Version | Date | Comment |
---|---|---|
0.1 | 2025-02-28 | Initial XML conversion |
A conformant TOE will claim conformance to a PP-Configuration that includes the Base-PP identified above, this PP-Module, and any of the PP-Modules or packages identified in Section 2.
This Base-PP is valid because a Li-Fi Access System is a specific function for a purpose-built network device.
Tech terms section below is placeholder/template, will need to be updated later for terms specific to this moduleAssurance | Grounds for confidence that a TOE meets the SFRs [CC]. |
Base Protection Profile (Base-PP) | Protection Profile used as a basis to build a PP-Configuration. |
Collaborative Protection Profile (cPP) | A Protection Profile developed by international technical communities and approved by multiple schemes. |
Common Criteria (CC) | Common Criteria for Information Technology Security Evaluation (International Standard ISO/IEC 15408). |
Common Criteria Testing Laboratory | Within the context of the Common Criteria Evaluation and Validation Scheme (CCEVS), an IT security evaluation facility accredited by the National Voluntary Laboratory Accreditation Program (NVLAP) and approved by the NIAP Validation Body to conduct Common Criteria-based evaluations. |
Common Evaluation Methodology (CEM) | Common Evaluation Methodology for Information Technology Security Evaluation. |
Distributed TOE | A TOE composed of multiple components operating as a logical whole. |
Extended Package (EP) | A deprecated document form for collecting SFRs that implement a particular protocol, technology, or functionality. See Functional Packages. |
Functional Package (FP) | A document that collects SFRs for a particular protocol, technology, or functionality. |
Operational Environment (OE) | Hardware and software that are outside the TOE boundary that support the TOE functionality and security policy. |
Protection Profile (PP) | An implementation-independent set of security requirements for a category of products. |
Protection Profile Configuration (PP-Configuration) | A comprehensive set of security requirements for a product type that consists of at least one Base-PP and at least one PP-Module. |
Protection Profile Module (PP-Module) | An implementation-independent statement of security needs for a TOE type complementary to one or more Base-PPs. |
Security Assurance Requirement (SAR) | A requirement to assure the security of the TOE. |
Security Functional Requirement (SFR) | A requirement for security enforcement by the TOE. |
Security Target (ST) | A set of implementation-dependent security requirements for a specific product. |
Target of Evaluation (TOE) | The product under evaluation. |
TOE Security Functionality (TSF) | The security functionality of the product under evaluation. |
TOE Summary Specification (TSS) | A description of how a TOE satisfies the SFRs in an ST. |
If this feature is implemented by the TOE, the following requirements must be claimed in the ST:
If this feature is implemented by the TOE, the following requirements must be claimed in the ST:
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FAU_GEN.1/LiFI | ||
No events specified | N/A | |
FCS_COP.1/LiFiDataEncryption | ||
No events specified | N/A | |
FIA_8021X_EXT.1 | ||
None | Provided client identity (e.g., MAC address). | |
FIA_UAU.6 | ||
None | Origin of the attempt (e.g., IP address) | |
FMT_SMF.1/LiFi | ||
No events specified | N/A | |
FMT_SMR_EXT.1 | ||
No events specified | N/A | |
FTA_TSE.1 | ||
Denial of a session establishment due to the session establishment mechanism |
|
A TOE that conforms to a Protection Profile Configuration (PP-Configuration) containing this PP-Module either can be a standalone or distributed TOE as defined in the NDcPP. For distributed TOEs, the expectation for this PP-Module is that a LiFi AS is composed of a single controller and one or more access points (APs). If the TOE is a distributed system across multiple components then they must be capable of sending audit data to the controller. If the TOE is a standalone system, audit data should be stored on the component that generates it.
The auditable events defined in Table t-audit-mandatory, Table t-audit-sel-based, and Table t-audit-impl-dep are for the SFRs that are explicitly defined in this PP-Module and are intended to extend FAU_GEN.1 in the Base-PP. The events in the Auditable Events table should be combined with those of the NDcPP in the context of a conforming Security Target. This table includes rows for all SFRs in the PP-Module. For any SFRs the ST claims, the corresponding audit events must also be claimed in the table. If the ST does not claim a particular SFR, then there is likewise no expectation that the auditable events for that SFR are required.
