
| Version | Date | Comment |
|---|---|---|
| 0.1 | 2025-02-28 | Initial XML conversion |
A conformant TOE will claim conformance to a PP-Configuration that includes the Base-PP identified above, this PP-Module, and any of the PP-Modules or packages identified in Section 2.
This Base-PP is valid because a LiFi Access System is a specific function for a purpose-built network device.
Assurance | Grounds for confidence that a TOE meets the SFRs [CC]. |
Base Protection Profile (Base-PP) | Protection Profile used as a basis to build a PP-Configuration. |
Collaborative Protection Profile (cPP) | A Protection Profile developed by international technical communities and approved by multiple schemes. |
Common Criteria (CC) | Common Criteria for Information Technology Security Evaluation (International Standard ISO/IEC 15408). |
Common Criteria Testing Laboratory | Within the context of the Common Criteria Evaluation and Validation Scheme (CCEVS), an IT security evaluation facility accredited by the National Voluntary Laboratory Accreditation Program (NVLAP) and approved by the NIAP Validation Body to conduct Common Criteria-based evaluations. |
Common Evaluation Methodology (CEM) | Common Evaluation Methodology for Information Technology Security Evaluation. |
Distributed TOE | A TOE composed of multiple components operating as a logical whole. |
Operational Environment (OE) | Hardware and software that are outside the TOE boundary that support the TOE functionality and security policy. |
Protection Profile (PP) | An implementation-independent set of security requirements for a category of products. |
Protection Profile Configuration (PP-Configuration) | A comprehensive set of security requirements for a product type that consists of at least one Base-PP and at least one PP-Module. |
Protection Profile Module (PP-Module) | An implementation-independent statement of security needs for a TOE type complementary to one or more Base-PPs. |
Security Assurance Requirement (SAR) | A requirement to assure the security of the TOE. |
Security Functional Requirement (SFR) | A requirement for security enforcement by the TOE. |
Security Target (ST) | A set of implementation-dependent security requirements for a specific product. |
Target of Evaluation (TOE) | The product under evaluation. |
TOE Security Functionality (TSF) | The security functionality of the product under evaluation. |
TOE Summary Specification (TSS) | A description of how a TOE satisfies the SFRs in an ST. |
Access Point (AP) | A device that provides the network interface that enables wireless client hosts to access a wired network. |
LiFi | A wireless computer network that links two or more devices using modulated optical communication to form a local area network within a limited area such as a home, school, computer laboratory, campus, office building, etc. |
Service Set Identifier (SSID) | The primary name associated with an 802.11 wireless local area network (WLAN). |
This PP-Module specifically addresses LiFi (IEEE 802.11bb, ITU G.9991) access systems (AS). A compliant LiFi AS is a system composed of hardware and software that is connected to a network and has an infrastructure role in the overall enterprise network. In particular, a LiFi AS establishes a secure wireless (IEEE 802.11, IEEE802.1x, IEEE 802.1AE) link that provides an authenticated and encrypted path to an enterprise network and thereby decreases the risk of exposure of information transiting “over-the-air”.
Since this PP-Module extends the NDcPP, conformant TOEs are obligated to implement the functionality required in the NDcPP along with the additional functionality defined in this PP-Module in response to the threat environment discussed subsequently herein.
The TOE encompasses the OS kernel drivers, shared software libraries, and some application software included with the OS. The applications considered within the TOE are those that provide essential LiFi services that make up the LiFi link and security. Examples are management services that implement configuration functions specified in this PP-Module, host services that manage client authentication to the access point, and the libraries and modules that provide security implementation of the LiFi link. This applies to each separate TOE component that are being used to meet the security requirements proposed.
The physical boundary for a TOE that conforms to this PP-Module is one or more physical network appliances (in a standalone or distributed configuration) that provides generalized network device functionality such as auditing, identification and authentication, and cryptographic services for network communications, as well as specialized functionality for facilitating remote network access via LiFi communications. The TOE's logical boundary includes all functionality required by the claimed Base-PP, this PP-Module, and any other PP-Modules which may be claimed by the ST author as a part of a PP-Configuration that includes this PP-Module. Product functionality for which no PP-Module exists, or for which no SFR within a relevant PP-Module exists to capture, are considered to be non-interfering with respect to the TSF. In other words, they may be present or enabled in the evaluated configuration of the TOE but their presence must not degrade or interrupt the enforcement of functions within the TOE's logical boundary.
