Juniper Network Connect Cryptographic Module Version 2.0 Security Policy Document Version 1.0. Juniper Networks, Inc.

Similar documents
STS Secure for Windows XP, Embedded XP Security Policy Document Version 1.4

EgoSecure GmbH. EgoSecure Full Disk Encryption (FDE) Cryptographic Module. FIPS Security Policy

Juniper Networks Pulse Cryptographic Module. FIPS Level 1 Security Policy Version: 1.0 Last Updated: July 19, 2013

FIPS Non-Proprietary Security Policy

Dolphin DCI 1.2. FIPS Level 3 Validation. Non-Proprietary Security Policy. Version 1.0. DOL.TD DRM Page 1 Version 1.0 Doremi Cinema LLC

FIPS Security Policy

Symantec Corporation

Sony Security Module. Security Policy

Silent Circle Mobile Application Cryptographic Module

FIPS Non-Proprietary Security Policy. Cotap Cryptographic Module. Software Version 1.0. Document Version 1.4.

IOS Common Cryptographic Module (IC2M)

Hewlett-Packard Development Company, L.P. NonStop Volume Level Encryption (NSVLE) Product No: T0867 SW Version: 2.0

FIPS Non-Proprietary Security Policy. Level 1 Validation Version 1.2

Dolphin Board. FIPS Level 3 Validation. Security Policy. Version a - Dolphin_SecPolicy_000193_v1_3.doc Page 1 of 19 Version 1.

This Security Policy describes how this module complies with the eleven sections of the Standard:

FIPS Security Policy

Oracle Solaris Userland Cryptographic Framework Software Version 1.0 and 1.1

Oracle Solaris Kernel Cryptographic Framework Software Version 1.0 and 1.1

Imprivata FIPS Cryptographic Module Non-Proprietary Security Policy Version: 2.9 Date: August 10, 2016

SEL-3021 Serial Encrypting Transceiver Security Policy Document Version 1.9

Meru Networks. Security Gateway SG1000 Cryptographic Module Security Policy Document Version 1.2. Revision Date: June 24, 2009

The Xirrus Wi Fi Array XS4, XS8 Security Policy Document Version 1.0. Xirrus, Inc.

VMware, Inc. VMware Horizon JCE (Java Cryptographic Extension) Module

Dell SonicWALL. NSA 220, NSA 220W and NSA 240. FIPS Non-Proprietary Security Policy

Cisco VPN 3002 Hardware Client Security Policy

Lexmark PrintCryption TM (Firmware Version 1.3.1)

Hitachi Virtual Storage Platform (VSP) Encryption Board. FIPS Non-Proprietary Cryptographic Module Security Policy

CAT862 Dolby JPEG 2000/MPEG-2 Media Block IDC Security Policy. Version 3 June 30, 2010

FIPS Security Policy

Security Policy Document Version 3.3. Tropos Networks

KEY-UP Cryptographic Module Security Policy Document Version 0.5. Ian Donnelly Systems (IDS)

Hughes Network Systems, LLC Hughes Crypto Kernel Firmware Version: FIPS Non-Proprietary Security Policy

BCM58100B0 Series: BCM58101B0, BCM58102B0, BCM58103B0 Cryptographic Module VC0 Non-Proprietary Security Policy Document Version 0.

Dolby IMS-SM FIPS Level 2 Validation. Nonproprietary Security Policy Version: 4

econet smart grid gateways: econet SL and econet MSA FIPS Security Policy

FIPS Level 1 Validation March 31, 2011 Version 1.12

Credant CmgCryptoLib Version 1.7 Credant Cryptographic Kernel Version 1.5 FIPS Non-Proprietary Security Policy, Version 1.7 Level 1 Validation

FIPS Security Policy. for Marvell Semiconductor, Inc. Solaris 2 Cryptographic Module

WatchKey USB Token Cryptographic Module Model Number: K6 Smart Card Chip: Z32L256D32U PCB: K003010A Firmware Version: 360C6702

