You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: input/stip.xml
+15-15Lines changed: 15 additions & 15 deletions
Original file line number
Diff line number
Diff line change
@@ -1058,7 +1058,7 @@ expected to enforce.<h:p/>
1058
1058
the certificate enrollment process always requires the TSF to validate a presented certificate.</consistency-rationale>
1059
1059
<description> This SFR is selection-based in the <h:a href="https://www.niap-ccevs.org/protectionprofiles/511">Functional Package for X.509, version 1.0</h:a> but
1060
1060
is mandatory when this PP-Module is claimed. FIA_ENR_EXT.1 requires this PP-Module to generate certificate requests
1061
-
using either PKCS#10 or Enrollment over Secure Transport (EST). If PKCS#10 is claimed, the TSF must be able to apply this SFR to the certificate repsonse signed
1061
+
using either PKCS#10 or Enrollment over Secure Transport (EST). If PKCS#10 is claimed, the TSF must be able to apply this SFR to the certificate response signed
1062
1062
by an external CA. If EST is claimed, the TSF must be able to apply this SFR to the X.509 certificate presented by an EST server.</description>
1063
1063
<no-change/>
1064
1064
</base-sfr-spec>
@@ -1249,7 +1249,7 @@ expected to enforce.<h:p/>
1249
1249
</h:ol>
1250
1250
</title>
1251
1251
<note role="application">
1252
-
The "Start-up and shtudown of the audit functions" event is identical to the event defined in the Base-PP's iteration of FAU_GEN.1.
1252
+
The "Start-up and shutdown of the audit functions" event is identical to the event defined in the Base-PP's iteration of FAU_GEN.1.
1253
1253
The TOE is not required to have two separate events for this behavior if there is only a single audit stream that which all audit events use.
1254
1254
If the TOE does maintain a separate logging facility for STIP-related behavior, then this event must be addressed for it. Note that if
1255
1255
the audit functions cannot be started and stopped separately from the TOE itself, then auditing the start-up and shutdown of the TOE is sufficient to address this.
@@ -1445,7 +1445,7 @@ expected to enforce.<h:p/>
1445
1445
evaluator shall compare the ciphertext with the result of encryption of the same inputs with a known
1446
1446
good implementation.
1447
1447
<h:p/>
1448
-
<h:b>Variable Assocated Data Test</h:b>
1448
+
<h:b>Variable Associated Data Test</h:b>
1449
1449
<h:p/>
1450
1450
For each supported key size and associated data length, and any supported payload length, nonce length,
1451
1451
and tag length, the evaluator shall supply one key value, one nonce value, and 10 pairs of associated data
@@ -1583,7 +1583,7 @@ expected to enforce.<h:p/>
1583
1583
and secret keys referenced by this SFR</note>
1584
1584
<aactivity>
1585
1585
<TSS>The evaluator will check the TSS to ensure it lists each persistent secret and private key needed to meet
1586
-
the requirements in the ST. For each of these items, the evaluatorshall confirm that the TSS lists for what
1586
+
the requirements in the ST. For each of these items, the evaluator shall confirm that the TSS lists for what
1587
1587
purpose it is used, and how it is stored, and that the storage is hardware-protected.<h:p/></TSS>
1588
1588
<Guidance>There are no guidance EAs for this component.<h:p/></Guidance>
1589
1589
<Tests>There are no test EAs for this component.</Tests>
@@ -2009,7 +2009,7 @@ expected to enforce.<h:p/>
2009
2009
<h:p/></Guidance>
2010
2010
<Tests>Using the setup for <xref to="tttc-ciphers"/> of FCS_TTTC_EXT.1.1, the evaluator shall establish one or more trusted
2011
2011
subordinate CAs by issuing them valid CA certificates from the trusted CA. The evaluator shall establish a
2012
-
certificate status capability for both the trusted subordinate CAsand the trusted CA that uses a method
2012
+
certificate status capability for both the trusted subordinate CAs and the trusted CA that uses a method
2013
2013
supported by the TSF. The evaluator shall also establish an untrusted CA to use a self-signed CA certificate
2014
2014
not loaded into the TSF trust store. The evaluator shall establish one or more requested servers to use a
2015
2015
valid TLS version and cipher suite combination and to respond using valid TLS handshake messages except
@@ -2033,7 +2033,7 @@ expected to enforce.<h:p/>
2033
2033
evaluator shall ensure the subordinate CA is included in the certificate chain provided by the requested
2034
2034
server and the revocation information is available. The evaluator shall confirm that authentication fails.</test>
2035
2035
<test>The evaluator shall issue a valid certificate for the requested server from the subordinate CA, and
2036
-
establish valid revocation information from the subordinate CA using a supported mechanism for endentity certificates, indicating the requested server’s certificate is revoked. The evaluator shall ensure the
2036
+