Per FAU_STG_EXT.1 in the Base-PP, the TOE must support transfer of the audit data to an external IT entity using a trusted channel.
This requirement covers the TOE's role as the authenticator in an 802.1X authentication exchange. If the exchange is completed successfully, the TOE will obtain the PMK from the RADIUS server and perform the four-way handshake with the wireless client (supplicant) to begin 802.11 communications. As indicated previously, there are at least three communication paths present during the exchange; two with the TOE as an endpoint and one with the TOE acting as a transfer point only. The TOE establishes an Extensible Authentication Protocol (EAP) over Local Area Network (EAPOL) connection with the wireless client as specified in 802.1X-2007. The TOE also establishes (or has established) a RADIUS protocol connection protected either by IPsec or RadSec (TLS) with the RADIUS server. The wireless client and RADIUS server establish an EAP-TLS session (RFC 5216); in this transaction the TOE merely takes the EAP-TLS packets from its EAPOL/RADIUS endpoint and transfers them to the other endpoint. Because the specific authentication method (TLS in this case) is opaque to the TOE, there are no requirements with respect to RFC 5126 in this PP-Module. However, the base RADIUS protocol (2865) has an update (3579) that will need to be addressed in the implementation and evaluation activities.
Additionally, RFC 5080 contains implementation issues that will need to be addressed by developers but which levy no new requirements. The point of performing 802.1X authentication is to provide access to the network (assuming the authentication was successful and that all 802.11 negotiations are performed successfully); in the terminology of 802.1X, this means the wireless client has access to the "controlled port" maintained by the TOE.
The “TOE interface” can be specified in terms of the device in the TOE that the Li-Fi client is connecting to (e.g. specific Li-Fi APs). “Time” and “day” refer to time-of-day and day-of-week, respectively.
The assignment is to be used by the ST author to specify additional attributes on which denial of session establishment can be based.
The following rationale provides justification for each SFR for the TOE,
showing that the SFRs are suitable to address the specified threats:
Threat | Addressed by | Rationale |
---|---|---|
T.DATA_INTEGRITY | TBD | TBD |
T.NETWORK_DISCLOSURE | TBD | TBD |
T.NETWORK_ACCESS | TBD | TBD |
T.REPLAY_ATTACK | TBD | TBD |
T.TSF_FAILURE | TBD | TBD |
PP-Module Threat, Assumption, OSP | Consistency Rationale |
---|---|
T.DATA_INTEGRITY | |
T.NETWORK_DISCLOSURE | |
T.NETWORK_ACCESS | |
T.REPLAY_ATTACK | |
T.TSF_FAILURE | |
A.PHYSICAL | |
A.NON_SECURITY_FUNCTIONS | |
A.MANAGED_CONFIG | |
A.THIRD_PARTY_SOFTWARE | |
A.NETWORK_CONNECTIVITY | |
A.TRUSTED_ADMIN | |
A.PROPER_USER |
PP-Module OE Objective | Consistency Rationale |
---|---|
OE.PHYSICAL | |
OE.NON_SECURITY_FUNCTIONS | |
OE.MANAGED_CONFIG | |
OE.THIRD_PARTY_SOFTWARE | |
OE.NETWORK_CONNECTIVITY | |
OE.TRUSTED_ADMIN | |
OE.PROPER_USER |
PP-Module Requirement | Consistency Rationale |
---|---|
Modified SFRs | |
FPT_TST_EXT.1 | This PP-Module modifies the Base-PP's definition of the SFR by defining a minimum baseline for what self-tests must be run. Additional self-tests may still be specified by the ST author. |
Additional SFRs | |
This PP-Module does not add any requirements when the NDcPP is the base. | |
Mandatory SFRs | |
FAU_GEN.1/LiFI | |
FCS_COP.1/LiFiDataEncryption | |
FIA_8021X_EXT.1 | |
FIA_UAU.6 | |
FMT_SMF.1/LiFi | |
FMT_SMR_EXT.1 | |
FTA_TSE.1 | |
Optional SFRs | |
This PP-Module does not define any Optional requirements. | |
Objective SFRs | |
This PP-Module does not define any Objective requirements. | |
Implementation-dependent SFRs | |
FCS_CKM.1/WPA | |
FCS_CKM.2/DISTRIB | |
FCS_CKM.2/GTK | |
FCS_CKM.2/PMK | |
FIA_PSK_EXT.1 | |
FTP_ITC.1/8021X | |
FTP_ITC.1/Client | |
FTP_ITC.1/MACsec | |
Selection-based SFRs | |
FCS_RADSEC_EXT.1 | |
FCS_RADSEC_EXT.2 | |
FCS_RADSEC_EXT.3 |
This PP-Module does not define any Strictly Optional SFRs or SARs.
