Skip to content

Commit b7a5939

Browse files
author
Jenn Honkofsky
committed
Spell check and version numbers
1 parent c4a4ed0 commit b7a5939

File tree

1 file changed

+24
-19
lines changed

1 file changed

+24
-19
lines changed

input/stip.xml

Lines changed: 24 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -23,23 +23,24 @@
2323

2424
<RevisionHistory>
2525
<entry>
26-
<version>2.0</version>
27-
<date>2025-04-25</date>
28-
<subject>Incorporate NIAP Technical Decisions, Update to CC:2022</subject>
26+
<version>1.0</version>
27+
<date>2019-08-23</date>
28+
<subject>Update release</subject>
2929
</entry>
30+
3031
<entry>
3132
<version>1.1</version>
3233
<date>2022-11-17</date>
3334
<subject>Updates to reflect GitHub conversion, compatibility with CPP_ND_V2.2E, and Technical Decisions applied to version 1.0</subject>
3435
</entry>
35-
</RevisionHistory>
36-
<RevisionHistory>
36+
3737
<entry>
38-
<version>1.0</version>
39-
<date>2019-08-23</date>
40-
<subject>Update release</subject>
41-
</entry>
38+
<version>2.0</version>
39+
<date>2025-04-25</date>
40+
<subject>Incorporate NIAP Technical Decisions, Update to CC:2022</subject>
41+
</entry>
4242
</RevisionHistory>
43+
4344

4445
<include-pkg id="pkgX509">
4546
<git>
@@ -51,7 +52,7 @@
5152
<include-pkg id="pkgTLS">
5253
<git>
5354
<url>https://github.com/commoncriteria/tls</url>
54-
<branch>release-2.0</branch>
55+
<branch>release-2.1</branch>
5556
</git>
5657
<url>https://www.niap-ccevs.org/protectionprofiles/465</url>
5758
</include-pkg>
@@ -322,10 +323,10 @@
322323
<cc-pp-conf/>
323324
<cc-pp-config-with>
324325
<PP-cc-ref>Network Device collaborative Protection Profile Version 4.0</PP-cc-ref>
325-
<Mod-cc-ref>collaborative PP-Module for Stateful Traffic Filter Firewalls, v1.4 + Errata, 20200625</Mod-cc-ref>
326+
<Mod-cc-ref>collaborative PP-Module for Stateful Traffic Filter Firewalls, v2.0</Mod-cc-ref>
326327
</cc-pp-config-with>
327328
<cc-pkg-claim>
328-
<FP-cc-ref conf="conformant">Functional Package for TLS, version 2.0</FP-cc-ref>
329+
<FP-cc-ref conf="conformant">Functional Package for TLS, version 2.1</FP-cc-ref>
329330
<FP-cc-ref conf="conformant">Functional Package for X.509, version 1.0</FP-cc-ref>
330331
</cc-pkg-claim>
331332
</CClaimsInfo>
@@ -1032,15 +1033,17 @@ expected to enforce.<h:p/>
10321033
</base-sfr-spec>
10331034
<base-sfr-spec cc-id="fcs_tlsc_ext.1" id="nd-mod-fcs-tlsc-ext-1" title="TLS Client Protocol without Mutual Authentication">
10341035
<consistency-rationale>Other than defining an additional selection-based trigger, there is no modification to this SFR.</consistency-rationale>
1035-
<description>This PP-Module does not modify this SFR as it is defined in the <h:a href="https://www.niap-ccevs.org/protectionprofiles/465">Functional Package for TLS, version 2.0</h:a>. This SFR is selection-based in the Functional Package for its potential use in trusted communications.
1036+
<description>This PP-Module does not modify this SFR as it is defined in the <h:a
1037+
href="https://www.niap-ccevs.org/protectionprofiles/465">Functional Package for TLS, version 2.1</h:a>. This SFR is selection-based in the Functional Package for its potential use in trusted communications.
10361038
This PP-Module also defines EST as a supported method of obtaining certificates for the TOE, which may use TLS.
10371039
This SFR can therefore also be triggered if the TOE claims FIA_ESTC_EXT.1 and selects a mechanism that makes use of FCS_TLSC_EXT.1.</description>
10381040

