in updating
the TSF is described and, if multiple stages and software are indicated, that the
software/firmware responsible for each stage is indicated and that the stage(s)
which perform signature verification of the update are identified.
The evaluator shall verify that the TSS describes the method by which the
digital signature is verified.
The evaluator shall verify that the TSS describes that the public key used to
verify the signature is either hardware-protected or is validated to chain to a
public key in the Trust Anchor Database. If hardware-protection is selected, the
evaluator shall verify that the method of hardware-protection is described and
that the ST author has justified why the public key may not be modified by
unauthorized parties.
[conditional] If the ST author indicates that the public key for software update
digital signature verification, the evaluator shall verify that the update
mechanism includes a certificate validation according to FIA_X509_EXT.1 and
a check for the Code Signing purpose in the extendedKeyUsage.
Guidance
The evaluator shall examine the operational user to ensure it contains the
required information regarding TOE version verification and TOE updates as
specified in AGD_OPE.1.
Test
The evaluator shall perform the following tests:
67
Test 3: The evaluator shall obtain or produce an update with an
invalid signature, and shall attempt to install it on the TOE. The
evaluator shall verify that the TOE rejects the update and performs
any other actions specified in the TSS.
Test 4: The evaluator shall digitally sign the update with a
certificate that does not have the Code Signing purpose and verify
that application installation fails. The evaluator shall repeat the
test using a valid certificate and a certificate that contains the Code
Signing purpose and verify that the application installation
succeeds.
Test 5: The tester shall attempt to install an update without the
digital signature and shall verify that installation fails. The tester
shall attempt to install an update with altered digital signature, and
verify that installation fails.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
Assurance Activity
TSS
There are no TSS assurance activities for this requirement beyond what is
necessary to satisfy the requirements in [CEM].
Guidance
The evaluator shall examine the operational guidance to ensure it describes
how to terminate interactive sessions.
Test
The evaluator shall perform the following tests:
Test 1: The evaluator shall initiate an interactive local session with
the TOE. The evaluator shall then follow the operational guidance
to terminate the session and observe that the session has been
terminated.
68
Test 2: The evaluator shall initiate an interactive remote session
with the TOE. The evaluator shall then follow the operational
guidance to terminate the session and observe that the session has
been terminated.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
Application Note: This requirement is intended to apply to interactive sessions between a human
user and a TOE. IT entities establishing connections or programmatic connections
(e.g., remote procedure calls over a network) are not required to be covered by
this requirement.
Assurance Activity
TSS
The evaluator shall examine the TSS to ensure that it details each method of
access (local and remote) available to the administrator (e.g., serial port, SSH,
HTTPS).
Guidance
The evaluator shall examine the operational guidance to ensure it includes
instructions for how to configure notices and consent warning messages.
Test
The evaluator shall perform the following test:
69
5.1.9 Trusted Path/Channels (FTP)
FTP_TRP.1.2 Refinement: The TSF shall permit remote subscribers and privileged users to
initiate communication via the trusted path.
FTP_TRP.1.3 The TSF shall require the use of the trusted path for [initial subscriber and
privileged user authentication and all remote administration actions].
Application Note: This requirement ensures that remote subscribers and privileged users initiate all
communication with the TOE via a trusted path, and that all communications with
the TOE by remote subscribers and privileged users is performed over this path.
The data passed in this trusted communication channel are encrypted as defined
the protocol chosen in the first selection. The ST author chooses the
mechanism(s) supported by the TOE and ensures the detailed requirements in
Annex B corresponding to their selection are copied to the ST if not already
present.
Assurance Activity
TSS
The evaluator shall examine the TSS to determine that the methods of remote
TOE communication are indicated, along with how those communications are
protected. The evaluator shall also confirm that all protocols listed in the TSS
in support of TOE communication are consistent with those specified in the
requirement, and are included in the requirements in the ST.
Guidance
The evaluator shall examine the operational guidance to ensure it contains
instructions for establishing the remote sessions for each supported method.
Test
The evaluator shall perform the following tests:
Test 1: The evaluator shall ensure that communications using each
specified (in the operational guidance) remote method is tested
during the course of the evaluation, setting up the connections as
described in the operational guidance and ensuring that
communication is successful.
70
Test 2: For each method of remote communication supported, the
evaluator shall follow the operational guidance to ensure that
there is no available interface that can be used by a remote user to
establish a remote session without invoking the trusted path.
Test 3: The evaluator shall ensure, for each method of remote
communication, the channel data is not sent in plaintext.
Further assurance activities are associated with the specific protocols.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
71
ADV_FSP.1 Basic Functional Specification
Assurance Activity
There are no specific assurance activities associated with these SARs, except
ensuring the information is provided. The functional specification
72
documentation is provided to support the evaluation activities described in
Section 5.1, and other activities described for AGD, ATE, and AVA SARs. The
requirements on the content of the functional specification information is
implicitly assessed by virtue of the other assurance activities being performed;
if the evaluator is unable to perform an activity because there is insufficient
interface information, then an adequate functional specification has not been
provided.
Developer Note: Rather than repeat information here, the developer should
review the assurance activities for this component to
ascertain the specifics of the guidance that the evaluator
will be checking for. This will provide the necessary
information for the preparation of acceptable guidance.
73
AGD_OPE.1.4C The operational user guidance shall, for each privileged
user role, clearly present each type of security-relevant
event relative to the privileged user-accessible functions
that need to be performed, including changing the security
characteristics of entities under the control of the TSF.
Assurance Activity
Some of the contents of the operational guidance will be verified by the
assurance activities in Section 5.1 and evaluation of the TOE according to the
CEM. The following additional information is also required.
The operational guidance shall at a minimum list the processes that comprise
the TOE in its evaluated configuration.
The operational guidance shall contain instructions for configuring the
Operational Environment to support the functions of the TOE. These
instructions shall include configuration of the cryptographic engine associated
with the evaluated configuration of the TOE as well as configuration of the
underlying platform. It shall provide a warning to the administrator that use of
other cryptographic engines or platforms was not evaluated nor tested during
the CC evaluation of the TOE. The documentation must describe the process
for installing updates to the TOE. The evaluator shall verify that this process
includes the following steps:
Instructions for obtaining the update. This should include instructions for
making the update accessible to the TOE (e.g., placement in a specific
directory).
Instructions for initiating the update process, as well as discerning whether the
process was successful or unsuccessful.
74
The TOE will likely contain security functionality that does not fall in the scope
of evaluation under this PP. The operational guidance shall make it clear to an
administrator which security functionality is covered by the evaluation
activities.
AGD_PRE.1 Preparative Procedures
Assurance Activity
As indicated in the introduction above, there are significant expectations with
respect to the documentation—especially when configuring the operational
environment to support TOE functional requirements. The evaluator shall
check to ensure that the guidance provided for the TOE adequately addresses
all platforms claimed for the TOE in the ST.
The evaluator shall check to ensure that the following guidance is provided:
As indicated in the introductory material, administration of the TOE is
performed by one or more administrators that are a subset of the
group of all users of the TOE. While it must be the case that the overall
system (TOE plus Operational Environment [Operational
75
Environment]) provide this capability, the responsibility for the
implementation of the functionality can vary from totally the
Operational Environment’s responsibility to totally the TOE’s
responsibility. At a high level, the guidance must contain the
appropriate instructions so that the Operational Environment is
configured so that it provides the portion of the capability for which it
is responsible.
ALC_CMC.1.1D The developer shall provide the TOE and a reference for
the TOE.
Assurance Activity
The evaluator shall check the ST to ensure that it contains an identifier (such as
a product name/version number) that specifically identifies the version that
meets the requirements of the ST. Further, the evaluator shall check the AGD
guidance and TOE samples received for testing to ensure that the version
number is consistent with that in the ST. If the vendor maintains a web site
advertising the TOE, the evaluator shall examine the information on the web
site to ensure that the information in the ST is sufficient to distinguish the
product.
76
ALC_CMS.1 TOE CM Coverage
ALC_CMS.2.1D The developer shall provide a configuration list for the TOE.
ALC_CMS.2.1C The configuration list shall include the following: the TOE
itself; and the evaluation evidence required by the SARs.
Assurance Activity
The “evaluation evidence required by the SARs” in this PP is limited to the
information in the ST coupled with the guidance provided to administrators
and users under the AGD requirements. By ensuring that the TOE is specifically
identified and that this identification is consistent in the ST and in the AGD
guidance (as done in the assurance activity for ALC_CMC.1), the evaluator
implicitly confirms the information required by this component.
77
ATE_IND.1.1E The evaluator shall confirm that the information provided
meets all requirements for content and presentation of
evidence.
ATE_IND.1.2E The evaluator shall test a subset of the TSF to confirm that
the TSF operates as specified.
Application Note: If the ST author selects SSH, the TSF shall be validated against the
Extended Package for Secure Shell
Assurance Activity
The evaluator shall prepare a test plan and report documenting the testing
aspects of the system. The test plan covers all of the testing actions contained
in the CEM and the body of this PP’s Assurance Activities. While it is not
necessary to have one test case per test listed in an Assurance Activity, the
evaluator must document in the test plan that each applicable testing
requirement in the ST is covered.
The test plan identifies the platforms to be tested, and for those platforms not
included in the test plan but included in the ST, the test plan provides a
justification for not testing the platforms. This justification must address the
differences between the tested platforms and the untested platforms, and
make an argument that the differences do not affect the testing to be
performed. It is not sufficient to merely assert that the differences have no
affect; rationale must be provided. If all platforms claimed in the ST are tested,
then no rationale is necessary.
The test plan describes the composition of each platform to be tested, and any
setup that is necessary beyond what is contained in the AGD documentation.
It should be noted that the evaluator is expected to follow the AGD
documentation for installation and setup of each platform either as part of a
test or as a standard pre-test condition. This may include special test drivers or
tools. For each driver or tool, an argument (not just an assertion) should be
provided that the driver or tool will not adversely affect the performance of
the functionality by the TOE and its platform. This also includes the
configuration of the cryptographic engine to be used. The cryptographic
algorithms implemented by this engine are those specified by this PP and used
by the cryptographic protocols being evaluated (IPsec, TLS/HTTPS, SSH).
The test plan identifies high-level test objectives as well as the test procedures
to be followed to achieve those objectives. These procedures include expected
results. The test report (which could just be an annotated version of the test
plan) details the activities that took place when the test procedures were
executed, and includes the actual results of the tests. This shall be a cumulative
account, so if there was a test run that resulted in a failure; a fix installed; and
then a successful re-run of the test, the report would show a “fail” and “pass”
result (and the supporting details), and not just the “pass” result.
78
5.2.6 Class AVA: Vulnerability Analysis
For the current generation of this Protection Profile, the evaluation lab is expected to survey open sources
to discover what vulnerabilities have been discovered in these types of products. In most cases, these
vulnerabilities will require sophistication beyond that of a basic attacker. Until penetration tools are
created and uniformly distributed to the evaluation labs, the evaluator will not be expected to test for
these vulnerabilities in the TOE. The labs will be expected to comment on the likelihood of these
vulnerabilities given the documentation provided by the vendor. This information will be used in the
development of penetration testing tools and for the development of future Protection Profiles.
Assurance Activity
As with ATE_IND, the evaluator shall generate a report to document their
findings with respect to this requirement. This report could physically be part
of the overall test report mentioned in ATE_IND, or a separate document. The
evaluator performs a search of public information to determine the
vulnerabilities that have been found in certification authority products, the
communications and enrollment protocols used, as well as those that pertain
to the particular TOE. The evaluator documents the sources consulted and the
vulnerabilities found in the report. For each vulnerability found, the evaluator
either provides a rationale with respect to its non-applicability, or the evaluator
formulates a test (using the guidelines provided in ATE_IND) to confirm the
vulnerability, if suitable. Suitability is determined by assessing the attack vector
needed to take advantage of the vulnerability. For example, if the vulnerability
can be detected by pressing a key combination on boot-up, a test would be
suitable at the assurance level of this PP. If exploiting the vulnerability requires
79
expert skills and an electron microscope, for instance, then a test would not be
suitable and an appropriate justification would be formulated.
80
A. Optional Requirements
As indicated in the introduction to this PP, the baseline requirements (those that must be performed by
the TOE or its underlying platform) are contained in the body of this PP. Additionally, there are three other
types of requirements specified in Annexes A, B, and C.
The first type (in this Annex) contains requirements that can be included in the ST, but do not have to be
in order for a TOE to claim conformance to this PP. There are two cases for requirements in this Annex.
The first case is that if the TOE contains the functionality pertaining to a requirement in this Annex, then
the functionality must be included in the evaluation and the SFRs included in the ST. This is the case with
the FCS_COP.1(5), FDP_SDP_EXT.1, FDP_STG_EXT.1, FPT_SKY_EXT.1, FPT_TST_EXT.2, FTA_SSL.3, and
FTA_SSL_EXT.1 SFRs. The second case is that even if the TOE contains the functionality associated with
the SFR, the ST author is free to either claim that functionality or not claim that functionality in the ST. If
the functionality is claimed, then they include the SFRs (in this case, FDP_CER_EXT.4 and FPT_NPE_EXT.1)
in the ST. However, if they do not wish to claim or evaluate the functionality, then these two SFRs do not
have to be included in the ST.
The second type (in Annex B) contains requirements based on selections in the body of the PP: if certain
selections are made, then additional requirements in that annex will need to be included. The third type
(in Annex C) contains requirements that are not required in order to conform to this PP, but will be
included in the baseline requirements in future versions of this PP, so adoption by Certification Authority
vendors is encouraged. Note that the ST author is responsible for ensuring that requirements that may be
associated with those in Annex A, Annex B, and/or Annex C but are not listed (e.g., FMT-type
requirements) are also included in the ST.
Application Note: This requirement is optional. It will be claimed if the method of protecting key
shares in FPT_SKY_EXT.2 or any other mechanism to enforce access by privileged
user depends on passwords. It may also be claimed if other mechanisms use
password-based encryption.
In the first selection for each element, the ST author chooses whether the TOE
performs the derivation, or whether it invokes interfaces in the Operational
Environment for the functionality.
The ST author selects the appropriate hash algorithm used in the second selection.
81
The cryptographic key sizes in the third selection should be made to correspond to
the KEK key sizes selected in FCS_CKM_EXT.1(3). A future requirement will add a
refinement to require a PBKDF iteration count of at least 1000.
This password must be conditioned into a string of bits that forms the submask to
be used as input into the KEK. Conditioning is be performed using one of the
identified hash functions. NIST SP 800-132 requires the use of a pseudo-random
function (PRF) consisting of HMAC with an approved hash function. The ST author
selects the hash function used, also includes the appropriate requirements for
HMAC and the hash function.
Assurance Activity
TSS
If this SFR is implemented by the TSF, then the evaluator shall perform the
following activities.
The evaluator shall check that the TSS describes the method by which the
password is first encoded and then fed to the SHA algorithm. The settings for
the algorithm (padding, blocking, etc.) shall be described, and the evaluator
shall verify that these are supported by the selections in this component as well
as the selections concerning the hash function itself. The evaluator shall verify
that the TSS contains a description of how the output of the hash function is
used to form the submask that will be input into the function and is the same
length as the DEK or KEK being protected.
Guidance
There are no AGD assurance activities for this requirement beyond what is
necessary to satisfy the requirements in [CEM].
Test
There are no ATE assurance activities for this requirement beyond what is
necessary to satisfy the requirements in [CEM].
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
82
FDP_CER_EXT.4 Non-X.509v3 Certificate Generation
FDP_CER_EXT.4.1 For X.509 certificate formats other than v3, the TSF shall ensure that these
certificate formats contain the following general characteristics:
Version (0 or 1);
Unique identifier of the issuer;
keyUsage;
Unique identifier of the certificate
Validity period
Signature field in accordance with FCS_COP.1(2)
Application Note: This optional requirement can be included if X.509 certificate formats other than
the mandated v3 are supported.
Assurance Activity
TSS
The evaluator shall examine the TSS to ensure it describes the X.509 certificate
generation function and the supported and non- features of the ITU-T
Recommendation X.509, in accordance with FDP_CER_EXT.2.1, that can be
used to issue certificates. The evaluator shall ensure that the TSS identifies
which of the values identified in FDP_CER_EXT.2.1 can be included in generated
certificates.
Guidance
If the TOE supports configurable certificate profiles, the evaluator shall
examine the operational guidance to ensure that instructions are available to
configure certificate profiles used for the generation of X.509 certificates.
Test
The evaluator shall perform the following test:
Test 1: For each field defined in FDP_CER_EXT.2.1, the evaluator shall
attempt to create a certificate request that violates the required
conditions of the field. The evaluator shall determine that all such
attempts are rejected by the TSF.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
83
subscriber identity information,
subscriber contact information,
photograph from official ID such as an organization ID badge, passport or
driver’s license,
background check information,
copies of legal documents,
captured biometrics,
[assignment: other personally identifiable information]]
through encryption in accordance with FCS_COP.1(1) using a DEK.
FDP_SDP_EXT.1.2 The TSF shall [selection: destroy, invoke interfaces to the Operational Environment
to destroy] all protected data when no longer required in accordance with the
specified cryptographic data destruction method:
[selection:
by clearing the DEK encrypting the protected data,
in accordance with the following rules:
o For volatile EEPROM the destruction shall be executed by a single direct
overwrite consisting of [selection:
a pseudo random pattern using the TSF’s RBG (as specified in
FCS_RBG_EXT.1),
zeroes],
followed by a read-verify.
o For volatile flash memory the destruction shall be executed by
[selection:
a single direct overwrite consisting of zeroes,
a block erase],
followed by a read-verify].
Application Note: In the first selection for each element, the ST author chooses whether the TOE
performs the protection/destruction, or whether it invokes interfaces in the
Operational Environment for the functionality.
Assurance Activity
TSS
84
The evaluator shall examine the TSS to verify that it describes (for each
supported platform) how the data destruction functionality is performed or
invoked.
The evaluator shall examine the TSS to ensure it describes each user data type
as indicated in FDP_SDP_EXT.1.1, including where it is stored, how it is
protected (including mode and key size used when encrypting the data), when
it is destroyed (for example, immediately after use, on system shutdown, etc.);
and the type of destruction procedure that is performed.
The evaluator shall ensure that the mode and key size used in the encryption
of the data is specified in the FCS_COP.1 SFR.
If the Operational Environment is invoked to perform the functions, the TSS
shall list the interfaces (APIs) that are invoked.
Guidance
If the protection and destruction of user data is configurable, the evaluator
shall examine the operational guidance to ensure it instructs the administrator
how to ensure that user data is protected and destroyed in accordance with
this requirement.
Test
The evaluator shall perform the following tests for each platform listed in the
ST:
Test 1: The evaluator shall, for each user data type listed in the TSS,
locate where the data is stored and verify that it is encrypted.
Test 2: The evaluator shall, for each user data type listed in the TSS,
initiate the supported data destruction mechanism according to the
documented times that it should be initiated for that user data type
(e.g., immediately after use, on system shutdown, etc.) and verify
that the protected data has been destroyed.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
Application Note: Public keys used to satisfy CA-related requirements in the ST must be protected.
If the TOE protects the keys or a subset of the keys, this SFR is included in the ST.
It is acceptable if some or all of the public keys are stored in the OE and protected
85
by OE-provided mechanisms. If this is the case, then the ST author includes
OE.PUBLIC_KEY_PROTECTION in the ST. It is acceptable for the TOE to protect
some keys and the OE to protect other keys.
Assurance Activity
TSS
The evaluator shall examine the TSS to ensure it describes the trusted public
keys and certificates implemented, including trust stores that contains root CA
certificates, used to meet the requirements of this PP. This description shall
contain information pertaining to how certificates are loaded into the store,
and (if the first selection in the requirement is chosen) how the store is
protected from unauthorized access in accordance with the permissions
established in FMT_SMF.1 and FMT_MOF.1(1) through FMT_MOF.1(5).
Guidance
The evaluator shall examine the operational guidance to ensure it contains
instructions for how to load certificates and public key into and remove
certificates and public keys from the protected storage.
Test
This test is conditional on the first selection in the SFR being chosen. If the
second selection is chosen, the evaluator does not perform this and instead
performs the actions called for FCS_CKM_EXT.5.
The evaluator shall perform the following test:
Test 1 (conditional): The evaluator shall attempt to modify the
contents of the Trust Anchor Database in a way that violates the
documented permissions and verify that the attempt fails.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
86
FPT_NPE_EXT.1 NPE Constraints
FPT_NPE_EXT.1.1 The TSF shall enforce an Administrator-configurable ruleset that specifies
authorizations to submit NPE certificate requests.
Application Note: The rulesets specify when approval by a CA, RA, and/or AOR is required and limits
the authorizations of RAs or specific Authorized Organizational Representatives
(AORs), to approve NPE certificates associated to a particular organization.
FPT_NPE_EXT.1.2 The TSF shall require the CA Operations Staff to register any RA, and shall require
a CA Operations Staff or authorized RA to register any AORs, and associate each
AOR with an organization or set of devices prior to that AOR making requests on
behalf of an assigned organization or devices.
Application Note: Registration authorities may be restricted in the types of certificates they are
authorized to request, or the subjects asserted in those requests, but typically
have wide authority to request certificates. AORs, on the other hand, are
restricted to NPE certificate types, and are further restricted to request certificates
for a small number of devices owned by their affiliated organization. Similar to
subscriber self-service requests, an AOR’s request authority is provided only for
those certificates associated to devices the particular AOR is authorized to
manage.
Assurance Activity
TSS
The evaluator shall examine the TSS to ensure it describes the AOR constraint
mechanism, including the ruleset and its enforcement.
Guidance
The evaluator shall examine the operational guidance to verify that it describes
how to configure the ruleset. The evaluator shall ensure that the operational
guidance includes instructions on how the RAs and CA Operations staff register
the AORs and associate the AORs with particular organizations. The evaluator
shall also examine the operational guidance to ensure it also describes how
AORs, RAs or CA Operations Staff perform certificate management on behalf
of the organization for which they are registered.
Test
The evaluator shall perform the following tests:
Test 1: The evaluator shall assume the Administrator role and
configure the ruleset. The evaluator shall then assume other roles and
verify that no other roles can modify the ruleset.
Test 2: The evaluator shall configure the ruleset that restricts an AOR
to a particular organization. The evaluator shall assume a CA
Operations Staff or RA role and register an AOR with an organization,
authorizing the AOR to perform specific operations on that
87
organization’s behalf. The evaluator shall then verify that the AOR can
perform each authorized operation on behalf of the organization.
Test 3: The evaluator shall configure the ruleset that restricts an AOR
to a particular organization. The evaluator shall assume a CA
Operations Staff or RA role and register an AOR with an organization,
authorizing the AOR to perform specific operations on that
organization’s behalf. The evaluator shall verify that the AOR cannot
perform any operations on behalf of organizations for which it is not
registered. The evaluator shall also verify that the AOR cannot perform
unauthorized operations on behalf of its assigned organization.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
Application Note: The intent of this requirement is to limit access to critical keys that are necessary
to maintain operations after a failure.
The ST author includes this SFR in the ST when the TOE is used to enforce split
knowledge procedures, either directly or via interfaces with the OE. If enforcement
of split knowledge procedures is performed entirely by the OE, then this SFR is not
included in the ST and OE.KEY_ARCHIVAL is included in the ST.
Assurance Activity
If the TSF implements a key sharing mechanism, this SFR is satisfied through
the referenced SFRs in Appendices B.3 and B.8 of the PP. FCS_CKM_EXT.1(3)
specifies how the key shares generated in accordance with FCS_CKM_EXT.1(4)
are used to produce a KEK to protect the keys listed in this requirement. The
protection of those keys with the KEK is done by mechanism required in
88
FCS_CKM_EXT.6. FPT_SKY_EXT.2 specifies access control for the key shares
themselves.