This PP-Module does not define any Objective SFRs.
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FCS_CKM.1/WPA | ||
No events specified | N/A | |
FCS_CKM.2/DISTRIB | ||
No events specified | N/A | |
FCS_CKM.2/GTK | ||
No events specified | N/A | |
FCS_CKM.2/PMK | ||
No events specified | N/A | |
FIA_PSK_EXT.1 | ||
No events specified | N/A | |
FTP_ITC.1/8021X | ||
Failed attempts to establish a trusted channel (including IEEE 802.11) | Identification of the initiator and target of channel | |
Detection of modification of channel data | Identification of the initiator and target of channel | |
FTP_ITC.1/Client | ||
Failed attempts to establish a trusted channel (including IEEE 802.11) | Identification of the initiator and target of channel | |
Detection of modification of channel data | Identification of the initiator and target of channel | |
FTP_ITC.1/MACsec | ||
Failed attempts to establish a trusted channel | Identification of the initiator and target of channel | |
Detection of modification of channel data | Identification of the initiator and target of channel |
The cryptographic key derivation algorithm required by IEEE 802.11-2020 (Section 12.7.1.2) and verified in WPA2 certification is PRF-384, which uses the HMAC-SHA-1 function and outputs 384 bits. The use of GCMP is defined in IEEE 802.11ax-2021 (Section 12.5.5) and requires a Key Derivation Function (KDF) based on HMAC-SHA-256 (for 128-bit symmetric keys) or HMAC-SHA-384 (for 256-bit symmetric keys). This KDF outputs 704 bits.
This requirement applies only to the keys that are generated or derived for the communications between the AP and the client once the client has been authenticated. It refers to the derivation of the Group Temporal Key (GTK), through the Random Bit Generator (RBG) specified in this PP-Module, as well as the derivation of the Pairwise Transient Key (PTK) from the Pairwise Master Key (PMK), which is done using a random value generated by the RBG specified in this PP-Module, the HMAC function as specified in this PP-Module, as well as other information. This is specified in IEEE 802.11-2020, primarily in chapter 12. FCS_RBG.1 is defined in the NDcPP.
This requirement applies to any key necessary for successful IEEE 802.11 connections not covered by FCS_CKM.2/GTK. In cases where a key must be distributed to other APs, this communication must be performed via a mechanism of commensurate cryptographic strength. Because communications with any component of a distributed TOE are required to be performed over a trusted connection, the transfer of these keys will be protected.
FCS_COP.1 and FPT_ITT.1 are defined in the NDcPP.
This requirement must be included if IPsec or another protocol that uses pre-shared keys is claimed, and pre-shared key authentication is selected (e.g., "Pre-shared Keys" is selected in FCS_IPSEC_EXT.1.13 or "pre-shared keys" is selected in FCS_RADSEC_EXT.1.2). The intent of this requirement is that all protocols will support both text-based and bit-based pre-shared keys.
For the length of the text-based pre-shared keys, a common length (22 characters) is required to help promote interoperability. If other lengths are supported, they should be listed in the assignment; this assignment can also specify a range of values (e.g., "lengths from 5 to 55 characters") as well.
For FIA_PSK_EXT.1.3, the ST author specifies whether the TSF merely accepts bit-based pre-shared keys or is capable of generating them. If it generates them, the requirement specifies that they must be generated using the RBG provided by the TOE.
This requirement has been iterated from its definition in the NDcPP to mandate the communications protocols and environmental components that a Li-FI AS must use for 802.1X. IPsec or RADIUS over TLS (commonly known as "RadSec") is required at least for communications with the 802.1X authentication server. The requirement implies that not only are communications protected when they are initially established, but also on resumption after an outage.
The IT entity of "802.1X authentication server" is distinct from "authentication server" as specified in FTP_ITC.1 in the NDcPP because the latter may be used for administrator authentication rather than authorization of WLAN clients.