Note that while the Base-PP permits the TOE either to be a physical or virtual network appliance, LiFi devices require the use of specialized hardware that will not be present on commodity servers, and it is therefore expected that any TOE that conforms to this PP-Module will be one or more dedicated physical devices.
If this feature is implemented by the TOE, the following requirements must be claimed in the ST:
If this feature is implemented by the TOE, the following requirements must be claimed in the ST:
| Assumption or OSP | Security Objectives | Rationale |
| A.NON_SECURITY_FUNCTIONS | OE.NON_SECURITY_FUNCTIONS | The operational environment objective OE.NON_SECURITY_FUNCTIONS is realized through A.NON_SECURITY_FUNCTIONS. |
| A.MANAGED_CONFIG | OE.MANAGED_CONFIG | The operational environment objective OE.MANAGED_CONFIG is realized through A.MANAGED_CONFIG. |
| A.THIRD_PARTY_SOFTWARE | OE.THIRD_PARTY_SOFTWARE | The operational environment objective OE.THIRD_PARTY_SOFTWARE is realized through A.THIRD_PARTY_SOFTWARE. |
| A.NETWORK_CONNECTIVITY | OE.NETWORK_CONNECTIVITY | The operational environment objective OE.NETWORK_CONNECTIVITY is realized through A.NETWORK_CONNECTIVITY. |
| A.PROPER_USER | OE.PROPER_USER | The operational environment objective OE.PROPER_USER is realized through A.PROPER_USER. |
| Requirement | Auditable Events | Additional Audit Record Contents |
|---|---|---|
| FAU_GEN.1/LiFi | ||
| No events specified | N/A | |
| FCS_COP.1/LiFiDataEncryption | ||
| No events specified | N/A | |
| FIA_8021X_EXT.1 | ||
| None | Provided client identity (e.g., MAC address). | |
| FIA_UAU.6 | ||
| None | Origin of the attempt (e.g., IP address) | |
| FMT_SMF.1/LiFi | ||
| No events specified | N/A | |
| FMT_SMR_EXT.1 | ||
| No events specified | N/A | |
| FTA_TSE.1 | ||
| Denial of a session establishment due to the session establishment mechanism |
| |
| FTP_ITC.1/8021X | ||
| Failed attempts to establish a trusted channel (including IEEE 802.11) | Identification of the initiator and target of channel | |
| Detection of modification of channel data | Identification of the initiator and target of channel |
A TOE that conforms to a Protection Profile Configuration (PP-Configuration) containing this PP-Module either can be a standalone or distributed TOE as defined in the NDcPP. For distributed TOEs, the expectation for this PP-Module is that a LiFi AS is composed of a single controller and one or more access points (APs). If the TOE is a distributed system across multiple components then they must be capable of sending audit data to the controller. If the TOE is a standalone system, audit data should be stored on the component that generates it.
The auditable events defined in Table 2, Table 8, and Table 10are for the SFRs that are explicitly defined in this PP-Module and are intended to extend FAU_GEN.1 in the Base-PP. The events in the Auditable Events table should be combined with those of the NDcPP in the context of a conforming Security Target. This table includes rows for all SFRs in the PP-Module. For any SFRs the ST claims, the corresponding audit events must also be claimed in the table. If the ST does not claim a particular SFR, then there is likewise no expectation that the auditable events for that SFR are required.
Per FAU_STG_EXT.1 in the Base-PP, the TOE must support transfer of the audit data to an external IT entity using a trusted channel.