If the TSF interfaces with a cryptographic module in the Operational
Environment to implement a key sharing mechanism, the evaluator shall
examine the TSS to ensure that the interface to the OE, and cryptographic
provider for the key sharing mechanism is described.
If the TSF implements another split knowledge procedure, the evaluator shall
examine the TSS to ensure the procedure is adequately described, and assess
the procedure to ensure that it is effective in restricting access to the CA signing
key and all other selected data and keys. The evaluator shall attempt to devise
tests to validate that the TSF implements the described mechanism. The
evaluator shall review the AGD to ensure it contains clear instructions to
privileged users on how to conduct the procedures.
If the TSF interfaces with the OE to implement other split knowledge
procedures, the evaluator shall examine the TSS to ensure the procedure is
adequately described, and assess the procedure to ensure that it is effective in
restricting access to the CA signing key and all other selected data and keys.
The evaluator shall ensure that the TSS describes the dependence on the OE
and identifies any cryptographic providers within the OE used to support the
procedures. The evaluator shall also examine the AGD guidance to ensure it
contains instructions for configuring the OE to restrict access to the CA signing
key and all other selected data and keys.
FPT_TST_EXT.1.2 The [selection: TSF, Operational Environment] shall verify the integrity of the TOE
software and firmware [selection: at power-up, at initialization, on-demand by a
privileged user].
Application Note: The ST author includes this SFR when the TSF includes a mechanism that can
perform integrity tests on software/firmware, for instance, if the TSF includes an
operating system.
Assurance Activity
89
TSS
The evaluator shall examine the TSS to ensure it describes the mechanisms that
will be used to verify the integrity software/firmware and the action(s) taken if
any of the integrity tests fails.
Guidance
The evaluator shall examine the operational guidance to ensure that it includes
instructions to verify the integrity of the software/firmware.
Test
The evaluator shall perform the following tests:
Test 1: The evaluator shall modify a TOE binary to verify the
integrity test fails and the action defined in FPT_TST_EXT.1.2
occurs. If this test cannot be performed, the evaluator shall provide
a justification.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
Application Note: The ST author includes this SFR when the TSF itself provides integrity protection
for any of the items listed in the second selection of FPT_TST_EXT.2.1.
Assurance Activity
TSS
The evaluator shall examine the TSS to ensure it describes the mechanisms that
will be used to verify the integrity of the selected data and the action(s) taken
if any of the integrity tests fails.
Guidance
90
The evaluator shall examine the operational guidance to ensure that it includes
instructions to verify the integrity of the selected data.
Test
The evaluator shall perform the following tests:
Test 1: The evaluator shall use the operational guidance
instructions to verify the integrity of each protected element
specified in the TSS.
Application Note: This requirement is included if the TSF is implementing the mechanism used to
terminate remote sessions after a defined time period. If this requirement is not
included in the ST, then OE.SESSION_PROTECTION_REMOTE will be included in the
ST.
Assurance Activity
TSS
There are no TSS assurance activities for this requirement beyond what is
necessary to satisfy the requirements in [CEM].
Guidance
The evaluator shall examine the operational guidance to ensure it includes
instructions for configuring the inactivity time period for remote interactive
sessions.
Test
The evaluator shall perform the following test:
Test 1: The evaluator shall follow the operational guidance to
configure several different values for the inactivity time period
referenced in the component. For each period configured, the
evaluator shall establish a remote interactive session with the TOE.
91
The evaluator shall then observe that the session is terminated
after the configured time period.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
lock the session–- disable any activity of the user’s data access/display devices
other than unlocking the session, and requiring that the privileged user re-
authenticate to the TSF prior to unlocking the session;
terminate the session]
after an Administrator-configured time period of inactivity.
Application Note: This requirement is included if the TSF is implementing the mechanism used to
terminate or lock local sessions after a defined time period. If this requirement is
not included in the ST, then OE.SESSION_PROTECTION_LOCAL will be included in
the ST.
Assurance Activity
TSS
The evaluator shall examine the TSS to ensure it describe the mechanism used
for locking local interactive sessions, including the resulting behavior.
Guidance
The evaluator shall examine the operational guidance to ensure it includes
instructions for configuring the inactivity time period for local interactive
sessions.
Test
The evaluator shall perform the following test:
Test 1: The evaluator shall follow the operational guidance to
configure several different values for the inactivity time period
referenced in the component. For each period configured, the
evaluator shall establish a local interactive session with the TOE.
The evaluator shall then observe that the session is either locked
or terminated after the configured time period. If locking was
selected from the component, the evaluator shall ensure that re-
authentication is needed when trying to unlock the session.
Equivalency
92
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
93
associations.
94
B. Selection-Based Requirements
Several of the requirements in the main body of the PP have selections that, when chosen, will require
SFRs in this appendix to be included in the ST (for instance, requirements for a specific protocol that is
chosen in FTP_TRP.1). The requirements in the main body and the requirements in this appendix contain
application notes to let the ST author know when particular components need to be included.
Note that minor adjustments to the narrative information in the beginning of the ST may be required
depending on the selections performed. Additionally, depending on the requirements selected, the
appropriate information from Section B.9 Auditable Events will need to be added to the auditable events
table in the ST.
[selection:
an RBG that meets this profile (as specified in FCS_RBG_EXT.1),
a key generation capability of the Operational Environment,
a TSF-provided mechanism that combines KEKs in a way that preserves the
effective entropy of each factor by [selection:
o using an XOR operation,
o concatenating the keys and using a key derivation function (KDF) in
accordance with SP 800-108,
o encrypting one key with another in accordance with FCS_COP.1(1) and
using modes [selection: AES-CCM, AES-GCM, AES Key Wrap, AES Key Wrap
with Padding]].
Application Note: Data encryption keys (DEKs) are used to protect data at rest (e.g., subscriber PII
of security critical parameters) that needs to be encrypted. These are
distinguished from KEKs (whose generation is described in FCS_CKM_EXT.1(2))
that are used to protect other keys – DEKs, other KEKs, and other types of keys
stored by the user or applications.
The first selection must match the selection for this component in FCS_CDP_EXT.1
in terms of whether this functionality is implemented by the TOE or through the
OE.
95
The second selection is simply the number of bits in the DEK.
For the third selection, if the TSF invokes an RBG that is implemented by the TOE
or implemented by the OE, the first item is selected and FCS_RBG_EXT.1 is
included in the ST. If the TSF invokes a key-generation mechanism in the OE (that
is not a direct invocation of an RBG), then the second item (“a key generation
capability of the Operational Environment”) is selected; in this case the second
item of the first selection ("invoke interfaces provided by the Operational
Environment to generate") should have also been chosen. If the TSF uses a method
to combine KEKs to produce the DEK, the third item is selected and the method
used to produce the DEK from the KEKs is chosen in the fourth selection.
Additionally, if this third item is selected (TSF combining KEKs to produce the DEK),
then FCS_CKM_EXT.1(2) (to specify how the KEKs used are generated) and
FCS_CKM_EXT.7 (to specify how the REK that anchors the KEKs is generated and
protected) in Annex B.8 must be included. Finally, if the third item in the fourth
selection statement is chosen (key wrap), then FCS_COP.1(1) will be included in
the ST and the appropriate key wrap method will be chosen in the fifth selection.
Assurance Activity
TSS
For DEKs generated using an RBG, the evaluator shall examine the TSS of the
TOE to verify that it describes, for either the TOE or the Operational
Environment, how the functionality described by FCS_RBG_EXT.1 is invoked.
The evaluator shall review the TSS and other evidence to determine that the
key size being requested from the RBG is identical to the key size used for the
encryption/decryption of the data or key.
For each DEK that is formed from a combination by the TSF (that is, “perform”
is selected in the first selection, and “combined from KEKs…” is selected in the
second selection), the evaluator shall verify that the TSS describes the method
of combination and contains a justification for preserving the effective entropy.
Guidance
There are no AGD assurance activities for this requirement beyond what is
necessary to satisfy the requirements in [CEM].
Test
There are no ATE assurance activities for this requirement beyond what is
necessary to satisfy the requirements in [CEM].
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
96
B.2 Internal Audit Requirements
FAU_ADP_EXT.1 allows the ST author to specify whether the TSF implements audit functionality itself or
invokes the Operational Environment to perform audit-related services. Depending on whether an audit
operation is performed by the TOE or by the OE, the ST author will include requirements in this Annex as
instructed by the Application Notes for FAU_ADP_EXT.1 and requirements in this section.
subject name,
individual components of subject alternative name,
subject ID,
issuer ID,
algorithm ID,
public key,
key usage,
extended key usage,
serial number,
[assignment: list of other certificate fields]],
returning all matching certificates and [assignment: object identifier(s) of
matching certificate(s)].
Application Note: The ability to search on certificate fields is useful for conducting forensic analysis.
If the certificate repository is stored within the TOE boundary, then the first item
of the first selection is chosen. If the repository is stored in the OE, but the auditor
uses TSF interfaces to perform this function on the repository, then the second
item of the first selection is chosen. It is allowed that this function be provided
entirely by the OE (when the repository is stored in the OE); if this is the case, then
this requirement is not included in the ST, but instead the
OE.CERTIFICATE_REPOSITORY_SEARCH objective is included (this objective is
omitted in the other two cases, when this SFR is included in the ST).
In the second selection and assignment, the ST author includes/fills in the values
that can be searched on for this function; at least one value is required to be
selected.
Assurance Activity
The following activities apply regardless of the selection made in the first
selection in the SFR. The test activities can be conducted in conjunction with
those for FDP_CER_EXT.1 and FAU_GCR_EXT.1.
The evaluator shall examine the operational guidance to ensure it contains
instructions for searching the specified information.
97
The evaluator shall generate a sufficient number and variety of certificates to
populate the repository certificates having at least two values for each of the
search fields selected in this SFR. The evaluator shall then, following the
instructions within the operational guidance, search the repository or audit
record for certificates containing specific values for each search field included
in the ST, and confirm that all certificates matching the search criteria are
returned; all returned certificates match the criteria; and the object identifier
is returned. The object identifier will be used in testing for FAU_SAR.3.
FAU_SAR.1.2 Refinement: The TSF shall provide the audit records in a manner suitable for the
Auditor to interpret the information.
Application Note: This SFR is included in the ST by the ST author if the operations provided by the
TSF (as specified in FAU_ADP_EXT.1) include the review of audit records. If this
SFR is not selected, the ST author includes OE.AUDIT_REVIEW.
Assurance Activity
This activity should be accomplished in conjunction with the testing of
FAU_GEN.1. Review of each of each of the generated audit records
demonstrates that these records are reviewable.
Application Note: This SFR is included in the ST by the ST author if the operations provided by the
TSF (as specified in FAU_ADP_EXT.1) include the review of audit records. If this
SFR is not selected, the ST author includes OE.AUDIT_REVIEW. FAU_SCR_EXT.1
defines the ability of the TOE to search a certificate repository to find certificates
based on certain values of individual fields, and return an object identifier of the
certificate. The intent of this SFR--along with FAU_SCR_EXT.1--is that the auditor
has the ability to obtain a certificate’s unique identifier by searching for other
known fields and then using that unique identifier as an input to searching audit
data for all activities involving that certificate. Therefore, the assignment for this
SFR and the corresponding assignment in FAU_SCR_EXT.1 are to be made
identical by the ST author.
Assurance Activity
This activity should be accomplished in conjunction with the testing of
FAU_GEN.1.
98
FAU_SEL.1 Selective Audit
FAU_SEL.1.1 Refinement: The TSF shall be able to select the set of events to be audited by
specific mechanisms from the set of all auditable events based on the following
attributes:
a) [selection: object identity, user identity, subject identity, host identity, event
type]
b) [assignment: list of additional attributes that audit selectivity is based upon].
Application Note: This SFR is included in the ST by the ST author if the operations provided by the
TSF (as specified in FAU_ADP_EXT.1) include the pre-selection of audit records.
Assurance Activity
TSS
There are no TSS assurance activities for this requirement beyond what is
necessary to satisfy the requirements in [CEM].
Guidance
The evaluator shall examine the operational guidance to ensure that it itemizes
all event types, as well as describes all attributes that are to be selectable in
accordance with the requirement, to include those attributes listed in the
assignment. The operational guidance shall also contain instructions on how to
set the pre-selection as well as explain the syntax (if present) for multi-value
pre-selection. The administrative guidance shall also identify those audit
records that are always recorded, regardless of the selection criteria currently
being enforced.
Test
The evaluator shall perform the following tests:
Test 1: For each attribute listed in the requirement, the evaluator shall
devise a test to show that selecting the attribute causes only audit
events with that attribute (or those that are always recorded, as
identified in the administrative guidance) to be recorded.
Test 2: [conditional] If the TSF supports specification of more complex
audit pre-selection criteria (e.g., multiple attributes, logical
expressions using attributes) then the evaluator shall devise tests
showing that this capability is correctly implemented. The evaluator
shall also, in the test plan, provide a short narrative justifying the set
of tests as representative and sufficient to exercise the capability.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE's ST. Justification must be provided for those platforms that were excluded
from testing.
99
FAU_STG.1(1) Protected Audit Trail Storage
FAU_STG.1.1(1) The TSF shall protect the stored audit records in the audit trail from unauthorized
deletion.
FAU_STG.1.2(1) The TSF shall be able to [prevent] unauthorized modifications to the stored audit
records in the audit trail.
Application Note: This requirement applies when the audit data are stored by the TOE itself. If the
TSF does not store all (or any) of the audit data, OE.AUDIT_STORAGE is included
in the ST.
Assurance Activity
TSS
The evaluator shall examine the TSS to ensure that it lists each type of audit log
generated by the TOE. For each audit log, the TSS shall describe how it is stored,
where it is located, and how it is protected. The evaluator shall verify that the
TSS’ description of the protection includes prevention of unauthorized
deletion. The TSS description shall also include prevention of modification. If
roles other than the Auditor are not provided with an interface for accessing
the stored audit records, the TSS shall provide a justification for why the role
cannot delete or modify the audit records
Guidance
There are no AGD assurance activities for this requirement beyond what is
necessary to satisfy the requirements in [CEM].
Test
Test 1: The evaluator shall assume each role (other than the auditor
role) and attempt to delete the stored audit records, then verify that
the attempted deletion failed.
Test 2: The evaluator shall assume each role (including the auditor role)
and attempt to modify the stored audit records and verify that the
attempted modification was prevented.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE's ST. Justification must be provided for those platforms that were excluded
from testing.
100
FAU_STG.1.2(2) Refinement: The TSF shall be able to [prevent] modifications to the stored audit
records with extended retention requirements in the audit trail.
Application Note: This requirement applies to audit data stored within the TOE boundary that is
expected to persist intact beyond the validity of certificates issued by the CA, even
in the event of unexpected TSF failure. Refer to Table 4 through Table 6 for the
auditable events marked as requiring extended retention that are relevant to this
SFR.
Audit events that are not covered by this SFR (that is, those requiring extended
retention and stored in the OE) will be protected via integrity and redundancy
mechanisms typically provided in archive servers. To reflect this, if any audit
events marked “extended” in tables 4, 5, and 6 are stored in the OE, then
OE.AUDIT_RETENTION is included in the ST.
If any audit storage provided by the TOE is used for audit events marked
“extended” in tables 4, 5, and 6 that are included in the ST, then this SFR will be
included in the ST by the ST author.
Assurance Activity
TSS
The evaluator shall examine the TSS to ensure that it lists each type of audit log
generated by the TOE. For each audit log, the TSS shall describe how it is stored,
where it is located, and how it is protected. The evaluator shall verify that the
TSS’ description of the protection includes prevention of deletion prior to the
retention period. The TSS description shall also include prevention of
modification of events after they are written to the audit trail. If the TSF
requires the actions of an Auditor to meet these requirements, the TSS shall
describe the restrictions on Auditor activity. If roles other than the Auditor are
provided with an interface for accessing the stored audit records, the TSS shall
provide a justification for why the role cannot delete or modify the audit
records.
Guidance
There are no AGD assurance activities for this requirement beyond what is
necessary to satisfy the requirements in [CEM].
Test
The testing may be accomplished with the testing performed by FAU_STG.1(1).
The evaluator shall perform the following tests for each role other than the
Auditor role:
Test 1: For each audit event marked identified with extended retention
requirements in the ST, the evaluator shall assume a role and attempt
to delete the stored audit records, then verify that the attempted
deletion failed.
101
Test 2: For each audit event marked identified with extended retention
requirements in the ST, the evaluator shall assume a role and attempt
to modify the stored audit records and verify that the attempted
modification was prevented.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE's ST. Justification must be provided for those platforms that were excluded
from testing.
Application Note: There are 3 cases for the storage of audit data: Locally on the TOE (within the TOE
boundary without going over a network connection); locally on the TOE platform
(outside the TOE boundary, but without going over a network connection); and
external to the TOE platform (meaning over a network connection to a physically
distinct IT entity). The TOE may rely on a non-TOE audit server for storage of these
audit records and the ability to allow the administrator to review these audit
records is provided by the operational environment. In the selection, the ST author
chooses the method used by the TOE to store audit data.
This requirement is included in the ST if the TSF initiates the storage of the audit
data. The last item in the selection (external audit server) should only be selected
(and this SFR included in the ST) if the TOE is responsible for connecting to the
external audit server to store the data.
If the last item in the selection is chosen, the ST author must include FTP_ITC.1
with “audit server” selection, and ensures that the supporting protocol
requirement matches the selection is included in the ST.
The TOE platform and external IT entity are considered part of the Operational
Environment.
Assurance Activity
TSS
The evaluator shall examine the TSS to ensure it describes the audit storage
mechanism from the perspective of the TOE. The TSS must also describe the
means by which the audit data are stored locally, or transferred to the external
IT entity (and how the trusted channel is provided).
Guidance
102
The evaluator shall examine the operational guidance to ensure it describes
the configuration of any local audit storage mechanism (first two items in the
selection in the SFR), including its location and size.
The evaluator shall examine the operational guidance to determine that it
describes the relationship between the local audit data (stored inside the TOE
boundary and, if applicable, on the TOE platform) and the audit data that are
sent to the external IT entity (if applicable). For example, when an audit event
is generated, whether it is simultaneously sent to the external IT entity and the
local store, or is the local store used as a buffer and “cleared” periodically by
sending the data to the external IT entity.
If an external audit server is used, the evaluator shall also examine the
operational guidance to ensure it describes how to establish the trusted
channel to the audit server, as well as describe any requirements on the audit
server (particular audit server protocol, version of the protocol required, etc.),
as well as configuration of the TOE needed to communicate with the audit
server.
Test
Testing of the trusted channel mechanism (if the last item is selected in the
SFR) will be performed as specified in the associated assurance activities for
the particular trusted channel mechanism.
The evaluator shall perform the following tests if the last selection in the SFR is
made:
103
FAU_STG_EXT.2 Audit Data Retention
FAU_STG_EXT.2.1 The TSF shall apply the following rules for retention of audit data:
Application Note: This SFR is to be included if “locally on the TOE” is selected in FAU_STG_EXT.1, and
OE.AUDIT_RETENTION is not included in the ST. The TSF may apply different
policies for different types of audit data (e.g. one type of record may be stored
indefinitely while another type is automatically purged after a set period of time).
If this SFR is not included in the ST, then OE.AUDIT_RETENTION is included in the
ST.
Assurance Activity
TSS
The evaluator shall review the TSS to ensure the rules specified are adequate
for the retention of audit records as indicated in Tables 4 through 6.
The evaluator shall assume the role of an auditor and establish an extension
period for the retention of certificate-related audit records. The evaluator shall
cause the TSF to issue a certificate of short validity period. Prior to the
retention period (not-after-date+extension), and prior to transferring the audit
record to an external archive, the evaluator shall attempt to delete he audit
record of an event marked ‘extended’, and observe that the audit record was
not deleted. Also during this time, the evaluator shall attempt to modify the
audit record of an event marked ‘extended’, and observe that the audit record
was not modified.
104
[selection:
RSA schemes using cryptographic key sizes of 2048-bit or greater that meet
the following: FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Appendix
B.3;
ECC schemes using “NIST curves” [selection: P-256, P-384, P-521] that meet
the following: FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Appendix
B.4;
FFC schemes using cryptographic key sizes of 2048-bit or greater that meet
the following: FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Appendix
B.1]
and specified cryptographic key sizes [assignment: equivalent to or greater than
a symmetric key strength of 112 bits] that meet the following: [assignment: list of
standards].
Application Note: The ST authors should specify whether the TOE generates these keys or whether
the Operational Environment is used.
For keys used for authentication, only RSA- or ECC-based selections are allowed.
The ST author will make clear in the ST which keys are used for what purpose.
Since the domain parameters to be used are specified by the requirements of the
protocol in this PP, it is not expected that the TOE will generate domain
parameters, and therefore there is no additional domain parameter validation
needed when the TOE complies with the protocols specified in this PP.
The generated key strength of 2048-bit DSA and RSA keys need to be equivalent
to, or greater than, a symmetric key strength of 112 bits. See NIST Special
Publication 800-57, “Recommendation for Key Management” for information
about equivalent key strengths.
Assurance Activity
TSS
The evaluator shall ensure that the TSS identifies the key sizes supported. If the
ST specifies more than one scheme, the evaluator shall examine the TSS to
verify that it identifies the usage for each scheme.
Guidance
105
The evaluator shall verify that the AGD guidance instructs the administrator
how to configure the TOE or OE to use the selected key generation scheme(s)
and key size(s) for all cryptographic protocols defined in the Security Target.
Test
If this requirement is met by the TOE, the evaluator shall verify the
implementation of the key generation routines of the supported schemes using
the following tests:
Key Generation for FIPS PUB 186-4 RSA Schemes
The evaluator shall verify the implementation of RSA Key Generation by the
TOE using the Key Generation test. This test verifies the ability of the TSF to
correctly produce values for the key components including the public
verification exponent e, the private prime factors p and q, the public modulus
n and the calculation of the private signature exponent d.
Key Pair generation specifies 5 ways (or methods) to generate the primes p
and q. These include:
a) Random Primes:
• Provable primes
• Probable primes
To test the key generation method for the Random Provable primes method
and for all the Primes with Conditions methods, the evaluator must seed the
TSF key generation routine with sufficient data to deterministically generate
the RSA key pair. This includes the random seed(s), the public exponent of
the RSA key, and the desired key length. For each key length supported, the
evaluator shall have the TSF generate 25 key pairs. The evaluator shall verify
the correctness of the TSF’s implementation by comparing values generated
by the TSF with those generated from a known good implementation.
For each supported NIST curve, i.e., P-256, P-384 and P-521, the evaluator
shall require the implementation under test (IUT) to generate 10 private/public
key pairs. The private key shall be generated using an approved random bit
generator (RBG). To determine correctness, the evaluator shall submit the
generated key pairs to the public key verification (PKV) function of a known
106
good implementation.
For each supported NIST curve, i.e., P-256, P-384 and P-521, the evaluator
shall generate 10 private/public key pairs using the key generation function of
a known good implementation and modify five of the public key values so that
they are incorrect, leaving five values unchanged (i.e., correct). The evaluator
shall obtain in response a set of 10 PASS/FAIL values.
The security strength of the RBG must be at least that of the security offered
by the FFC parameter set.
To test the cryptographic and field prime generation method for the provable
primes method and/or the group generator g for a verifiable process, the
evaluator must seed the TSF parameter generation routine with sufficient data
to deterministically generate the parameter set.
