Skip to content

Commit 317a7ad

Browse files
committed
Update stip.xml
1 parent 8903ad9 commit 317a7ad

File tree

1 file changed

+15
-55
lines changed

1 file changed

+15
-55
lines changed

input/stip.xml

Lines changed: 15 additions & 55 deletions
Original file line numberDiff line numberDiff line change
@@ -516,8 +516,7 @@ expected to enforce.<h:p/>
516516
exposed plaintext. An adversary may attempt to gain access the plaintext via misrouting of traffic or
517517
manipulate the traffic in such a way as to cause unauthorized exposure, denial of service, or
518518
corruption of the underlying plaintext. </description>
519-
<addressed-by>FCS_CKM.6 (from Base-PP)</addressed-by>
520-
<rationale>Mitigates the threat by ensuring secret and private key data is disposed of immediately after use to prevent unauthorized disclosure of keys.</rationale>
519+
521520
<addressed-by>FCS_TLSC_EXT.1 (from <xref to="tls"/>)</addressed-by>
522521
<rationale>Mitigates the threat by defining the TLS trusted channel used for EST if the TOE supports that functionality.</rationale>
523522
<addressed-by>FCS_TLSC_EXT.2 (from <xref to="tls"/>)</addressed-by>
@@ -686,8 +685,7 @@ expected to enforce.<h:p/>
686685
abuse of inspection services. An authorized user (AU) (or adversary able to gain access to AU
687686
credentials) can access or misuse device services, or disclose sensitive or security critical data.
688687
</description>
689-
<addressed-by>FCS_CKM.6 (from Base-PP)</addressed-by>
690-
<rationale>Mitigates the threat by ensuring secret and private key data is disposed of immediately after use to prevent unauthorized disclosure of keys.</rationale>
688+
691689
<addressed-by>FCS_TLSC_EXT.1 (from <xref to="tls"/>)</addressed-by>
692690
<rationale>Mitigates the threat because TLS is a mechanism by which its own certificate data may be obtained from an external CA. </rationale>
693691
<addressed-by>FCS_TLSC_EXT.2 (from <xref to="tls"/>)</addressed-by>
@@ -841,8 +839,7 @@ expected to enforce.<h:p/>
841839
intended by the monitored client to be encrypted. A malicious user or flawed TOE implementation could cause data to be transmitted
842840
in cleartext for which a user has a reasonable expectation of confidentiality.
843841
</description>
844-
<addressed-by>FCS_CKM.6 (from Base-PP)</addressed-by>
845-
<rationale>Mitigates the threat by ensuring secret and private key data is disposed of immediately after use to prevent unauthorized disclosure of keys.</rationale>
842+
846843
<addressed-by>FCS_TLSC_EXT.1 (from <xref to="tls"/>)</addressed-by>
847844
<rationale>Mitigates the threat by defining the TLS trusted channel used for EST if the TOE supports that functionality.</rationale>
848845
<addressed-by>FCS_TLSC_EXT.2 (from <xref to="tls"/>)</addressed-by>
@@ -1128,54 +1125,8 @@ expected to enforce.<h:p/>
11281125

