Version: 1.02022-03-31National Information Assurance Partnership| Version | Date | Comment |
|---|
| ID | Requirement | Assurance Activity | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FAU_GEN.1.1/WLAN | The TSF shall be able to generate an audit record of the following auditable
events:
Application
Note:
The auditable events defined in : Auditable Events auditWLAN are for the SFRs that are explicitly defined in this PP-Module and are intended to extend FAU_GEN.1 in the Base-PP. The events in the Auditable Events table should be combined with those of the NDcPP in the context of a conforming Security Target. The Auditable Events (: Auditable Events auditWLAN) includes optional and objective SFRs. The auditing of optional and objective SFRs is only required if that SFR is included in the ST. Per FAU_STG_EXT.1 in the Base-PP, the TOE must support transfer of the audit data to an external IT entity using a trusted channel. |
There are no TSS evaluation activities for this SFR. There are no operational guidance activities for this SFR. The evaluator will test the TOE’s ability to correctly generate audit records by having the TOE generate audit records in accordance with the evaluation activities associated with the functional requirements in this PP-Module. When verifying the test results, the evaluator will ensure the audit records generated during testing match the format specified in the administrative guide and that the fields in each audit record have the proper entries. Note that the testing here can be accomplished in conjunction with the testing of the security mechanisms directly. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FCS_CKM.1.1/WPA |
The TSF shall generate symmetric cryptographic keys in accordance with a
specified cryptographic key generation algorithm [PRF-384 and [selection: PRF-512, PRF-704, no other algorithm ]] and specified cryptographic key sizes [256 bits and [selection: 128 bits, 192 bits, no other key sizes ]] using a Random Bit Generator as specified in FCS_RBG_EXT.1 that meet the following:
[IEEE 802.11-2020 and [selection: IEEE 802.11ax-2021, no other standards ]].
Application
Note:
The cryptographic key derivation algorithm required by IEEE 802.11-2020 (Section 12.7.1.2) and verified in WPA2 certification is PRF-384, which uses the HMAC-SHA-1 function and outputs 384 bits. The use of GCMP is defined in IEEE 802.11ax-2021 (Section 12.5.5) and requires a Key Derivation Function (KDF) based on HMAC-SHA-256 (for 128-bit symmetric keys) or HMAC-SHA-384 (for 256-bit symmetric keys). This KDF outputs 704 bits. This requirement applies only to the keys that are generated or derived for the communications between the AP and the client once the client has been authenticated. It refers to the derivation of the Group Temporal Key (GTK), through the Random Bit Generator (RBG) specified in this PP-Module, as well as the derivation of the Pairwise Transient Key (PTK) from the Pairwise Master Key (PMK), which is done using a random value generated by the RBG specified in this PP-Module, the HMAC function as specified in this PP-Module, as well as other information. This is specified in IEEE 802.11-2020, primarily in chapter 12. FCS_RBG_EXT.1 is defined in the NDcPP. |
The cryptographic primitives will be verified through evaluation activities specified elsewhere in this PP-Module.
The evaluator will verify that the TSS describes how the primitives defined and implemented by this PP-Module
are used by the TOE in establishing and maintaining secure connectivity to the wireless clients. This
description will include how the GTK and PTK are generated or derived. The TSS will also provide a
description of the developer’s methods of assuring that their implementation conforms to the
cryptographic standards; this includes not only testing done by the developing organization, but also
proof of third-party testing that is performed (e.g. WPA2 certification). The evaluator will ensure that
the description of the testing methodology is of sufficient detail to determine the extent to which the
details of the protocol specifics are tested. There are no guidance evaluation activities for this component. The evaluator will perform the following test using a packet sniffing tool to collect frames between the TOE and a wireless client: Step 1: The evaluator will configure the AP to an unused channel and configure the WLAN sniffer to sniff only on that channel (i.e., lock the sniffer on the selected channel). The sniffer should also be configured to filter on the MAC address of the TOE and client. Step 2: The evaluator will configure the TOE to communicate with a WLAN client using IEEE 802.11-2020 and a 256-bit (64 hex values 0-f) pre-shared key, setting up the connections as described in the operational guidance. The pre-shared key is only used for testing. Step 3: The evaluator will start the sniffing tool, initiate a connection between the TOE and WLAN client, and allow the TOE to authenticate, associate, and successfully complete the four-way handshake with the client. Step 4: The evaluator will set a timer for one minute, at the end of which the evaluator will disconnect the client from the TOE and stop the sniffer. Step 5: The evaluator will identify the four-way handshake frames (denoted EAPOL-key in Wireshark captures) and derive the PTK from the four-way handshake frames and pre-shared key as specified in IEEE 802.11-2020. Step 6: The evaluator will select the first data frame from the captured packets that was sent between the client and TOE after the four-way handshake successfully completed and without the frame control value 0x4208 (the first two bytes are 08 42). The evaluator will use the PTK to decrypt the data portion of the packet as specified in IEEE 802.11-2020 and verify that the decrypted data contains ASCII-readable text. Step 7: The evaluator will repeat Step 6 for the next two data frames between the TOE and client, and without frame control value 0x4208. Additionally, the evaluator will test the PRF function using the test vectors from:
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FCS_CKM.2.1/GTK |
The TSF shall distribute Group Temporal Key (GTK) in accordance with a specified cryptographic key distribution method: [selection: AES Key Wrap in an EAPOL-Key frame, AES Key Wrap with Padding in an EAPOL-Key frame ] that meets the following: [NIST SP 800-38F, IEEE 802.11-2020 for the packet format and timing considerations]
and does not expose the cryptographic keys.