RSA BSAFE Crypto-C Micro Edition Security Policy

CoSign Hardware version 7.0 Firmware version 5.2

Seagate Secure TCG Enterprise SSC Pulsar.2 Self-Encrypting Drive FIPS 140 Module Security Policy

FIPS Non-Proprietary Security Policy

Security Requirements for Crypto Devices

ProtectV StartGuard. FIPS Level 1 Non-Proprietary Security Policy

FEITIAN Technologies Company, LTD epass Token Hardware Version: FIPS Non-Proprietary Security Policy

SecureDoc Disk Encryption Cryptographic Engine

Symantec Corporation Symantec Cryptographic Module Software Version: 1.1. FIPS Non-Proprietary Security Policy

1 INTRODUCTION CRYPTOGRAPHIC MODULE SPECIFICATION... 9

FIPS Cryptographic Module Security Policy Entrust Authority Security Toolkit for the Java Platform

SafeNet LUNA EFT FIPS LEVEL 3 SECURITY POLICY

FIPS SECURITY POLICY FOR

Hydra PC FIPS Sector-based Encryption Module Security Policy

Enhanced Bandwidth Efficient Modem (EBEM) Cryptographic Module Non-Proprietary Security Policy

Dell Software, Inc. Dell SonicWALL NSA Series SM 9600, SM 9400, SM 9200, NSA FIPS Non-Proprietary Security Policy

Barco ICMP FIPS Non-Proprietary Security Policy

FIPS Security Policy for Cisco Aironet Lightweight AP1131, AP1142, AP1242, AP1252, AP1262, CAP3502e, and CAP3502i Wireless LAN Access Points

Motorola PTP 800 Series CMU Cryptographic Module Security Policy

Polycom, Inc. VSX 3000, VSX 5000, and VSX 7000s (Firmware version: ) FIPS Non-Proprietary Security Policy

FireEye CM Series: CM-4400, CM-7400, CM-9400

Comtech EF Data Corporation SLM-5650A TRANSEC Module Hardware Version: 1.2; Firmware Version: FIPS Non-Proprietary Security Policy

Secure Cryptographic Module (SCM)

FIPS Security Policy UGS Teamcenter Cryptographic Module

Security Policy for FIPS KVL 3000 Plus

Integral Memory PLC. Crypto Dual (Underlying Steel Chassis) and Crypto Dual Plus (Underlying Steel Chassis) FIPS Security Policy

Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.

ARX (Algorithmic Research) PrivateServer Hardware version 4.7 Firmware version 4.8.1

Samsung FIPS BC for Mobile Phone and Tablet FIPS Security Policy

Non-Proprietary Security Policy Version 1.1

Satisfying CC Cryptography Requirements through CAVP/CMVP Certifications. International Crypto Module Conference May 19, 2017

WatchKey ProX USB Token Cryptographic Module Hardware Version: K023314A Firmware Version:

FIPS Level 2 Security Policy for FlagStone Core (Versions V a, V a, V )

FireEye HX Series: HX 4400, HX 4400D, HX 4402, HX 9402

Security Policy: Astro Subscriber Motorola Advanced Crypto Engine (MACE)

Certification Report

RSA BSAFE Crypto-J JSAFE and JCE Software Module Security Policy Level 2 Roles, Services and Authentication

FireEye NX Series: NX-900, NX1400, NX-2400, NX-4400, NX4420, NX-7400, NX-7420, NX7500, NX-10000, NX-9450, NX10450

Bluefly Processor. Security Policy. Bluefly Processor MSW4000. Darren Krahn. Security Policy. Secure Storage Products. 4.0 (Part # R)

Route1 FIPS Cryptographic Module

AirMagnet SmartEdge Sensor A5200, A5205, A5220, and A5225 Security Policy

McAfee, Inc. Network Security Platform Sensor M-1250, M-1450, M-2750, M-2850, M-2950, M-3050, M-4050, and M-6050

