|
6741 | 6741 |
|
6742 | 6742 | <f-element id="fia-afl-ext-1e3"> |
6743 | 6743 | <title> |
6744 | | - <h:mark>The TSF shall maintain the number of unsuccessful authentication attempts that have occurred |
| 6744 | + The TSF shall maintain the number of unsuccessful authentication attempts that have occurred |
6745 | 6745 | upon power off if the minimum boot time of the system is shorter than the lockout time |
6746 | | - specified in FIA_AFL_EXT.1.5. (see Issue 64)</h:mark> |
| 6746 | + specified in FIA_AFL_EXT.1.5. |
6747 | 6747 | </title> |
6748 | 6748 | <note role="application"> |
6749 | | - <h:mark>The purpose of this requirement is to prevent hammering attacks focused on |
6750 | | - a device's pre-OS firmware from bypassing the actions in FIA_AFL_EXT.1.5 by power |
6751 | | - cycling the system in order to zero the authentication failure count. This purpose |
6752 | | - is achieved by default if the minimum reboot time of the system is greater than the |
6753 | | - timeout penalty specified in FIA_AFL_EXT.1.5.<h:p/> |
6754 | | - If the actions specified in FIA_AFL_EXT.1.5 are device wipe or a non-time-limited lockout, or if |
6755 | | - the minimum reboot time is shorter than the specified lockout time, then |
6756 | | - the authentication failure count must be maintained across power cycles. The variation of |
6757 | | - boot duration of individual devices and the configurability of FIA_AFL_EXT.1.5 |
6758 | | - may create scenarios where some devices are compliant by design (specifically server-class |
6759 | | - devices with lengthy boot times) while other devices (specifically fast-booting |
6760 | | - workstations) may need to implement this requirement. The intention is to protect |
6761 | | - the pre-OS firmware without making assumptions as to boot duration per device. |
6762 | | - <h:p/></h:mark> |
6763 | | - The TOE may implement an Authentication Factor interface that precedes another Authentication |
6764 | | - Factor interface in the boot sequence (for example, a volume DAR decryption interface which |
6765 | | - precedes the lockscreen interface) before the user can access the GPCP. In this situation, |
6766 | | - because the user must successfully authenticate to the first interface to access the second, |
6767 | | - the number of unsuccessful authentication attempts need not be maintained for the second |
6768 | | - interface. |
| 6749 | + The purpose of this requirement is to prevent hammering attacks focused on a device's pre-OSfirmware |
| 6750 | + from bypassing the actions in FIA_AFL_EXT.1.5 by power cycling the system in order to zero the |
| 6751 | + authentication failure count. The intention is to protect the pre-OS firmware without making |
| 6752 | + assumptions as to boot duration per device. This purpose is achieved by default if the minimum reboot |
| 6753 | + time of the system is greater than the timeout penalty specified in FIA_AFL_EXT.1.5.<h:p/> |
| 6754 | + If the actions specified in FIA_AFL_EXT.1.5 are device wipe or a non-time-limited lockout, or if the |
| 6755 | + minimum reboot time is shorter than the specified lockout time, then the authentication failure count |
| 6756 | + must be maintained across power cycles. The variation of boot duration of individual devices and the |
| 6757 | + configurability of FIA_AFL_EXT.1.5 may create scenarios where some devices are compliant by default |
| 6758 | + (specifically slow-booting servers and workstations) while other devices (specifically fast-booting |
| 6759 | + desktops and notebooks) may need to implement this requirement.<h:p/> |
| 6760 | + The TOE may implement an Authentication Factor interface that precedes another Authentication Factor |
| 6761 | + interface in the boot sequence (for example, a volume DAR decryption interface which precedes the |
| 6762 | + lockscreen interface) before the user can access the GPCP. In this situation, because the user must |
| 6763 | + successfully authenticate to the first interface to access the second, the number of unsuccessful |
| 6764 | + authentication attempts need not be maintained for the second interface. |
6769 | 6765 | </note> |
6770 | 6766 | </f-element> |