Application
Note:
This requirement applies to the Group Temporal Key (GTK) that is generated by the
TOE for use in broadcast and multicast messages to clients to which it is connected. 802.11-2020
specifies the format for the transfer as well as the fact that it must be wrapped by the AES Key Wrap
method specified in NIST SP 800-38F. |
The evaluator will check the TSS to ensure that it describes how the GTK is wrapped prior to being
distributed using the AES implementation specified in this PP-Module, and also how the GTKs are distributed
when multiple clients connect to the TOE. There are no guidance evaluation activities for this component. The evaluator will perform the following test using a packet sniffing tool to collect frames between a wireless client and the TOE (which may be performed in conjunction with the evaluation activity for FCS_CKM.1/PMK. To fully test the broadcast and multicast functionality, these steps will be performed as the evaluator connects multiple clients to the TOE. The evaluator will ensure that GTKs established are sent to the appropriate participating clients. Step 1: The evaluator will configure the AP to an unused channel and configure the WLAN sniffer to sniff only on that channel (i.e., lock the sniffer on the selected channel). The sniffer should also be configured to filter on the MAC address of the TOE and client. Step 2: The evaluator will configure the TOE to communicate with the client using IEEE 802.11-2020 and a 256-bit (64 hex values 0-f) pre-shared key, setting up the connections as described in the operational guidance. The pre-shared key is only used for testing. Step 3: The evaluator will start the sniffing tool, initiate a connection between the TOE and client, and allow the client to authenticate, associate and successfully complete the four-way handshake with the TOE. Step 4: The evaluator will set a timer for one minute, at the end of which the evaluator will disconnect the TOE from the client and stop the sniffer. Step 5: The evaluator will identify the four-way handshake frames (denoted EAPOL-key in Wireshark captures) and derive the PTK and GTK from the four-way handshake frames and pre-shared key as specified in IEEE 802.11-2020. Step 6: The evaluator will select the first data frame from the captured packets that was sent between the TOE and client after the four-way handshake successfully completed, and with the frame control value 0x4208 (the first two bytes are 08 42). The evaluator will use the GTK to decrypt the data portion of the selected packet as specified in IEEE 802.11-2020 and verify that the decrypted data contains ASCII-readable text. Step 7: The evaluator will repeat Step 6 for the next two data frames with frame control value 0x4208. The evaluator will also perform the following testing based on the supported GTK distribution methods: AES Key Wrap (AES-KW Tests)
AES Key Wrap with Padding (AES-KWP Tests)
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FCS_CKM.2.1/PMK |
The TSF shall receive the 802.11 Pairwise Master Key (PMK) in
accordance with a specified cryptographic key distribution method: [from 802.1X Authorization Server]
that meets the following: [IEEE 802.11-2020] and does not expose the cryptographic keys.
Application
Note:
This requirement applies to the Pairwise Master Key that is received from the RADIUS
server by the TOE. The intent of this requirement is to ensure conformant TOEs implement 802.1X
authentication prior to establishing secure communications with the client.