For each key length supported, the evaluator shall have the TSF generate 25
parameter sets and key pairs. The evaluator shall verify the correctness of the
TSF’s implementation by comparing values generated by the TSF with those
generated from a known good implementation. Verification must also confirm
107
• g != 0,1
• q divides p-1
• g^q mod p = 1
• g^x mod p = y
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
[selection:
RSA-based key establishment schemes that meet the following: NIST
Special Publication 800-56B Revision 1, “Recommendation for Pair-Wise
Key Establishment Schemes Using Integer Factorization Cryptography”;
Elliptic curve-based key establishment schemes that meet the following:
NIST Special Publication 800-56A Revision 2, “Recommendation for Pair-
Wise Key Establishment Schemes Using Discrete Logarithm Cryptography”;
Finite field-based key establishment schemes that meet the following: NIST
Special Publication 800-56A Revision 2, “Recommendation for Pair-Wise
Key Establishment Schemes Using Discrete Logarithm Cryptography”;
Key establishment scheme using Diffie-Hellman group 14 that meetsthe
following: RFC 3526, Section 3;]
that meet the following: [assignment: list of standards].
Application Note: This is a refinement of the SFR FCS_CKM.2 to deal with key establishment rather
than key distribution. The ST authors should specify whether the TOE performs
the key establishment function or whether the Operational Environment is used.
The ST author selects all key establishment schemes used for the selected
cryptographic protocols. For Diffie-Hellman group 14, ST authors should make the
corresponding selection from the SFR instead of using the Finite field-based key
establishment selection.
108
The elliptic curves used for the key establishment scheme correlate with the
curves specified in FCS_CKM.1.1.
The domain parameters used for the finite field-based key establishment scheme
are specified by the key generation according to FCS_CKM.1.1.
Assurance Activity
TSS
The evaluator shall ensure that the supported key establishment schemes
correspond to the key generation schemes identified in FCS_CKM.1.1. If the ST
specifies more than one scheme, the evaluator shall examine the TSS to verify
that it identifies the usage for each scheme (including whether the TOE acts as
a sender, a recipient, or both). If Diffie-Hellman group 14 is selected from
FCS_CKM.2.1, the TSS shall describe how the implementation meets RFC 3526
Section 3.
Guidance
Test
If this requirement is met by the TOE, the evaluator shall verify the
implementation of the key generation routines of the supported schemes using
the following tests:
Function Test
The Function test verifies the ability of the TOE to implement the key
agreement schemes correctly. To conduct this test the evaluator shall generate
or obtain test vectors from a known good implementation of the TOE
supported schemes. For each supported key agreement scheme-key
109
agreement role combination, KDF type, and, if supported, key confirmation
role- key confirmation type combination, the tester shall generate 10 sets of
test vectors. The data set consists of one set of domain parameter values (FFC)
or the NIST approved curve (ECC) per 10 sets of public keys. These keys are
static, ephemeral or both depending on the scheme being tested.
The evaluator shall obtain the DKM, the corresponding TOE’s public keys (static
and/or ephemeral), the MAC tag(s), and any inputs used in the KDF, such as the
Other Information field OI and TOE id fields.
If the TOE does not use a KDF defined in SP 800-56A, the evaluator shall obtain
only the public keys and the hashed value of the shared secret.
If key confirmation is supported, the TSF shall perform the above for each
implemented approved MAC algorithm.
Validity Test
The Validity test verifies the ability of the TOE to recognize another party’s valid
and invalid key agreement results with or without key confirmation. To conduct
this test, the evaluator shall obtain a list of the supporting cryptographic
functions included in the SP800-56A key agreement implementation to
determine which errors the TOE should be able to recognize. The evaluator
generates a set of 24 (FFC) or 30 (ECC) test vectors consisting of data sets
including domain parameter values or NIST approved curves, the evaluator’s
public keys, the TOE’s public/private key pairs, MACTag, and any inputs used in
the KDF, such as the other info and TOE id fields.
The evaluator shall inject an error in some of the test vectors to test that the
TOE recognizes invalid key agreement results caused by the following fields
being incorrect: the shared secret value Z, the DKM, the other information field
OI, the data to be MACed, or the generated MACTag. If the TOE contains the
full or partial (only ECC) public key validation, the evaluator will also individually
inject errors in both parties’ static public keys, both parties’ ephemeral public
keys and the TOE’s static private key to assure the TOE detects errors in the
public key validation function and/or the partial key validation function (in ECC
only). At least two of the test vectors shall remain unmodified and therefore
should result in valid key agreement results (they should pass).
The TOE shall use these modified test vectors to emulate the key agreement
scheme using the corresponding parameters. The evaluator shall compare the
110
TOE’s results with the results using a known good implementation verifying
that the TOE detects these errors.
If the TOE acts as a sender, the following assurance activity shall be performed
to ensure the proper operation of every TOE supported combination of RSA-
based key establishment scheme:
a) To conduct this test the evaluator shall generate or obtain test vectors
from a known good implementation of the TOE supported schemes.
For each combination of supported key establishment scheme and its
options (with or without key confirmation if supported, for each
supported key confirmation MAC function if key confirmation is
supported, and for each supported mask generation function if
KTSOAEP is supported), the tester shall generate 10 sets of test vectors.
Each test vector shall include the RSA public key, the plaintext keying
material, any additional input parameters if applicable, the MacKey
and MacTag if key confirmation is incorporated, and the outputted
ciphertext. For each test vector, the evaluator shall perform a key
establishment encryption operation on the TOE with the same inputs
(in cases where key confirmation is incorporated, the test shall use the
MacKey from the test vector instead of the randomly generated
MacKey used in normal operation) and ensure that the outputted
ciphertext is equivalent to the ciphertext in the test vector.
a) To conduct this test the evaluator shall generate or obtain test vectors
from a known good implementation of the TOE supported schemes. For
each combination of supported key establishment scheme and its options
(with our without key confirmation if supported, for each supported key
confirmation MAC function if key confirmation is supported, and for each
supported mask generation function if KTSOAEP is supported), the tester
shall generate 10 sets of test vectors. Each test vector shall include the RSA
private key, the plaintext keying material (KeyData), any additional input
parameters if applicable, the MacTag in cases where key confirmation is
incorporated, and the outputted ciphertext. For each test vector, the
evaluator shall perform the key establishment decryption operation on the
TOE and ensure that the outputted plaintext keying material (KeyData) is
equivalent to the plaintext keying material in the test vector. In cases
where key confirmation is incorporated, the evaluator shall perform the
key confirmation steps and ensure that the outputted MacTag is equivalent
to the MacTag in the test vector.
111
b) The evaluator shall ensure that the TSS describes how the TOE handles
decryption errors. In accordance with NIST Special Publication 800- 56B,
the TOE must not reveal the particular error that occurred, either through
the contents of any outputted or logged error message or through timing
variations. If KTS-OAEP is supported, the evaluator shall create separate
contrived ciphertext values that trigger each of the three decryption error
checks described in NIST Special Publication 800-56B section 7.2.2.3,
ensure that each decryption attempt results in an error, and ensure that
any outputted or logged error message is identical for each. If KTS-KEM-
KWS is supported, the evaluator shall create separate contrived ciphertext
values that trigger each of the three decryption error checks described in
NIST Special Publication 800- 56B section 7.2.3.3, ensure that each
decryption attempt results in an error, and ensure that any outputted or
logged error message is identical for each.
Diffie-Hellman Group 14
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
FCS_CKM_EXT.1(3) Key Generation for Key Encryption Keys (TOE Key Archival)
FCS_CKM_EXT.1.1(3) The TSF shall be able to [selection: generate, invoke interfaces provided by the
Operational Environment to generate] [selection: asymmetric KEKs of
[assignment: security strength greater than or equal to 112 bits] security strength,
symmetric KEKs of size [selection: 128-bit, 256-bit]] using
[selection:
an Operational Environment-provided mechanism that combines Key Shares
and produces a KEK,
a TSF-provided mechanism that combines Key Shares in a way that preserves
the effective entropy of each factor by [selection:
o polynomial interpolation based on Shimir’s secret sharing scheme
o geometric construction based on Blakely’s secret sharing mechanism,
o encrypting a shared secret with multiple public keys using a threshold
cryptographic scheme
o computing Chinese Remainders, via a Asmuth-Bloom threshold secret
sharing scheme,
o [assignment: a secure, threshold-based secret sharing scheme]]
112
for the archival and recovery of TOE keys from two or more shares according to
a key sharing mechanism.
Application Note: This SFR is included when the third selection in FPT_SKY_EXT.1 indicates that a
“key sharing mechanisms in accordance with…” is used. This requirement
specifies how the KEK that will be used to protect the keys listed in FPT_SKY_EXT.1
is generated from two or more shares. The generation of the shares themselves
is specified in FCS_CKM_EXT.1(4), which the ST author includes whenever this SFR
is included in the ST. The key that is generated by this requirement is used by the
mechanisms specified in FCS_CKM_EXT.6 to protect the keys specified in
FPT_SKY_EXT.1.
In the first selection, the ST author chooses whether the TOE performs the
operation, or whether it invokes interfaces in the Operational Environment for the
functionality.
If a symmetric KEK is generated, the number of bits of the KEK is specified in the
third selection.
For the fourth selection, identify the key sharing mechanism used and reference
analysis that documents the basis for the security and entropy preservations.
Assurance Activity
The evaluator shall ensure the TSS describes the mechanism used to generate
a KEK from the key shares and identifies the cryptographic provider used.
If this requirement is met by the TOE, then the evaluator shall ensure the TSS
identifies analysis to prove that the entropy of the KEK
Assurance Activity
TSS
The evaluator shall review the TSS to confirm that the key share mechanism is
described. If the TSF generates the key shares (the first item in the selection is
chosen), the evaluator shall review the TSS to confirm that the generated
113
shares are greater than or equal to the security strength of the KEK defined in
FCS_CKM_EXT.1(3).
[selection:
by clearing the KEK encrypting the target key,
for volatile memory, the destruction shall be executed by a [selection:
o single direct overwrite consisting of [selection:
a pseudo-random pattern using the TSF’s RBG,
zeroes,
ones,
a new value of a key,
[assignment: some value that does not contain any CSP]],
o removal of power to the memory,
o destruction of reference to the key directly followed by a request for
garbage collection],
for non-volatile memory that consists of the invocation of an interface
provided by the underlying platform that [selection:
o logically addresses the storage location of the key and performs a
[selection: single, [assignment: ST author-defined multi-pass]] direct
overwrite consisting of [selection:
a pseudo-random pattern using the TSF’s RBG,
zeroes,
ones,
a new value of a key,
[assignment: some value that does not contain any CSP]],
o instructs the underlying platform to destroy the abstraction that
represents the key]].
FCS_CKM_EXT.4.2 The TSF shall [selection: destroy, invoke interfaces provided by the Operational
Environment to destroy] all plaintext keying material cryptographic security
parameters when no longer needed.
Application Note: The interface referenced in the requirement could take different forms, the most
likely of which is an application programming interface to an OS kernel. There may
be various levels of abstraction visible. For instance, in a given implementation
the application may have access to the file system details and may be able to
logically address specific memory locations. In another implementation, the
application may simply have a handle to a resource and can only ask the platform
to delete the resource. The level of detail to which the TOE has access will be
reflected in the TSS section of the ST.
114
Several selections allow assignment of a ‘value that does not contain any CSP’.
This means that the TOE uses some other specified data not drawn from an RBG
meeting FCS_RBG_EXT requirements, and not being any of the particular values
listed as other selection options. The point of the phrase ‘does not contain any
CSP’ is to ensure that the overwritten data is carefully selected, and not taken
from a general ‘pool’ that might contain current or residual data that itself
requires confidentiality protection.
Key destruction does not apply to the public component of asymmetric key pairs.
Assurance Activity
TSS
The evaluator shall examine the TSS to ensure it describes each of the secret
keys (keys used for symmetric encryption), private keys, and critical security
parameters; when they are destroyed (for example, immediately after use, on
system shutdown, etc.); and the type of destruction procedure that is
performed (overwrite with zeros, overwrite three times with random pattern,
etc.). If different types of memory are used to store the materials to be
protected, the evaluator shall examine the TSS to ensure it describes the
destruction procedure in terms of the memory in which the data are stored.
Guidance
The evaluator shall examine the AGD guidance to ensure it contains
instructions for configuring the TOE to support the required key destruction
functionality.
Test
If this requirement is met by volatile memory in the TOE boundary (the second
item in the second selection of FCS_CKM_EXT.4.1), the evaluator shall attempt
to perform the following tests:
Test 1: The evaluator shall utilize appropriate combinations of
specialized operational environment and development tools
(debuggers, simulators, etc.) for the TOE and instrumented TOE builds
to test that keys are cleared correctly, including all intermediate copies
of the key that may have been created internally by the TOE during
normal cryptographic processing with that key.
Cryptographic TOE implementations in software shall be loaded and
exercised under a debugger to perform such tests. The evaluator shall
perform the following test for each key subject to clearing, including
intermediate plaintext copies of keys that are subsequently encrypted
for storage by the TOE:
1. Load the instrumented TOE build in a debugger.
2. Record the value of the key in the TOE subject to clearing.
115
3. Cause the TOE to perform a normal cryptographic processing with
the key from #1.
4. Cause the TOE to clear the key.
5. Cause the TOE to stop the execution but not exit.
6. Cause the TOE to dump the entire memory footprint of the TOE
into a binary file.
7. Search the content of the binary file created in #4 for instances of
the known key value from #1.
The test succeeds if no copies of the key from #1 are found in step #7 above
and fails otherwise.
The evaluator shall perform this test on all keys, including those subsequently
encrypted for storage, to ensure plaintext intermediate copies are cleared.
Test 2: (Conditional) In cases where the TOE is implemented in
firmware and operates in a limited operating environment that does
not allow the use of debuggers, the evaluator shall utilize a simulator
for the TOE on a general purpose operating system. The evaluator shall
confirm that keys can be tracked and that destruction occurs. The
evaluator shall provide a rationale explaining the instrumentation of
the simulated test environment and justifying the obtained test
results.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
FCS_CKM_EXT.5.2 The [selection: digital signature, keyed hash] used to protect a public key shall be
verified upon each access to the key.
Application Note: This SFR is included when the second selection in FDP_STG_EXT.1.1 is chosen, and
applies to the public keys listed in that SFR. If integrity protection is provided
entirely by the OE with no interaction from the TOE (and that is the only method
of protecting the public keys), then FDP_STG_EXT.1 should not be claimed in the
ST, and instead OE.PUBLIC_KEY_PROTECTION should be included in the ST.
116
The first item in the first selection is chosen when the TSF performs the
cryptographic operation in the second selection itself. If the OE performs the
cryptographic operation (calculation of the digital signature or keyed hash), the
ST author chooses the second item in the first selection. In either case, the TSF is
the entity responsible for checking the public key on each access and taking
actions on integrity failures.
The ST author selects “integrity failure on Trust Anchor database” for FPT_FLS.1 if
this SFR is included in the ST.
Assurance Activity
TSS
The evaluator shall examine the TSS to ensure it describes each applicable public
key, where it is stored and protected, the purpose of the public key, the
mechanism used to protect the public key from undetected modification, and
the method (for each public key) by which the integrity of the key is checked in
accordance with FCS_CKM_EXT.5.2.
Guidance
There are no AGD assurance activities for this requirement beyond what is
necessary to satisfy the requirements in [CEM].
Test
NOTE: It might not be possible to directly access certain public keys via the TOE
interface in a way that is needed to perform the test below. If that is the case,
then the evaluator must describe for each applicable key the interface and
indicate why the interface does not allow access to the public keys.
For each public key identified in the TSS, the evaluator shall perform the
following test:
Test 1: The evaluator shall attempt to violate the protection of a public
key to verify that the action specified in FCS_CKM_EXT.5.2 occurs.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
117
FCS_CKM_EXT.6.2 The TSF shall [selection: be able to, invoke interfaces in the Operational
Environment to be able to] export the protected keys (in FCS_CKM_EXT.6.1) for
the purpose of archival in encrypted form.
FCS_CKM_EXT.6.3 The TSF shall [selection: be able to, invoke interfaces in the Operational
Environment to be able to] import protected keys (in FCS_CKM_EXT.6.1) for the
purpose of continued operations after failure.
FCS_CKM_EXT.6.4 The TSF shall [selection: encrypt, invoke interfaces in the Operational Environment
to encrypt] the keys specified in FCS_CKM_EXT.6.1 in accordance with [selection:
FCS_COP.1(1), FCS_CKM.1] using the KEK generated in accordance with
FCS_CKM_EXT.1(3).
FCS_CKM_EXT.6.5 The TSF shall [selection: decrypt, invoke interfaces in the Operational Environment
to decrypt] the keys specified in FCS_CKM_EXT.6.1 in accordance with [selection:
FCS_COP.1(1), FCS_CKM.1] using the KEK generated in accordance with
FCS_CKM_EXT.1(3).
Application Note: This requirement is required when ‘key sharing mechanisms…’ is selected in
FPT_SKY_EXT.1., and ensures that the archival of any keys required for continuity
of operations (e.g., signature keys used to sign CRLs) from the TOE involves
encryption of those keys using KEKs that were derived using key sharing
mechanisms as specified in FCS_CKM_EXT.1(3).
Assurance Activity
TSS
The evaluator shall examine the TSS to verify that it lists the keys that are
archived, the encryption method (key size and mode) used, and that the
method of archival is described.
Guidance
The evaluator shall verify that the operational guidance provides instructions
on how to perform this function (protection and export of the keys to be
archived) in a manner that is consistent with its description in the ST. If aspects
of the archive function are configurable, the evaluator shall confirm that the
operational guidance describes the various configuration options.
118
AES Key Wrap (KW) (as defined in NIST SP 800-38F) mode
AES Key Wrap with Padding (KWP) (as defined in NIST SP 800-38F) mode]
and cryptographic key size [selection: 128-bit, 256-bit] that meet the following:
[assignment: list of standards].
Application Note: For the third selection of FCS_COP.1.1(1), the ST author should choose the mode
or modes in which AES operates. For the fourth selection, the ST author should
choose the key sizes besides 128-bit that are supported by this functionality.
Assurance Activity
TSS
Regardless of whether the requirement is met by the TSF or the TSF in
conjunction with the TOE platform, the evaluator shall examine the TSS to
ensure that all key encryption and decryption functions use the approved
algorithms, modes, and key sizes.
Guidance
The evaluator shall examine the AGD guidance to ensure it contains
instructions for configuring the TOE or the TOE in conjunction with the
Operational Environment for the required encryption algorithms and
associated modes and key sizes.
Test
The following tests shall be performed for functionality implemented by the
TSF.
AES-CBC Tests
AES-CBC Known Answer Tests
There are four Known Answer Tests (KATs), described below. In all KATs, the
plaintext, ciphertext, and IV values shall be 128-bit blocks. The results from
each test may either be obtained by the evaluator directly or by supplying the
inputs to the implementer and receiving the results in response. To determine
correctness, the evaluator shall compare the resulting values to those obtained
by submitting the same inputs to a known good implementation.
KAT-1. To test the encrypt functionality of AES-CBC, the evaluator shall
supply a set of 5 plaintext values for each key size selected and obtain
119
the ciphertext value that results from AES-CBC encryption of the given
plaintext using a key value of all zeros and an IV of all zeros. Five
plaintext values shall be encrypted with an all-zeros key of length equal
to the selected key size, for each key size selected..
To test the decrypt functionality of AES-CBC, the evaluator shall
perform the same test as for encrypt, using the ciphertext values as
input and AES-CBC decryption.
KAT-2. To test the encrypt functionality of AES-CBC, the evaluator shall
supply a set of 5 key values for each key size selected and obtain the
ciphertext value that results from AES-CBC encryption of an all-zeros
plaintext using the given key value and an IV of all zeros. Five of the
keys shall be of length equal to the selected key size, for each key size
selected.
To test the decrypt functionality of AES-CBC, the evaluator shall
perform the same test as for encrypt, using an all-zero ciphertext value
as input and AES-CBC decryption.
KAT-3. To test the encrypt functionality of AES-CBC, the evaluator shall
supply a set of key values described below for each key size selected
and obtain the ciphertext value that results from AES encryption of an
all-zeros plaintext using the given key value and an IV of all zeros. The
keys in each set shall have the same length as the selected key size, for
each key size, N. Key I in each set shall have the leftmost I bits be ones
and the rightmost N-I bits be zeros, for I in [1,N].
To test the decrypt functionality of AES-CBC, the evaluator shall supply
the two sets of key and ciphertext value pairs described below and
obtain the plaintext value that results from AES-CBC decryption of the
given ciphertext using the given key and an IV of all zeros. Each set of
key/ciphertext pairs shall have N N-bit key/ciphertext pairs, and the
second set of key/ciphertext pairs for selected key size, N. Key I in each
set shall have the leftmost I bits be ones and the rightmost N-I bits be
zeros, for I in [1,N]. The ciphertext value in each pair shall be the value
that results in an all-zeros plaintext when decrypted with its
corresponding key.
KAT-4. To test the encrypt functionality of AES-CBC, the evaluator shall
supply the set of 128 plaintext values described below and obtain
ciphertext values that result from AES-CBC encryption of the given
plaintext using a key value of all zeros of length equal to the selected
key size with an IV of all zeros for each key size selected. Plaintext value
I in each set shall have the leftmost I bits be ones and the rightmost
128-I bits be zeros, for I in [1,128].
To test the decrypt functionality of AES-CBC, the evaluator shall
perform the same test as for encrypt, using ciphertext values of the
120
same form as the plaintext in the encrypt test as input and AES-CBC
decryption.
AES-CBC Multi-Block Message Test
The evaluator shall test the encrypt functionality by encrypting an i-block
message where 1 < I <=10. The evaluator shall choose a key, an IV and plaintext
message of length I blocks and encrypt the message, using the mode to be
tested, with the chosen key and IV. The ciphertext shall be compared to the
result of encrypting the same plaintext message with the same key and IV using
a known good implementation.
The evaluator shall also test the decrypt functionality for each mode by
decrypting an i-block message where 1 < I <=10. The evaluator shall choose a
key, an IV and a ciphertext message of length I blocks and decrypt the message,
using the mode to be tested, with the chosen key and IV. The plaintext shall be
compared to the result of decrypting the same ciphertext message with the
same key and IV using a known good implementation.
AES-CBC Monte Carlo Tests
The evaluator shall test the encrypt functionality using a set of 100 plaintext,
IV, and key 3-tuples for each selected key size. The plaintext and IV values shall
be 128-bit blocks. For each 3-tuple, 1000 iterations shall be run as follows:
# Input: PT, IV, Key
for I = 1 to 1000:
if I == 1:
CT[1] = AES-CBC-Encrypt(Key, IV, PT)
PT = IV
else:
CT[i] = AES-CBC-Encrypt(Key, PT)
PT = CT[i-1]
The ciphertext computed in the 1000th iteration (i.e., CT[1000]) is the result for
that trial. This result shall be compared to the result of running 1000 iterations
with the same values using a known good implementation.
The evaluator shall test the decrypt functionality using the same test as for
encrypt, exchanging CT and PT and replacing AES-CBC-Encrypt with AES-CBC-
Decrypt.
AES-CCM Tests
The evaluator shall test the generation-encryption and decryption-verification
functionality of AES-CCM for the following input parameter and tag lengths:
121
Each selected key length
Two payload lengths. One payload length shall be the shortest
supported payload length, greater than or equal to zero bytes. The
other payload length shall be the longest supported payload length,
less than or equal to 32 bytes (256 bits).
Two or three associated data lengths. One associated data length shall
be 0, if supported. One associated data length shall be the shortest
supported payload length, greater than or equal to zero bytes. One
associated data length shall be the longest supported payload length,
less than or equal to 32 bytes (256 bits). If the implementation
supports an associated data length of 216 bytes, an
Nonce lengths. All supported nonce lengths between 7 and 13 bytes,
inclusive, shall be tested.
Tag lengths. All supported tag lengths of 4, 6, 8, 10, 12, 14 and 16 bytes
shall be tested.
To test the generation-encryption functionality of AES-CCMP, the evaluator
shall perform the following four tests:
Test 1. For EACH supported key and associated data length and ANY
supported payload, nonce and tag length, the evaluator shall supply
one key value, one nonce value and 10 pairs of associated data and
payload values and obtain the resulting ciphertext.
