Skip to content

Commit 93884c6

Browse files
authored
Update gpcp.xml
Results of 9/4 meeting. Issues 64, 65, and 67 addressed and closed. Changes made to FIA_AFL_EXT.1.3 and FIA_UAU.5.1.
1 parent 6d97ab8 commit 93884c6

File tree

1 file changed

+30
-35
lines changed

1 file changed

+30
-35
lines changed

input/gpcp.xml

Lines changed: 30 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -6741,31 +6741,27 @@
67416741

67426742
<f-element id="fia-afl-ext-1e3">
67436743
<title>
6744-
<h:mark>The TSF shall maintain the number of unsuccessful authentication attempts that have occurred
6744+
The TSF shall maintain the number of unsuccessful authentication attempts that have occurred
67456745
upon power off if the minimum boot time of the system is shorter than the lockout time
6746-
specified in FIA_AFL_EXT.1.5. (see Issue 64)</h:mark>
6746+
specified in FIA_AFL_EXT.1.5.
67476747
</title>
67486748
<note role="application">
6749-
<h:mark>The purpose of this requirement is to prevent hammering attacks focused on
6750-
a device's pre-OS firmware from bypassing the actions in FIA_AFL_EXT.1.5 by power
6751-
cycling the system in order to zero the authentication failure count. This purpose
6752-
is achieved by default if the minimum reboot time of the system is greater than the
6753-
timeout penalty specified in FIA_AFL_EXT.1.5.<h:p/>
6754-
If the actions specified in FIA_AFL_EXT.1.5 are device wipe or a non-time-limited lockout, or if
6755-
the minimum reboot time is shorter than the specified lockout time, then
6756-
the authentication failure count must be maintained across power cycles. The variation of
6757-
boot duration of individual devices and the configurability of FIA_AFL_EXT.1.5
6758-
may create scenarios where some devices are compliant by design (specifically server-class
6759-
devices with lengthy boot times) while other devices (specifically fast-booting
6760-
workstations) may need to implement this requirement. The intention is to protect
6761-
the pre-OS firmware without making assumptions as to boot duration per device.
6762-
<h:p/></h:mark>
6763-
The TOE may implement an Authentication Factor interface that precedes another Authentication
6764-
Factor interface in the boot sequence (for example, a volume DAR decryption interface which
6765-
precedes the lockscreen interface) before the user can access the GPCP. In this situation,
6766-
because the user must successfully authenticate to the first interface to access the second,
6767-
the number of unsuccessful authentication attempts need not be maintained for the second
6768-
interface.
6749+
The purpose of this requirement is to prevent hammering attacks focused on a device's pre-OSfirmware
6750+
from bypassing the actions in FIA_AFL_EXT.1.5 by power cycling the system in order to zero the
6751+
authentication failure count. The intention is to protect the pre-OS firmware without making
6752+
assumptions as to boot duration per device. This purpose is achieved by default if the minimum reboot
6753+
time of the system is greater than the timeout penalty specified in FIA_AFL_EXT.1.5.<h:p/>
6754+
If the actions specified in FIA_AFL_EXT.1.5 are device wipe or a non-time-limited lockout, or if the
6755+
minimum reboot time is shorter than the specified lockout time, then the authentication failure count
6756+
must be maintained across power cycles. The variation of boot duration of individual devices and the
6757+
configurability of FIA_AFL_EXT.1.5 may create scenarios where some devices are compliant by default
6758+
(specifically slow-booting servers and workstations) while other devices (specifically fast-booting
6759+
desktops and notebooks) may need to implement this requirement.<h:p/>
6760+
The TOE may implement an Authentication Factor interface that precedes another Authentication Factor
6761+
interface in the boot sequence (for example, a volume DAR decryption interface which precedes the
6762+
lockscreen interface) before the user can access the GPCP. In this situation, because the user must
6763+
successfully authenticate to the first interface to access the second, the number of unsuccessful
6764+
authentication attempts need not be maintained for the second interface.
67696765
</note>
67706766
</f-element>
67716767