The intent is that any WLAN AS evaluated against this PP-Module will support both
WPA2-Enterprise and WPA3-Enterprise at a minimum and certificate-based authentication mechanisms
and therefore disallows implementations that support only pre-shared keys. Because communications
with the RADIUS server are required to be performed over a protected connection, the transfer
of the PMK will be protected.
|
The evaluator will examine the TSS to determine that it describes how the PMK is transferred (that is,
through what EAP attribute) to the TOE. There are no guidance evaluation activities for this component. The evaluator will establish a session between the TOE and a RADIUS server according to the configuration guidance provided. The evaluator will then examine the traffic that passes between the RADIUS server and the TOE during a successful attempt to connect a wireless client to the TOE to determine that the PMK is not exposed. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FIA_8021X_EXT.1.1 | The TSF shall conform to IEEE Standard 802.1X for a Port Access Entity (PAE) in the
“Authenticator” role. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FIA_8021X_EXT.1.2 | The TSF shall support communications to a RADIUS authentication server
conforming to RFCs 2865 and 3579. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FIA_8021X_EXT.1.3 | The TSF shall ensure that no access to its 802.1X controlled port is given to the
wireless client prior to successful completion of this authentication exchange. Application
Note:
This requirement covers the TOE's role as the authenticator in an 802.1X authentication exchange. If the exchange is completed successfully, the TOE will obtain the PMK from the RADIUS server and perform the four-way handshake with the wireless client (supplicant) to begin 802.11 communications. As indicated previously, there are at least three communication paths present during the exchange; two with the TOE as an endpoint and one with the TOE acting as a transfer point only. The TOE establishes an EAP over Local Area Network (EAPOL) connection with the wireless client as specified in 802.1X-2007. The TOE also establishes (or has established) a RADIUS protocol connection protected either by IPsec or RadSec (TLS) with the RADIUS server. The wireless client and RADIUS server establish an EAP-TLS session (RFC 5216); in this transaction the TOE merely takes the EAP-TLS packets from its EAPOL/RADIUS endpoint and transfers them to the other endpoint. Because the specific authentication method (TLS in this case) is opaque to the TOE, there are no requirements with respect to RFC 5126 in this PP-Module. However, the base RADIUS protocol (2865) has an update (3579) that will need to be addressed in the implementation and evaluation activities. Additionally, RFC 5080 contains implementation issues that will need to be addressed by developers but which levy no new requirements. The point of performing 802.1X authentication is to provide access to the network (assuming the authentication was successful and that all 802.11 negotiations are performed successfully); in the terminology of 802.1X, this means the wireless client has access to the "controlled port" maintained by the TOE. |
In order to show that the TSF implements the 802.1X-2010 standard correctly, the evaluator will ensure
that the TSS contains the following information:
There are no guidance evaluation activities for this component. The evaluator will perform the following tests:
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FIA_UAU.6.1 | The TSF shall re-authenticate the administrative user under the conditions [when the user
changes their password, [selection: following TSF-initiated session locking, [assignment:
other conditions], no other conditions ]].
|
There are no TSS evaluation activities for this component. There are no guidance evaluation activities for this component. The evaluator will attempt to change their password as directed by the operational guidance. While making this attempt, the evaluator will verify that re-authentication is required. If other re-authentication conditions are specified, the evaluator will cause those conditions to occur and verify that the TSF re-authenticates the authenticated user. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FMT_SMF.1.1/AccessSystem | The TSF shall be capable of performing the following management functions:
|
The evaluator will confirm that the TSS includes which security types (e.g., WPA3),
authentication protocol (e.g., SAE), and frequency bands the WLAN AS supports.
The evaluator will confirm that the TSS includes how connection attempts
from clients that are not operating on an approved security type are handled. The evaluator will confirm that the operational guidance includes instructions for configuring the WLAN AS for each feature listed.
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FMT_SMR_EXT.1.1 |
The TSF shall ensure that the ability to administer remotely the TOE from a wireless client
shall be disabled by default.
|
There are no TSS evaluation activities for this component. The evaluator will review the operational guidance to ensure that it contains instructions for administering the TOE both locally and remotely, including any configuration that needs to be performed on the client for remote administration. The evaluator will confirm that the TOE does not permit remote administration from a wireless client by default. The evaluator will demonstrate that after configuring the TOE for first use from the operational guidance, it is possible to establish an administrative session with the TOE on the “wired” portion of the device. They will then demonstrate that an identically configured wireless client that can successfully connect to the TOE cannot be used to perform administration. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FPT_FLS.1.1 | The TSF shall preserve a secure state when the following types of failures occur: [failure of
the self-tests]. Application
Note:
The intent of this requirement is to express the fail secure capabilities that the TOE
possesses.
