You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<Mod-cc-ref>collaborative PP-Module for Stateful Traffic Filter Firewalls, v2.0</Mod-cc-ref>
326
327
</cc-pp-config-with>
327
328
<cc-pkg-claim>
328
-
<FP-cc-ref conf="conformant">Functional Package for TLS, version 2.0</FP-cc-ref>
329
+
<FP-cc-ref conf="conformant">Functional Package for TLS, version 2.1</FP-cc-ref>
329
330
<FP-cc-ref conf="conformant">Functional Package for X.509, version 1.0</FP-cc-ref>
330
331
</cc-pkg-claim>
331
332
</CClaimsInfo>
@@ -1032,15 +1033,17 @@ expected to enforce.<h:p/>
1032
1033
</base-sfr-spec>
1033
1034
<base-sfr-spec cc-id="fcs_tlsc_ext.1" id="nd-mod-fcs-tlsc-ext-1" title="TLS Client Protocol without Mutual Authentication">
1034
1035
<consistency-rationale>Other than defining an additional selection-based trigger, there is no modification to this SFR.</consistency-rationale>
1035
-
<description>This PP-Module does not modify this SFR as it is defined in the <h:a href="https://www.niap-ccevs.org/protectionprofiles/465">Functional Package for TLS, version 2.0</h:a>. This SFR is selection-based in the Functional Package for its potential use in trusted communications.
1036
+
<description>This PP-Module does not modify this SFR as it is defined in the <h:a
1037
+
href="https://www.niap-ccevs.org/protectionprofiles/465">Functional Package for TLS, version 2.1</h:a>. This SFR is selection-based in the Functional Package for its potential use in trusted communications.
1036
1038
This PP-Module also defines EST as a supported method of obtaining certificates for the TOE, which may use TLS.
1037
1039
This SFR can therefore also be triggered if the TOE claims FIA_ESTC_EXT.1 and selects a mechanism that makes use of FCS_TLSC_EXT.1.</description>
1038
1040
1039
1041
<no-change/>
1040
1042
</base-sfr-spec>
1041
1043
<base-sfr-spec cc-id="fcs_tlsc_ext.2" title="TLS Client Support for Mutual Authentication" id="nd-mod-fcs-tlsc-ext-2">
1042
1044
<consistency-rationale>Other than being defined as selection-based, there is no modification to this SFR.</consistency-rationale>
1043
-
<description>This PP-Module does not modify this SFR as it is defined in the <h:a href="https://www.niap-ccevs.org/protectionprofiles/465">Functional Package for TLS, version 2.0</h:a>. This SFR is selection-based in the Functional Package for its potential use in trusted communications.
1045
+
<description>This PP-Module does not modify this SFR as it is defined in the <h:a
1046
+
href="https://www.niap-ccevs.org/protectionprofiles/465">Functional Package for TLS, version 2.1</h:a>. This SFR is selection-based in the Functional Package for its potential use in trusted communications.
1044
1047
This PP-Module also defines EST as a supported method of obtaining certificates, which may use mutually-authenticated TLS.