6771 | 6767 |
|
|
6789 | 6785 | TSF shall |
6790 | 6786 | <selectables linebreak="yes"> |
6791 | 6787 | <selectable>perform a wipe of all protected data</selectable> |
6792 | | - <selectable>exclude the <h:mark>current Administrator</h:mark> from further authentication attempts</selectable> |
6793 | | - <selectable>exclude the <h:mark>current Administrator</h:mark> from further authentication |
6794 | | - attempts for <assignable><h:mark>a period of time greater than zero seconds</h:mark></assignable></selectable> |
6795 | | - <selectable>exclude the <h:mark>current Administrator</h:mark> from further authentication |
6796 | | - attempts for <assignable><h:mark>a period of time greater than the minimum boot time of the system</h:mark></assignable></selectable> |
| 6788 | + <selectable>exclude the current Administrator from further authentication attempts</selectable> |
| 6789 | + <selectable>exclude the current Administrator from further authentication |
| 6790 | + attempts for <assignable>a period of time greater than zero seconds</assignable></selectable> |
| 6791 | + <selectable>exclude the current Administrator from further authentication |
| 6792 | + attempts for <assignable>a period of time greater than the minimum boot time of the system</assignable></selectable> |
6797 | 6793 | </selectables>. |
6798 | 6794 | </title> |
6799 | 6795 | <note role="application"> |
6800 | | - <h:mark>(Issue 65) The "current Administrator" is the entity attempting to authenticate to the TOE that has run afoul of |
| 6796 | + The "current Administrator" is the entity attempting to authenticate to the TOE that has run afoul of |
6801 | 6797 | the limit on authentication attempts. For platforms that support multiple Administrator identities, only the |
6802 | 6798 | identity that has run afoul is punished. For platforms without such support, these actions |
6803 | | - are effectively applied to the authentication mechanism rather than a specific user.</h:mark><h:p/> |
| 6799 | + are effectively applied to the authentication mechanism rather than a specific user.<h:p/> |
6804 | 6800 | Wipe is performed in accordance with FCS_CKM.6. Protected data is all non-TSF data, |
6805 | 6801 | including all user or enterprise data. Some or all of this data may be considered sensitive |
6806 | 6802 | data as well.<h:p/> |
|
7034 | 7030 | <title> |
7035 | 7031 | The TSF shall provide [<h:i>password and |
7036 | 7032 | <selectables> |
7037 | | - <selectable id="sel-fia-uau-5-x509">X.509 certificate-based authentication</selectable> |
7038 | | - <selectable id="sel-fia-uau-5-ssh"><h:mark>SSH-based public key, password, or certificate authentication</h:mark></selectable> |
| 7033 | + <selectable id="sel-fia-uau-5-x509">certificate-based authentication</selectable> |
| 7034 | + <selectable id="sel-fia-uau-5-ssh">public key-based authentication</selectable> |
7039 | 7035 | <selectable>biometric authentication</selectable> |
7040 | 7036 | <selectable exclusive="yes">no other authentication mechanism</selectable> |
7041 | | - </selectables></h:i>] to support user authentication.<h:mark>See Issue 67</h:mark> |
| 7037 | + </selectables></h:i>] to support user authentication. |
7042 | 7038 | </title> |
7043 | 7039 | <note role="application"> |
7044 | 7040 | This SFR is included in the ST if the "<h:i>Administrator</h:i>" role is selected |
|
7050 | 7046 | The Password Authentication Factor is configured according to FIA_PMG_EXT.1.<h:p/> |
7051 | 7047 | If "<h:i>X.509 certificate-based authentication</h:i>" is selected, then the ST must include |
7052 | 7048 | FIA_X509_EXT.1 and FIA_X509_EXT.2 from <xref to="pkg-x509"/>.<h:p/> |
7053 | | - The ST Author should select "<h:i>SSH-based authentication</h:i>" if the TOE supports |
7054 | | - SSH-based authentication, whether public key-, password-, or certificate-based. In this case, |
7055 | | - the ST claims the <xref to="pkg-ssh"/>. |
| 7049 | + If "<h:i>public key-based authentication authentication</h:i>" is selected, then the ST must claim |
| 7050 | + the <xref to="pkg-ssh"/>. |
7056 | 7051 | </note> |
7057 | 7052 | </f-element> |
7058 | 7053 | <f-element id="fia-uau-5e2"> |
|
0 commit comments