This means that the TOE must be able to attain a secure, safe state (shutdown) when any of
the identified failures occur.
|
The evaluator will examine the TSS to determine that the TOE’s implementation of the fail secure
functionality is documented. The evaluator will examine the TSS to ensure that it describes all failure
conditions and how a secure state is preserved if any of these failures occur. The evaluator will ensure that
the definition of a secure state is suitable to ensure the continued protection of any key material and user data. The evaluator will examine the operational guidance to verify that it describes applicable recovery instructions for each TSF failure state. For each failure mode specified in the ST, the evaluator will ensure that the TOE attains a secure state (e.g., shutdown) after initiating each failure mode type. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FTA_TSE.1.1 | The TSF shall be able to deny session establishment of a wireless client session based
on [TOE interface, time, day, [selection: [assignment:
other attributes], no other attributes ]].
Application
Note:
The “TOE interface” can be specified in terms of the device in the TOE that the WLAN client is connecting to (e.g. specific WLAN APs). “Time” and “day” refer to time-of-day and day-of-week, respectively. The assignment is to be used by the ST author to specify additional attributes on which denial of session establishment can be based. |
The evaluator will examine the TSS to determine that all of the attributes on
which a client session can be denied are specifically defined. The evaluator will examine the operational guidance to determine that it contains guidance for configuring each of the attributes identified in the TSS. For each supported attribute, the evaluator will perform the following test:
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FTP_ITC.1.1/Client | The TSF shall be capable of using WPA3-Enterprise, WPA2-Enterprise and
[selection: WPA3-SAE, WPA3-SAE-PK, WPA2-PSK, no other mode ]
as defined by IEEE 802.11-2020 to provide a trusted communication channel
between itself and WLAN clients that is logically distinct from
other communication channels and provides assured identification of its end
points and protection of the channel data from disclosure and detection of
modification of the channel data.
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FTP_ITC.1.2/Client |
The TSF shall permit the authorized IT entities to initiate communication via the trusted channel.
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FTP_ITC.1.3/Client | The TSF shall initiate communication via the trusted channel for [no services]. |
This component is adequately evaluated when performing the evaluation activities for FTP_ITC.1 in the Network Device, version 2.2e base-PP. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Modified SFRs | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FAU_GEN_EXT.1.1 |
This is specified as a selection-based SFR in the Base-PP but is
mandatory for any TOE that claims
conformance to this PP-Module because a conformant TOE will always be distributed.
Therefore, it will always be required for each TOE component to
generate its own audit records.
|
There is no change to the Evaluation Activities specified for this SFR in the NDcPP Supporting Document. The PP-Module modifies this SFR to make it mandatory because of the TOE’s required deployment as a distributed TOE. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FAU_STG_EXT.1.1 |
The TSF shall be able to transmit the generated audit data to an external
IT entity using a trusted channel according to FTP_ITC.1.
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FAU_STG_EXT.1.2 |
The TSF shall be able to store generated audit data on the TOE itself. In addition
[selection: The TOE shall be a distributed TOE that stores audit data on the following TOE
components: [assignment:
identification of TOE components], The TOE shall be a distributed TOE with storage of audit data provided externally for
the following TOE components: [assignment:
list of TOE components that do not store
audit data locally and the other TOE components to which they transmit their generated
audit data] ].
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FAU_STG_EXT.1.3 |
The TSF shall [selection: drop new audit data, overwrite previous audit records according to the following rule: [assignment:
rule for overwriting previous audit records], [assignment:
other action] ] when the local storage space for audit data is full.
|
There is no change to the Evaluation Activities specified for this SFR in the NDcPP Supporting Document. The PP-Module modifies this SFR to restricts selections in FAU_STG_EXT.1.2 to a subset of the available options to account for the TOE being distributed. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FAU_STG_EXT.4.1 |
This is specified as a selection-based SFR in the Base-PP but is
mandatory for any TOE that claims
conformance to this PP-Module because a conformant TOE will always be distributed.