Test 2. For EACH supported key and payload length and ANY supported
associated data, nonce and tag length, the evaluator shall supply one
key value, one nonce value and 10 pairs of associated data and payload
values and obtain the resulting ciphertext.
Test 3. For EACH supported key and nonce length and ANY supported
associated data, payload and tag length, the evaluator shall supply one
key value and 10 associated data, payload and nonce value 3-tuples
and obtain the resulting ciphertext.
Test 4. For EACH supported key and tag length and ANY supported
associated data, payload and nonce length, the evaluator shall supply
one key value, one nonce value and 10 pairs of associated data and
payload values and obtain the resulting ciphertext.
To determine correctness in each of the above tests, the evaluator shall
compare the ciphertext with the result of generation-encryption of the same
inputs with a known good implementation.
To test the decryption-verification functionality of AES-CCM, for EACH
combination of supported associated data length, payload length, nonce
length and tag length, the evaluator shall supply a key value and 15 nonce,
associated data and ciphertext 3-tuples and obtain either a FAIL result or a
122
PASS result with the decrypted payload. The evaluator shall supply 10 tuples
that should FAIL and 5 that should PASS per set of 15.
Additionally, the evaluator shall use tests from the IEEE 802.11-02/362r6
document “Proposed Test vectors for IEEE 802.11 TG”, dated September 10,
2002, Section 2.1 AES-CCMP Encapsulation Example and Section 2.2 Additional
AES CCMP Test Vectors to further verify the IEEE 802.11-2007 implementation
of AES-CCMP.
AES-Galois\Counter Mode (GCM) Monte Carlo Test
The evaluator shall test the authenticated encrypt functionality of AES-GCM for
each combination of the following input parameter lengths:
Each selected key length
Two plaintext lengths. One of the plaintext lengths shall be a non-zero
integer multiple of 128 bits, if supported. The other plaintext length
shall not be an integer multiple of 128 bits, if supported.
Three AAD lengths. One AAD length shall be 0, if supported. One AAD
length shall be a non-zero integer multiple of 128 bits, if supported.
One AAD length shall not be an integer multiple of 128 bits, if
supported.
Two IV lengths. If 96 bit IV is supported, 96 bits shall be one of the two
IV lengths tested.
The evaluator shall test the encrypt functionality using a set of 10 key,
plaintext, AAD, and IV tuples for each combination of parameter lengths above
and obtain the ciphertext value and tag that results from AES-GCM
authenticated encrypt. Each supported tag length shall be tested at least once
per set of 10. The IV value may be supplied by the evaluator or the
implementation being tested, as long as it is known.
The evaluator shall test the decrypt functionality using a set of 10 key,
ciphertext, tag, AAD, and IV 5-tuples for each combination of parameter
lengths above and obtain a Pass/Fail result on authentication and the
decrypted plaintext if Pass. The set shall include five tuples that Pass and five
that Fail.
The results from each test may either be obtained by the evaluator directly or
by supplying the inputs to the implementer and receiving the results in
response. To determine correctness, the evaluator shall compare the resulting
values to those obtained by submitting the same inputs to a known good
implementation.
XTS-AES Monte Carlo Test
The evaluator shall test the encrypt functionality of XTS-AES for each
combination of the following input parameter lengths:
123
Each selected key length
Three data unit (i.e., plaintext) lengths. One of the data unit lengths
shall be a non-zero integer multiple of 128 bits, if supported. One of
the data unit lengths shall be an integer multiple of 128 bits, if
supported. The third data unit length shall be either the longest
supported data unit length or 216 bits, whichever is smaller.
Using a set of 100 key, plaintext and 128-bit random tweak value 3-tuples and
obtain the ciphertext that results from XTS-AES encrypt.
The evaluator may supply a data unit sequence number instead of the tweak
value if the implementation supports it. The data unit sequence number is a
base-10 number ranging between 0 and 255 that implementations convert to
a tweak value internally.
The evaluator shall test the decrypt functionality of XTS-AES using the same
test as for encrypt, replacing plaintext values with ciphertext values and XTS-
AES encrypt with XTS-AES decrypt.
AES Key Wrap (AES-KW) and Key Wrap with Padding (AES-KWP) Test
The evaluator shall test the authenticated encryption functionality of AES-KW
for EACH combination of the following input parameter lengths:
Each selected key length
Three plaintext lengths. One of the plaintext lengths shall be two semi-
blocks (128 bits). One of the plaintext lengths shall be three semi-
blocks (192 bits). The third data unit length shall be the longest
supported plaintext length less than or equal to 64 semi-blocks (4096
bits).
Using a set of 100 key and plaintext pairs and obtain the ciphertext that results
from AES-KW authenticated encryption. To determine correctness, the
evaluator shall use the AES-KW authenticated-encryption function of a known
good implementation.
The evaluator shall test the authenticated-decryption functionality of AES-KW
using the same test as for authenticated-encryption, replacing plaintext values
with ciphertext values and AES-KW authenticated-encryption with AES-KW
authenticated-decryption.
The evaluator shall test the authenticated-encryption functionality of AES-KWP
using the same test as for AES-KW authenticated-encryption with the following
change in the three plaintext lengths:
One plaintext length shall be one octet. One plaintext length shall be
20 octets (160 bits).
One plaintext length shall be the longest supported plaintext length
less than or equal to 512 octets (4096 bits).
124
The evaluator shall test the authenticated-decryption functionality of AES-KWP
using the same test as for AES-KWP authenticated-encryption, replacing
plaintext values with ciphertext values and AES-KWP authenticated-encryption
with AES-KWP authenticated-decryption.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
125
Guidance
The evaluator shall examine the AGD guidance to ensure it contains
instructions for configuring the TOE or the TIE in conjunction with the
Operational Environment for the required signature algorithms and associated
modes and key sizes.
Test
The following tests shall be performed for functionality implemented by the
TSF.
Key Generation:
Key Generation for RSA Signature Schemes
The evaluator shall verify the implementation of RSA Key Generation
by the TOE using the Key Generation test. This test verifies the ability
of the TSF to correctly produce values for the key components
including the public verification exponent e, the private prime factors
p and q, the public modulus n and the calculation of the private
signature exponent d.
Key Pair generation specifies 5 ways (or methods) to generate the
primes p and q. These include:
Random Primes:
o Provable primes
o Probable primes
Primes with Conditions:
o Primes p1, p2, q1,q2, p and q shall all be provable
primes
o Primes p1, p2, q1, and q2 shall be provable primes and
p and q shall be probable primes
o Primes p1, p2, q1,q2, p and q shall all be probable
primes
To test the key generation method for the Random Provable primes
method and for all the Primes with Conditions methods, the evaluator
must seed the TSF key generation routine with sufficient data to
deterministically generate the RSA key pair. This includes the random
seed(s), the public exponent of the RSA key, and the desired key length.
For each key length supported, the evaluator shall have the TSF
generate 25 key pairs. The evaluator shall verify the correctness of the
TSF’s implementation by comparing values generated by the TSF with
those generated from a known good implementation.
ECDSA Key Generation Tests
126
FIPS 186-4 ECDSA Key Generation Test
For each supported NIST curve, i.e., P-256, P-384 and P-521, the
evaluator shall require the implementation under test (IUT) to
generate 10 private/public key pairs. The private key shall be
generated using an approved random bit generator (RBG). To
determine correctness, the evaluator shall submit the generated key
pairs to the public key verification (PKV) function of a known good
implementation.
FIPS 186-4 Public Key Verification (PKV) Test
For each supported NIST curve, i.e., P-256, P-384 and P-521, the
evaluator shall generate 10 private/public key pairs using the key
generation function of a known good implementation and modify five
of the public key values so that they are incorrect, leaving five values
unchanged (i.e., correct). The evaluator shall obtain in response a set
of 10 PASS/FAIL values.
ECDSA Algorithm Tests
ECDSA FIPS 186-4 Signature Generation Test
For each supported NIST curve (i.e., P-256, P-384 and P-521) and SHA
function pair, the evaluator shall generate 10 1024-bit long messages
and obtain for each message a public key and the resulting signature
values R and S. To determine correctness, the evaluator shall use the
signature verification function of a known good implementation.
ECDSA FIPS 186-4 Signature Verification Test
For each supported NIST curve (i.e., P-256, P-384 and P-521) and SHA
function pair, the evaluator shall generate a set of 10 1024-bit
message, public key and signature tuples and modify one of the values
(message, public key or signature) in five of the 10 tuples. The
evaluator shall obtain in response a set of 10 PASS/FAIL values.
RSA Signature Algorithm Tests
Signature Generation Test
The evaluator shall verify the implementation of RSA Signature
Generation by the TOE using the Signature Generation Test. To
conduct this test the evaluator must generate or obtain 10 messages
from a trusted reference implementation for each modulus size/SHA
combination supported by the TSF. The evaluator shall have the TOE
use their private key and modulus value to sign these messages.
The evaluator shall verify the correctness of the TSF’s signature using a
known good implementation and the associated public keys to verify
the signatures.
127
Signature Verification Test
The evaluator shall perform the Signature Verification test to verify the
ability of the TOE to recognize another party’s valid and invalid
signatures. The evaluator shall inject errors into the test vectors
produced during the Signature Verification Test by introducing errors
in some of the public keys e, messages, IR format, and/or signatures.
The TOE attempts to verify the signatures and returns success or
failure.
The evaluator shall use these test vectors to emulate the signature verification
test using the corresponding parameters and verify that the TOE detects these
errors.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
Application Note: In future versions of this document, SHA-1 may be removed as an option. SHA-1
for generating digital signatures was disallowed after December 2013, and SHA-
1 for verification of digital signatures is strongly discouraged as there may be risk
in accepting these signatures.
The selection of the hashing algorithm must correspond to the selection of the
message digest size; for example, if SHA-1 is chosen, then the only valid message
digest size selection would be 160 bits.
The TSF hashing functions can be implemented in one of two modes. The first
mode is the byte-oriented mode. In this mode the TSF only hashes messages that
are an integral number of bytes in length; i.e., the length (in bits) of the message
to be hashed is divisible by 8. The second mode is the bit-oriented mode. In this
mode the TSF hashes messages of arbitrary length. As there are different tests for
each mode, an indication is given in the following sections for the bit-oriented vs.
the byte-oriented test modes.
Assurance Activity
TSS
128
Regardless of whether the requirement is met by the TSF or TOE platform, the
evaluator shall examine the TSS to ensure that all hash functions use the
approved algorithms, modes and key sizes.
Guidance
The evaluator shall examine the AGD guidance to ensure it documents how to
configure the TOE or the TOE in conjunction with the Operational Environment
for the required hash sizes. The AGD guidance shall also include instructions
for disabling deprecated algorithms.
Test
If this requirement is met by the TOE, the evaluator shall perform all of the
following tests for each hash algorithm implemented by the TSF and used to
satisfy the requirements of this PP.
Short Messages Test–- Bit-oriented Mode
The evaluator shall devise an input set consisting of m+1 messages, where m is
the block length of the hash algorithm. The length of the messages range
sequentially from 0 to m bits. The message text shall be pseudorandomly
generated. The evaluator shall compute the message digest for each of the
messages and ensure that the correct result is produced when the messages
are provided to the TSF.
Short Messages Test–- Byte-oriented Mode
The evaluator shall devise an input set consisting of m/8+1 messages, where m
is the block length of the hash algorithm. The length of the messages range
sequentially from 0 to m/8 bytes, with each message being an integral number
of bytes. The message text shall be pseudorandomly generated. The evaluator
shall compute the message digest for each of the messages and ensure that
the correct result is produced when the messages are provided to the TSF.
Selected Long Messages Test–- Bit-oriented Mode
The evaluator shall devise an input set consisting of m messages, where m is
the block length of the hash algorithm. The length of the ith message is 512 +
99*i, where 1 ≤ i ≤ m. The message text shall be pseudorandomly generated.
The evaluator shall compute the message digest for each of the messages and
ensure that the correct result is produced when the messages are provided to
the TSF.
Selected Long Messages Test–- Byte-oriented Mode
The evaluator shall devise an input set consisting of m/8 messages, where m is
the block length of the hash algorithm. The length of the ith message is 512 +
8*99*i, where 1 ≤ i ≤ m/8. The message text shall be pseudorandomly
generated. The evaluator shall compute the message digest for each of the
messages and ensure that the correct result is produced when the messages
are provided to the TSF.
129
Pseudorandomly Generated Messages Test
This test is for byte-oriented implementations only. The evaluator shall
randomly generate a seed that is n bits long, where n is the length of
the message digest produced by the hash function to be tested. The
evaluator shall then formulate a set of 100 messages and associated
digests by following the algorithm provided in Figure 1 of [SHAVS]. The
evaluator shall then ensure that the correct result is produced when
the messages are provided to the TSF.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
Application Note: The intent of this requirement is to specify the keyed hash message authentication
function used when used for key establishment purposes for the various
cryptographic protocols used by the TOE (e.g., trusted channel). The hash
selection must support the message digest size selection. The hash selection
should be consistent with the overall strength of the algorithm used for
FCS_COP.1(1).
130
The evaluator shall examine the AGD guidance to ensure it contains
instructions for configuring the TOE or the TOE in conjunction with the
Operational Environment for the required hash sizes and message digest sizes.
Test
If this requirement is met by the TOE, the evaluator shall perform the following
test:
Test 1: For each of the supported parameter sets, the evaluator shall
compose 15 sets of test data. Each set shall consist of a key and
message data. The evaluator shall have the TSF generate HMAC tags
for these sets of test data. The resulting MAC tags shall be compared
to the result of generating HMAC tags with the same key and IV using
a known good implementation.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
FCS_RBG_EXT.1.2 The deterministic RBG shall be seeded by an entropy source that accumulates
entropy from [selection: a software-based noise source, TSF hardware-based
noise source, an Operational Environment-based noise source] with a minimum
of [selection: 128 bits, 256 bits] of entropy at least equal to the greatest security
strength (according to NIST SP 800-57) of the keys and authorization factors that
it will generate.
Application Note: SP 800-90A contains three different methods of generating random numbers;
each of these, in turn, depends on underlying cryptographic primitives (hash
functions/ciphers). The ST author will select the function used, and include the
specific underlying cryptographic primitives used in the requirement or in the TSS.
While any of the identified hash functions (SHA- 224, SHA-256, SHA-384, SHA-512)
are allowed for Hash_DRBG or HMAC_DRBG, only AES-based implementations for
CTR_DRBG are allowed.
The ST author must also ensure that any underlying functions are included in the
baseline requirements for the TOE.
131
algorithms included in the ST. Security strength is defined in Tables 2 and 3 of NIST
SP 800-57A. For example, if the implementation includes 2048-bit RSA (security
strength of 112 bits), AES 128 (security strength 128 bits), and HMAC-SHA-256
(security strength 256 bits), then the ST author would select 256 bits.
The ST author may select either software or hardware noise sources for a TOE-
implemented noise source, or an Operational Environment noise source. A
hardware noise source is a component that produces data that cannot be
explained by a deterministic rule, due to its physical nature. In other words, a
hardware based noise source generates sequences of random numbers from a
physical process that cannot be predicted. For example, a sampled ring oscillator
consists of an odd number of inverter gates chained into a loop, with an electrical
pulse traveling from inverter to inverter around the loop. The inverters are not
clocked, so the precise time required for a complete circuit around the loop varies
slightly as various physical effects modify the small delay time at each inverter on
the line to the next inverter. This variance results in an approximate natural
frequency that contains drift and jitter over time. The output of the ring oscillator
consists of the oscillating binary value sampled at a constant rate from one of the
inverters – a rate that is significantly slower than the oscillator’s natural
frequency.
Assurance Activity
TSS
The evaluator shall examine the TSS to ensure it describes the deterministic
random bit generation services provided by either the TSF or the Operational
Environment, including a description of the entropy source.
Guidance
If any part of the deterministic RBG services is configurable, the evaluator shall
ensure that the operational guidance provides clear instructions for how to
configure them, including those that pertain to the Operational Environment,
if applicable.
Test
Documentation shall be produced—and the evaluator shall perform the
activities—in accordance with Annex D, Entropy Documentation and
Assessment, regardless of whether the entropy source is implemented by the
TOE or the Operational Environment. Note that this is only applicable if the
TOE implements or directly invokes the DRBG. If this is not the case, then
FCS_RBG_EXT.1 should not be included in the ST, as outlined in the application
note for FCS_CDP_EXT.1.
For RBG implementations in the TSF, the evaluator shall also perform the
following tests, depending on the standard to which the RBG conforms.
132
Implementations Conforming to NIST Special Publication 800-90A
The evaluator shall perform 15 trials for the RBG implementation. If the RBG is
configurable, the evaluator shall perform 15 trials for each configuration. The
evaluator shall also confirm that the operational guidance contains appropriate
instructions for configuring the RBG functionality.
If the RBG has prediction resistance enabled, each trial consists of
(1) instantiate DRBG,
(2) generate the first block of random bits,
(3) generate a second block of random bits,
(4) uninstantiate.
The evaluator verifies that the second block of random bits is the expected
value. The evaluator shall generate eight input values for each trial. The first is
a count (0 – 14). The next three are entropy input, nonce, and personalization
string for the instantiate operation. The next two are additional input and
entropy input for the first call to generate. The final two are additional input
and entropy input for the second call to generate. These values are randomly
generated. “generate one block of random bits” means to generate random
bits with number of returned bits equal to the Output Block Length (as defined
in NIST SP 800-90A).
If the RBG does not have prediction resistance, each trial consists of
(1) instantiate DRBG,
(2) generate the first block of random bits,
(3) reseed,
(4) generate a second block of random bits,
(5) uninstantiate.
The evaluator verifies that the second block of random bits is the expected
value. The evaluator shall generate eight input values for each trial. The first is
a count (0 – 14). The next three are entropy input, nonce, and personalization
string for the instantiate operation. The fifth value is additional input to the
first call to generate. The sixth and seventh are additional input and entropy
input to the call to reseed. The final value is additional input to the second
generate call.
The following paragraphs contain more information on some of the input
values to be generated/selected by the evaluator.
Entropy input: the length of the entropy input value must equal the
seed length.
133
Nonce: If a nonce is supported (CTR_DRBG with no df does not use a
nonce), the nonce bit length is one-half the seed length.
Personalization string: The length of the personalization string must
be <= seed length. If the implementation only supports one
personalization string length, then the same length can be used for
both values. If more than one string length is support, the evaluator
shall use personalization strings of two different lengths. If the
implementation does not use a personalization string, no value needs
to be supplied.
Additional input: the additional input bit lengths have the same
defaults and restrictions as the personalization string lengths.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
FIA_AFL.1.2 When the defined number of unsuccessful authentication attempts has been
[met], the TSF shall [selection, choose one of: prevent the remote privileged user
from successfully authenticating until [assignment: action] is taken by an
Administrator, prevent the privileged user from successfully authenticating until
an Administrator defined time period has elapsed].
Application Note: This requirement does not apply to a privileged user at the local console, since it
does not make sense to lock a local privileged user’s account in this fashion. This
could be addressed by (for example) requiring a separate account for local
privileged users or having the authentication mechanism implementation
distinguish local and remote login attempts. The “action” taken by an
administrator is implementation specific and would be defined in the
134
administrator guidance (for example, lockout reset or password reset). The ST
author chooses one of the selections for handling of authentication failures
depending on how the TOE has implemented this handler.
Assurance Activity
TSS
The evaluator shall examine the TSS to determine that it contains a description,
for each supported method for remote administrative actions, of how
successive unsuccessful authentication attempts are detected and tracked. The
TSS shall also describe the method by which the remote privileged user is
prevented from successfully logging on to the TOE, and the actions necessary
to restore this ability.
If the Operational Environment is responsible for this function, the evaluator
shall verify that the TSS describes that function.
Guidance
The evaluator shall examine the operational guidance to ensure that
instructions for configuring the number of successive unsuccessful
authentication attempts (1.1) and time period (1.2, if implemented) are
provided, and that the process of allowing the remote privileged user to once
again successfully log on is described for each “action” specified (if that option
is chosen). If different actions or mechanisms are implemented depending on
the authentication method (e.g., TLS vs. SSH), all must be described.
If the Operational Environment is responsible for this function, the evaluator
shall verify that the operational guidance instructs the reader to rely on this
capability.
Test
The evaluator shall perform the following tests for each method by which
remote privileged users access the TOE, either directly or by authenticating to
the Operational Environment from which the TOE inherits user information
(e.g., TLS, SSH):
Test 1 [conditional on first selection item]: The evaluator shall use the
operational guidance to configure the number of successive
unsuccessful authentication attempts allowed by the TOE. The
evaluator shall test that once the limit is reached, attempts with valid
credentials are not successful. For each action specified by the
requirement, the evaluator shall show that following the operational
guidance and performing each action to allow the remote privileged
user access are successful.
135
user. After exceeding the specified number of invalid login attempts
and showing that valid login is not possible, the evaluator shall show
that waiting for the interval defined by the time period before another
access attempt will result in the ability for the remote privileged user
to successfully log on using valid credentials.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
Assurance Activity
TSS
The evaluator shall examine the TSS to ensure it describes how the minimum
password is established and the range of values that can be assigned.
Guidance
The evaluator shall examine the operational guidance to determine that it
provides guidance to security administrators on the composition of strong
passwords, and that it provides instructions on setting the minimum password
length.
Test
The evaluator shall perform the following test:
136
evaluator shall ensure that all characters, rule characteristics, and
a minimum length listed in the requirement are supported, and
justify the subset of those characters chosen for testing.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
Application Note: “Obscured feedback” implies the TSF does not produce a visible display of the
exact authentication data entered by a user (such as the echoing of a password),
although an obscured indication of progress may be provided (such as an asterisk
for each character). It also implies that the TSF does not return any information
during the authentication process to the user that may provide any indication of
the authentication data. The assignment can include unobscured feedback such
as “the number of characters typed” or “the authentication mechanism that failed
the authentication.”
Assurance Activity
TSS
For each authentication mechanism selected in FIA_UAU_EXT.1.1, the
evaluator shall examine the TSS to ensure it describes how obscured feedback
is provided to the authenticating user. If no obscured feedback is provided, the
TSS must provide justification for why it is not provided.
Guidance
There are no AGD assurance activities for this requirement beyond what is
necessary to satisfy the requirements in [CEM].
Test
The evaluator shall perform the following test:
Test 1: The evaluator shall locally authenticate to the TOE and verify
that at most obscured feedback is provided while entering the
authentication information.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
137
FPT_APW_EXT.1 Protection of Privileged User Passwords
FPT_APW_EXT.1.1 The TSF shall store passwords in non-plaintext form.
Application Note: The intent of the requirement is that raw password authentication data are not
stored in the clear, and that no user or administrator is able to read the plaintext
password through “normal” interfaces. An all-powerful administrator of course
could directly read memory to capture a password but is trusted not to do so.
In this version of the PP there are no requirements on the method used to store
the passwords in non-plaintext form, but cryptographic methods based on the
requirements in FCS_COP are preferred. In future versions of this PP, FCS_COP-
based cryptographic methods that conform to the Level 2 Credential Storage
requirements from NIST SP 800-63 will be required.
Assurance Activity
TSS
The evaluator shall examine the TSS to determine that it details all
authentication data that are subject to this requirement, and the method used
to obscure the plaintext password data when stored. The evaluator shall
ensure that the TSS also details that passwords are stored in such a way that
they are unable to be viewed through an interface designed specifically for that
purpose, as outlined in the application note.
There are no AGD assurance activities for this requirement beyond what is
necessary to satisfy the requirements in [CEM].
Test
The evaluator shall perform the following test:
Test 1: The evaluator shall use forensic tools to search storage media
to verify that passwords cannot be found in an unobscured (e.g.,
plaintext) form.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
138
B.5 Certificate Request Protocol
Application Note: Based on what is chosen in the selections, the applicable requirements from Annex
B (i.e., FIA_CMCS_EXT.1, FIA_ESTS_EXT.1) must be included.