If IPsec is selected in FTP_ITC.1.1, then FCS_IPSEC_EXT.1 from the NDcPP must be claimed. If RADIUS over TLS is selected in FTP_ITC.1.1, then FCS_RADSEC_EXT.1 in this PP-Module must be claimed, as well as FCS_TLSC_EXT.1 from the Functional Package for TLS.
This requirement has been iterated from its definition in the NDcPP to mandate support for 802.11 specifically for Li-Fi client access.
This requirement has been iterated from its definition in the NDcPP to mandate support for MACsec.
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FCS_RADSEC_EXT.1 | ||
No events specified | N/A | |
FCS_RADSEC_EXT.2 | ||
No events specified | N/A | |
FCS_RADSEC_EXT.3 | ||
No events specified | N/A |
This SFR is applicable if "RADIUS over TLS" is selected in FTP_ITC.1.1.
If X.509v3 certificates is selected in FCS_RADSEC_EXT.1.2, then FCS_TLSC_EXT.1 from the Functional Package for TLS must be claimed and "mutual authentication" must be selected. If pre-shared keys is selected in FCS_RADSEC_EXT.1.2, then FCS_RADSEC_EXT.2 and FIA_PSK_EXT.1 in this PP-Module must be claimed.
If any of the TLS_RSA_PSK ciphersuites are selected by the ST author, it is necessary to claim the selection-based requirement FCS_RADSEC_EXT.3.
The above ciphersuites are only for use when the TSF is acting as a RADIUS over TLS client, not for other uses of the TLS protocol. The ciphersuites to be tested in the evaluated configuration are limited by this requirement. The ST author should select the ciphersuites that are supported. If "X.509v3 certificates" is selected in FCS_RADSEC_EXT.1.2, the ciphersuites selected in (and tested by) FCS_TLSC_EXT.1.1 in the Functional Package for TLS are also supported for RADIUS over TLS client use.
This requirement must be claimed if any ciphersuites beginning with 'TLS_RSA_PSK' are selected in FCS_RADSEC_EXT.2.1.
The rules for verification of identity are described in Section 6 of RFC 6125. The reference identifier is typically established by configuration (e.g. configuring the name of the authentication server). Based on a singular reference identifier’s source domain and application service type (e.g. HTTP, SIP, LDAP), the client establishes all reference identifiers which are acceptable, such as a Common Name for the Subject Name field of the certificate and a (case-insensitive) DNS name for the Subject Alternative Name field. The client then compares this list of all acceptable reference identifiers to the presented identifiers in the TLS server’s certificate.
The preferred method for verification is the Subject Alternative Name using DNS names, URI names, or Service Names. Verification using the Common Name is required for the purposes of backwards compatibility. Additionally, support for use of IP addresses in the Subject Name or Subject Alternative name is discouraged as against best practices but may be implemented. Finally, support for wildcards is discouraged but may be implemented. If the client supports wildcards, the client must follow the best practices regarding matching; these best practices are captured in the evaluation activity.
This requirement must be claimed if any ciphersuites beginning with 'TLS_RSA_PSK' are selected in FCS_RADSEC_EXT.2.1.
Validity is determined by the identifier verification, certificate path, the expiration date, and the revocation status in accordance with RFC 5280. Certificate validity is tested in accordance with testing performed for FIA_X509_EXT.1/Rev in the NDcPP.
Functional Class | Functional Components |
---|---|
Cryptographic Support (FCS) | FCS_RADSEC_EXT RadSec |
Identification and Authentication (FIA) | FIA_8021X_EXT 802.1X Port Access Entity (Authenticator) Authentication |
Security Management (FMT) | FMT_SMR_EXT Security Management Restrictions |
FCS_RADSEC_EXT.1, RadSec, requires the TSF to implement RadSec using a specified peer authentication method.
FCS_RADSEC_EXT.2, RadSec using Pre-Shared Keys, requires the TSF to implement RadSec using pre-shared key authentication in a manner that conforms to relevant TLS specifications.
FCS_RADSEC_EXT.3, RadSec using Pre-Shared Keys and RSA, requires the TSF to validate the external entity used for trusted communications.