Therefore, it will always be required for each TOE component to
appropriately protect its own audit records.
|
There is no change to the Evaluation Activities specified for this SFR in the NDcPP Supporting Document. The PP-Module modifies this SFR to make it mandatory because of the TOE’s required deployment as a distributed TOE. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FCO_CPC_EXT.1.1 |
This is specified as a selection-based SFR in the Base-PP but is
mandatory for any TOE that claims
conformance to this PP-Module because a conformant TOE will always be distributed.
Therefore, it will always be required for a Security Administrator to enable
communications between any pair of TOE components before such communication can take place.
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FCO_CPC_EXT.1.2 |
This is specified as a selection-based SFR in the Base-PP but is
mandatory for any TOE that claims
conformance to this PP-Module because a conformant TOE will always be distributed.
Therefore, it will always be required that each component
establish and use a communications channel that uses a secure channel requirement or
no channel.
|
There is no change to the Evaluation Activities specified for this SFR in the NDcPP Supporting Document. The PP-Module modifies this SFR to make it mandatory because of the TOE’s required deployment as a distributed TOE. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FCS_COP.1.1/DataEncryption |
The TSF shall perform encryption/decryption in accordance
with a specified cryptographic algorithm AES used in CBC, CCMP, and [selection: CTR, GCM, GCMP, no other ] modes and cryptographic key sizes 256 bits and [selection: 128 bits, 192 bits, no other key sizes ] that meet the following: AES as specified in ISO 18033-3,
CBC as specified in ISO 10116,
CCMP as specified in NIST SP 800-38C and IEEE 802.11-2020, [selection: CTR as specified in ISO 10116, GCM as specified in ISO 19772, GCMP as specified in NIST SP 800-38D and IEEE 802.11ax-2021, no other standards ].
Application
Note:
This requirement is modified from its definition in the NDcPP by mandating the selection of CBC mode and 256 bit key sizes while also defining additional AES mode and key size selections not present in the original definition. This requirement mandates two modes for AES with a key size of 256 bits being implemented. It is not expected that these modes will both be used for all encryption and decryption functionality. Rather, the mandates serve particular purposes: to comply with the FCS_IPSEC_EXT.1 requirements, CBC mode is mandated, and to comply with IEEE 802.11-2020, AES-CCMP (which uses AES in CCM as specified in SP 800-38C) must be implemented. For the first selection of FCS_COP.1.1/DataEncryption, the ST author should choose the additional mode or modes in which AES operates. For the second selection, the ST author should choose the key sizes that are supported by this functionality. 256-bit CCMP is required in order to comply with FCS_CKM.1/WPA. Note that optionally AES-CCMP-192, AES-CCMP-128, AES-GCMP-192, and AES-GCMP-128 with cryptographic key size of 256 bits, may be implemented for IEEE 802.11ax-2021 connections. In the future, one of these modes may be required. CTR mode is not used for WLAN AS capabilities but remains selectable since it may be required by another part of the TSF. |
There are no additional TSS evaluation activities for this component beyond what the NDcPP requires. There are no additional guidance evaluation activities for this component beyond what the NDcPP requires. In addition to the tests required by the NDcPP, the evaluator will perform the following testing: AES-CCM Tests The evaluator will test the generation-encryption and decryption-verification functionality of AES-CCM for the following input parameter and tag lengths: 128 bit and 256 bit keys Two payload lengths. One payload length will be the shortest supported payload length, greater than or equal to zero bytes. The other payload length will be the longest supported payload length, less than or equal to 32 bytes (256 bits). Two or three associated data lengths. One associated data length will be 0, if supported. One associated data length will be the shortest supported payload length, greater than or equal to zero bytes. One associated data length will be the longest supported payload length, less than or equal to 32 bytes (256 bits). If the implementation supports an associated data length of 216 bytes, an associated data length of 216 bytes will be tested. Nonce lengths. All supported nonce lengths between 7 and 13 bytes, inclusive, will be tested. Tag lengths. All supported tag lengths of 4, 6, 8, 10, 12, 14, and 16 bytes will be tested. Due to the restrictions that IEEE 802.11 specifies for this mode (nonce length of 13 and tag length of 8), it is acceptable to test a subset of the supported lengths as long as the selections fall into the ranges specified above. In this case, the evaluator will ensure that these are the only supported lengths. To test the generation-encryption functionality of AES-CCM, the evaluator will perform the following four tests:
To test the decryption-verification functionality of AES-CCM, for each combination of supported associated data length, payload length, nonce length, and tag length, the evaluator will supply a key value and 15 nonce, associated data and ciphertext 3-tuples, and obtain either a fail result or a pass result with the decrypted payload. The evaluator will supply 10 tuples that should fail and 5 that should pass per set of 15. Additionally, the evaluator will use tests from the IEEE 802.11-02/362r6 document “Proposed Test vectors for IEEE 802.11 TGi”, dated September 10, 2002, Section 2.1 AES-CCMP Encapsulation Example and Section 2.2 Additional AES-CCMP Test Vectors to verify further the IEEE 802.11-2020 implementation of AES-CCMP. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FPT_TST_EXT.1.1 |
The TSF shall run a suite of the following self-tests during initial start-up (on power on) and [selection: periodically during normal operation, at the request of the authorized user, at the conditions [assignment:
conditions under which self-tests should occur], in no other circumstances ] to demonstrate the correct operation of the TSF: integrity verification of stored TSF executable code when it is loaded for execution
through the use of the TSF-provided cryptographic service specified in FCS_COP.1/SigGen, [selection: [assignment:
list of additional self-tests run by the TSF], no other self-tests ].