Assurance Activity
TSS
The evaluator shall examine the TSS to ensure it describes the mechanisms
used for generating proof of origin for certificate request response.
If configurable, evaluator shall examine the operational guidance to ensure it
defines how to configure the applicable algorithms used for providing proof of
origin as defined in FCS_COP.1(2).
Test
The evaluator shall perform the following test for each selection:
Test 1: For each supported request message, the evaluator shall
generate and submit a properly authenticated request to the TOE and
verify the response is signed. The evaluator shall verify the signature
on the responses and show that they are signed by the TOE that
generated the response.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
FIA_CMCS_EXT.1.2 The TSF shall be able to generate CMC simple responses and [selection: CMC full
responses, no other] that are consistent with the selected certificate profile and
which are in accordance with RFC 5272 as updated by RFC 6402, meeting the
compliance requirements for CMS server and certification authorities in
accordance with RFC 5474 as updated by RFC 6402.
139
FIA_CMCS_EXT.1.3 The TSF shall require CMC transport over HTTPS for online CMC messages in
accordance with RFC 5273 as updated by RFC 6402, where the HTTPS is
established in accordance with FCS_HTTPS_EXT.1. For CMC requests containing
certificate requests other than initial certificate requests authenticated using
shared secrets in AuthenticatedData requests or in the Identity Proof Version 2
Control of SignedData requests, the TSF shall require HTTPS with client
authentication, shall ensure the authenticating entity is the same as the entity
signing the CMC request and any subject indicated in the requested certificate(s)
are the same as the authenticating entity, or the authenticating entity is
[selection: an authorized RA for the requested subject, an AOR registered for the
requested subject, no other entity].
FIA_CMCS_EXT.1.4 The TSF shall require CMC simple and full messages use cryptographic support in
accordance with this profile. At a minimum the TSF shall ensure:
FIA_CMCS_EXT.1.5 The TSF shall accept, process and export CMC messages under the control of local
privileged user sessions for privileged users with CA Operations Staff, [selection:
RA Staff, no other] role.
Application Note: FIA_CMCS_EXT.1.5 focuses on offline root CAs that do not have direct connection
to external IT entities.
In subsequent versions of the PP, the TSF will be required to meet the Suite B
profile for CMC as described in RFC 6403.
Assurance Activity
TSS
The evaluator shall examine the TSS to ensure that it describes how CMC server
support is provided.
140
The evaluator shall examine the TSS to determine how initial requests are
authenticated when no certificates are available.
Guidance
The evaluator shall examine the operational guidance to ensure it contains
instructions on how to configure CMC processing to support the TOE’s
certificate profiles.
If the TSS indicates that neither AuthenticatedData or Identity Proof Version 2
Control mechanisms using shared secretes are supported, the evaluator shall
also examine the operational guidance to ensure that it describes how to
authenticate requests for subordinate CA certificates, initial subscriber
certificates and, if supported, initial certificates for Registration Authority
Officers, when no other certificates are available.
Test
The evaluator shall perform the following tests:
Test Group A. Offline CA Operations:
Test 1:
o The evaluator shall establish the TSF in an offline mode to provide
an operational root CA, (CA-0) according to AGD-PRE.
o The evaluator shall use a CMC client to generate and export a CMC
full request to obtain CA-0’s certificate. The evaluator shall log into
the TSF with CA Operations Staff role to submit the request, and
observe that the CA-0’s certificate is returned in the response.
o [Conditional on CMC support for shared secrets:] While still logged
into the TSF, the evaluator shall establish a username and shared
secret to be used to authenticate a subordinate CA (CA-1) for use
in Test 2.
o The evaluator shall install the CA’s certificate into the CMC client’s
trust store for use in subsequent tests.
Test 2:
o The evaluator shall establish a second instance of the TSF to be a
subordinate CA (CA-1) to the root CA established in Test 1.
o The evaluator shall log into the CA-1 TSF in the CA Operations Staff
role and load the self-signed certificate obtained in Test 1 into the
CA-1’s trust store
o The evaluator shall generate certificate request(s):
[Conditional on CMC support shared secrets]: The evaluator
shall request the CA-1 TSF to generate a CMC requests for the
CA-0 TSF to sign its certificate, using the established username
as password from test 1 to authenticate the request using CMC
AuthenticatedData or Identity Proof Version 2 Control
mechanisms,
[Conditional on CMC support for shared secrets] The evaluator
shall generate two CMC request for certificates on the CMC
client using the same authentication mechanism(s) as on the
141
subordinate CA-1 TSF. The first request CMC client shall use the
same username established by the CA-0 TSF, but use a
modified the shared secret. The second request shall use a
modified the username, but use the established shared secret.
[Conditional, if the TSF does not provide CMC support for
shared secrets:] The evaluator shall follow operational
guidance to generate a certificate request for the CA-1 TSF that
can be authenticated by manual processes.
Test 3:
o The evaluator shall sign into the CA-0 TSF in the CA Operations Staff
role and submit in turn the requests generated in Test 2.
o The evaluator shall observe that the CA-0 TSF generates a CMC
response containing CA-1’s signed certificate for the correctly
authenticated request, and that the root CA certificate repository
and audit trail indicates successful generation.
o [Conditional on CMC support for shared secrets:] For each request
from the CMC client including modified authentication data, the
evaluator shall observe that the CA-0 TSF either generates a full
CMC request indicating errors or does not return a request, and
that the CA-0 TSF’s audit trail indicates the errors.
Test 4: The evaluator shall sign into the subordinate CA in the CA
Operations Staff role, import the simple CMC response and complete
the initialization of the CA-1 TSF in accordance with OGD-PRE.
Test Group B. Online subordinate CA (uses root and subordinate CA established
in offline tests):
Test 1:
o [Conditional on CMC support for shared secrets:] The evaluator
shall log onto the CA-1 TSF in the CA Operations Staff role and
establish a username and shared secret for entities represented by
the CMC client established above. A different username and shared
secret should be used for at least as many entities are there are
request types and POP controls (but at least two).
o For each request type indicated in the selection for
FIA_CMCS_EXT.1.1 and for each POP control supported, the
evaluator shall use the CMC client to establish a CMC request, using
a different identifier (subject name) for each request.
o [Conditional on CMC support for shared secrets:] The evaluator
shall log onto the subordinate CA in the CA Operations Staff role
and establish a username and shared secret for entities
represented by the CMC client established above. A different
username and shared secret should be used for at least as many
entities are there are request types and POP controls (but at least
two).
o For each request type indicated in the selection for
FIA_CMCS_EXT.1.1 and for each POP control supported, the
142
evaluator shall use the client to establish a CMC request, using a
different identifier (subject name) for each request.
[Conditional on CMC support for shared secrets:] The evaluator
shall authenticate the requests using the established
username/shared secret combinations.
[Conditional on TSF not providing CMC support for shared
secrets:] The evaluator shall generate certificate requests that
can be authenticated via mechanisms described in the OGD.
o The evaluator shall copy each request, and create new requests
with modified POP values.
o [Conditional on CMC support for shared secrets:] The evaluator
shall establish an HTTPS session without client authentication
between the CMC client and the CA-1 TSF, and submit in turn, each
of the modified requests, observing that the CA-1 TSF returns full
CMC responses indicating POP errors, or does not return responses
and the CA-1 TSF’s logs indicate the errors.
o The evaluator shall then submit in turn, each of the unmodified
requests under the HTTPS session, provide any required approvals,
and observe that the CA-1 TSF returns CMC responses containing
signed end-entity certificates, each of which properly chain to the
root CA-0 and that the CA-1 TSF’s repository and audit trail indicate
successful issuance.
Test 2:
o The evaluator shall select one of the client’s certificates and use
the CMC client to generate a CMC request for a certificate update,
authenticated with the selected certificate.
o The evaluator shall submit the request under the existing, non-
authenticated HTTPS session, and observe that either the CA-1 TSF
responds with a full CMC response indicating that the transport is
invalid or that no response is provided and the CA-1 TSF’s audit trail
indicates the error.
Test 3: The evaluator shall establish a new HTTPS session between the
CMC client and the CA-1 TSF using client authentication with the
selected client certificate (and associated private key) and resubmit
the request selected in Test 2, observing that the CA-1 TSF returns a
simple CMC response containing a valid certificate for the client. The
HTTPS session is retained for Test 4.
Test 4: The evaluator shall select a second client certificate, with a
different subject name from that used to establish the HTTPS session,
and shall generate a CMC request to update that certificate. The
evaluator shall observe that the CA-1 TSF returns a full CMC response
indicating CMC transport failure or does not respond, and that the CA-
1 audit trail indicates the error.
Test Group C. Support for Certificate Profiles
Test 1: The evaluator shall configure the CA-1 TSF to use a certificate
profile requiring extensions not used in Test Groups A or B.
143
Test 2: The evaluator shall select a valid certificate and use the CMC
client to generate a CMC request to update the certificate that is
otherwise valid, but not populating the required extension, establish
an HTTPS session between the client and the CA-1 TSF with client
authentication using the selected client certificate and associated
private key, and submit the CMC request. The evaluator shall observe
that the CA-1 TSF responds in one of the following ways:
o returns a full CMC response rejecting the update indicating a
profile error
o returns a simple CMC response containing a certificate
meeting the current profile (implicitly rejecting the request
without the required extension), or
o does not return a response, and the CA-1 TSF’s audit trail
indicates the error,
Test 3: The evaluator shall generate another otherwise valid CMC
request for the selected certificate, this time populating the extension,
but with an invalid value. The evaluator shall submit the request via
the proper HTTPS transport and observe that the that the CA-1 TSF
responds in one of the following ways:
o returns a full CMC response rejecting the update indicating a
profile error
o returns a simple CMC response containing a certificate
meeting the current profile (implicitly rejecting the request
without the required extension), or
o does not return a response, and the CA-1 TSF’s audit trail
indicates the error,
Test 4: The evaluator shall generate and submit a valid CMC request
including the extension and observe that the subordinate CA returns a
simple CMC response with the updated certificate and that the
subordinate CA certificate repository and audit trail indicate the
successful issuance.
Test Group D. Additional Testing of Controls
Test 1: For each required control, the evaluator shall generate and
submit an otherwise valid CMC request including a certificate update
where the control is missing, or submitted with an invalid value, and
observe that the subordinate CA returns a full CMC with the error
indicated or does not respond, and that the subordinate CA audit trail
indicates the error.
Test Group E. Additional Cryptographic Testing
Test 1: For each item in FIA_CMCS_EXT.1.5, the evaluator shall
generate and submit an otherwise valid CMC request including a
certificate update where the item uses an invalid cryptographic
mechanism, and observe that the subordinate CA returns a full CMC
indicating the failure or does not respond, and that the subordinate CA
audit trail indicates the error.
144
Equivalence:
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
FIA_CMCC_EXT.1.2 The TSF shall export CMC requests and import CMC responses under the control
of a privileged user under the CA Operations Staff role.
FIA_CMCC_EXT.1.3 The TSF shall require CMC transport over HTTPS for online CMC messages in
accordance with RFC 5273 as updated by RFC 6402, where the HTTPS is
established in accordance with FCS_HTTPS_EXT.1. For CMC requests containing
certificate requests other than initial certificate requests authenticated using
shared secrets in AuthenticatedData requests or in the Identity Proof Version 2
Control of SignedData requests, the TSF shall require HTTPS with client
authentication.
Application Note: A CA implemented by the TOE that is not a root CA will need to interface with a
root or intermediate CA.
Assurance Activity
TSS
The evaluator shall examine the TSS to ensure that it describes how CMC client
support is provided.
Guidance
If the TSS indicates that neither AuthenticatedData or Identity Proof Version 2
Control mechanisms using shared secretes are supported, the evaluator shall
also examine the operational guidance to ensure that it describes how to
authenticate requests for subordinate CA certificates, initial subscriber
certificates and, if supported, initial certificates for Registration Authority
Officers, when no other certificates are available.
Test
Testing for FIA_CMCC_EXT.1 is performed in conjunction with tests in
FIA_CMCS_EXT.1, performing additional test activities as follows:
While completing test 2 for FIA_CMCS_EXT.1 for Test Group A:
145
Test 2:
o The evaluator shall review the CA-1 TSF’s trust store and observe
that the offline CA-0 certificate is trusted.
o The evaluator shall log onto the CA-1 TSF using a privileged user
without CA Operations Staff privilege (e.g., with administrator
privileges), and attempt to export the request, observing that the
attempt fails.
o The evaluator shall examine the certificate request(s) generated on
the CA-1 TSF are compliant with with RFC 5272 as updated by RFC
6402 and RFC 5474 as updated by RFC 6402.
After completing tests in Test Group B the evaluator shall perform the
following:
Test 5:
o The evaluator shall establish a third instance of the TSF
implementing an online CA (CA-2) subordinate to the online CA-1
established for Test Group B in FIA_CMCC_EXT.1.
o For one of the request types indicated in the selection for
FIA_CMCC_EXT.1.1 and one of the POP control supported, the
evaluator shall log into the CA-2 TSF in the CA Operations Staff role
and cause CA-2 to generate CMC request.
o The evaluator shall cause the CA-2 CMC request to be
authenticated (using any available mechanism) to CA-1, and install
the certificate for the CA using CA-1’s CMC response.
o The evaluator shall cause the CA-2 TSF to generate a valid
certificate update request.
o The evaluator shall send the update request to the CA-1 TSF via
HTTPS.
o The evaluator shall observe that the CA-2 TSF receives and
processes the response from CA-1 and that the updated CA-2
certificate is available for use.
Equivalence:
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
FIA_ESTS_EXT.1.2 The TSF shall authenticate EST clients for re-enrollment via TLS certificate-based
mutual authentication in accordance with RFC 7030 Section 3.3.2 and
FCS_TLSS_EXT.1.
146
FIA_ESTS_EXT.1.3 The TSF shall authenticate EST clients for initial enrollment and for supplemental
authentication via [selection: HTTP basic authentication in accordance with
RFC7030 section 3.2.3; HTTP digest authentication using a cryptographic hash
algorithm in accordance with FCS_COP.1(3) and RFC 7030 section 3.2.3; TLS
certificate-based mutual authentication in accordance with RFC 7030 section
3.3.2 and FCS_TLSS_EXT.1].
FIA_ESTS_EXT.1.4 The TSF shall authorize EST clients based on [selection: the authenticated client
certificate is issued by the same issuer that asserts id-kp-cmcRA in its extended
key usage extension as specified by RFC 7030 Section 3.7, [assignment: policy used
by the TOE to determine client authorization in accordance with RFC 7030 section
3.7]].
Application Note: Enrollment over Secure Transport (EST) uses the simple Certificate Request
Message as specified in RFC 7030. EST also uses HTTPS as specified in
FCS_HTTPS_EXT.1 to establish a secure connection with an EST client.
For FIA_ESTS_EXT.1.4, the ST author should specify how the TOE determines a
client is authorized if the request does not have the id-kp-cmcRA EKU included in
its certificate. The assignment requires that this method be compliant with the
requirements in RFC 7030, section 3.7.
If only the third item is chosen in the selection for FIA_ESTS_EXT.1.3, or if the first
item is chosen in the selection for FIA_ESTS_EXT.1.4, then support of an RA or AOR
is required for initial authentication and SFR selections associated to the support
for these optional roles must be claimed.
Assurance Activity
TSS
The evaluator shall examine the TSS to ensure it describes the implementation
of this protocol. If the description indicates the use or RA or AOR for initial
issuance or authorization of certificates, the evaluator shall examine the TSS to
ensure that these roles are supported.
Guidance
The evaluator shall examine the operational guidance to ensure it contains
instructions on configuring the TOE so that EST conforms to the description in
the TSS.
Test
147
The evaluator shall perform the following tests:
Test 1: The evaluator shall use an EST client to request certificate
enrollment of an authorized subject to obtain a new certificate
from the TOE using the simple enrolment method described in RFC
7030 Section 4.2, authenticating the request using an existing
certificate and corresponding private key as described by RFC 7030
Section 3.3.2. The evaluator shall confirm that the TOE issues a
certificate and returns it to the client.
Test 2: If username and password authentication is selected in
FIA_ESTS_EXT.1.3, the evaluator shall use an EST client to request
an initial certificate for a user from the TOE using the simple
enrollment method described in RFC 7030 Section 4.2,
authenticating the request using a username and password as
described by RFC 7030 Section 3.2.3. The evaluator shall confirm
that the TOE issues a certificate and returns it to the client.
Test 3: If “a certificate issued by the same issuer that asserts id-kp-
cmcRA in its extended key usage extension” is selected in
FIA_ESTS_EXT.1.4, the evaluator shall use an EST client to request
certificate enrollment of a subject not known to the TOE to be
authorized, to request an initial certificate from the TOE using the
simple enrollment method described in RFC 7030 Section 4.2,
authenticating the request using an RA’s certificate issued by the
TOE’s Certification Authority functionality that asserts id-kp-
cmcRA in its extended key usage extension. The evaluator shall
confirm that the TOE issues a certificate and returns it to the client.
148
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
FIA_ESTC_EXT.1.2 The TSF shall be able to obtain EST server and CA certificates for authorized EST
services via [selection: implicit TA database configured by an [selection
administrator, CA operations staff], an explicit TA database populated via a TLS-
authenticated EST CA certificate request in accordance with RFC 7030 section
4.1.2 and FCS_TLSC_EXT.2].
FIA_ESTC_EXT.1.3 The TSF shall authenticate EST servers using X.509 certificates that chain to trust
store elements from the [selection: implicit TA database, explicit TA database] in
accordance with FIA_X.509_EXT.1/Rev for all EST requests.
FIA_ESTC_EXT.1.4 The TSF shall authenticate its certificate enrollment requests to receive the
signing certificate for CA implemented by the TOE, and [assignment: other
certificates required to authenticate the TOE], from an authorized EST server
using [selection:
HTTP basic authentication transported over TLS in accordance with RFC 7030
section 3.2.3 and FCS_TLSC_EXT.2.
HTTP digest authentication using a cryptographic hash algorithm in
accordance with FCS_COP.1/HASH, transported over TLS in accordance with
RFC 7030 section 3.2.3 and FCS_TLSC_EXT.2.
Certificate-based authentication in accordance with RFC 7030 section 3.3.2
and FCS_TSL_EXT.2 using [assignment: a pre-existing certificate authorized by
the EST server]].
FIA_ESTC_EXT.1.5 The TSF shall generate authenticated re-enrollment requests in accordance with
RFC 7030 Section 3.3.2 and FCS_TLSC_EXT, using an existing valid certificate with
the same subject name as the requested certificate and which was issued by the
external CA.
Application Note: A CA used as an intermediate certification authority in a PKI will need to make
requests to external CAs to which it is subordinate. It is acceptable to use EST to
generate these requests.
149
Assurance Activity
TSS
The evaluator shall examine the TSS to ensure it describes the implementation
of this protocol, the certificates obtained, and any pre-existing certificates or
trust anchor databases used by the protocol.
Guidance
The evaluator shall examine the operational guidance to ensure it contains
instructions on configuring the TOE so that EST conforms to the description in
the TSS.
The evaluator shall examine the operational guidance to ensure it contains
instructions for obtaining or configuring the TA database (implicit or explicit)
and any required initial certificates.
Test
The evaluator shall perform the following tests:
Test 1: The evaluator shall establish an external CA and EST server,
and configure the TOE as indicated in the AGD to authorize the EST
server for EST services using the external CA. The evaluator shall
examine the TOE logs and TA database(s) using available interfaces
to ensure the EST server and external CA’s certificates are
authorized for EST services.
Test 2: For each authentication method specified in
FIA_ESTC_EXT.1.4, the evaluator shall generate one or more
certificate enrollment requests using the authentication method
to obtain TOE required certificates from the authorized CA via the
EST server established in Test 1. In accordance with guidance
documentation, the evaluator shall obtain all required certificates
in aggregate to allow the TOE to operate a CA.
Test 3: The evaluator shall make a valid request for a certificate to
be issued by the CA certificate obtained in test 2, and confirm that
the certificate received from the TOE is signed by the TOE’s CA
certificate issued by the external CA.
150
enrollment request for the TOE’s embedded CA signing certificate,
and submit it to the second EST server. The evaluator shall repeat
Test 3, observing that the certificate returned by the second EST
server is not listed as the issuer of certificate chain returned.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
FIA_X509_EXT.3.1 The TSF shall generate a Certificate Request Message as specified by RFC
2986 and be able to provide the following information in the request:
public key, CA's distinguished name, [assignment: other information describing
the CA implemented by the TOE],
Application Note: The public key is the public key portion of the public-private key pair generated
by the TOE as specified in FCS_CKM.1. The CA distinguished name and any
additional information shall be configurable by a CA Operations Staff role.
FIA_X509_EXT.3.2 The TSF shall validate the chain of certificates from the Root CA upon receiving
the CA Certificate Response.
Assurance Activity
TSS
If the ST author selects “device-specific information”, the evaluator shall verify
that the TSS contains a description of the device-specific fields used in certificate
requests.
Guidance Documentation
The evaluator shall check to ensure that the guidance documentation contains
instructions on requesting certificates from a CA, including generation of a
Certificate Request Message. If the ST author selects “Common Name",
"Organization”, “Organizational Unit”, or "Country", the evaluator shall ensure
that this guidance includes instructions for establishing these fields before
creating the certificate request message.
Tests
The evaluator shall perform the following tests:
a) Test 1: The evaluator shall use the guidance documentation to cause the TOE
to generate a certificate request message. The evaluator shall capture the
generated message and ensure that it conforms to the format specified. The
151
evaluator shall confirm that the certificate request provides the public key and
other required information, including any necessary user-input information.
b) Test 2: The evaluator shall demonstrate that validating a certificate response
message without a valid certification path results in the function failing. The
evaluator shall then load a certificate or certificates as trusted CAs needed
to validate the certificate response message, and demonstrate that the function
succeeds.
152
Test 2: For each field defined in FDP_CRL_EXT.1.1, the evaluator shall
attempt to create a CRL that violates the required conditions of the
field. The evaluator shall determine that all such attempts are rejected
by the TSF.
Test 3: The evaluator shall make a selection of fields from a configured
CRL function and shall attempt to create a CRL that violates the
required conditions of the field. The evaluator shall determine that all
such attempts are rejected by the TSF.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
Assurance Activity
TSS
The evaluator shall examine the TSS to ensure it indicates whether the TOE
supports OCSP and, if so, describes the OCSP response function. Also, the
evaluator shall ensure that the TSS identifies which of the values identified in
FDP_OCSPG_EXT.1.1 can be included in OCSP responses.
Test
153
If the TOE supports configuration of the OCSP function, the evaluator shall
examine the operational guidance to ensure that instructions are available to
configure the OCSP response function in accordance with FDP_OCSPG_EXT.1.1.
The evaluator shall perform the following tests:
Test 1: For each OCSP response format identified in FCO_NRO_EXT.2.2,
the evaluator shall configure the OCSP response function, establish a
client and submit, in turn, an OCSP request to the TSF for the status of
a certificate issued by a CA implemented by the TOE and which is not
revoked, a certificate issued by a CA implemented by the TOE which
has been revoked, and a certificate not issued by a CA implemented by
the TOE. The evaluator shall ensure that the responses satisfy all
constraints in FDP_OCSPG_EXT.1.1 and reflects the correct status in
accordance with the referenced standard.
Test 2: For each OCSP response format defined in FDP_CSI_EXT.1.1,
and for each item a-e of this SFR, the evaluator shall attempt to create
an OCSP response that violates the required conditions. The evaluator
shall determine that all such attempts are rejected by the TSF.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
FTP_ITC.1.1 Refinement: The TSF shall use [selection: HTTPS, IPsec, TLS, SSH] to provide a
trusted communication channel between itself and authorized external network
based IT entities supporting the following capabilities: [selection: audit server,
external cryptographic module, directory services, RA, [assignment: other
components]] that is logically distinct from other communication channels and
provides assured identification of its end points and protection of the channel
data from modification or disclosure.