| Identifier | Cryptographic Algorithm | Cryptographic Key Sizes | List of Standards |
|---|---|---|---|
| AES-GCMP | AES in Galois Counter Mode Protocol | 256 bits | ISO/IEC 18033-3:2010 (Subclause 5.2), NIST SP 800-38D, IEEE 802.11ax-2021 |
| AES-CBC | AES in CBC mode with non-repeating and unpredictable IVs | 256 bits | ISO/IEC 18033-3:2010 (Subclause 5.2), ISO/IEC 10116:2017 (Clause 7) |
| AES-CCMP | AES in CCM mode Protocol | 256 bits | ISO/IEC 18033-3:2010 (Subclause 5.2), NIST SP 800-38C, IEEE 802.11-2020 |
| AES-GCM | AES in GCM mode with non-repeating IVs using [selection: deterministic, RBG-based], IV construction; the tag must be of length [selection: 96, 104, 112, 120, 128] | 256 bits | ISO/IEC 18033-3:2010 (Subclause 5.2), ISO/IEC 19772:2020 (Clause 10) |
This requirement covers the TOE's role as the authenticator in an 802.1X authentication exchange. If the exchange is completed successfully, the TOE will obtain the PMK from the RADIUS server and perform the four-way handshake with the wireless client (supplicant) to begin 802.11 communications. As indicated previously, there are at least three communication paths present during the exchange; two with the TOE as an endpoint and one with the TOE acting as a transfer point only. The TOE establishes an Extensible Authentication Protocol (EAP) over Local Area Network (EAPOL) connection with the wireless client as specified in 802.1X-2007. The TOE also establishes (or has established) a RADIUS protocol connection protected either by IPsec or RadSec (TLS) with the RADIUS server. The wireless client and RADIUS server establish an EAP-TLS session (RFC 5216); in this transaction the TOE merely takes the EAP-TLS packets from its EAPOL/RADIUS endpoint and transfers them to the other endpoint. Because the specific authentication method (TLS in this case) is opaque to the TOE, there are no requirements with respect to RFC 5126 in this PP-Module. However, the base RADIUS protocol (2865) has an update (3579) that will need to be addressed in the implementation and evaluation activities. RADIUS accounting is implemented via conformance to RFC 2866.
Additionally, RFC 5080 contains implementation issues that will need to be addressed by developers but which levy no new requirements. The point of performing 802.1X authentication is to provide access to the network (assuming the authentication was successful and that all 802.11 negotiations are performed successfully); in the terminology of 802.1X, this means the wireless client has access to the "controlled port" maintained by the TOE.
The purpose of this requirement is to help ensure the integrity of application binaries by supporting file protection mechanisms such as directory-level file permissions and application allowlisting.
A user-modifiable file for purposes of this requirement is a file that is writable by an unprivileged user of the application - either directly through application execution or independently of the application. If an application runs in the context of the application user, then the application should not be able to write to the directory containing the application binaries - regardless of whether the files are configuration data, audit data, or temporary files.Executables and user-modifiable files may not share the same parent directory, but may share directories above the parent.The “TOE interface” can be specified in terms of the device in the TOE that the LiFi client is connecting to (e.g. specific LiFi APs). “Time” and “day” refer to time-of-day and day-of-week, respectively.
The assignment is to be used by the ST author to specify additional attributes on which denial of session establishment can be based.
This requirement has been iterated from its definition in the NDcPP to mandate the communications protocols and environmental components that a LiFI AS must use for 802.1X. IPsec or RADIUS over TLS (commonly known as "RadSec") is required at least for communications with the 802.1X authentication server. The requirement implies that not only are communications protected when they are initially established, but also on resumption after an outage.
The IT entity of "802.1X authentication server" is distinct from "authentication server" as specified in FTP_ITC.1 in the NDcPP because the latter may be used for administrator authentication rather than authorization of LiFi clients.
If IPsec is selected in FTP_ITC.1.1, then FCS_IPSEC_EXT.1 from the NDcPP must be claimed. If RADIUS over TLS is selected in FTP_ITC.1.1, then FCS_RADSEC_EXT.1 in this PP-Module must be claimed, as well as FCS_TLSC_EXT.1 from the Functional Package for TLS.