Application
Note:
This SFR is modified from its definition in the NDcPP by mandating that self-testing occur at power on and that the self-testing must include, at minimum,
an integrity test using a digital signature. FCS_COP.1/SigGen is defined in the NDcPP. |
The evaluator will perform the following activities in addition to those required by the NDcPP: The evaluator will examine the TSS to ensure that it describes how to verify the integrity of stored TSF executable code when it is loaded for execution, which includes the generation and protection of the “check value” used to ensure integrity as well as the verification step. This description will also cover the digital signature service used in performing these functions. The evaluator also checks the operational guidance to ensure that any actions required by the administrator to initialize or operate this functionality are present. The evaluator will also ensure that the TSS or operational guidance describes the actions that take place for successful and unsuccessful execution of the integrity test. The evaluator will ensure that the TSS or operational guidance describes the actions that take place for successful and unsuccessful execution of the integrity test. The evaluator will perform the following tests:
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FTP_ITC.1.1 | The TSF shall be capable of using IEEE 802.1X, [selection: IPsec, RADIUS over TLS ], and [selection: SSH, TLS, DTLS, HTTPS, no other protocols ] to provide a trusted communication channel
between itself and authorized IT entities supporting the following capabilities: 802.1X authentication server, audit
server, [selection: authentication server, [assignment:
other capabilities], no other capabilities ] that is logically distinct
from other communication channels and provides assured identification of its end points and protection
of the channel data from disclosure and detection of modification of the channel data.
Application
Note:
This requirement has been modified from its definition in the NDcPP to mandate the communications protocols and environmental components that a WLAN AS must use for infrastructure communications (802.11 support is also required for wireless client communications, but this is covered by the FTP_ITC.1/Client). IPsec or RADIUS over TLS (commonly known as "RadSec") is required at least for communications with the 802.1X authentication server. Other selections may be made if needed by other parts of the TSF. The requirement implies that not only are communications protected when they are initially established, but also on resumption after an outage. The IT entity of "802.1X authentication server" is distinct from "authentication server" because the latter may be used for administrator authentication rather than authorization of WLAN clients. If IPsec is selected in FTP_ITC.1.1, then FCS_IPSEC_EXT.1 from the NDcPP must be claimed. If RADIUS over TLS is selected in FTP_ITC.1.1, then FCS_RADSEC_EXT.1 in this PP-Module must be claimed, as well as FCS_TLSC_EXT.1 from the NDcPP. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FTP_ITC.1.2 | The TSF shall permit the TSF or the authorized IT entities to initiate communication via the trusted channel. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FTP_ITC.1.3 | The TSF shall initiate communication via the trusted channel for [assignment:
list of services for which the TSF is able to initiate communications]. |
The evaluator will perform the following activities in addition to those required by the NDcPP: The evaluator will examine the TSS to determine that, for all communications with authorized IT entities identified in the requirement, each communications mechanism is identified in terms of the allowed protocols for that IT entity. The evaluator will also confirm that all protocols listed in the TSS are specified and included in the requirements in the ST. The evaluator will confirm that the guidance documentation contains instructions for establishing the allowed protocols with each authorized IT entity and that it contains recovery instructions should a connection be unintentionally broken. The evaluator will perform the following tests:
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Optional SFRs | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FCS_CKM.2.1/DISTRIB | The TSF shall distribute the IEEE 802.11 keys in accordance with a
specified key distribution method: [trusted channel protocol specified in FPT_ITT.1(Base-PP) ] that meets the following: [standards specified in the various iterations of FCS_COP.1] and
does not expose the cryptographic keys.