RFS7000 SERIES Wireless Controller. FIPS Cryptographic Module Security Policy

Security Policy: Astro Subscriber Encryption Module Astro Spectra, Astro Saber, Astro Consolette, and Astro XTS3000. Version

Expert Embedded Security

Acme Packet VME. FIPS Level 1 Validation. Software Version: E-CZ Date: July 20, 2018

Apple Inc. Apple OS X CoreCrypto Kernel Module, v5.0 FIPS Non-Proprietary Security Policy

SecureD v Security Policy

FIPS SECURITY POLICY

RSA BSAFE Crypto-J JSAFE and JCE Software Module 5.0 Security Policy Level 1 Roles, Authentication and Services

RSA BSAFE Crypto-J JSAFE and JCE Software Module 5.0 Security Policy Level 2 Roles, Authentication and Services

Avaya, Inc. Secure Router 2330 Hardware Version: SR2330; Firmware Version: FIPS Non-Proprietary Security Policy

Cisco Systems 5760 Wireless LAN Controller

Blue Ridge Networks BorderGuard 4000/3140. FIPS Security Policy

VMware OpenSSL FIPS Object Module

Oracle Linux 7 OpenSSH Server Cryptographic Module

Oracle Linux 6 OpenSSH Server Cryptographic Module

Cambium Networks PTP 800 Compact Modem Unit (CMU) FIPS Security Policy

Expert 3.2

IBM z/os Version 1 Release 11 System SSL Cryptographic Module

Seagate Secure TCG Enterprise SSC Self-Encrypting Drives FIPS 140 Module. Security Policy. Security Level 2. Rev. 0.

Transcription:

Juniper Network Connect Cryptographic Module Version 2.0 Security Policy Document Version 1.0 Juniper Networks, Inc. September 10, 2009 Copyright Juniper Networks, Inc. 2009. May be reproduced only in its original entirety [without revision].

TABLE OF CONTENTS 1. MODULE OVERVIEW...3 2. SECURITY LEVEL...4 3. MODES OF OPERATION...5 4. PORTS AND INTERFACES...5 5. IDENTIFICATION AND AUTHENTICATION POLICY...6 6. ACCESS CONTROL POLICY...7 7. CRYPTOGRAPHIC KEY MANAGEMENT...10 8. OPERATIONAL ENVIRONMENT...10 9. SECURITY RULES...11 10. PHYSICAL SECURITY...12 11. MITIGATION OF OTHER ATTACKS POLICY...12 12. DEFINITIONS AND ACRONYMS...12 2

1. Module Overview The Juniper Network Connect Cryptographic Module (SW Version 2.0) is a software module that implements a set of cryptographic algorithms for use by a software application. This Security Policy document details the Juniper Network Connect Cryptographic Module. The Juniper Network Connect Cryptographic Module (JNCCM) comprises a dynamic link library, odfips2.dll, compiled from source code written using a combination of C, C++ and assembly language implementations on specific platforms. The binary library resides in user space only. The JNCCM runs on PCs under Windows XP (SP 2) and Windows 2000 (SP 3) operating systems. The module has a multi-chip standalone embodiment as defined by FIPS 140-2. The module only implements an Approved mode of operation. The module was operational tested on the following Common Criteria evaluated platforms: Dell Optiplex GX400 running Windows 2000 Professional (SP 3) CC EAL 4 CCEVS Validation Report available at: http://www.niap-ccevs.org/cc-scheme/st/vid4002/ Dell Optiplex GX270 running Windows XP Professional (SP 2) CC EAL 4 CCEVS Validation Report available at: http://www.niap-ccevs.org/cc-scheme/st/vid9506/ keyboard mouse display controller controller controller System Bus cpu memory disk network ports physical boundary Figure 1: Hardware Diagram Showing PC Containing Cryptographic Module 3