The following rationale provides justification for each SFR for the TOE,
showing that the SFRs are suitable to address the specified threats:
| Threat | Addressed by | Rationale |
|---|---|---|
| T.DATA_INTEGRITY | FCS_COP.1/LiFiDataEncryption | Mitigates the threat by defining implementation of secure cryptographic integrity algorithms. |
| FCS_CKM.2/DISTRIB (optional) | Mitigates the threat by securely distributing 802.11 keys to clients so that they are not disclosed, maintaining the integrity of the data the key is used to protect. | |
| FCS_CKM.1/WPA (implementation-dependent) | Mitigates the threat by generating a secure key used to encrypt and protect wireless traffic using WPA. | |
| FCS_CKM.2/GTK (implementation-dependent) | Mitigates the threat by securely distributing group temporal keys to clients so that they are not disclosed, maintaining the integrity of the data the key is used to protect. | |
| FCS_CKM.2/PMK (implementation-dependent) | Mitigates the threat by securely receiving a key from an authentication server so that it is not disclosed, maintaining the integrity of the data the key is used to protect. | |
| FTP_ITC.1/Client (implementation-dependent) | Mitigates the threat by providing a secure channel for LiFi client traffic that protects the confidentiality and integrity of the data. update status of this if needed to resolve github comment | |
| FTP_ITC.1/Gvlc (implementation-dependent) | Mitigates the threat by providing a secure channel for LiFi client traffic that protects the confidentiality and integrity of the data. | |
| T.NETWORK_DISCLOSURE | FCS_COP.1/LiFiDataEncryption | Mitigates the threat by defining implementation of secure cryptographic confidentiality algorithms. |
| FIA_UAU.6 | Mitigates the threat by re-authenticating users when specified criteria are met. | |
| FTA_TSE.1 | Mitigates the threat by denying sessions based on undesirable characteristics. | |
| FTP_ITC.1/8021X | Mitigates the threat by enforcing the use of authentication to access the network. | |
| FCS_CKM.2/DISTRIB (optional) | Mitigates the threat by securely distributing 802.11 keys to clients. | |
| FCS_CKM.1/WPA (implementation-dependent) | Mitigates the threat by utilizing a secure key generation function for WPA functionality. | |
| FCS_CKM.2/GTK (implementation-dependent) | Mitigates the threat by securely distributing GTK keys to clients. | |
| FCS_CKM.2/PMK (implementation-dependent) | Mitigates the threat by securely receiving a key from an authentication server. | |
| FTP_ITC.1/Client (implementation-dependent) | Mitigates the threat by providing a secure channel for LiFi client traffic. | |
| FTP_ITC.1/Gvlc (implementation-dependent) | Mitigates the threat by providing a secure channel for LiFi client traffic. update status of this if needed to resolve github comment | |
| FCS_RADSEC_EXT.1 (selection-based) | Mitigates the threat by utilizing a secure RADIUS implementation to authenticate clients. | |
| FCS_RADSEC_EXT.2 (selection-based) | Mitigates the threat by utilizing a secure TLS configuration for RADIUS over TLS. | |
| T.NETWORK_ACCESS | FAU_GEN.1/LiFi | Mitigates the threat by generating audit data that will detect access to the network. |
| FIA_UAU.6 | Mitigates the threat by re-authenticating users when specified criteria are met. | |
| FMT_SMF.1/LiFi | Mitigates the threat by defining management functions that must be protected. | |
| FMT_SMR_EXT.1 | Mitigates the threat by preventing remote administration functions from being exercised from a wireless client. | |
| FTA_TSE.1 | Mitigates the threat by denying sessions based on undesirable characteristics. | |
| FTP_ITC.1/8021X | Mitigates the threat by authenticating clients before allowing access to the controlled network. | |
| FIA_PSK_EXT.1 (implementation-dependent) | Mitigates the threat by defining the use of a PSK to authenticate clients. | |
| FCS_RADSEC_EXT.1 (selection-based) | Mitigates the threat by utilizing a secure RADIUS implementation to authenticate clients. | |
| FCS_RADSEC_EXT.2 (selection-based) | Mitigates the threat by utilizing a secure TLS configuration for RADIUS over TLS. | |
| T.NETWORK_ATTACK | FAU_GEN.1/LiFi | Mitigates the threat by generating audit data that will detect TSF failures. |
| FPT_AEX_EXT.1 | Mitigates the threat by implementing mechanisms that increase the difficulty of a successful network attack. | |
| T.REPLAY_ATTACK | FCS_COP.1/LiFiDataEncryption | Mitigates the threat by defining implementation of secure cryptographic integrity algorithms that prevent the disclosure of data that would be potentially suitable for replay attempts. |
| FTP_ITC.1/8021X | Mitigates the threat by authenticating clients before allowing access to the controlled network and preventing replay of previous authentication sessions. | |