establish valid revocation information from the subordinate CA using a supported mechanism for end-entity certificates, indicating the requested server’s certificate is revoked. The evaluator shall ensure the
2037
2037
subordinate CA is included in the certificate chain provided by the requested server and ensure the
2038
2038
revocation information is not available to the TSF. The evaluator shall confirm that the default behavior
2039
2039
for revocation information not available is performed by the TSF. If this behavior is configurable (the first
@@ -2819,7 +2819,7 @@ legacy cipher suites. -->
2819
2819
the current time and a notAfter value that does not precede the value
2820
2820
specified in notBefore.</h:li>
2821
2821
<h:li>The issuer field is not empty and is populated with the
2822
-
<assignable>authrozied role(s)</assignable>-configured CA name.</h:li>
2822
+
<assignable>authorized role(s)</assignable>-configured CA name.</h:li>
2823
2823
<h:li>The signature field and the algorithm in the subjectPublicKeyInfo field
2824
2824
shall contain the OID for a signature algorithm specified in
2825
2825
FCS_COP.1.</h:li>
@@ -4434,13 +4434,13 @@ legacy cipher suites. -->
4434
4434
<!-- Note: changed conditional statement to make it more obvious what the trigger is for this test -->
4435
4435
(conditional, both 'mutual authentication inspection' and 'send an empty certificate list as part of the inspection operation' are selected in FDP_TEP_EXT.1.7):
4436
4436
The evaluator shall establish a server to send certificate requests in its TLS handshake.
4437
-
The evaluator shall extablish a monitored client configured to provide a valid client certificate in response to a certificate request.
4437
+
The evaluator shall establish a monitored client configured to provide a valid client certificate in response to a certificate request.
4438
4438
The evaluator shall follow operational guidance to configure the TLS inspection proxy policy to send an empty certificate list in a certificate message to the server,
4439
4439
and initiate a TLS request from a monitored client to the server through the TOE.
4440
4440
The evaluator shall observe network traffic between the TOE and the requested server and confirm that the TOE sends an empty certificate list to the server after receiving the certificate request.
4441
4441
<h:p/>
4442
4442
Using the same server, the evaluator shall follow operational guidance to configure the TSF to perform mutual authentication inspection with the server,
4443
-
and initiate a TLS request from the same monitored client ro the same requested server through the TOE.
4443
+
and initiate a TLS request from the same monitored client to the same requested server through the TOE.
4444
4444
The evaluator shall observe network traffic between the TOE and the requested server and confirm the TOE sends a certificate message containing a client certificate representing the monitored client.
4445
4445
</test>
4446
4446
</testlist>
@@ -4608,7 +4608,7 @@ legacy cipher suites. -->
4608
4608
correspond to SFR-relevant functionality. For example, a peer acting as
4609
4609
a web server should have TLS Web Server Authentication listed as an
4610
4610
extendedKeyUsage parameter of its X.509v3 certificate. The TOE
4611
-
ensuresthat the relevant extensions in each certificate in the chain such
4611
+
ensures that the relevant extensions in each certificate in the chain such
4612
4612
as the extendedKeyUsage parameters of the leaf certificate correspond
4613
4613
to the SFR-relevant functionality they are used with.</h:li>
4614
4614
</h:ol><h:p/>
@@ -4652,7 +4652,7 @@ legacy cipher suites. -->
4652
4652
<Guidance>There are no guidance EAs for this component.<h:p/></Guidance>
4653
4653
<Tests>
4654
4654
The evaluator shall demonstrate that checking the validity of a certificate is performed when a certificate
4655
-
is used in an authentication of a requested server certificate, or, if mutual authentication for throughtraffic processing is supported, a monitored client certificate, as well as CA certificates included in the
4655
+
is used in an authentication of a requested server certificate, or, if mutual authentication for through traffic processing is supported, a monitored client certificate, as well as CA certificates included in the
4656
4656
certificate path and any for OCSP responses used in validating these certificates. The evaluator shall
4657
4657
perform the following tests for FIA_X509_EXT.1.1/STIP. These tests must be repeated for each distinct
4658
4658
security function that uses X.509v3 certificates in association with thru-traffic processing. For
@@ -5914,7 +5914,7 @@ legacy cipher suites. -->
5914
5914
The TSF shall be able to obtain EST server and CA certificates for authorized EST
5915
5915
services via <selectables>
5916
5916
<selectable>implicit Trust Anchor/Trust Store (TA) configured by
0 commit comments