FTP_ITC.1.2 The TSF shall permit [the TSF, the authorized IT entities] to initiate communication
via the trusted channel.
FTP_ ITC.1.3 The TSF shall initiate communication via the trusted channel for [assignment: list
of services for which the TSF is able to initiate communications].
154
Application Note: The intent of the above requirement is to use a cryptographic protocol to protect
external communications with authorized IT entities that the TOE interacts with
to perform its functions. While there are no requirements on the party initiating
the communication, the ST author lists in the assignment for FTP_ITC.1.3 the
services for which the TOE can initiate the communication with the authorized IT
entity (it is acceptable to assign “no services” for FTP_ITC.1.3 if the TOE does not
initiate any of the covered connections). Note that SSH is not included because
this protocol is not used by the TSF to connect to other components. If the ST
author selects SSH, the TSF shall be validated against the Extended Package for
Secure Shell
The requirement implies that not only are communications protected when they
are initially established, but also on resumption after an interruption. It may be
the case that some part of the TOE setup involves manually setting up tunnels to
protect other communication, and if after an interruption the TOE attempts to re-
establish the communication automatically with (the necessary) manual
intervention, there may be a window created where an attacker might be able to
gain critical information or compromise a connection.
Assurance Activity
TSS
The evaluator shall examine the TSS to determine that, for all communications
with authorized IT entities identified in the requirement, each communications
mechanism is identified in terms of the allowed protocols for that IT entity. The
evaluator shall also confirm that all protocols listed in the TSS are specified and
included in the requirements in the ST.
If an external cryptographic module is selected in FTP_ITC.1.1, the evaluator
shall examine the TSS to ensure it describes how the external module is used
for cryptographic operations versus how any locally provided cryptographic
functionality is used.
Guidance
The evaluator shall examine the operational guidance to ensure it contains
instructions for establishing the allowed protocols with each authorized IT
entity, and that it contains recovery instructions should a connection be
interrupted.
Test
The evaluator shall perform the following tests:
Test 1: The evaluator shall ensure that communications using each
protocol with each authorized IT entity is tested during the course
of the evaluation, setting up the connections as described in the
operational guidance and ensuring that communication is
successful.
155
Test 2: For each protocol that the TOE can initiate as defined in the
requirement, the evaluator shall follow the operational guidance
to ensure that in fact the communication channel can be initiated
from the TOE.
Test 3: The evaluator shall ensure, for each communication
channel with an authorized IT entity, the channel data is not sent
in plaintext.
Test 4: The evaluator shall, for each protocol associated with each
authorized IT entity tested during test 1, cause an interruption to
the connection. The evaluator shall ensure that when connectivity
is restored, communications are appropriately protected.
Further assurance activities are associated with the specific protocols.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
Application Note: The ST author must provide enough detail to determine how the implementation
is complying with the standard(s) identified; this can be done either by adding
elements to this component, or by additional detail in the TSS.
Assurance Activity
The evaluator shall check the TSS to ensure that it is clear on how HTTPS uses
TLS to establish protected communications with remote IT entities, focusing on
when client authentication is required Testing for this activity is done as part
of the TLS testing.
Application Note: RFC 4301 calls for an IPsec implementation to protect IP traffic through the use of
a Security Policy Database (SPD). The SPD is used to define how IP packets are to
be handled: PROTECT the packet (e.g., encrypt the packet), BYPASS the IPsec
services (e.g., no encryption), or DISCARD the packet (e.g., drop the packet). The
SPD can be implemented in various ways, including router access control lists,
firewall rulesets, a “traditional” SPD, etc. Regardless of the implementation
156
details, there is a notion of a “rule” that a packet is “matched” against and a
resulting action that takes place.
While there must be a means to order the rules, a general approach to ordering is
not mandated, as long as the SPD can distinguish the IP packets and apply the
rules accordingly. There may be multiple SPDs (one for each network interface),
but this is not required.
Assurance Activity
TSS
The evaluator shall examine the TSS and determine that it describes what takes
place when a packet is processed by the TOE, e.g., the algorithm used to
process the packet. The TSS describes how the SPD is implemented and the
rules for processing both inbound and outbound packets in terms of the IPsec
policy. The TSS describes the rules that are available and the resulting actions
available after matching a rule. The TSS describes how those rules and actions
form the SPD in terms of the DISCARD (e.g., drop the packet), and PROTECT
(e.g., encrypt the packet) actions defined in RFC 4301 (BYPASS should not be
included).
As noted in section 4.4.1 of RFC 4301, the processing of entries in the SPD is
non-trivial and the evaluator shall determine that the description in the TSS is
sufficient to determine which rules will be applied to protect communication
between TOE components and authorized external IT entities, and discard all
other communications. This description shall cover both the initial packets
(that is, no SA is established on the interface or for that particular packet) as
well as packets that are part of an established SA.
Guidance
The evaluator shall examine the operational guidance to verify it instructs the
Administrator how to construct entries into the SPD that specify a rule for
processing a packet. The description includes both cases – a rule that ensures
packets between authorized components are protected and a rule that all
other packets are dropped. The evaluator shall determine that the description
in the operational guidance is consistent with the description in the TSS, and
that the level of detail in the operational guidance is sufficient to allow the
administrator to set up the SPD in an unambiguous fashion. This includes a
discussion of how ordering of rules impacts the processing of an IP packet.
Test
The evaluator uses the operational guidance to configure the TOE to carry out
the following tests:
Test 1: The evaluator shall configure the SPD such that there is a rule
for dropping a packet, encrypting a packet. The selectors used in the
construction of the rule shall be different such that the evaluator can
generate a packet and send packets to the gateway with the
157
appropriate fields (fields that are used by the rule - e.g., the IP
addresses, TCP/UDP ports) in the packet header. The evaluator
performs both positive and negative test cases for each type of rule
(e.g., a packet that matches the rule and another that does not match
the rule). The evaluator observes via the audit trail, and packet
captures that the TOE exhibited the expected behavior: appropriate
packets were dropped encrypted by the IPsec implementation.
Test 2: The evaluator shall devise several tests that cover a variety of
scenarios for packet processing. As with Test 1, the evaluator ensures
both positive and negative test cases are constructed. These scenarios
shall exercise the range of possibilities for SPD entries and processing
modes as outlined in the TSS and operational guidance. Potential areas
to cover include rules with overlapping ranges and conflicting entries,
inbound and outbound packets, and packets that establish SAs as well
as packets that belong to established SAs. The evaluator shall verify, via
the audit trail and packet captures, for each scenario that the expected
behavior is exhibited, and is consistent with both the TSS and the
operational guidance.
FCS_IPSEC_EXT.1.2 The TSF shall have a nominal, final entry in the SPD that matches anything that is
otherwise unmatched, and discards it.
Assurance Activity
The assurance activity for this element is performed in conjunction with the
activities for FCS_IPSEC_EXT.1.1.
Test
The evaluator uses the operational guidance to configure the TOE to carry out
the following tests:
Test 1: The evaluator shall configure the SPD such that there is a rule
for dropping a packet, encrypting a packet, and allowing a packet to
flow in plaintext. The evaluator may use the SPD that was created for
verification of FCS_IPSEC_EXT.1.1. The evaluator shall construct a
network packet that matches the rule to allow the packet to flow in
plaintext and send that packet. The evaluator should observe that the
network packet is passed to the proper destination interface with no
modification. The evaluator shall then modify a field in the packet
header; such that it no longer matches the evaluator-created entries
(there may be a “TOE/platform created” final entry that discards
packets that do not match any previous entries). The evaluator sends
the packet, and observes that the packet was dropped.
FCS_IPSEC_EXT.1.3 The TSF shall implement transport mode and [selection: tunnel mode, no other
mode].
Assurance Activity
158
The evaluator checks the TSS to ensure it states that the VPN can be established
to operate in tunnel mode and/or transport mode (as identified in
FCS_IPSEC_EXT.1.3).
Guidance
The evaluator shall confirm that the operational guidance contains instructions
on how to configure the connection in each mode selected.
Test
The evaluator shall perform the following test(s) based on the selections
chosen:
a) Test 1 (conditional): If tunnel mode is selected, the evaluator uses the
operational guidance to configure the TOE/platform to operate in
tunnel mode and also configures a VPN peer to operate in tunnel
mode. The evaluator configures the TOE/platform and the VPN peer to
use any of the allowable cryptographic algorithms, authentication
methods, etc. to ensure an allowable SA can be negotiated. The
evaluator shall then initiate a connection from the TOE/Platform to the
VPN peer. The evaluator observes (for example, in the audit trail and
the captured packets) that a successful connection was established
using the tunnel mode.
b) Test 2: The evaluator uses the operational guidance to configure the
TOE/platform to operate in transport mode and also configures a VPN
peer to operate in transport mode. The evaluator configures the
TOE/platform and the VPN peer to use any of the allowed
cryptographic algorithms, authentication methods, etc. to ensure an
allowable SA can be negotiated. The evaluator then initiates a
connection from the TOE/platform to connect to the VPN peer. The
evaluator observes (for example, in the audit trail and the captured
packets) that a successful connection was established using the
transport mode.
FCS_IPSEC_EXT.1.4 The TSF shall implement the IPsec protocol ESP as defined by RFC 4303 using the
cryptographic algorithms AES-CBC-128, AES-CBC-256 (both specified by RFC
3602) and [selection: AES-GCM-128 (specified in RFC 4106), AES-GCM-256
(specified in RFC 4106), no other algorithms] together with a Secure Hash
Algorithm (SHA)-based HMAC.
Assurance Activity
The evaluator shall examine the TSS to verify that the algorithms AES-CBC-128
and AES-CBC-256 are implemented. If the ST author has selected either AES-
GCM-128 or AES-GCM-256 in the requirement, then the evaluator verifies the
TSS describes these as well. In addition, the evaluator ensures that the SHA-
based HMAC algorithm conforms to the algorithms specified in FCS_COP.1(4)
Cryptographic Operations (for keyed-hash message authentication).
159
Guidance
The evaluator checks the operational guidance to ensure it provides
instructions on how to configure the TOE/platform to use the algorithms, and
if either AES-GCM-128 or AES-GCM-256 have been selected the guidance
instructs how to use these as well.
Test
The evaluator shall configure the TOE/platform as indicated in the operational
guidance configuring the TOE/platform to use each of the supported
algorithms, attempt to establish a connection using ESP, and verify that the
attempt succeeds.
FCS_IPSEC_EXT.1.5 The TSF shall implement the protocol: [selection:
IKEv1, using Main Mode for Phase 1 exchanges, as defined in RFCs 2407, 2408,
2409, RFC 4109, [selection: no other RFCs for extended sequence numbers,
RFC 4304 for extended sequence numbers], and [selection: no other RFCs for
hash functions, RFC 4868 for hash functions];
IKEv2 as defined in RFC 5996 and [selection: with no support for NAT traversal,
with mandatory support for NAT traversal as specified in RFC 5996, section
2.23)], and [selection: no other RFCs for hash functions, RFC 4868 for hash
functions].
Application Note: If the TOE implements SHA-2 hash algorithms for IKEv1 or IKEv2, the ST author
shall select RFC 4868. If the ST author selects IKEv1, FCS_IPSEC_EXT.1.15 must also
be included in the ST.
Assurance Activity
TSS
The evaluator shall examine the TSS to verify that IKEv1 and/or IKEv2 are
implemented. If IKEv1 is claimed, the evaluator shall examine the TSS to ensure
that, in the description of the IPsec protocol, it states that aggressive mode is
not used for IKEv1 Phase 1 exchanges, and that only main mode is used. It may
be that this is a configurable option.
Guidance
The evaluator shall check the operational guidance to ensure it instructs the
administrator how to configure the TOE/platform to use IKEv1 and/or IKEv2 (as
selected), and uses the guidance to configure the TOE/platform to perform
NAT traversal for the following test (if selected). If IKEv1 is claimed and the use
of main mode requires configuration of the TOE/platform prior to its operation,
the evaluator shall check the operational guidance to ensure that instructions
for this configuration are contained within that guidance.
Test
160
Tests are performed in conjunction with the other IPsec evaluation activities
with the exception of the activities below:
(Conditional): If the TOE claims IKEv1, the evaluator shall configure the
TOE/platform as indicated in the operational guidance (if applicable) and
attempt to establish a connection using an IKEv1 Phase 1 connection in
aggressive mode. This attempt should fail. The evaluator should then show
that main mode exchanges are supported.
(Conditional): The evaluator shall configure the TOE/platform so that it will
perform NAT traversal processing as described in the TSS and RFC 5996,
section 2.23. The evaluator shall initiate an IPsec connection and
determine that the NAT is successfully traversed.
FCS_IPSEC_EXT.1.6 The TSF shall ensure the encrypted payload in the [selection: IKEv1, IKEv2]
protocol uses the cryptographic algorithms AES-CBC-128, AES-CBC-256 as
specified in RFC 3602 and [selection: AES-GCM-128, AES-GCM-256 as specified in
RFC 5282, no other algorithm].
Application Note: AES-GCM-128 and AES-GCM-256 may only be selected if IKEv2 is also selected, as
there is no RFC defining AES-GCM for IKEv1.
Assurance Activity
TSS
The evaluator shall ensure the TSS identifies the algorithms used for encrypting
the IKEv1 and/or IKEv2 payload, and that the algorithms AES-CBC-128, AES-
CBC-256 are specified, and if others are chosen in the selection of the
requirement, those are included in the TSS discussion.
If the cryptographic functionality is implemented by the Operational
Environment and invoked by the TOE, the evaluator shall examine the TSS to
determine that it lists the cryptographic provider for the functionality and the
interfaces that are invoked.
Guidance
The evaluator ensures that the operational guidance describes the
configuration of the mandated algorithms, as well as any additional algorithms
selected in the requirement. The guidance is then used to configure the
TOE/platform to perform the following test for each ciphersuite selected.
Test
The evaluator shall configure the TOE/platform to use the ciphersuite under
test to encrypt the IKEv1 and/or IKEv2 payload and establish a connection with
a peer device, which is configured to only accept the payload encrypted using
the indicated ciphersuite. The evaluator will confirm the algorithm was that
used in the negotiation.
161
FCS_IPSEC_EXT.1.7 The TSF shall ensure that [selection:
Application Note: The ST author chooses either the IKEv1 requirements or IKEv2 requirements (or
both, depending on the selection in FCS_IPSEC_EXT.1.5). The ST author chooses
either packet/volume-based lifetimes or time-based lifetimes. This requirement
must be accomplished by providing Security Administrator-configurable lifetimes
(with appropriate instructions in documents mandated by AGD_OPE). Hardcoded
limits are not acceptable. In general, instructions for setting the parameters of the
implementation, including lifetime of the SAs, should be included in the
operational guidance generated for AGD_OPE.
Assurance Activity
Guidance
The evaluator shall verify that the values for SA lifetimes can be configured and
that the instructions for doing so are located in the operational guidance. If
time-based limits are supported, the evaluator ensures that the Administrator
is able to configure Phase 1 SA values for 24 hours. Currently there are no
values mandated for the number of packets or number of bytes, the evaluator
just ensures that this can be configured if selected in the requirement.
Test
When testing this functionality, the evaluator needs to ensure that both sides
are configured appropriately. From the RFC “A difference between IKEv1 and
IKEv2 is that in IKEv1 SA lifetimes were negotiated. In IKEv2, each end of the SA
is responsible for enforcing its own lifetime policy on the SA and rekeying the
SA when necessary. If the two ends have different lifetime policies, the end
with the shorter lifetime will end up always being the one to request the
rekeying. If the two ends have the same lifetime policies, it is possible that both
will initiate a rekeying at the same time (which will result in redundant SAs). To
reduce the probability of this happening, the timing of rekeying requests
SHOULD be jittered.”
Each of the following tests shall be performed for each version of IKE selected
in the FCS_IPSEC_EXT.1.5 protocol selection:
a) Test 1 (Conditional): The evaluator shall configure a maximum lifetime
in terms of the number of packets (or bytes) allowed following the
162
operational guidance. The evaluator shall configure a test peer with a
packet/byte lifetime that exceeds the lifetime of the TOE. The
evaluator shall establish an SA between the TOE and the test peer, and
determine that once the allowed number of packets (or bytes) through
this SA is exceeded, a new SA is negotiated. The evaluator shall verify
that the TOE initiates a Phase 1 negotiation.
b) Test 2 (Conditional): The evaluator shall configure a maximum lifetime
of 24 hours for the Phase 1 SA following the operational guidance. The
evaluator shall configure a test peer with a lifetime that exceeds the
lifetime of the TOE. The evaluator shall establish an SA between the
TOE and the test peer, maintain the Phase 1 SA for 24 hours, and
determine that once 24 hours has elapsed, a new Phase 1 SA is
negotiated. The evaluator shall verify that the TOE initiates a Phase 1
negotiation.
FCS_IPSEC_EXT.1.8 The TSF shall ensure that [selection:
Application Note: The ST author chooses either the IKEv1 requirements or IKEv2 requirements (or
both, depending on the selection in FCS_IPSEC_EXT.1.5). The ST author chooses
either packet/volume-based lifetimes or time-based lifetimes. This requirement
must be accomplished by providing Security Administrator-configurable lifetimes
(with appropriate instructions in documents mandated by AGD_OPE). Hardcoded
limits are not acceptable. In general, instructions for setting the parameters of the
implementation, including lifetime of the SAs, should be included in the
operational guidance generated for AGD_OPE.
Assurance Activity
Guidance
The evaluator shall verify that the values for SA lifetimes can be configured and
that the instructions for doing so are located in the operational guidance. If
time-based limits are supported, the evaluator ensures that the Administrator
is able to configure Phase 2 SA values for 8 hours. Currently there are no values
mandated for the number of packets or number of bytes, the evaluator just
ensures that this can be configured if selected in the requirement.
163
Test
When testing this functionality, the evaluator needs to ensure that both sides
are configured appropriately. From the RFC “A difference between IKEv1 and
IKEv2 is that in IKEv1 SA lifetimes were negotiated. In IKEv2, each end of the SA
is responsible for enforcing its own lifetime policy on the SA and rekeying the
SA when necessary. If the two ends have different lifetime policies, the end
with the shorter lifetime will end up always being the one to request the
rekeying. If the two ends have the same lifetime policies, it is possible that both
will initiate a rekeying at the same time (which will result in redundant SAs). To
reduce the probability of this happening, the timing of rekeying requests
SHOULD be jittered.”
Each of the following tests shall be performed for each version of IKE selected
in the FCS_IPSEC_EXT.1.5 protocol selection:
c) Test 1 (Conditional): The evaluator shall configure a maximum lifetime
in terms of the number of packets (or bytes) allowed following the
operational guidance. The evaluator shall configure a test peer with a
packet/byte lifetime that exceeds the lifetime of the TOE. The
evaluator shall establish an SA between the TOE and the test peer, and
determine that once the allowed number of packets (or bytes) through
this SA is exceeded, a new SA is negotiated. The evaluator shall verify
that the TOE initiates a Phase 2 negotiation.
d) Test 2 (Conditional): The evaluator shall configure a maximum lifetime
of 8 hours for the Phase 2 SA following the operational guidance. The
evaluator shall configure a test peer with a lifetime that exceeds the
lifetime of the TOE. The evaluator shall establish an SA between the
TOE and the test peer, maintain the Phase 1 SA for 8 hours, and
determine that once 8 hours has elapsed, a new Phase 2 SA is
negotiated. The evaluator shall verify that the TOE initiates a Phase 2
negotiation.
FCS_IPSEC_EXT.1.9 The TSF shall generate the secret value x used in the IKE Diffie-Hellman key
exchange (“x” in g^x mod p) using the random bit generator specified in
FCS_RBG_EXT.1, and having a length of at least [assignment: (one or more)
number(s) of bits that is at least twice the security strength of the negotiated
Diffie-Hellman group] bits.
Application Note: For DH groups 19 and 20, the "x" value is the point multiplier for the generator
point G.
164
and group 20 (ECDH using NIST curve P-384). From Table 2, the bits of security
value for group 14 is 112, and for group 20 it is 192.
Assurance Activity
The evaluator shall check to ensure that, for each DH group supported, the TSS
describes the process for generating "x" (as defined in FCS_IPSEC_EXT.1.). The
evaluator shall verify that the TSS indicates that the random number generated
that meets the requirements in this PP is used, and that the length of "x" meets
the stipulations in the requirement.
FCS_IPSEC_EXT.1.10 The TSF shall generate nonce used in [selection: IKEv1, IKEv2] exchanges of length
[selection:
Application Note: The ST author must select the second option for nonce lengths if IKEv2 is also
selected (as this is mandated in RFC 5996). The ST author may select either option
for IKEv1.
For the first option for nonce lengths, since the implementation may allow
different Diffie-Hellman groups to be negotiated for use in forming the SAs, the
assignment in FCS_IPSEC_EXT.1. may contain multiple values. For each DH group
supported, the ST author consults Table 2 in NIST SP 800-57 “Recommendation
for Key Management –Part 1: General” to determine the security strength (“bits
of security”) associated with the DH group. Each unique value is then used to fill
in the assignment. For example, suppose the implementation supports DH group
14 (2048-bit MODP) and group 20 (ECDH using NIST curve P-384). From Table 2,
the bits of security value for group 14 is 112, and for group 20 it is 192.
Because nonces may be exchanged before the DH group is negotiated, the nonce
used should be large enough to support all TOE-chosen proposals in the exchange.
Assurance Activity
Test
(conditional) If the first selection is chosen, the evaluator shall check
to ensure that, for each DH group supported, the TSS describes the
process for generating each nonce. The evaluator shall verify that the
TSS indicates that the random number generated that meets the
requirements in this PP is used, and that the length of the nonces meet
the stipulations in the requirement.
(conditional) If the second selection is chosen, the evaluator shall
check to ensure that, for each PRF hash supported, the TSS describes
the process for generating each nonce. The evaluator shall verify that
165
the TSS indicates that the random number generated that meets the
requirements in this PP is used, and that the length of the nonces meet
the stipulations in the requirement.
FCS_IPSEC_EXT.1.11 The TSF shall ensure that all IKE protocols implement [selection: DH Groups 14
(2048-bit MODP), 19 (256-bit Random ECP), 24 (2048-bit MODP with 256-bit POS),
20 (384-bit Random ECP), no other DH groups].
Application Note: The selection is used to specify additional DH groups supported. This applies to
IKEv1 and IKEv2 exchanges. It should be noted that if any additional DH groups
are specified, they must comply with the requirements (in terms of the ephemeral
keys that are established) listed in FCS_CKM.1/FCS_CKM.2.
Assurance Activity
The evaluator shall check to ensure that the DH groups specified in the
requirement are listed as being supported in the TSS. If there is more than one
DH group supported, the evaluator checks to ensure the TSS describes how a
particular DH group is specified/negotiated with a peer.
Test
For each supported DH group, the evaluator shall test to ensure that all
supported IKE protocols can be successfully completed using that particular DH
group.
FCS_IPSEC_EXT.1.12 The TSF shall be able to ensure by default that the strength of the symmetric
algorithm (in terms of the number of bits in the key) negotiated to protect the
[selection: IKEv1 Phase 1, IKEv2 IKE_SA] connection is greater than or equal to the
strength of the symmetric algorithm (in terms of the number of bits in the key)
negotiated to protect the [selection: IKEv1 Phase 2, IKEv2 CHILD_SA] connection.