2. Security Level Figure 2: Software Diagram Showing Cryptographic Boundary The Juniper Network Connect Cryptographic Module meets the overall requirements applicable to Level 2 security of FIPS 140-2. Table 1 - Module Security Level Specification Security Requirements Section Level Cryptographic Module Specification 2 Module Ports and Interfaces 2 Roles, Services and Authentication 2 Finite State Model 2 Physical Security N/A Operational Environment 2 Cryptographic Key Management 2 EMI/EMC 2 Self-Tests 2 Design Assurance 2 Mitigation of Other Attacks N/A 4

3. Modes of Operation Approved mode of operation In FIPS mode, the JNCCM supports the following FIPS Approved algorithms: AES 128, 192, 256 ECB, CBC, and Counter modes (See certificate #783) AES-CCM Key sizes 128, 192, and 256 (See certificate #784) Triple-DES TECB and TCBC modes (See certificate #679) SHA-1, SHA-224, SHA-256, SHA-384, SHA-512 (See certificate #787) HMAC-SHA-1, HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA- 512 (See certificate #430) DSA Sign/Verify, Key Gen, and PQG Gen/Verify (See certificate #293) RSA Sign/Verify (See certificate #373) FIPS 186-2 RNG (See certificate #451) The module only supports an Approved mode of operation. Once loaded into memory and executed, the module is running in FIPS mode. An operator of the module can verify that the module is running in the FIPS Approved mode of operation by first executing the EnableFIPSModule command, followed by the Get State service, which shall return the following: OD_FIPS_STATE_ENABLED. The cryptographic module provides the following allowed cryptographic algorithms: RSA Encrypt/Decrypt (for Key Transport only) (key wrapping; key establishment methodology provides between 80 and 128 bits of encryption strength) The following non-approved algorithm is also available in the Approved mode of operation: RSA Encrypt/Decrypt (for bulk data) - No security is claimed for data that has been encrypted using this RSA. 4. Ports and Interfaces All FIPS ports and interfaces are defined as the API of the cryptographic module. The API contains all data input, data output, control input, and status output interfaces to and from the module. 5

5. Identification and Authentication Policy Assumption of roles The JNCCM shall support two roles, User and Cryptographic Officer. The authentication mechanism is provided by the host Operating System. Proper operation of the module requires that the host Operating System be configured to enforce a password length of at least six characters. The module relies on the Operating System to distinguish between an operator assuming the User role or Crypto Officer role. An operator with Administrator privileges to the Operating System assumes the Crypto Officer role. Table 2 lists these roles along with their required identification and authentication techniques. Table 3 outlines each authentication mechanism and the associated strengths. Table 2 - Roles and Required Identification and Authentication Role Type of Authentication Authentication Data User Role-based operator authentication Password Cryptographic Officer Role-based operator authentication Password Table 3 Strengths of Authentication Mechanisms Authentication Mechanism Strength of Mechanism Password Each password is at least six characters in length. Characters are chosen from a fifty-two character set. The probability of a successful random attempt is less than 1/52^6, which is less than 1/1,000,000. Assuming that no password lockout settings were configured, that no delay is configured between password attempts, and that an attacker could attempt 100 password entries per minute, the probability of successfully authenticating to the module within one minute through random attempts is 100/(52^6), which is less than one in 100,000. 6

6. Access Control Policy Roles and Services Table 4 lists each role and the services authorized for each role. Role User and Cryptographic Officer: Table 4 Services Authorized for Roles Authorized Services AES Encrypt/Decrypt TDES Encrypt/Decrypt RSA Sign/Verify DSA Sign/Verify Generate Random Number AES CCM HMAC-SHA-1, HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 RSA Encrypt/Decrypt (for key transport only) - Note: This service is also used for encrypting/decrypting bulk data. However, no security is claimed for data that has been protected by RSA. RSA Key Generation DSA Key Generation AES Key Encryption Generate Prime Number Generates a prime number using the FIPS 186-2 RNG Modular Exponentiation EnableFIPSModule Enables all authorized services. DisableFIPSModule Disables all authorized services and returns the module to a pre-operational state. GetState Returns the current state of the cryptographic module GetError Returns a specific error code when the module is in an error state Run Self-tests This service executes the suite of power up self-tests required by FIPS 140-2 by calling the API command. Note: In addition to the authenticated "Run Self-Tests" service, self-tests can also be initiated by any operator without authentication by reloading the module into memory. 7