11291126
<section title="Cryptographic Support (FCS)" id="nd-m-fcs">
11301127

1131-
<base-sfr-spec cc-id="fcs_ckm.6" id="nd-mod-fcs-ckm-6" title="Cryptographic Key Destruction">
1132-
<consistency-rationale>The ST author is instructed to include security critical parameters and when
1133-
key destruction is required.</consistency-rationale>
1134-
<description><h:p>This SFR is modified from its definition in the Base-PP to include security critical parameters as an item to be destroyed.</h:p>
1135-
<h:p>The text of the requirement is replaced with: </h:p>
1136-
<h:p><h:b>FCS_CKM.6.1: </h:b>The TSF shall destroy [<h:i>all cryptographic keys <h:b>and critical security parameters</h:b></h:i>] when
1137-
[<h:i>no longer needed</h:i>].</h:p>
1138-
<h:p><h:b>FCS_CKM.6.2: </h:b>The TSF shall destroy cryptographic keys and keying material specified by FCS_CKM.6.1 in accordance with a specified cryptographic
1139-
key destruction method: [<h:b>selection: </h:b><h:i>
1140-
<h:ul>
1141-
<h:li>For plaintext keys in volatile storage, the destruction shall be executed by a [<h:b>selection: </h:b>
1142-
<h:ul>
1143-
<h:li>Single overwrite consisting of [<h:b>selection: </h:b>
1144-
<h:ul>
1145-
<h:li>a pseudo-random pattern using the TSF's RBG</h:li>
1146-
<h:li>zeroes</h:li>
1147-
<h:li>ones</h:li>
1148-
<h:li>a new value of the key</h:li>
1149-
<h:li>[<h:b>assignment: </h:b>a static or dynamic value that does not contain any CSP]</h:li>
1150-
</h:ul>]</h:li>
1151-
<h:li>Destruction of reference to the key directly followed by a request for garbage collection</h:li>
1152-
</h:ul>]</h:li>
1153-
<h:li>For plaintext keys in non-volatile storage, the destruction shall be executed by the invocation of an interface provided by the
1154-
TSF that [<h:b>selection: </h:b>
1155-
<h:ul>
1156-
<h:li>Logically addresses the storage location of the key and performs a [<h:b>selection: </h:b>single, [<h:b>assignment: </h:b> number of passes]-pass] overwrite
1157-
consisting of [<h:b>selection: </h:b>
1158-
<h:ul>
1159-
<h:li>a pseudo-random pattern using the TSF's RBG</h:li>
1160-
<h:li>zeroes</h:li>
1161-
<h:li>ones</h:li>
1162-
<h:li>a new value of the key</h:li>
1163-
<h:li>[<h:b>assignment: </h:b>a static or dynamic value that does not contain any CSP]</h:li>
1164-
</h:ul>
1165-
]</h:li>
1166-
<h:li>Instructs a part of the TSF to destroy the abstraction that represents the key</h:li>
1167-
</h:ul>]
1168-
</h:li>
1169-
</h:ul></h:i>] that meets the following: [<h:i>no standard</h:i>].
1170-
</h:p>
1171-
<h:p><h:b>Application Note: </h:b>This SFR is refined from its definition in the Base-PP through the inclusion of security critical parameters and clarifies when destruction
1172-
is required; a STIP device includes persistent keys, including the embedded CA’s signing private key that should not be destroyed until they are no longer needed. Security
1173-
critical parameters includes security related information (e.g., secret and private cryptographic keys, authentication data such as passwords and PINs) appearing in plaintext
1174-
or otherwise unprotected form and whose disclosure or modification can compromise the security of a CA or the security of the information protected by the CA.</h:p></description>
1175-
<!-- NDcPP is not in XML so no change can be modeled -->
1176-
<no-change/>
1128+
11771129