| FIA_UAU.6 | Mitigates the threat by re-authenticating users when specified criteria are met, which can include if a specified time has passed or other indicators of stale authentication data. | |
| FTA_TSE.1 | Mitigates the threat by denying sessions based on undesirable characteristics, which can include a detection of replay or other indicators of stale authentication data. | |
| FCS_CKM.2/DISTRIB (optional) | Mitigates the threat by securely distributing 802.11 keys to clients so that they are not disclosed, maintaining confidentiality and preventing replay. | |
| FCS_CKM.1/WPA (implementation-dependent) | Mitigates the threat by utilizing a secure key generation function for WPA functionality that is not subject to replay or guessing. | |
| FCS_CKM.2/GTK (implementation-dependent) | Mitigates the threat by securely distributing GTK keys to clients so that they are not disclosed, maintaining confidentiality and preventing replay. | |
| FCS_CKM.2/PMK (implementation-dependent) | Mitigates the threat by securely receiving a key from an authentication server so that it is not disclosed, maintaining confidentiality and preventing replay. | |
| FTP_ITC.1/Client (implementation-dependent) | Mitigates the threat by providing a secure channel for LiFi client traffic that prevents the use of replayed data. | |
| FTP_ITC.1/Gvlc (implementation-dependent) | Mitigates the threat by providing a secure channel for LiFi client traffic that prevents the use of replayed data. | |
| FCS_RADSEC_EXT.1 (selection-based) | Mitigates the threat by utilizing a secure RADIUS implementation to authenticate clients, which protects authentication data from replay attacks. | |
| FCS_RADSEC_EXT.2 (selection-based) | Mitigates the threat by utilizing a secure TLS configuration for RADIUS over TLS, which provides protection against replay and data modification. |
| PP-Module Threat, Assumption, OSP | Consistency Rationale |
|---|---|
| T.DATA_INTEGRITY | This threat is a specific type of failure that may result from successful exploitation of the T.WEAK_CRYPTOGRAPHY threat defined by the Base-PP. It is an extension of the Base-PP threat for communications that are specific to this PP-Module. |
| T.NETWORK_DISCLOSURE | This threat extends the security problem defined by the Base-PP to include the threat of a malicious entity in an untrusted network interacting with a protected entity in a trusted network. This is not addressed in the Base-PP because not all network devices are responsible for facilitating communications between separate networks. This threat is also consistent with the T.UNTRUSTED_COMMUNICATION_CHANNELS threat defined by the Base-PP because compromise of data in transit is one potential way this threat may be exploited. |
| T.NETWORK_ACCESS | This threat extends the security problem defined by the Base-PP to include the threat of a malicious entity in an untrusted network interacting with a protected entity in a trusted network. This is not addressed in the Base-PP because not all network devices are responsible for facilitating communications between separate networks. |
| T.NETWORK_ATTACK | This threat extends the security problem defined by the Base-PP to define a specific manifestation of T.SECURITY_FUNCTIONALITY_FAILURE. |
| T.REPLAY_ATTACK | This threat is a specific type of failure that may result from successful exploitation of the T.UNAUTHORIZED_ADMINISTRATOR_ACCESS and T.UNTRUSTED_COMMUNICATIONS_CHANNELS threats defined by the Base-PP. It is an extension of the Base-PP threat for communications that are specific to this PP-Module. |
| A.NON_SECURITY_FUNCTIONS | This is consistent with the Base-PP because the notion of exact PP conformance accepts the case where non-TSF functionality exists within the physical boundary of the TOE if there are no PP requirements to evaluate it. |
| A.MANAGED_CONFIG | This is consistent with A.TRUSTED_ADMINISTRATOR in the Base-PP by defining specific mechanisms by which the trusted administrator is defined. |
| A.THIRD_PARTY_SOFTWARE | This is consistent with the Base-PP because the existence of a trusted update mechanism allows for the possibility that the TOE may have implementation flaws in need of fixing. |
| A.NETWORK_CONNECTIVITY | This is consistent with the Base-PP because a network device inherently requires network connectivity and the Base-PP similarly does not treat external entities as automatically trusted (hence the use of trusted channels to authentiate them). |
| A.PROPER_USER | This is consistent with the expectations of A.TRUSTED_ADMINISTRATOR in the Base-PP by defining administrators as non-hostile but allowing for the possibility of unintentional error. |
| PP-Module OE Objective | Consistency Rationale |
|---|---|
| OE.NON_SECURITY_FUNCTIONS | This is consistent with the Base-PP because the notion of exact PP conformance accepts the case where non-TSF functionality exists within the physical boundary of the TOE if there are no PP requirements to evaluate it. |