Application
Note:
This requirement applies to any key necessary for successful IEEE 802.11 connections not covered by FCS_CKM.2/GTK. In cases where a key must be distributed to other APs, this communication must be performed via a mechanism of commensurate cryptographic strength. Because communications with any component of a distributed TOE are required to be performed over a trusted connection, the transfer of these keys will be protected. FCS_COP.1 and FPT_ITT.1 are defined in the NDcPP. |
The evaluator will examine the TSS to determine that it describes which keys are distributed outside
the TOE, where they are sent, and the purpose for this transfer. If this function is dependent on TOE configuration, the evaluator will confirm that the operational guidance contains instructions for how to configure that the keys are adequately protected. This requirement will be tested in conjunction with the tests for the cryptographic primitives, the secure protocols, and FPT_ITT.1 (Base-PP). |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Selection-based SFRs | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FCS_RADSEC_EXT.1.1 |
The TSF shall implement RADIUS over TLS as specified in RFC 6614 to communicate securely with a RADIUS server.
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FCS_RADSEC_EXT.1.2 |
The TSF shall perform peer authentication using [selection: X.509v3 certificates, pre-shared keys ].
Application
Note:
This SFR is applicable if "RADIUS over TLS" is selected in FTP_ITC.1.1. If X.509v3 certificates is selected in FCS_RADSEC_EXT.1.2, then FCS_TLSC_EXT.2 from the NDcPP must be claimed. If pre-shared keys is selected in FCS_RADSEC_EXT.1.2, then FCS_RADSEC_EXT.2 and FIA_PSK_EXT.1 in this PP-Module must be claimed. |
The evaluator will verify that the TSS description includes the use of
RADIUS over TLS, as described in RFC 6614.
If X.509v3 certificates is selected, the evaluator will ensure that the TSS description includes the use of client-side certificates for TLS mutual authentication. The evaluator will verify that any configuration necessary to meet the requirement must be contained in the guidance.The evaluator will demonstrate the ability to successfully establish a RADIUS over TLS connection with a RADIUS server. This test will be performed with X.509v3 certificates if selected and performed with pre-shared keys if selected. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FCS_RADSEC_EXT.2.1 | The TSF shall implement [selection: TLS 1.2 (RFC 5246), TLS 1.1 (RFC 4346) ] and no earlier TLS versions when acting as a RADIUS over TLS client that supports the following ciphersuites:
[selection:
Application
Note:
If any of the TLS_RSA_PSK ciphersuites are selected by the ST author, it is necessary to claim the selection-based requirement FCS_RADSEC_EXT.3. The above ciphersuites are only for use when the TSF is acting as a RADIUS over TLS client, not for other uses of the TLS protocol. The ciphersuites to be tested in the evaluated configuration are limited by this requirement. The ST author should select the ciphersuites that are supported. If "X.509v3 certificates" is selected in FCS_RADSEC_EXT.1.2, the ciphersuites selected in (and tested by) FCS_TLSC_EXT.2.1 are also supported for RADIUS over TLS client use. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FCS_RADSEC_EXT.2.2 | The TSF shall be able to [selection: accept, generate using the random bit generator specified in FCS_RBG_EXT.1 ] bit-based pre-shared keys. |
The evaluator will check the description of the implementation of this protocol in the TSS to ensure that the ciphersuites supported are specified.
The evaluator will check the TSS to ensure that the ciphersuites specified are identical to those listed for this component.
The evaluator will also verify that the TSS contains a description of the denial of old SSL and TLS versions.
The evaluator will examine the TSS to ensure it describes the process by which the bit-based pre-shared keys are generated (if the TOE supports this functionality) and confirm that this process uses the RBG specified in FCS_RBG_EXT.1. The evaluator will verify that any configuration necessary to meet the requirement must be contained in the guidance.The evaluator will also check the guidance documentation to ensure that it contains instructions on configuring the TOE so that RADIUS over TLS conforms to the description in the TSS (for instance, the set of ciphersuites advertised by the TOE may have to be restricted to meet the requirements). The evaluator will confirm the operational guidance contains instructions for either entering bit-based pre-shared keys or generating a bit-based pre-shared key (or both). The evaluator will perform the following tests:
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FCS_RADSEC_EXT.3.1 |
When the TSF negotiates a TLS_RSA_PSK cipher suite, the TSF shall verify that the presented identifier matches the reference identifier per RFC 6125 section 6.