Application Note: The ST author chooses either or both of the IKE selections based on what is
implemented by the TOE. Obviously, the IKE version(s) chosen should be consistent
not only in this element, but with other choices for other elements in this
component. While it is acceptable for this capability to be configurable, the
default configuration in the evaluated configuration (either "out of the box" or by
configuration guidance in the AGD documentation) must enable this functionality.
Assurance Activity
166
The evaluator shall check that the TSS describes the potential strengths (in
terms of the number of bits in the symmetric key) of the algorithms that are
allowed for the IKE and ESP exchanges. The TSS shall also describe the checks
that are done when negotiating IKEv1 Phase 2 and/or IKEv2 CHILD_SA suites to
ensure that the strength (in terms of the number of bits of key in the symmetric
algorithm) of the negotiated algorithm is less than or equal to that of the IKE
SA this is protecting the negotiation.
Test
The evaluator simply follows the guidance to configure the TOE/platform to
perform the following tests.
e) Test 1: This test shall be performed for each version of IKE supported.
The evaluator shall successfully negotiate an IPsec connection using
each of the supported algorithms and hash functions identified in the
requirements.
f) Test 2: This test shall be performed for each version of IKE supported.
The evaluator shall attempt to establish an SA for ESP that selects an
encryption algorithm with more strength than that being used for the
IKE SA (i.e., symmetric algorithm with a key size larger than that being
used for the IKE SA). Such attempts should fail.
g) Test 3: This test shall be performed for each version of IKE supported.
The evaluator shall attempt to establish an IKE SA using an algorithm
that is not one of the supported algorithms and hash functions
identified in the requirements. Such an attempt should fail.
h) Test 4: This test shall be performed for each version of IKE supported.
The evaluator shall attempt to establish an SA for ESP (assumes the
proper parameters where used to establish the IKE SA) that selects an
encryption algorithm that is not identified in FCS_IPSEC_EXT.1.4. Such
an attempt should fail.
FCS_IPSEC_EXT.1.13 The TSF shall ensure that all IKE protocols perform peer authentication using a
[selection: RSA, ECDSA] that use X.509v3 certificates that conform to RFC 4945
and [selection: Pre-shared Keys, no other method].
Application Note: At least one public-key-based Peer Authentication method is required in order to
conform to this PP; one or more of the public key schemes is chosen by the ST
author to reflect what is implemented. The ST author also ensures that
appropriate FCS requirements reflecting the algorithms used (and key generation
capabilities, if provided) are listed to support those methods. Note that the TSS
will elaborate on the way in which these algorithms are to be used (for example,
2409 specifies three authentication methods using public keys; each one
supported will be described in the TSS).
Assurance Activity
TSS
167
The evaluator ensures that the TSS identifies RSA and/or ECDSA as being used
to perform peer authentication. The description shall be consistent with the
algorithms as specified in FCS_COP.1(2) Cryptographic Operations (for
cryptographic signature).
If pre-shared keys are chosen in the selection, the evaluator shall check to
ensure that the TSS describes how pre-shared keys are established and used in
authentication of IPsec connections. The evaluator shall check that the
operational guidance describes how pre-shared keys are to be generated and
established. The description in the TSS and the operational guidance shall also
indicate how pre-shared key establishment is accomplished for TOEs that can
generate a pre-shared key as well as TOEs that simply use a pre-shared key.
Guidance
The evaluator ensures the operational guidance describes how to set up the
TOE to use certificates with RSA and/or ECDSA signatures and public keys.
In order to construct the environment and configure the TOE for the following
tests, the evaluator will ensure that the operational guidance describes how to
configure the TOE to connect to a trusted CA, and ensure a valid certificate for
that CA is loaded into the TOE and marked “trusted”.
Test
For efficiency sake, the testing that is performed may be combined with the
testing for FIA_X509_EXT.1, FIA_X509_EXT.2 (for IPsec connections), and
FCS_IPSEC_EXT.1.1. The following tests shall be repeated for each peer
authentication selected in the FCS_IPSEC_EXT.1.1 selection above:
i) Test 1: The evaluator shall configure the TOE to use a private key and
associated certificate signed by a trusted CA and shall establish an IPsec
connection with the peer.
j) Test 2 [conditional]: The evaluator shall generate a pre-shared key off-
TOE and use it, as indicated in the operational guidance, to establish
an IPsec connection with the peer.
FCS_IPSEC_EXT.1.14 The TSF shall support peer identifiers of the following types: [selection: IP address,
Fully Qualified Domain Name (FQDN), user FQDN, Distinguished Name (DN)] and
[selection: no other reference identifier type, [assignment: other supported
reference identifier types]].
Application Note: The TOE must support at least one of the following identifier types: IP address,
Fully Qualified Domain Name (FQDN), user FQDN, or Distinguished Name (DN). In
the future, the TOE will be required to support all of these identifier types. The TOE
is expected to support as many IP address formats (IPv4 and IPv6) as IP versions
supported by the TOE in general. The ST author may assign additional supported
identifier types in the second selection.
Assurance Activity
1 The assurance activities for this element are performed in conjunction with the
assurance activities for the next element.
168
FCS_IPSEC_EXT.1.15 The TSF shall not establish an SA if the presented identifier does not match the
configured reference identifier of the peer.
Application Note: At this time, only the comparison between the presented identifier in the peer’s
certificate and the peer’s reference identifier is mandated by the testing below.
However, in the future, this requirement will address two aspects of the peer
certificate validation: 1) comparison of the peer’s ID payload to the peer’s
certificate which are both presented identifiers, as required by RFC 4945 and 2)
verification that the peer identified by the ID payload and the certificate is the
peer expected by the TOE (per the reference identifier). At that time, the TOE will
be required to demonstrate both aspects (i.e. that the TOE enforces that the peer’s
ID payload matches the peer’s certificate which both match configured peer
reference identifiers).
Excluding the DN identifier type (which is necessarily the Subject DN in the peer
certificate), the TOE may support the identifier in either the Common Name or
Subject Alternative Name (SAN) or both. If both are supported, the preferred logic
is to compare the reference identifier to a presented SAN, and only if the peer’s
certificate does not contain a SAN, to fall back to a comparison against the
Common Name. In the future, the TOE will be required to compare the reference
identifier to the presented identifier in the SAN only, ignoring the Common Name.
Assurance Activity
2 TSS
3 The evaluator shall ensure that the TSS describes how the TOE compares the
peer’s presented identifier to the reference identifier. This description shall
include whether the certificate presented identifier is compared to the ID
payload presented identifier, which field(s) of the certificate are used as the
presented identifier (DN, Common Name, or SAN), and, if multiple fields are
supported, the logical order comparison. If the ST author assigned an additional
identifier type, the TSS description shall also include a description of that type
and the method by which that type is compared to the peer’s presented
certificate.
4 Guidance
5 The evaluator shall ensure that the operational guidance includes the
configuration of the reference identifier(s) for the peer.
6 Test
7 For each supported identifier type (excluding DNs), the evaluator shall repeat
the following tests:
8 Test 1: For each field of the certificate supported for comparison, the evaluator
shall configure the peer’s reference identifier on the TOE (per the
169
administrative guidance) to match the field in the peer’s presented certificate
and shall verify that the IKE authentication succeeds.
9 Test 2: For each field of the certificate support for comparison, the evaluator
shall configure the peer’s reference identifier on the TOE (per the
administrative guidance) to not match the field in the peer’s presented
certificate and shall verify that the IKE authentication fails.
10 The following tests are conditional:
11 Test 3: (conditional) If, according to the TSS, the TOE supports both Common
Name and SAN certificate fields and uses the preferred logic outlined in the
Application Note, the tests above with the Common Name field shall be
performed using peer certificates with no SAN extension. Additionally, the
evaluator shall configure the peer’s reference identifier on the TOE to not
match the SAN in the peer’s presented certificate but to match the Common
Name in the peer’s presented certificate, and verify that the IKE authentication
fails.
12 Test 4: (conditional) If the TOE supports DN identifier types, the evaluator shall
configure the peer’s reference identifier on the TOE (per the administrative
guidance) to match the subject DN in the peer’s presented certificate and shall
verify that the IKE authentication succeeds. To demonstrate a bit-wise
comparison of the DN, the evaluator shall change a single bit in the DN
(preferably, in an Object Identifier (OID) in the DN) and verify that the IKE
authentication fails.
13 Test 5: (conditional) If the TOE supports both IPv4 and IPv6 and supports IP
address identifier types, the evaluator must repeat test 1 and 2 with both IPv4
address identifiers and IPv6 identifiers. Additionally, the evaluator shall verify
that the TOE verifies that the IP header matches the identifiers by setting the
presented identifiers and the reference identifier with the same IP address that
differs from the actual IP address of the peer in the IP headers and verifying
that the IKE authentication fails.
14 Test 6: (conditional) If, according to the TSS, the TOE performs comparisons
between the peer’s ID payload and the peer’s certificate, the evaluator shall
repeat the following test for each combination of supported identifier types
and supported certificate fields (as above). The evaluator shall configure the
peer to present a different ID payload than the field in the peer’s presented
certificate and verify that the TOE fails to authenticate the IKE peer.
170
TLS_DHE_RSA_WITH_AES_256_CBC_SHA as defined in RFC 3268
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA as defined in RFC 4492
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA as defined in RFC 4492
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA as defined in RFC 4492
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA as defined in RFC 4492
TLS_RSA_WITH_AES_128_CBC_SHA256 as defined in RFC 5246
TLS_RSA_WITH_AES_256_CBC_ SHA256 as defined in RFC 5246
TLS_DHE_RSA_WITH_AES_128_CBC_ SHA256 as defined in RFC 5246
TLS_DHE_RSA_WITH_AES_256_CBC_ SHA256 as defined in RFC 5246
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 as defined in RFC 5288
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 as defined in RFC 5289
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 as defined in RFC 5289
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 as defined in RFC
5289
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 as defined in RFC
5289
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 as defined in RFC 5289
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 as defined in RFC 5289
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 as defined in RFC 5289
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 as defined in RFC 5289]
and no other ciphersuite.
Application Note: The ciphersuites to be tested in the evaluated configuration are limited by this
requirement. The ST author should select the ciphersuites that are supported. It is
necessary to limit the ciphersuites that can be used in an evaluated configuration
administratively on the server in the test environment. The Suite B algorithms
listed above (RFC 6460) are the preferred algorithms for implementation.
These requirements will be revisited as new TLS versions are standardized by the
IETF.
If any ciphersuites are selected using ECDHE, then FCS_TLSC_EXT.1.5 is required.
In a future version of this PP TLS v1.2 will be required for all TOEs.
It is recognized that RFC 5246 mandates the cipher suite
TLS_RSA_WITH_AES_128_CBC_SHA, but use of SHA-1 for digital signature
generation is no longer recommended (see NIST SP 800-131A rev-1 and SP 800-
78-4). Subsequent revisions of the PP will not include SHA-1.
Assurance Activity
TSS
171
evaluator shall check the TSS to ensure that the ciphersuites specified include
those listed for this component.
Test
Test 1: The evaluator shall establish a TLS connection using each of the
ciphersuites specified by the requirement. This connection may be established
as part of the establishment of a higher-level protocol, e.g., as part of an EAP
session. It is sufficient to observe the successful negotiation of a ciphersuite to
satisfy the intent of the test; it is not necessary to examine the characteristics
of the encrypted traffic in an attempt to discern the ciphersuite being used (for
example, that the cryptographic algorithm is 128-bit AES and not 256-bit AES).
Test 2: The evaluator shall attempt to establish the connection using a server
with a server certificate that contains the Server Authentication purpose in the
extendedKeyUsage field and verify that a connection is established. The
evaluator will then verify that the client rejects an otherwise valid server
certificate that lacks the Server Authentication purpose in the
extendedKeyUsage field and a connection is not established. Ideally, the two
certificates should be identical except for the extendedKeyUsage field.
Test 3: The evaluator shall send a server certificate in the TLS connection that
the does not match the server-selected ciphersuite (for example, send a ECDSA
certificate while using the TLS_RSA_WITH_AES_128_CBC_SHA ciphersuite or
send a RSA certificate while using one of the ECDSA ciphersuites.) The
evaluator shall verify that the TOE disconnects after receiving the server’s
Certificate handshake message.
172
e) Modify a byte in the Server Finished handshake message, and verify
that the client sends a fatal alert upon receipt and does not send any
application data.
f) Send a garbled message from the Server after the Server has issued the
ChangeCipherSpec message and verify that the client denies the
connection.
FCS_TLSC_EXT.1.2 The TSF shall verify that the presented identifier matches the reference identifier
according to RFC 6125.
Application Note: The rules for verification of identity are described in Section 6 of RFC 6125. The
reference identifier is established by an authorized user, by configuration (e.g.,
configuring the name of an authentication server), or by an application (e.g., a
parameter of an API) as described in the TSS. . Based on a singular reference
identifier’s source domain and application service type (e.g., HTTP, SIP, LDAP), the
client establishes all reference identifiers which are acceptable, such as a Common
Name for the Subject Name field of the certificate and a (case-insensitive) DNS
name, URI name, and Service Name for the Subject Alternative Name field. The
client then compares this list of all acceptable reference identifiers to the
presented identifiers in the TLS server’s certificate.
The preferred method for verification is the Subject Alternative Name using DNS
names, URI names, or Service Names. Verification using the Common Name is
required for the purposes of backwards compatibility. Additionally, support for
use of IP addresses in the Subject Name or Subject Alternative name is
discouraged as against best practices but may be implemented. Finally, the client
should avoid constructing reference identifiers using wildcards. However, if the
presented identifiers include wildcards, the client must follow the best practices
regarding matching; these best practices are captured in the assurance activity.
Assurance Activity
TSS
The evaluator shall ensure that the TSS describes the client’s method of
establishing all reference identifiers from the administrator/application-
configured reference identifier, including which types of reference identifiers
are supported (e.g., Common Name, DNS Name, URI Name, Service Name, or
other application-specific Subject Alternative Names) and whether IP
addresses and wildcards are supported. The evaluator shall ensure that this
description identifies whether and the manner in which certificate pinning is
supported or used by the TOE.
Test
The evaluator shall configure the reference identifier according to the AGD
guidance and perform the following tests during a TLS connection:
Test 1: The evaluator shall present a server certificate that does not contain an
identifier in either the Subject Alternative Name (SAN) or Common Name (CN)
173
that matches the reference identifier. The evaluator shall verify that the
connection fails.
Test 2: The evaluator shall present a server certificate that contains a CN that
matches the reference identifier, contains the SAN extension, but does not
contain an identifier in the SAN that matches the reference identifier. The
evaluator shall verify that the connection fails. The evaluator shall repeat this
test for each supported SAN type.
Test 3: The evaluator shall present a server certificate that contains a CN that
matches the reference identifier and does not contain the SAN extension. The
evaluator shall verify that the connection succeeds.
Test 4: The evaluator shall present a server certificate that contains a CN that
does not match the reference identifier but does contain an identifier in the
SAN that matches. The evaluator shall verify that the connection succeeds.
Test 5: The evaluator shall perform the following wildcard tests with each
supported type of reference identifier:
FCS_TLSC_EXT.1.3 The TSF shall establish a trusted channel only if the peer certificate is valid.
174
Application Note: Validity is determined by the identifier verification, certificate path, the expiration
date, and the revocation status in accordance with RFC 5280. Certificate validity
shall be tested in accordance with testing performed for FIA_X509_EXT.1.
Assurance Activity
Test
Test 1: The evaluator shall demonstrate that using a certificate without a valid
certification path results in the function failing. Using the administrative
guidance, the evaluator shall then load a certificate or certificates needed to
validate the certificate to be used in the function, and demonstrate that the
function succeeds. The evaluator then shall delete one of the certificates, and
show that the function fails.
FCS_TLSC_EXT.1.4 The TSF shall present the Supported Elliptic Curves Extension in the Client Hello
with the following NIST curves: [selection: secp256r1, secp384r1, secp521r1] and
no other curves.
Application Note: If ciphersuites with elliptic curves were selected in FCS_TLSC_EXT.1.1, this
component is required.
This requirement limits the elliptic curves allowed for authentication and key
agreement to the NIST curves from FCS_COP.1(2) and FCS_CKM.1 and FCS_CKM.2.
This extension is required for clients supporting Elliptic Curve ciphersuites.
Assurance Activity
The evaluator shall verify that TSS describes the Supported Elliptic Curves
Extension and whether the required behavior is performed by default or may
be configured.
Test
Test 1: The evaluator shall configure the server to perform an ECDHE key
exchange in the TLS connection using a non-supported curve (for example P-
192) and shall verify that the TOE disconnects after receiving the server’s Key
Exchange handshake message.
175
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA as defined in RFC 4492
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA as defined in RFC 4492
TLS_RSA_WITH_AES_128_CBC_SHA256 as defined in RFC 5246
TLS_RSA_WITH_AES_256_CBC_ SHA256 as defined in RFC 5246
TLS_DHE_RSA_WITH_AES_128_CBC_ SHA256 as defined in RFC 5246
TLS_DHE_RSA_WITH_AES_256_CBC_ SHA256 as defined in RFC 5246
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 as defined in RFC 5288
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 as defined in RFC 5289
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 as defined in RFC 5289
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 as defined in RFC
5289
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 as defined in RFC
5289
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 as defined in RFC 5289
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 as defined in RFC 5289
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 as defined in RFC 5289
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 as defined in RFC 5289]
and no other ciphersuite.
Application Note: The ciphersuites to be tested in the evaluated configuration are limited by this
requirement. The ST author should select the ciphersuites that are supported. It is
necessary to limit the ciphersuites that can be used in an evaluated configuration
administratively on the server in the test environment. The Suite B algorithms
listed above (RFC 6460) are the preferred algorithms for implementation.
These requirements will be revisited as new TLS versions are standardized by the
IETF.
It is recognized that RFC 5246 mandates the cipher suite
TLS_RSA_WITH_AES_128_CBC_SHA, but use of SHA-1 for digital signature
generation is no longer recommended (see NIST SP 800-131A rev-1 and SP 800-
78-4). Subsequent revisions of the PP will not include SHA-1.
Assurance Activity
TSS
The evaluator shall check the description of the implementation of this
protocol in the TSS to ensure that the ciphersuites supported are specified. The
evaluator shall check the TSS to ensure that the ciphersuites specified are
identical to those listed for this component.
Guidance
The evaluator shall also check the operational guidance to ensure that it
contains instructions on configuring the TOE so that TLS conforms to the
description in the TSS (for instance, the set of ciphersuites advertised by the
TOE may have to be restricted to meet the requirements).
Test
176
Test 1: The evaluator shall establish a TLS connection using each of the
ciphersuites specified by the requirement. This connection may be established
as part of the establishment of a higher-level protocol, e.g., as part of an EAP
session. It is sufficient to observe the successful negotiation of a ciphersuite to
satisfy the intent of the test; it is not necessary to examine the characteristics
of the encrypted traffic in an attempt to discern the ciphersuite being used (for
example, that the cryptographic algorithm is 128-bit AES and not 256-bit AES).
Test 2: The evaluator shall send a Client Hello to the server with a list of
ciphersuites that does not contain any of the ciphersuites in the server’s ST and
verify that the server denies the connection. Additionally, the evaluator shall
send a Client Hello to the server containing only the
TLS_NULL_WITH_NULL_NULL ciphersuite and verify that the server denies the
connection.
Test 3: The evaluator shall use a client to send a key exchange message in the
TLS connection that the does not match the server-selected ciphersuite (for
example, send an ECDHE key exchange while using the
TLS_RSA_WITH_AES_128_CBC_SHA ciphersuite or send a RSA key exchange
while using one of the ECDSA ciphersuites.) The evaluator shall verify that the
TOE disconnects after the receiving the key exchange message.
Test 4: The evaluator shall perform the following modifications to the traffic:
k) Modify at a byte in the client’s nonce in the Client Hello handshake
message, and verify that the server rejects the client’s Certificate
Verify handshake message (if using mutual authentication) or that the
server denies the client’s Finished handshake message.
l) [conditional] If an ECDHE or DHE ciphersuite is selected, modify the
signature block in the Client’s Key Exchange handshake message, and
verify that the server rejects the client’s Certificate Verify handshake
message (if using mutual authentication) or that the server denies the
client’s Finished handshake message.
m) Modify a byte in the Client Finished handshake message, and verify
that the server rejects the connection and does not send any
application data.
n) After generating a fatal alert by sending a Finished message from the
client before the client sends a ChangeCipherSpec message, send a
Client Hello with the session identifier from the previous test, and
verify that the server denies the connection.
o) Send a garbled message from the client after the client has issued the
ChangeCipherSpec message and verify that the Server denies the
connection.
FCS_TLSS_EXT.1.2 The TSF shall deny connections from clients requesting SSL 2.0, SSL 3.0, TLS 1.0
and [selection: TLS 1.1, TLS 1.2, no other TLS versions].
177
Application Note: All SSL versions and TLS v1.0 are denied. Any TLS versions not selected in
FCS_TLSS_EXT.1.1 should be selected here.
Assurance Activity
TSS
The evaluator shall verify that the TSS contains a description of the denial of
old SSL and TLS versions.
Guidance
The evaluator shall verify that any configuration necessary to meet the
requirement are contained in the AGD guidance.
Tests
The evaluator shall send a Client Hello requesting a connection for all
mandatory and selected protocol versions in the SFR (e.g., by enumeration of
protocol versions in a test client) and verify that the server denies the
connection.
FCS_TLSS_EXT.1.3 The TSF shall generate key agreement parameters using RSA with key size 2048
bits and [selection: 3072 bits, 4096 bits, no other size] and [selection: over NIST
curves [selection: secp256r1, secp384r1, secp521r1] and no other curves; Diffie-
Hellman parameters of size 2048 bits and [selection: 3072 bits, no other size]; no
other].
Application Note: If the ST lists a DHE or ECDHE ciphersuite in FCS_TLSS_EXT.1.1, the ST must include
the Diffie-Hellman or NIST curves selection in the requirement. FMT_SMF.1
requires the configuration of the key agreement parameters in order to establish
the security strength of the TLS connection.
Assurance Activity
The evaluator shall verify that the TSS describes the key agreement parameters
of the server key exchange message.
Guidance
The evaluator shall verify that any configuration necessary to meet the
requirement is contained in the AGD guidance.
Test
If the second selection includes any choice other than “no other”, the evaluator
shall attempt a connection using an ECDHE ciphersuite and a configured curve
and, using a packet analyzer, verify that the key agreement parameters in the
Key Exchange message are the ones configured. (Determining that the size
matches the expected size for the configured curve is sufficient.) The evaluator
shall repeat this test for each supported NIST Elliptic Curve and each supported
Diffie-Hellman key size.
178
FCS_TLSS_EXT.1.4 The TSF shall present the Supported Elliptic Curves Extension in the Client Hello
with the following NIST curves: [selection: secp256r1, secp384r1, secp521r1] and
no other curves.
Application Note: If ciphersuites with elliptic curves were selected in FCS_TLSS_EXT.1.1, this
component is required. This requirement limits the elliptic curves allowed for
authentication and key agreement to the NIST curves from FCS_COP.1(2),
FCS_CKM.1, and FCS_CKM.2. This extension is required for clients supporting
Elliptic Curve ciphersuites.
Assurance Activity
TSS
The evaluator shall verify that the TSS describes the Supported Elliptic Curves
Extension and whether the required behavior is performed by default or may
be configured.
Test
The evaluator shall perform the following test:
Test 1: The evaluator shall configure the server to perform an
ECDHE key exchange in the TLS connection using a non-supported
curve (for example P-192) and shall verify that the TOE disconnects
after receiving the server’s Key Exchange handshake message.
If SSH is selected, the TOE is expected to conform to the Extended Package for
Secure Shell.
1
To refine this requirement, the phrase “[assignment: access control SFP(s) and/or information flow control SFP(s)]
to” was removed and the phrase “through the use of [selection, choose at least one of: IPsec, SSH, TLS,
TLS/HTTPS]” was added.