10391041
<no-change/>
10401042
</base-sfr-spec>
10411043
<base-sfr-spec cc-id="fcs_tlsc_ext.2" title="TLS Client Support for Mutual Authentication" id="nd-mod-fcs-tlsc-ext-2">
10421044
<consistency-rationale>Other than being defined as selection-based, there is no modification to this SFR.</consistency-rationale>
1043-
<description>This PP-Module does not modify this SFR as it is defined in the <h:a href="https://www.niap-ccevs.org/protectionprofiles/465">Functional Package for TLS, version 2.0</h:a>. This SFR is selection-based in the Functional Package for its potential use in trusted communications.
1045+
<description>This PP-Module does not modify this SFR as it is defined in the <h:a
1046+
href="https://www.niap-ccevs.org/protectionprofiles/465">Functional Package for TLS, version 2.1</h:a>. This SFR is selection-based in the Functional Package for its potential use in trusted communications.
10441047
This PP-Module also defines EST as a supported method of obtaining certificates, which may use mutually-authenticated TLS.
10451048
This SFR can therefore also be triggered if the TOE claims FIA_ESTC_EXT.1, dependent on selection in FIA_ESTC_EXT.1.4. </description>
10461049
<no-change/>
@@ -1076,8 +1079,10 @@ expected to enforce.<h:p/>
10761079
<description>
10771080
<h:p>This SFR has been modified from its definition in the Base-PP to mandate the use of TLS. Other protocol options may be selected without restriction. Any element that is not present in this section is unchanged from its definition in the Base-PP.</h:p>
10781081
<h:p>The text of the specified elements is replaced with:</h:p>
1079-
<h:p><h:b>FTP_ITC.1.1: </h:b>The TSF shall be capable of using <h:b>TLS as defined in the <h:a href="https://www.niap-ccevs.org/protectionprofiles/465">Functional Package for TLS, version 2.0</h:a></h:b> and [<h:b>selection: </h:b><h:i>IPsec,
1080-
SSH <h:b>as defined in the <h:a href="https://www.niap-ccevs.org/protectionprofiles/515">Functional Package for SSH, version 2.0</h:a></h:b>, DTLS <h:b>as defined in the <h:a href="https://www.niap-ccevs.org/protectionprofiles/465">Functional Package for TLS, version 2.0</h:a></h:b>, HTTPS, <h:b>no other protocols</h:b></h:i>]
1082+
<h:p><h:b>FTP_ITC.1.1: </h:b>The TSF shall be capable of using <h:b>TLS as defined in
1083+
the <h:a href="https://www.niap-ccevs.org/protectionprofiles/465">Functional Package for TLS, version 2.1</h:a></h:b> and [<h:b>selection: </h:b><h:i>IPsec,
1084+
SSH <h:b>as defined in the <h:a
1085+
href="https://www.niap-ccevs.org/protectionprofiles/515">Functional Package for SSH, version 2.0</h:a></h:b>, DTLS <h:b>as defined in the <h:a href="https://www.niap-ccevs.org/protectionprofiles/465">Functional Package for TLS, version 2.1</h:a></h:b>, HTTPS, <h:b>no other protocols</h:b></h:i>]
10811086
to provide a trusted communication channel between itself and authorized IT entities supporting the following capabilities: audit server, <h:b>TLS session proxying, </h:b>[<h:b>selection: </h:b><h:i>authentication server, <h:b>Enrollment over Secure Transport, </h:b>[<h:b>assignment: </h:b>other capabilities], no other capabilities</h:i>]
10821087
that is logically distinct from other communication channels and provides assured identification of its end points and protection of the channel data from modification and disclosure.</h:p>
10831088
<h:p><h:b>Application Note: </h:b>This SFR is modified from its definition in the Base-PP by specifying that a conformant TOE will always implement TLS trusted channels at minimum, due
@@ -1535,7 +1540,7 @@ expected to enforce.<h:p/>
15351540
For i=0..31, the evaluator shall verify the encrypt functionality by using Key1{i}=Key2{i}=Key3{i} equal to
15361541
the round i key in table A.3 of NIST SP800-20, and IV=0x0000000000000000 to encrypt plaintext =
15371542
0x0000000000000000, and verifying that the resulting ciphertext c4{i} matches the known result for round
1538-
I indicated in table A.3 of NSIT SP800-20.
1543+
I indicated in table A.3 of NIST SP800-20.
15391544
<h:p/>
15401545
For i=0..31, the evaluator shall verify the decrypt functionality by using Key1{i}=Key2{i}=Key3{i} equal to
15411546
the round I key in table A.3 of NIST SP800-20, and IV=0x0000000000000000 to decrypt ciphertext c4{i}
@@ -1546,7 +1551,7 @@ expected to enforce.<h:p/>
15461551
For i=0..18, the evaluator shall verify the encrypt functionality by using Key1{i}=Key2{i}=Key3{i} equal to
15471552
the round i key in table A.4 of NIST SP800-20, and IV=0x0000000000000000 to encrypt the round i
15481553
plaintext, p4{i} in table A.4 of NIST SP300-20, and verifying that the resulting ciphertext c4{i} matches the
1549-
known result for round i indicated in table A.4 of NSIT SP800-20.
1554+
known result for round i indicated in table A.4 of NIST SP800-20.
15501555
<h:p/>
15511556
For i=0..18, the evaluator shall verify the decrypt functionality by using Key1{i}=Key2{i}=Key3{i} equal to
15521557
the round i key in table A.4 of NIST SP800-20, and IV=0x0000000000000000 to decrypt ciphertext =c4{i}
@@ -4747,7 +4752,7 @@ legacy cipher suites. -->
47474752
specify minimum required functionality for X.509 authentication based on its use in STIP. The PP-Module
47484753
also refines the authorized roles that can perform the related management function.</consistency-rationale>
47494754
<description><comment>This component will ostensibly be moved to the definitions present in the X.509 FP. However, we currently do not have a way to accurately model its status in this PP-Module.
4750-
In this case, there is an assignment that will need to be filled in in one of the open-ended assignment fields present in the X.509 FP, but there is
4755+
In this case, there is an assignment that will need to be filled in one of the open-ended assignment fields present in the X.509 FP, but there is
47514756
no way to provide guidance on what selections/assignments must be made in the FP from the PP-Module. There is also no way to provide guidance on what selections must be made in the Base-PP in order to
47524757
make the X.509 FP applicable to the product.
47534758
</comment></description>

0 commit comments

Comments
 (0)