No specific management functions are identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: |
FCS_TLSC_EXT.1 TLS Client Protocol FIA_PSK_EXT.1 Pre-Shared Key Composition FIA_X509_EXT.1 X.509v3 Certificate Validation |
No specific management functions are identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: |
FCS_CKM.1 Cryptographic Key Generation FCS_COP.1 Cryptographic Operation FCS_RADSEC_EXT.1 RadSec FCS_RBG.1 Random Bit Generation |
No specific management functions are identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: |
FCS_RADSEC_EXT.2 RadSec using Pre-Shared Keys FIA_X509_EXT.1 X.509v3 Certificate Validation |
FIA_8021X_EXT.1, 802.1X Authentication, requires the TSF to securely implement IEEE 802.1X as an authenticator.
No specific management functions are identified.
The following actions should be auditable if FAU_GEN Security Audit Data Generation is included in the ST:
Hierarchical to: | No other components. |
Dependencies to: | No dependencies |
FMT_SMR_EXT.1, No Administration from Client, requires the TSF to reject remote administration from a wireless client by default.
No specific management functions are identified.
There are no auditable events foreseen.
Acronym | Meaning |
---|---|
AES | Advanced Encryption Standard |
API | Application Programming Interface |
API | Application Programming Interface |
app | Application |
ASLR | Address Space Layout Randomization |
Base-PP | Base Protection Profile |
CC | Common Criteria |
CEM | Common Evaluation Methodology |
CESG | Communications-Electronics Security Group |
CMC | Certificate Management over CMS |
CMS | Cryptographic Message Syntax |
CN | Common Names |
cPP | Collaborative Protection Profile |
CRL | Certificate Revocation List |
CSA | Computer Security Act |
CSP | Critical Security Parameters |
DAR | Data At Rest |
DEP | Data Execution Prevention |
DES | Data Encryption Standard |
DHE | Diffie-Hellman Ephemeral |
DNS | Domain Name System |
DRBG | Deterministic Random Bit Generator |
DSS | Digital Signature Standard |
DSS | Digital Signature Standard |
DT | Date/Time Vector |
DTLS | Datagram Transport Layer Security |
EAP | Extensible Authentication Protocol |
ECDHE | Elliptic Curve Diffie-Hellman Ephemeral |
ECDSA | Elliptic Curve Digital Signature Algorithm |
EP | Extended Package |
EST | Enrollment over Secure Transport |
FIPS | Federal Information Processing Standards |
FP | Functional Package |
HMAC | Hash-based Message Authentication Code |
HTTP | Hypertext Transfer Protocol |
HTTPS | Hypertext Transfer Protocol Secure |
IETF | Internet Engineering Task Force |
IP | Internet Protocol |
ISO | International Organization for Standardization |
IT | Information Technology |
ITSEF | Information Technology Security Evaluation Facility |
NIAP | National Information Assurance Partnership |
NIST | National Institute of Standards and Technology |
OCSP | Online Certificate Status Protocol |
OE | Operational Environment |
OID | Object Identifier |
OMB | Office of Management and Budget |
OS | Operating System |
PII | Personally Identifiable Information |
PKI | Public Key Infrastructure |
PP | Protection Profile |
PP | Protection Profile |
PP-Configuration | Protection Profile Configuration |
PP-Module | Protection Profile Module |
RBG | Random Bit Generator |
RFC | Request for Comment |
RNG | Random Number Generator |
RNGVS | Random Number Generator Validation System |
S/MIME | Secure/Multi-purpose Internet Mail Extensions |
SAN | Subject Alternative Name |
SAR | Security Assurance Requirement |
SFR | Security Functional Requirement |
SHA | Secure Hash Algorithm |
SIP | Session Initiation Protocol |
ST | Security Target |
SWID | Software Identification |
TLS | Transport Layer Security |
TOE | Target of Evaluation |
TSF | TOE Security Functionality |
TSFI | TSF Interface |
TSS | TOE Summary Specification |
URI | Uniform Resource Identifier |
URL | Uniform Resource Locator |
USB | Universal Serial Bus |
VM | Virtual Machine |
XCCDF | eXtensible Configuration Checklist Description Format |
XOR | Exclusive Or |
Identifier | Title |
---|---|
[CC] | Common Criteria for Information Technology Security Evaluation -
|
[CEM] | Common Methodology for Information Technology Security Evaluation -
|