| OE.MANAGED_CONFIG | This is consistent with A.TRUSTED_ADMINISTRATOR in the Base-PP by defining specific mechanisms by which the trusted administrator is defined. |
| OE.THIRD_PARTY_SOFTWARE | This is consistent with the Base-PP because the existence of a trusted update mechanism allows for the possibility that the TOE may have implementation flaws in need of fixing. |
| OE.NETWORK_CONNECTIVITY | This is consistent with the Base-PP because a network device inherently requires network connectivity and the Base-PP similarly does not treat external entities as automatically trusted (hence the use of trusted channels to authentiate them). |
| OE.PROPER_USER | This is consistent with the expectations of A.TRUSTED_ADMINISTRATOR in the Base-PP by defining administrators as non-hostile but allowing for the possibility of unintentional error. |
| PP-Module Requirement | Consistency Rationale |
|---|---|
| Modified SFRs | |
| This PP-Module does not modify any requirements when the NDcPP is the base. | |
| Additional SFRs | |
| This PP-Module does not add any requirements when the NDcPP is the base. | |
| Mandatory SFRs | |
| FAU_GEN.1/LiFi | This SFR iterates the FAU_GEN.1 SFR defined in the Base-PP to define auditable events for the functionality that is specific to this PP-Module. |
| FCS_COP.1/LiFiDataEncryption | This SFR defines cryptographic behavior for functions outside the scope of what the Base-PP originally defined. |
| FIA_8021X_EXT.1 | This SFR defines support for 802.1X communications, which is a logical interface that extends the scope of what the Base-PP originally defined. |
| FIA_UAU.6 | This SFR defines support for re-authentication of wireless users, which are a type of subject beyond the scope of what the Base-PP originally defined. |
| FMT_SMF.1/LiFi | This SFR defines additional management functionality that is specific to the Module’s product type and would therefore not be expected to be present in the Base-PP. |
| FMT_SMR_EXT.1 | This SFR specifies that remote administration occurs over a dedicated channel, which does not conflict with the Base-PP. |
| FPT_AEX_EXT.1 | This SFR enforces specific low-level protections on the software running on the TOE that does not conflict with any other security functionality. |
| FTA_TSE.1 | |
| FTP_ITC.1/8021X | This SFR iterates the FTP_ITC.1 SFR defined in the Base-PP to define trusted communication channels for the functionality that is specific to this PP-Module. |
| Optional SFRs | |
| FCS_CKM.2/DISTRIB | This SFR defines an additional use for the cryptographic and self-protection mechanisms defined in the Base-PP. |
| Objective SFRs | |
| This PP-Module does not define any Objective requirements. | |
| Implementation-dependent SFRs | |
| FCS_CKM.1/WPA | This SFR defines additional cryptographic functionality not defined in the Base-PP, but it implements this using the DRBG mechanism already defined in the Base-PP. |
| FCS_CKM.2/GTK | This SFR defines additional cryptographic functionality not defined in the Base-PP that is used for functionality outside the original scope of the Base-PP. |
| FCS_CKM.2/PMK | This SFR defines additional cryptographic functionality not defined in the Base-PP that is used for functionality outside the original scope of the Base-PP. |
| FIA_PSK_EXT.1 | This SFR defines parameters for pre-shared key generation. The Base-PP supports pre-shared keys as a potential authentication method for IPsec. This PP-Module does not prevent this from being used but does define restrictions on how pre-shared keys may be generated and what constitutes an acceptable key. This may also be used for RadSec, which is outside the original scope of the Base-PP. |
| FTP_ITC.1/Client | This SFR iterates the FTP_ITC.1 SFR defined in the Base-PP to define trusted communication channels for the functionality that is specific to this PP-Module. |
| FTP_ITC.1/Gvlc | This SFR iterates the FTP_ITC.1 SFR defined in the Base-PP to define trusted communication channels for the functionality that is specific to this PP-Module. |
| Selection-based SFRs | |
| FCS_RADSEC_EXT.1 | This SFR defines the implementation of RadSec and the peer authentication method that it uses. This relies on the TLS requirements defined by the Base-PP and may also use the X.509v3 certificate validation methods specified in the Base-PP, depending on the selected peer authentication method. |
| FCS_RADSEC_EXT.2 | This SFR defines the implementation of RadSec when pre-shared key authentication is used. This functionality is outside the original scope of the Base-PP, but it relies on the TLS client protocol implementation, cryptographic algorithms, and random bit generation functions defined by the Base-PP. |
This SFR is optional because a conformant TOE may be a standalone device that has no function for distributing keys to other devices. A distributed TOE that supports 802.11bb is expected to claim this functionality.