Definition of Critical Security Parameters (CSPs) The Critical Security Parameters (CSPs) defined for the JNCCM consist of cryptographic keys and random numbers used as seeding material. The module does not persistently store CSPs within the logical boundary, and no CSPs are output from the physical bounds of the GPC. The following secret keys, private keys, and CSPs are supported by the module: AES Keys: 128, 192 and 256 bit keys used to AES encrypt/decrypt data. TDES Keys: 3 separate 128 bit DES keys used to TDES encrypt/decrypt data. AES CCM Key: 128, 192, or 256 bit AES Key used for AES CCM operations. HMAC Keys: For use during HMAC operations. DSA Signing Private Key: Used to digitally sign data. RSA Private Key: Used to digitally sign data. AES Key Encryption Key: 128 bit AES key for use in AES key wrapping operations. FIPS 186-2 PRNG Seed and Seed Key: Used for the generation of CSPs and Keys. These values are entered into the module (not internally generated) and the strength of the keys generated depends on the strength of these parameters. HMAC Integrity Key: HMAC-SHA-512 key used during the Software Integrity Test. (Note: This key is only used for power up self-tests and is not considered a CSP per CMVP IG 7.4.) Definition of Public Keys: The following are the public keys contained in the module: RSA Verifying Public Key: This is the public part of the cryptographic module s RSA Public/Private key pair used to verify RSA signatures. DSA Public Key: This is the public part of the cryptographic module s DSA Public/Private key pair used to verify DSA signatures. RSA Wrapping Key: Used to perform RSA key transport of keys. Definition of CSPs Modes of Access Table 5 defines the relationship between access to CSPs and the different module services. The modes of access shown in the table are defined as follows: Read Write Execute Each service's API indicates the type of access to CSPs defined by that API. When a CSP is used by the API call to perform particular services, read and execute access is indicated. When a CSP is generated, modified or deleted by the API call, write access is indicated. 8

Table 5 Key and CSP Access Rights within Services Approved Services Keys/CSPs Authorized Roles Symmetric Encryption/Decryption Services Type of Access AES Encrypt/Decrypt AES Key User/CO read, execute TDES Encrypt/Decrypt TDES Key User/CO read, execute Asymmetric Encryption/Decryption for Key Wrapping Services RSA Encrypt RSA Wrapping Public Key User/CO read, execute RSA Decrypt RSA Private Key User/CO read, execute Message Authentication Services AES-CCM AES-CCM Key User/CO read, execute HMAC-SHA-1, HMAC- SHA-224, HMAC-SHA- 256, HMAC-SHA-384, HMAC-SHA-512 Digital Signature Generation/Verification Services HMAC Key User/CO read, execute RSA Verify RSA Verifying Public Key User/CO read, execute RSA Sign RSA Private Key User/CO read, execute DSA Verify DSA Public Key User/CO read, execute DSA Sign DSA Signing Private Key User/CO read, execute Symmetric Key Wrapping Service AES Key Encryption AES Key Encryption Key User/CO read, execute Symmetric Key Generation Service Generate Random Number Asymmetric Key Generation Services RSA Key Generation DSA Key Generation Other Services Generate Prime Number FIPS 186-2 PRNG Seed and Seed Key RSA Public/Private Key Pair DSA Public/Private Key Pair FIPS 186-2 PRNG Seed and Seed Key User/CO User/CO User/CO User/CO read, execute write write Modular Exponentiation N/A User/CO N/A EnableFIPSModule N/A User/CO N/A read, execute 9