Application
Note:
This requirement must be claimed if any ciphersuites beginning with 'TLS_RSA_PSK' are selected in FCS_RADSEC_EXT.2.1. The rules for verification of identity are described in Section 6 of RFC 6125. The reference identifier is typically established by configuration (e.g. configuring the name of the authentication server). Based on a singular reference identifier’s source domain and application service type (e.g. HTTP, SIP, LDAP), the client establishes all reference identifiers which are acceptable, such as a Common Name for the Subject Name field of the certificate and a (case-insensitive) DNS name for the Subject Alternative Name field. The client then compares this list of all acceptable reference identifiers to the presented identifiers in the TLS server’s certificate. The preferred method for verification is the Subject Alternative Name using DNS names, URI names, or Service Names. Verification using the Common Name is required for the purposes of backwards compatibility. Additionally, support for use of IP addresses in the Subject Name or Subject Alternative name is discouraged as against best practices but may be implemented. Finally, support for wildcards is discouraged but may be implemented. If the client supports wildcards, the client must follow the best practices regarding matching; these best practices are captured in the evaluation activity. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FCS_RADSEC_EXT.3.2 | When the TSF negotiates a TLS_RSA_PSK cipher suite, the TSF shall [selection: not establish the connection, request authorization to establish the connection, [assignment:
other action] ] if the presented server certificate is deemed invalid. Application
Note:
This requirement must be claimed if any ciphersuites beginning with 'TLS_RSA_PSK' are selected in FCS_RADSEC_EXT.2.1. Validity is determined by the identifier verification, certificate path, the expiration date, and the revocation status in accordance with RFC 5280. Certificate validity is tested in accordance with testing performed for FIA_X509_EXT.1/Rev in the NDcPP. |
The evaluator will ensure that the TSS describes the client’s method of establishing all reference identifiers from the administrator and application-configured reference identifier,
including which types of reference identifiers are supported (e.g., Common Name, DNS Name, URI Name, Service Name, or other application-specific Subject Alternative Names) and whether IP addresses and wildcards are supported.
The evaluator will ensure that this description identifies whether and the manner in which certificate pinning is supported or used by the TOE. The evaluator will verify that the operational guidance includes instructions for setting the reference identifier to be used for the purposes of certificate validation in TLS. The evaluator will perform the following tests:
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FIA_PSK_EXT.1.1 | The TSF shall be able to use pre-shared keys for [selection: RADIUS over TLS (RadSec), IPsec, WPA3-SAE, WPA3-SAE-PK, IEEE 802.11 WPA2-PSK, [assignment:
other protocols that use pre-shared keys] ].
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FIA_PSK_EXT.1.2 | The TSF shall be able to accept text-based pre-shared keys that:
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FIA_PSK_EXT.1.3 | The TSF shall be able to [selection: accept, generate using the random bit generator specified in FCS_RBG_EXT.1 ] bit-based pre-shared keys.
Application
Note:
This requirement must be included if IPsec or another protocol that uses pre-shared keys is claimed, and pre-shared key authentication is selected (e.g., "Pre-shared Keys" is selected in FCS_IPSEC_EXT.1.13 or "pre-shared keys" is selected in FCS_RADSEC_EXT.1.2). The intent of this requirement is that all protocols will support both text-based and bit-based pre-shared keys. For the length of the text-based pre-shared keys, a common length (22 characters) is required to help promote interoperability. If other lengths are supported, they should be listed in the assignment; this assignment can also specify a range of values (e.g., "lengths from 5 to 55 characters") as well. For FIA_PSK_EXT.1.3, the ST author specifies whether the TSF merely accepts bit-based pre-shared keys or is capable of generating them. If it generates them, the requirement specifies that they must be generated using the RBG provided by the TOE. |
The evaluator will verify that the TSS describes
The evaluator will confirm the operational guidance contains instructions for either entering bit-based pre-shared keys for each protocol identified in the requirement or for generating a bit-based pre-shared key (or both). The evaluator will also perform the following tests for each protocol (or instantiation of a protocol, if performed by a different implementation on the TOE). Note that one or more of these tests can be performed with a single test case.
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| ID | Requirement | Assurance Activity |