1045
1048
This SFR can therefore also be triggered if the TOE claims FIA_ESTC_EXT.1, dependent on selection in FIA_ESTC_EXT.1.4. </description>
1046
1049
<no-change/>
@@ -1076,8 +1079,10 @@ expected to enforce.<h:p/>
1076
1079
<description>
1077
1080
<h:p>This SFR has been modified from its definition in the Base-PP to mandate the use of TLS. Other protocol options may be selected without restriction. Any element that is not present in this section is unchanged from its definition in the Base-PP.</h:p>
1078
1081
<h:p>The text of the specified elements is replaced with:</h:p>
1079
-
<h:p><h:b>FTP_ITC.1.1: </h:b>The TSF shall be capable of using <h:b>TLS as defined in the <h:a href="https://www.niap-ccevs.org/protectionprofiles/465">Functional Package for TLS, version 2.0</h:a></h:b> and [<h:b>selection: </h:b><h:i>IPsec,
1080
-
SSH <h:b>as defined in the <h:a href="https://www.niap-ccevs.org/protectionprofiles/515">Functional Package for SSH, version 2.0</h:a></h:b>, DTLS <h:b>as defined in the <h:a href="https://www.niap-ccevs.org/protectionprofiles/465">Functional Package for TLS, version 2.0</h:a></h:b>, HTTPS, <h:b>no other protocols</h:b></h:i>]
1082
+
<h:p><h:b>FTP_ITC.1.1: </h:b>The TSF shall be capable of using <h:b>TLS as defined in
1083
+
the <h:a href="https://www.niap-ccevs.org/protectionprofiles/465">Functional Package for TLS, version 2.1</h:a></h:b> and [<h:b>selection: </h:b><h:i>IPsec,
1084
+
SSH <h:b>as defined in the <h:a
1085
+
href="https://www.niap-ccevs.org/protectionprofiles/515">Functional Package for SSH, version 2.0</h:a></h:b>, DTLS <h:b>as defined in the <h:a href="https://www.niap-ccevs.org/protectionprofiles/465">Functional Package for TLS, version 2.1</h:a></h:b>, HTTPS, <h:b>no other protocols</h:b></h:i>]
1081
1086
to provide a trusted communication channel between itself and authorized IT entities supporting the following capabilities: audit server, <h:b>TLS session proxying, </h:b>[<h:b>selection: </h:b><h:i>authentication server, <h:b>Enrollment over Secure Transport, </h:b>[<h:b>assignment: </h:b>other capabilities], no other capabilities</h:i>]
1082
1087
that is logically distinct from other communication channels and provides assured identification of its end points and protection of the channel data from modification and disclosure.</h:p>
1083
1088
<h:p><h:b>Application Note: </h:b>This SFR is modified from its definition in the Base-PP by specifying that a conformant TOE will always implement TLS trusted channels at minimum, due
@@ -1535,7 +1540,7 @@ expected to enforce.<h:p/>
1535
1540
For i=0..31, the evaluator shall verify the encrypt functionality by using Key1{i}=Key2{i}=Key3{i} equal to
1536
1541
the round i key in table A.3 of NIST SP800-20, and IV=0x0000000000000000 to encrypt plaintext =
1537
1542
0x0000000000000000, and verifying that the resulting ciphertext c4{i} matches the known result for round
1538
-
I indicated in table A.3 of NSIT SP800-20.
1543
+
I indicated in table A.3 of NIST SP800-20.
1539
1544
<h:p/>
1540
1545
For i=0..31, the evaluator shall verify the decrypt functionality by using Key1{i}=Key2{i}=Key3{i} equal to
1541
1546
the round I key in table A.3 of NIST SP800-20, and IV=0x0000000000000000 to decrypt ciphertext c4{i}
@@ -1546,7 +1551,7 @@ expected to enforce.<h:p/>
1546
1551
For i=0..18, the evaluator shall verify the encrypt functionality by using Key1{i}=Key2{i}=Key3{i} equal to
1547
1552
the round i key in table A.4 of NIST SP800-20, and IV=0x0000000000000000 to encrypt the round i
1548
1553
plaintext, p4{i} in table A.4 of NIST SP300-20, and verifying that the resulting ciphertext c4{i} matches the
1549
-
known result for round i indicated in table A.4 of NSIT SP800-20.
1554
+
known result for round i indicated in table A.4 of NIST SP800-20.
1550
1555
<h:p/>
1551
1556
For i=0..18, the evaluator shall verify the decrypt functionality by using Key1{i}=Key2{i}=Key3{i} equal to
1552
1557
the round i key in table A.4 of NIST SP800-20, and IV=0x0000000000000000 to decrypt ciphertext =c4{i}
@@ -4747,7 +4752,7 @@ legacy cipher suites. -->
4747
4752
specify minimum required functionality for X.509 authentication based on its use in STIP. The PP-Module
4748
4753
also refines the authorized roles that can perform the related management function.</consistency-rationale>
4749
4754
<description><comment>This component will ostensibly be moved to the definitions present in the X.509 FP. However, we currently do not have a way to accurately model its status in this PP-Module.
4750
-
In this case, there is an assignment that will need to be filled in in one of the open-ended assignment fields present in the X.509 FP, but there is
4755
+
In this case, there is an assignment that will need to be filled in one of the open-ended assignment fields present in the X.509 FP, but there is
4751
4756
no way to provide guidance on what selections/assignments must be made in the FP from the PP-Module. There is also no way to provide guidance on what selections must be made in the Base-PP in order to
0 commit comments