If claimed, this requirement applies to any key necessary for successful IEEE 802.11 connections not covered by FCS_CKM.2/GTK. In cases where a key must be distributed to other APs, this communication must be performed via a mechanism of commensurate cryptographic strength. Because communications with any component of a distributed TOE are required to be performed over a trusted connection, the transfer of these keys will be protected.
This PP-Module does not define any Objective SFRs.
| Requirement | Auditable Events | Additional Audit Record Contents |
|---|---|---|
| FCS_CKM.1/WPA | ||
| No events specified | N/A | |
| FCS_CKM.2/GTK | ||
| No events specified | N/A | |
| FCS_CKM.2/PMK | ||
| No events specified | N/A | |
| FIA_PSK_EXT.1 | ||
| No events specified | N/A | |
| FTP_ITC.1/Client | ||
| Failed attempts to establish a trusted channel (including IEEE 802.11) | Identification of the initiator and target of channel | |
| Detection of modification of channel data | Identification of the initiator and target of channel | |
| FTP_ITC.1/Gvlc | ||
| Failed attempts to establish a trusted channel | Identification of the initiator and target of channel | |
| Detection of modification of channel data | Identification of the initiator and target of channel |
| Identifier | Cryptographic Key Generation Algorithm | Cryptographic Key Sizes | List of standards |
|---|---|---|---|
| PRF-384 | Pseudorandom Function using a random bit generator as specified in FCS_RBG.1 (from Base-PP) | 384 bits | IEEE 802.11-2020 |
| PRF-512 | Pseudorandom Function using a random bit generator as specified in FCS_RBG.1 (from Base-PP) | 512 bits | IEEE 802.11-2020 |
| PRF-704 | Pseudorandom Function using a random bit generator as specified in FCS_RBG.1 (from Base-PP) | 704 bits | IEEE 802.11-2020, IEEE 802.11ax-2021 |
The cryptographic key derivation algorithm required by IEEE 802.11-2020 (Section 12.7.1.2) and verified in WPA2 certification is PRF-384, which uses the HMAC-SHA-1 function and outputs 384 bits. The use of GCMP is defined in IEEE 802.11ax-2021 (Section 12.5.5) and requires a Key Derivation Function (KDF) based on HMAC-SHA-256 (for 128-bit symmetric keys) or HMAC-SHA-384 (for 256-bit symmetric keys). This KDF outputs 704 bits.
This requirement applies only to the keys that are generated or derived for the communications between the AP and the client once the client has been authenticated. It refers to the derivation of the Group Temporal Key (GTK), through the Random Bit Generator (RBG) specified in this PP-Module, as well as the derivation of the Pairwise Transient Key (PTK) from the Pairwise Master Key (PMK), which is done using a random value generated by the RBG specified in this PP-Module, the HMAC function as specified in this PP-Module, as well as other information. This is specified in IEEE 802.11-2020, primarily in chapter 12. FCS_RBG.1 is defined in the NDcPP.
This requirement must be included if IPsec or another protocol that uses pre-shared keys is claimed, and pre-shared key authentication is selected (e.g., "Pre-shared Keys" is selected in FCS_IPSEC_EXT.1.13 or "pre-shared keys" is selected in FCS_RADSEC_EXT.1.2). The intent of this requirement is that all protocols will support both text-based and bit-based pre-shared keys.
For the length of the text-based pre-shared keys, a common length (22 characters) is required to help promote interoperability. If other lengths are supported, they should be listed in the assignment; this assignment can also specify a range of values (e.g., "lengths from 5 to 55 characters") as well.
For FIA_PSK_EXT.1.3, the ST author specifies whether the TSF merely accepts bit-based pre-shared keys or is capable of generating them. If it generates them, the requirement specifies that they must be generated using the RBG provided by the TOE.
This requirement has been iterated from its definition in the NDcPP to mandate support for 802.11 specifically for LiFi client access.
This requirement has been iterated from its definition in the NDcPP to mandate support for MACsec.
| Requirement | Auditable Events | Additional Audit Record Contents |
|---|---|---|
| FCS_RADSEC_EXT.1 | ||
| No events specified | N/A | |
| FCS_RADSEC_EXT.2 | ||
| No events specified | N/A |
This SFR is applicable if "RADIUS over TLS" is selected in FTP_ITC.1.1.