1178-
</base-sfr-spec>
11791130
<base-sfr-spec cc-id="fcs_tlsc_ext.1" id="nd-mod-fcs-tlsc-ext-1" title="TLS Client Protocol without Mutual Authentication">
11801131
<consistency-rationale>Other than defining an additional selection-based trigger, there is no modification to this SFR.</consistency-rationale>
11811132
<description>This PP-Module does not modify this SFR as it is defined in the <h:a
@@ -1543,7 +1494,7 @@ expected to enforce.<h:p/>
15431494
<selectable>192 bits</selectable>
15441495
<selectable>256 bits</selectable>
15451496
</selectables> that meet the
1546-
following: [<h:i>AES as specified in ISO 18033-3, CCM and CCM-8 as specified in NIST
1497+
following: [<h:i>AES as specified in ISO 18033-3, AES as specified in FIPS PUB 197 CCM and CCM-8 as specified in NIST
15471498
SP 800-38C and <selectables>
15481499
<selectable>TDES as specified in NIST SP 800-67 Rev 2 and CBC mode
15491500
as specified in NIST SP 800-38A addendum</selectable>
@@ -1800,6 +1751,7 @@ expected to enforce.<h:p/>
18001751
<f-element id="fcs-tttc-ext-1e1"> <!-- Note: TD0577 applied -->
18011752
<title>
18021753
The TSF shall implement [<h:i>TLS 1.2 (RFC 5246), TLS 1.0 (RFC 2246), and <selectables>
1754+
<selectable>TLS 1.3 (RFC 8446)</selectable>
18031755
<selectable>TLS 1.1 (RFC 4346)</selectable>
18041756
<selectable>no other SSL or TLS versions</selectable>
18051757
</selectables></h:i>] as a client to the requested server that
@@ -1845,6 +1797,8 @@ expected to enforce.<h:p/>
18451797
<h:li>TLS_RSA_WITH_AES_256_CCM_8 as defined in RFC 6655</h:li>
18461798
</h:ul>
18471799
<selectables linebreak="yes">
1800+
<selectable>TLS_AES_128_GCM_SHA384 as defined in RFC 8446</selectable>
1801+
<selectable>TLS_AES_256_GCM_SHA384 as defined in RFC 8446</selectable>
18481802
<selectable>TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA as defined in RFC 8422</selectable>
18491803
<selectable>TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA as defined in RFC 5246</selectable>
18501804
<selectable>TLS_RSA_WITH_3DES_EDE_CBC_SHA as defined in RFC 5246</selectable>
@@ -2439,6 +2393,7 @@ legacy cipher suites. -->
24392393
<f-element id="fcs-ttts-ext-1e1"> <!-- Note: TD0577 applied -->
24402394
<title>
24412395
The TSF shall implement [<h:i>TLS 1.2 (RFC 5246), TLS 1.0 (RFC 2246), and <selectables>
2396+
<selectable>TLS 1.3 (RFC 8446)</selectable>
24422397
<selectable>TLS 1.1 (RFC 4346)</selectable>
24432398
<selectable>no other SSL or TLS versions</selectable>
24442399
</selectables></h:i>] as a server to the monitored client that
@@ -2484,6 +2439,8 @@ legacy cipher suites. -->
24842439
<h:li>TLS_RSA_WITH_AES_256_CCM_8 as defined in RFC 6655</h:li>
24852440
</h:ul>
24862441
<selectables linebreak="yes">
2442+
<selectable>TLS_AES_128_GCM_SHA384 as defined in RFC 8446</selectable>
2443+
<selectable>TLS_AES_256_GCM_SHA384 as defined in RFC 8446</selectable>
24872444
<selectable>TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA as defined in RFC 8422</selectable>
24882445
<selectable>TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA as defined in RFC 5246</selectable>
24892446
<selectable>TLS_RSA_WITH_3DES_EDE_CBC_SHA as defined in RFC 5246</selectable>
@@ -2625,6 +2582,8 @@ legacy cipher suites. -->
26252582
<selectable>1536 bits</selectable>
26262583
<selectable>3072 bits</selectable>
26272584
<selectable>4096 bits</selectable>
2585+
<selectable>6144 bits</selectable>
2586+
<selectable>8192 bits</selectable>
26282587
<selectable>no other sizes</selectable>
26292588
</selectables></h:li>
26302589
<h:li><selectables linebreak="yes">
@@ -2634,6 +2593,7 @@ legacy cipher suites. -->
26342593
<selectable>1536 bits</selectable>
26352594
<selectable>3072 bits</selectable>
26362595
<selectable>4096 bits</selectable>
2596+
<selectable>6144 bits</selectable>
26372597
<selectable>8192 bits</selectable>
26382598
<selectable>no other sizes</selectable></selectables></selectable>
26392599
<selectable>
@@ -6193,7 +6153,7 @@ legacy cipher suites. -->
61936153
TOE might be required to obtain this consent. The requirement in this section should be claimed if the TLS
61946154
session establishment policy requires it.
61956155

6196-
<f-component name="TOE Access Banner (Consent to Monitor Banner for TLS Inspection" cc-id="fta_tab.1" iteration="TLS" id="fta-tab-1">
6156+
<f-component name="TOE Access Banner (Consent to Monitor Banner for TLS Inspection)" cc-id="fta_tab.1" iteration="TLS" id="fta-tab-1">
61976157
<depends on-sel="banner"/>
61986158
<consistency-rationale>This SFR applies to having a notice and consent warning message at the start
61996159
of an SSL/TLS inspection session which is not defined in the Base-PP. </consistency-rationale>

0 commit comments

Comments
 (0)