Approved Services Keys/CSPs Authorized Roles Type of Access DisableFIPSModule N/A User/CO N/A Run Self-Tests N/A User/CO N/A GetState N/A User/CO N/A GetError N/A User/CO N/A 7. Cryptographic Key Management Key Generation The cryptographic module supports generation of DSA and RSA public and private keys, using the Approved FIPS 186-2 deterministic random number generator. Key Storage The module does not persistently store keys. Key material is provided for use through a defined API, stored in RAM, and then destroyed once processing is terminated. If the operator wishes to store keys they are responsible for doing so outside of the cryptographic module's logical boundary. Zeroization All key data exists in data structures allocated within the cryptographic module, and can only be returned to an authorized user using the defined API. The operating system protects system memory and process space from access by unauthorized users. The operator of the cryptographic module should follow the steps outlined in the module s API specification to ensure sensitive data is protected by zeroizing the data from memory when it is no longer needed. 8. Operational Environment The FIPS 140-2 Area 6 Operational Environment requirements are applicable because the module operates in a modifiable operational environment. The module was operational tested on the following Common Criteria evaluated platforms: Dell Optiplex GX400 running Windows 2000 Professional (SP 3) Dell Optiplex GX270 running Windows XP Professional (SP 2) 10

9. Security Rules The Juniper Network Connect Cryptographic Module s design corresponds to the module s security rules. This section documents the security rules enforced by the cryptographic module to implement the security requirements of this FIPS 140-2 Level 2 module. 1. The Operating System must enforce authentication methods to prevent unauthorized access to the module. The passwords to authenticate to the Operating System must be at least six characters long (chosen from a 52 character set). 2. The cryptographic module shall perform the following tests: A. Power up Self-Tests: 1. Cryptographic algorithm tests: a. AES KAT b. AES CCM KAT c. TDES KAT d. RSA Sign/Verify KAT e. RSA Encrypt/Decrypt KAT (for key transport only) f. DSA Sign/Verify KAT g. HMAC-SHA-1, HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 KATs h. SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512 KATs i. FIPS 186-2 DRNG KAT 2. Software Integrity Test (HMAC-SHA-512) B. Conditional Self-Tests: 1. Continuous Random Number Generator (RNG) test performed on DRNG 2. DSA pairwise consistency test 3. RSA pairwise consistency test 3. The operator shall be capable of commanding the module to perform the power-up self-test by reloading the module into memory or by calling the odfips_runselftestasynch function. 4. Prior to each use, the internal RNG shall be tested using the conditional test specified in FIPS 140-2 4.9.2. 5. Data output shall be inhibited during key generation, self-tests, zeroization, and error states. 6. Status information shall not contain CSPs or sensitive data that if misused could lead to a compromise of the module. 7. The module does not support concurrent operators. 11

10. Physical Security The FIPS 140-2 Area 5 Physical Security requirements are not applicable because the device is a software only module. 11. Mitigation of Other Attacks Policy The module has not been designed to mitigate any specific attacks outside the scope of FIPS 140-2 requirements. 12. Definitions and Acronyms AES API CC CCEVS CO CSP DLL DRNG DSA EAL EMC EMI FIPS GPC HMAC JNCCM RAM RNG RSA TDES SHA Advanced Encryption Standard Application Program Interface Common Criteria Common Criteria Evaluation and Validation Scheme Cryptographic Officer Critical Security Parameter Dynamic Link Library Deterministic Random Number Generator Digital Signature Algorithm Evaluation Assurance Level Electromagnetic Compatibility Electromagnetic Interference Federal Information Processing Standard General Purpose Computer Keyed-Hash Message Authentication Code Juniper Network Connect Cryptographic Module Random Access Memory Random Number Generator Rivest, Shamir and Adleman Algorithm Triple-DES Secure Hash Algorithm 12