@@ -6789,18 +6785,18 @@
67896785
TSF shall
67906786
<selectables linebreak="yes">
67916787
<selectable>perform a wipe of all protected data</selectable>
6792-
<selectable>exclude the <h:mark>current Administrator</h:mark> from further authentication attempts</selectable>
6793-
<selectable>exclude the <h:mark>current Administrator</h:mark> from further authentication
6794-
attempts for <assignable><h:mark>a period of time greater than zero seconds</h:mark></assignable></selectable>
6795-
<selectable>exclude the <h:mark>current Administrator</h:mark> from further authentication
6796-
attempts for <assignable><h:mark>a period of time greater than the minimum boot time of the system</h:mark></assignable></selectable>
6788+
<selectable>exclude the current Administrator from further authentication attempts</selectable>
6789+
<selectable>exclude the current Administrator from further authentication
6790+
attempts for <assignable>a period of time greater than zero seconds</assignable></selectable>
6791+
<selectable>exclude the current Administrator from further authentication
6792+
attempts for <assignable>a period of time greater than the minimum boot time of the system</assignable></selectable>
67976793
</selectables>.
67986794
</title>
67996795
<note role="application">
6800-
<h:mark>(Issue 65) The "current Administrator" is the entity attempting to authenticate to the TOE that has run afoul of
6796+
The "current Administrator" is the entity attempting to authenticate to the TOE that has run afoul of
68016797
the limit on authentication attempts. For platforms that support multiple Administrator identities, only the
68026798
identity that has run afoul is punished. For platforms without such support, these actions
6803-
are effectively applied to the authentication mechanism rather than a specific user.</h:mark><h:p/>
6799+
are effectively applied to the authentication mechanism rather than a specific user.<h:p/>
68046800
Wipe is performed in accordance with FCS_CKM.6. Protected data is all non-TSF data,
68056801
including all user or enterprise data. Some or all of this data may be considered sensitive
68066802
data as well.<h:p/>
@@ -7034,11 +7030,11 @@
70347030
<title>
70357031
The TSF shall provide [<h:i>password and
70367032
<selectables>
7037-
<selectable id="sel-fia-uau-5-x509">X.509 certificate-based authentication</selectable>
7038-
<selectable id="sel-fia-uau-5-ssh"><h:mark>SSH-based public key, password, or certificate authentication</h:mark></selectable>
7033+
<selectable id="sel-fia-uau-5-x509">certificate-based authentication</selectable>
7034+
<selectable id="sel-fia-uau-5-ssh">public key-based authentication</selectable>
70397035
<selectable>biometric authentication</selectable>
70407036
<selectable exclusive="yes">no other authentication mechanism</selectable>
7041-
</selectables></h:i>] to support user authentication.<h:mark>See Issue 67</h:mark>
7037+
</selectables></h:i>] to support user authentication.
70427038
</title>
70437039
<note role="application">
70447040
This SFR is included in the ST if the "<h:i>Administrator</h:i>" role is selected
@@ -7050,9 +7046,8 @@
70507046
The Password Authentication Factor is configured according to FIA_PMG_EXT.1.<h:p/>
70517047
If "<h:i>X.509 certificate-based authentication</h:i>" is selected, then the ST must include
70527048
FIA_X509_EXT.1 and FIA_X509_EXT.2 from <xref to="pkg-x509"/>.<h:p/>
7053-
The ST Author should select "<h:i>SSH-based authentication</h:i>" if the TOE supports
7054-
SSH-based authentication, whether public key-, password-, or certificate-based. In this case,
7055-
the ST claims the <xref to="pkg-ssh"/>.
7049+
If "<h:i>public key-based authentication authentication</h:i>" is selected, then the ST must claim
7050+
the <xref to="pkg-ssh"/>.
70567051
</note>
70577052
</f-element>
70587053
<f-element id="fia-uau-5e2">

0 commit comments

Comments
 (0)