179
Assurance Activity
TSS
The evaluator shall examine the TSS to determine that the methods and
protocols used to protect distributed TOE components are described. The
evaluator shall also confirm that all protocols listed in the TSS in support of TOE
administration are consistent with those specified in the requirement, and are
included in the requirements in the ST.
Guidance
The evaluator shall examine the operational guidance to ensure it contains
instructions for establishing the communication paths for each supported
method.
Test
The evaluator shall perform the following tests:
Test 1: The evaluators shall ensure that communications using
each specified (in the operational guidance) communications
method is tested during the course of the evaluation, setting up
the connections as described in the operational guidance and
ensuring that communication is successful.
Test 2: The evaluator shall ensure, for each method of
communication, the channel data is not sent in plaintext.
Further assurance activities are associated with the specific protocols.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
180
The requirements below mandate that the TOE must support text-based pre-shared keys and optionally
support bit-based pre-shared keys, although generation of the bit-based pre-shared keys may be done
either by the TOE or in the operational environment.
FIA_PSK_EXT.1.1 The TSF shall be able to use pre-shared keys for IPsec.
FIA_PSK_EXT.1.2 The TSF shall be able to accept text-based pre-shared keys that:
Application Note: For the length of the text-based pre-shared keys, a common length (22 characters)
is required to help promote interoperability. If other lengths are supported they
should be listed in the assignment; this assignment can also specify a range of
values (e.g., "lengths from 5 to 55 characters") as well.
In the second selection for FIA_PSK_EXT.1.3, the ST author fills in the method by
which the text string entered by the administrator is “conditioned” into the bit
string used as the key. This can be done by using one of the specified hash
functions, or some other method through the assignment statement. If “bit-based
pre-shared keys” is selected, the ST author specifies whether the TSF merely
accepts bit-based pre-shared keys, or is capable of generating them. If it
generates them, the requirement specified that they must be generated using the
RBG specified by the requirements. If the use of bit-based pre-shared keys is not
supported, the ST author chooses “use no other pre-shared keys”.
Assurance Activity
TSS
The evaluator shall examine the TSS to ensure that it states that text-based pre-
shared keys of 22 characters are supported, and that the TSS states the
conditioning that takes place to transform the text-based pre-shared key from
the key sequence entered by the user (e.g., ASCII representation) to the bit
string used by IPsec, and that this conditioning is consistent with the first
selection in the FIA_PSK_EXT.1.3 requirement. If the assignment is used to
specify conditioning, the evaluator will confirm that the TSS describes this
conditioning.
Guidance
The evaluator shall examine the operational guidance to determine that it
provides guidance on the composition of strong text-based pre-shared keys,
181
and (if the selection indicates keys of various lengths can be entered) that it
provides information on the merits of shorter or longer pre-shared keys. The
guidance must specify the allowable characters for pre-shared keys, and that
list must be a super-set of the list contained in FIA_PSK_EXT.1.2.
If “bit-based pre-shared keys” is selected, the evaluator shall confirm the
operational guidance contains instructions for either entering bit-based pre-
shared keys for each protocol identified in the requirement, or generating a
bit-based pre-shared key (or both). The evaluator shall also examine the TSS to
ensure it describes the process by which the bit-based pre-shared keys are
generated (if the TOE supports this functionality), and confirm that this process
uses the RBG specified in FCS_RBG_EXT.1.
Test
The evaluator shall perform the following tests:
Test 1: The evaluator shall compose at least 15 pre-shared keys of
22 characters that cover all allowed characters in various
combinations that conform to the operational guidance, and
demonstrates that a successful protocol negotiation can be
performed with each key.
Test 2 [conditional]: If the TOE supports pre-shared keys of
multiple lengths, the evaluator shall repeat Test 1 using the
minimum length; the maximum length; and an invalid length. The
minimum and maximum length tests should be successful, and the
invalid length must be rejected by the TOE.
Test 3 [conditional]: If the TOE supports bit-based pre-shared keys
but does not generate such keys, the evaluator shall obtain a bit-
based pre-shared key of the appropriate length and enter it
according to the instructions in the operational guidance. The
evaluator shall then demonstrate that a successful protocol
negotiation can be performed with the key.
Test 4 [conditional]: If the TOE supports bit-based pre-shared keys
and does generate such keys, the evaluator shall generate a bit-
based pre-shared key of the appropriate length and use it
according to the instructions in the operational guidance. The
evaluator shall then demonstrate that a successful protocol
negotiation can be performed with the key.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
182
FPT_ITT.1 Basic Internal TSF Data Transfer Protection
FPT_ITT.1.1 Refinement: The TSF shall protect TSF data from [disclosure, modification] when
it is transmitted between separate parts of the TOE through the use of [selection,
choose at least one of: IPsec, SSH, TLS, TLS/HTTPS].
If SSH is selected, the TOE is expected to conform to the Extended Package for
Secure Shell.
Assurance Activity
TSS
The evaluator shall examine the TSS to determine that the methods and
protocols used to protect distributed TOE components are described. The
evaluator shall also confirm that all protocols listed in the TSS in support of TOE
administration are consistent with those specified in the requirement, and are
included in the requirements in the ST.
Guidance
The evaluator shall examine the operational guidance to ensure it contains
instructions for establishing the communication paths for each supported
method.
Test
The evaluator shall perform the following tests:
183
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
This requirement addresses the generation of KEKs used to protect other keys
but not used to archive those keys; key archival is addressed by
FCS_CKM_EXT.1(3), FCS_CKM_EXT.1(4), and FCS_CKM_EXT.6
The ST author can select asymmetric or symmetric KEKs (or both). If asymmetric
KEKs are selected, the security strength corresponding to the modulus (per
FCS_CKM.1 will be in assigned in the requirement in the ST. If symmetric
generation is chosen, then the size of the symmetric key is as selected, and the
184
method or methods of generating the symmetric KEKs also will need to be
selected.
For the generation of symmetric KEKs, if any option but the RBG option is
selected, FCS_CKM_EXT.7 in Annex B.8 must be included.
In the first selection, the ST author chooses whether the TOE performs the
operation, or whether it invokes interfaces in the Operational Environment for the
functionality.
If a symmetric KEK is generated, the number of bits of the KEK is specified in the
third selection, and then the method of generating the DEK is selected in the fourth
(and subsequent) selection.
For the fourth selection, if the TSF invokes an RBG that is implemented by the
TOE or implemented by the OE, the first item is selected and FCS_RBG_EXT.1 is
included in the ST. If the TSF invokes a key-generation mechanism in the OE
(that is not a direct invocation of an RBG), then the second item (“a key
generation capability of the Operational Environment”) is selected; in this case
the second item of the first selection ("invoke interfaces provided by the
Operational Environment to perform") should have also been chosen. If the TSF
uses a method to combine KEKs to produce a KEK, the third item is selected and
the method used to produce the KEK from the other KEKs is chosen in the fifth
selection. If the third item in the fifth selection statement is chosen (key wrap),
then FCS_COP.1(1) will be included in the ST and the appropriate key wrap
method will be chosen in the sixth selection.
Assurance Activity
TSS
For KEKs generated using an RBG, the evaluator shall examine the TSS of the
TOE to verify that it describes how the functionality described by
FCS_RBG_EXT.1 is invoked. The evaluator shall review the TSS and other
evidence to determine that the key size being requested from the RBG is
identical to the key size used for the encryption/decryption of the data or key.
For KEKs generated according to an asymmetric key scheme, the evaluator shall
review the TSS to determine that it describes how the functionality described
by FCS_CKM.1 is invoked. The evaluator uses the description of the key
generation functionality in FCS_CKM.1 or documentation available for the
185
operational environment to determine that the key strength being requested
is greater than or equal to 112 bits.
For each KEK that is formed from a combination, the evaluator shall verify that
the TSS describes the method of combination and contains a justification for
preserving the effective entropy.
FCS_CKM_EXT.7.2 A REK shall not be able to be read from or exported from the hardware.
FCS_CKM_EXT.7.3 The TSF shall be able only to request encryption/decryption by the key and shall
not be able to read, import, or export a REK.
Application Note: Either asymmetric or symmetric keys are allowed; the ST author makes the
selection appropriate for the device. Symmetric keys must be of size 128 or 256
bits in order to correspond with FCS_COP.1(1). Asymmetric keys may be of any
strength corresponding to FCS_CKM.1.
When TSF is selected in FCS_CKM_EXT.7.1, the RBG used to generate a REK may
be a RBG native to a hardware key container that is within the TOE boundary or
may be generated using an off-device RBG during manufacturing. If generated by
an off-device RBG during manufacturing, the device manufacturer shall not be
able to access a REK after the manufacturing process has been completed. If a
hardware component in the Operational Environment stores the REK, the RBG
may be resident in the component where the REK is stored, or in a separate
component. The assurance activities for these cases differ.
Assurance Activity
TSS
The evaluator shall examine the TSS to determine that when a REK is supported
by the TSF, the TSS includes a description of the protection provided by the TSF
186
for a REK, and that the TSS includes a description of the method of generation
of a REK.
The evaluator shall verify that the description of the protection of a REK
describes how any reading, import, and export of that REK is prevented. The
evaluator shall verify that the TSS describes how encryption/decryption actions
are isolated so as to prevent applications and system-level processes from
reading the REK while allowing encryption/decryption by the key.
If a REK is generated by the TOE, the TSS shall include a description of the
generation mechanism including what triggers a generation, how the
functionality described by FCS_RBG_EXT.1 is invoked, and whether a separate
instance of the RBG is used for REK(s).
Justification
The use of asymmetric keys in a key hierarchy had not previously been
considered by the authors of the CA PP. An asymmetric encryption scheme can
provide similar protection of keys as a symmetric encryption scheme.
FCS_CKM_EXT.8.2 Key entropy for KEKs shall be preserved according to the sensitivity of the DEK,
KEK, or key it encrypts.
FCS_CKM_EXT.8.3 Key entropy for DEKs shall be [selection: 128, 256] bits in accordance with the
sensitivity of the data encrypted.
Application Note: KEKs may form key hierarchies, each rooted in a root encryption key (REK); a REK
is considered a KEK. DEKs are used to protect data (e.g., subscriber PII). KEKs are
used to protect other keys–- DEKs, other KEKs, and other types of keys stored by
the user or applications. A REK is a special KEK that uses available hardware
protections (e.g., trusted platform module (TPM) or external hardware
cryptographic module) and is generated in accordance with FCS_RBG_EXT.1.
187
This SFR is included whenever both FCS_CKM_EXT.1(2) and FCS_CKM_EXT.7 are
included in the ST.
Assurance Activity
TSS
The evaluator shall examine the TSS to ensure a key hierarchy is described
showing the relationship of all KEKs and DEKs formed by combinations or by
encrypting one key in another. The evaluator shall confirm that each
independent hierarchy is terminated in a REK and that the each REK is
generated, stored, and destroyed using hardware-based controls.
The evaluator shall examine the key hierarchy to ensure that the formation of
all KEKs and DEKs is described, and that the key sizes match that described by
the ST author.
For each KEK or DEK that is formed from a combination, the evaluator shall
verify that the TSS describes the method of combination and contains a
justification for preserving the effective entropy.
Guidance
There are no AGD assurance activities for this requirement beyond what is
necessary to satisfy the requirements in [CEM].
Test
There are no ATE assurance activities for this requirement beyond what is
necessary to satisfy the requirements in [CEM].
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
Application Note: This SFR shall be included if “key sharing mechanisms in accordance with
FCS_CKM_EXT.1(3), FCS_CKM_EXT.1(4), FCS_CKM_EXT.6, and FPT_SKY_EXT.2” is
selected in FPT_SKY_EXT.1.1. It should be noted that this protection can be
accomplished via FCS_COP.1(5); if it is, then that SFR should be included in the ST.
Assurance Activity
188
TSS
The Evaluator shall review the user guidance and observe that instructions on
how to establish key shares is provided.
Guidance
The evaluator shall ensure that the operational guidance contains any
instructions needed to ensure that the shares are protected and only accessible
by a single user.
Test
The evaluator shall assume the role of Administrator and attempt to establish
two key shares for the same user and observe that the operation fails. Note
that this is key shares for a single key as per FCS_CKM_EXT.1(4) and
FCS_CKM_EXT.1(3), in contrast to key shares that may be generated at
different times for different keys.
The evaluator shall then establish two key shares for two different users as
instructed in user guidance. As one of the users, the evaluator shall attempt to
access the share of the other, and observe that the operation fails.
189
ephemeral and
[selection:
ephemeral, no
other] key
generation for
TOE related
functions.
FCS_CKM.2 All occurrences Success: key established Normal
of non-
ephemeral and
[selection:
ephemeral, no
other] key
establishment
for TOE related
functions.
FCS_CKM_EXT.1(1) None. None. N/A
FCS_CKM_EXT.1(2) None. None. N/A
FCS_CKM_EXT.1(3) None None. N/A
FCS_CKM_EXT.1(4) None. None. N/A
FCS_CKM_EXT.4 Failure of the Identity of object or entity Normal
key destruction being cleared.
process for TOE
related keys.
FCS_CKM_EXT.5 Detection of None. Normal
integrity
violation for
stored TSF data.
FCS_CKM_EXT.6 All key archival None. Extended
actions.
FCS_CKM_EXT.7 None. None. N/A
FCS_CKM_EXT.8 None. None. N/A
FCS_COP.1(1) None. None. N/A
FCS_COP.1(2) All occurrences Name/identifier of object Extended
of signature being signed
generation Identifier of key used for
using a CA signing.
signing key.
190
session. failures.
FCS_IPSEC_EXT.1 Failure to Reason for failure. Normal
establish an
IPsec SA.
Establishment/ None.
Termination of
a TLS session.
FCS_TLSS_EXT.1 Failure to Reason for failure. Normal
establish a TLS
session.
Establishment/ None.
Termination of
a TLS session.
FDP_CRL_EXT.1 Failure to None. Normal
generate CRL.
FDP_ITT.1 None. None. N/A
FDP_OCSPG_EXT.1 Failure to None. Extended
generate
certificate
status
information.
FIA_AFL.1 The reaching of None. Normal
the threshold
for the
unsuccessful
authentication
attempts.
The action
taken.
The re-
enablement of
disabled non-
administrative
accounts.
FIA_CMCS_EXT.1 CMC requests Identifiers for all entities Extended
(generated or authenticating the
received) request, including the
containing entity providing client
certificate authentication for the
requests or CMC transport (if any).
revocation
191
requests. The submitted request.
192
FTP_ITC.1 Initiation of the Identification of the Normal
trusted initiator and target of
channel. failed trusted channels
Termination of establishment attempt.
the trusted
channel.
Failure of the
trusted channel
functions.
193
C. Objective Requirements
As indicated in the introduction to this PP, the baseline requirements (those that must be performed by
the TOE or its underlying platform) are contained in the body of this PP. There are additional requirements
that specify security functionality that is desirable and these requirements are contained in this Annex. It
is expected that these requirements will transition from objective requirements to baseline requirements
in future versions of this PP.
At any time, these may be included in the ST such that the TOE is still conformant to this PP.
Application Note: This SFR, which mandates the use of key sharing to control the export of CA signing
keys, is intended to replace FPT_SKY_EXT.1 in future versions of this PP.
Assurance Activity
TSS
The evaluator shall examine the TSS to ensure it describes the restrictions
placed on key shares generated in accordance with FCS_CKM_EXT.1(4) in
accordance with this requirement.
Guidance
The evaluator shall examine the AGD guidance to ensure it contains
instructions for configuring the TOE or Operational Environment to restrict
access to the shares and limit each one to a single privileged user.
Test
The evaluator shall perform the following test:
Test 1: The evaluator shall generate key shares that require two
persons. The evaluator shall assume a single role and shall verify
that access to the assigned share is possible but reconstitution of
the original key is not. The evaluator shall then assume a second
role and assign a key share to them, then verify that their actions
together result in a reconstituted key.
Note that in order to perform this testing, it is acceptable to violate the
operational guidance so that the same evaluator is simultaneously accessing
194
the TSF as two separate identities. Alternatively, this test can be performed by
two testers.
Equivalency
Testing of the TOE may be performed on a subset of the platforms listed in the
TOE’s ST. Justification must be provided for those platforms that were excluded
from testing.
Application Note: This SFR describes an optional element of RFC 7030 that strengthens the
authentication provided by EST. While RFC 7030 requires EST servers to validate
the tls-unique values when presented, this requirement is not implemented in
current EST servers. FIA_ESTC_EXT.2.1 will be integrated into FIA_ESTC_EXT.1 in a
subsequent release of this EP and should be claimed if the EST implementation
supports it.
Assurance Activity
TSS
The evaluator shall examine the TSS to ensure the description of EST includes
implementation of tls-unique values.
Guidance
The evaluator shall examine the operational guidance to ensure it contains
instructions on configuring the TOE so that EST conforms to the description in
the TSS, to include any configuration associated to the inclusion of tls-unique
values in certificate requests.
Test
The evaluator shall perform the following tests:
Test 1: The evaluator shall follow guidance documentation to
implement the EST request function to include tls-unique values in
the certificate request. The evaluator shall establish trust with an
external EST server and associated CA and submit a simple
certificate request. The evaluator shall review the request received
by the EST server and observe that the request contains the tls-
unique value and that the it matches the tls-unique value
established under the TLS session.
195
FIA_ESTS_EXT.2 Enrollment over Secure Transport (EST) Server
FIA_ESTS_EXT.2.1 The TSF shall verify tls-unique values offered by EST clients in accordance with
RFC 7030 section 3.5.
Application Note: The ability for EST servers to verify tls-unique values is required by RFC 7030, but
is not common in current EST libraries.
Assurance Activity
TSS
The evaluator shall examine the TSS to ensure it describes the implementation
of tls-unique verification within the description of the EST protocol.
Guidance
The evaluator shall examine the operational guidance to ensure it contains
instructions on any configurable features of the TOE so that EST includes
validation of tls-unique values in EST requests.
The evaluator shall examine the operational guidance to ensure it contains
instructions for obtaining or configuring the TA database (implicit or explicit)
and any required initial certificates.
Test
The evaluator shall perform the following tests:
196
C.3 Certificate Enrollment
FIA_ENR_EXT.1.1 The TSF shall be able to generate a certificate request to an external certification
authority to receive a CA certificate for a CA's signing key using [selection:
Application Note: The external certification authority may be a root or intermediate certification
authority that is used to issue and manage the TOE’s embedded CA’s certificate.
It is not to be used to directly issue end entity certificates to requested servers
instead of the TOE’s embedded CA.
Assurance Activity
TSS
The evaluator shall examine the TSS to ensure that it describes the certificate
enrollment function options
Guidance
The evaluator shall examine the operational guidance documentation and
confirm that it contains instructions for obtaining a certificate for the
embedded CA using the options claimed in FIA_ENR_EXT.1.1.
Test
Testing is covered under the tests for the referenced SFR of the claimed
options.
Design Description
Documentation shall include the design of the entropy source as a whole, including the interaction of all
entropy source components. It will describe the operation of the entropy source to include how it works,
how entropy is produced, and how unprocessed (raw) data can be obtained from within the entropy
source for testing purposes. The documentation should walk through the entropy source design indicating
where the random comes from, where it is passed next, any post-processing of the raw outputs (hash,
197
XOR, etc.), if/where it is stored, and finally, how it is output from the entropy source. Any conditions
placed on the process (e.g., blocking) should also be described in the entropy source design. Diagrams and
examples are encouraged.
This design must also include a description of the content of the security boundary of the entropy source
and a description of how the security boundary ensures that an adversary outside the boundary cannot
affect the entropy rate.
Entropy Justification
There should be a technical argument for where the unpredictability in the source comes from and why
there is confidence in the entropy source exhibiting probabilistic behavior (an explanation of the
probability distribution and justification for that distribution given the particular source is one way to
describe this). This argument will include a description of the expected entropy rate and explain how you
ensure that sufficient entropy is going into the TOE randomizer seeding process. This discussion will be
part of a justification for why the entropy source can be relied upon to produce bits with entropy.
Operating Conditions
Documentation will also include the range of operating conditions under which the entropy source is
expected to generate random data. It will clearly describe the measures that have been taken in the
system design to ensure the entropy source continues to operate under those conditions. Similarly,
documentation shall describe the conditions under which the entropy source is known to malfunction or
become inconsistent. Methods used to detect failure or degradation of the source shall be included.
Health Testing
More specifically, all entropy source health tests and their rationale will be documented. This will include
a description of the health tests, the rate and conditions under which each health test is performed (e.g.,
at startup, continuously, or on-demand), the expected results for each health test, and rationale indicating
why each test is believed to be appropriate for detecting one or more failures in the entropy source.
198
E. References
Identifier Title
[CC] Common Criteria for Information Technology Security Evaluation –
Part 1: Introduction and General Model, CCMB-2012-09-
001, Version 3.1 Revision 5, April 2017 [CC1]
Part 2: Security Functional Components, CCMB-2012-09-
002, Version 3.1 Revision 5, April 2017 [CC2]
Part 3: Security Assurance Components, CCMB-2012-09-
003, Version 3.1 Revision 5, April 2017 [CC3]
[CEM] Common Methodology for Information Technology Security
Evaluation, Version 3.1 Revision 5, April 2017
[IR7924] Second Draft NIST IR 7924, Reference Certificate Policy, May 2014
199
F. Acronyms
Acronym Meaning
AES Advanced Encryption Standard
AOR Authorized Organizational Representative
API Application Programming Interface
CA Certification Authority
CBC Cipher Block Chaining
CC Common Criteria
CCM Counter with CBC-Message Authentication Code
CCMP CCM Protocol
CCTL Common Criteria Testing Laboratory
CMC Certificate Management over CMS
CMS Cryptographic Message Syntax
CRL Certificate Revocation List
CSS Certificate Status Server
DEK Data Encryption Key
DES Data Encryption Standard
DH Diffie-Hellman
DHE Diffie Hellman Key Exchange
DKM Derived Keying Material
DRBG Deterministic Random Bit Generator
DSA Digital Signature Algorithm
DSS Digital Signature Standard
ECC Elliptic Curve Cryptography
ECDSA Elliptic Curve Digital Signature Algorithm
EDC Error Detection Code
EEPROM Electrically Erasable Programmable Read-Only Memory
ESP Encapsulating Security Payload (IPsec)
FFC Finite-Field Cryptography
FIPS Federal Information Processing Standards
GCM Galois/Counter Mode
HMAC Keyed Hash Message Authentication Code
HSM Hardware Security Module
HTTPS HyperText Transfer Protocol Secure
I&A Identification and Authentication
IKE Internet key Exchange
IPsec Internet Protocol Security
IUT Implementation Under Test
IV Initialization Vector
KAT Known Answer Tests
KDF Key Derivation Function
KEK Key Encryption Key
KW Key Wrap
KWP Key Wrapping with Padding
MAC Message Authentication Code
MODP Modular Exponential
NAT Network Address Translation
NIST National Institute of Standards and Technology
NPE Non-person Entity
200
NTP Network Time Protocol
OCSP Online Certificate Status Protocol
OID Object Identifier
PGP Pretty Good Privacy
PKI Public Key Infrastructure
PKV Public Key Verification
PP Protection Profile
RA Registration Authority
RAM Random Access Memory
RBG Random Bit Generator
rDSA RSA Digital Signature Algorithm
REK Root Encryption Key
RFC Request for Comment
RNGVS Random Number Generator Validation System
RSA Rivest Shamir Adleman
SA Security Association (IPsec)
SAR Security Assurance Requirement
SFR Security Functional Requirement
SHA Secure Hash Algorithm
SNMP Simple Network Management Protocol
SSH Secure Shell
SSL Secure Sockets Layer
ST Security Target
TLS Transport Layer Security
TOE Target of Evaluation
TPM Trusted Platform Module
TSF TOE Security Function
TSS TOE Summary Specification
201