If X.509v3 certificates is selected in FCS_RADSEC_EXT.1.2, then FCS_TLSC_EXT.1 from the Functional Package for TLS must be claimed and "mutual authentication" must be selected in FCS_TLSC_EXT.1.1. If pre-shared keys is selected in FCS_RADSEC_EXT.1.2, then FCS_RADSEC_EXT.2 and FIA_PSK_EXT.1 in this PP-Module must be claimed.
The above ciphersuites are only for use when the TSF is acting as a RADIUS over TLS client, not for other uses of the TLS protocol. The ciphersuites to be tested in the evaluated configuration are limited by this requirement. The ST author should select the ciphersuites that are supported.
| Functional Class | Functional Components |
|---|---|
| Cryptographic Support (FCS) | FCS_RADSEC_EXT RadSec |
| Identification and Authentication (FIA) | FIA_8021X_EXT 802.1X Port Access Entity (Authenticator) Authentication |
| Protection of the TSF (FPT) | FPT_AEX_EXT Anti-Exploitation Capabilities |
| Security Management (FMT) | FMT_SMR_EXT Security Management Restrictions |
FCS_RADSEC_EXT.1, RadSec, requires the TSF to implement RadSec using a specified peer authentication method.
FCS_RADSEC_EXT.2, RadSec using Pre-Shared Keys, requires the TSF to implement RadSec using pre-shared key authentication in a manner that conforms to relevant TLS specifications.
No specific management functions are identified.
There are no auditable events foreseen.
| Hierarchical to: | No other components. |
| Dependencies to: |
FCS_TLSC_EXT.1 TLS Client Protocol FIA_PSK_EXT.1 Pre-Shared Key Composition FIA_X509_EXT.1 X.509v3 Certificate Validation |
No specific management functions are identified.
There are no auditable events foreseen.
| Hierarchical to: | No other components. |
| Dependencies to: |
FCS_CKM.1 Cryptographic Key Generation FCS_COP.1 Cryptographic Operation FCS_RADSEC_EXT.1 RadSec FCS_RBG.1 Random Bit Generation |
FIA_8021X_EXT.1, 802.1X Authentication, requires the TSF to securely implement IEEE 802.1X as an authenticator.
No specific management functions are identified.
The following actions should be auditable if FAU_GEN Security Audit Data Generation is included in the ST:
| Hierarchical to: | No other components. |
| Dependencies to: | No dependencies |
FPT_AEX_EXT.1, Anti-Exploitation Capabilities, requires the application to implement functionality that protects against common software exploits.
No specific management functions are identified.
There are no auditable events foreseen.
| Hierarchical to: | No other components. |
| Dependencies to: | No dependencies. |
FMT_SMR_EXT.1, No Administration from Client, requires the TSF to reject remote administration from a wireless client by default.
No specific management functions are identified.
There are no auditable events foreseen.
| Acronym | Meaning |
|---|---|
| AES | Advanced Encryption Standard |
| AP | Access Point |
| ASLR | Address Space Layout Randomization |
| Base-PP | Base Protection Profile |
| CBC | Cipher Block Chaining |
| CC | Common Criteria |
| CCM | Counter Mode with CBC-Message Authentication Code |
| CCMP | CCM mode Protocol |
| CEM | Common Evaluation Methodology |
| cPP | Collaborative Protection Profile |
| CTR | Counter (encryption mode) |
| EAP | Extensible Authentication Protocol |
| GCM | Galois-Counter Mode |
| GTK | Group Temporal Key |
| IPsec | Internet Protocol Security |
| MAC | Media Access Control |
| NDcPP | Network Device collaborative Protection Profile |
| OE | Operational Environment |
| PAE | Port Access Entity |
| PMK | Pairwise Master Key |
| PP | Protection Profile |
| PP-Configuration | Protection Profile Configuration |
| PP-Module | Protection Profile Module |
| PTK | Pairwise Transient Key |
| RADIUS | Remote Authentication Dial In User Service |
| RBG | Random Bit Generator |
| SAR | Security Assurance Requirement |
| SFR | Security Functional Requirement |
| SSID | Service Set Identifier |
| ST | Security Target |
| TLS | Transport Layer Security |
| TOE | Target of Evaluation |
| TSF | TOE Security Functionality |
| TSFI | TSF Interface |
| TSS | TOE Summary Specification |
| WPA | Wi-Fi Protected Access |
| Identifier | Title |
|---|---|
| [CC] | Common Criteria for Information Technology Security Evaluation -
|
| [CEM] | Common Methodology for Information Technology Security Evaluation -
|