f5 NDCPP ST
f5 NDCPP ST
4 for LTM+APM
Security Target
Prepared By:
Saffire Systems
PO Box 40295
Indianapolis, IN 46240
Prepared For:
F5 Networks, Inc.
Seattle, WA 98119
Table of Contents
1 INTRODUCTION ...............................................................................................................................................1
1.1 SECURITY TARGET IDENTIFICATION .................................................................................................................1
1.2 TOE IDENTIFICATION ........................................................................................................................................1
1.3 DOCUMENT TERMINOLOGY ...............................................................................................................................3
1.3.1 ST Specific Terminology .........................................................................................................................3
1.3.2 Acronyms.................................................................................................................................................4
1.4 TOE TYPE .........................................................................................................................................................5
1.5 TOE OVERVIEW ................................................................................................................................................5
1.6 TOE DESCRIPTION ............................................................................................................................................6
1.6.1 Introduction.............................................................................................................................................6
1.6.2 Architecture Description .........................................................................................................................7
1.6.3 Physical Boundaries .............................................................................................................................10
1.6.3.1 Physical boundaries .......................................................................................................................................... 10
1.6.3.2 Guidance Documentation.................................................................................................................................. 11
1.6.4 Logical Boundaries ...............................................................................................................................12
1.6.4.1 Security Audit ................................................................................................................................................... 13
1.6.4.2 Cryptographic Support ...................................................................................................................................... 13
1.6.4.3 Identification and Authentication ..................................................................................................................... 14
1.6.4.4 Security Management ....................................................................................................................................... 14
1.6.4.5 Protection of the TSF ........................................................................................................................................ 15
1.6.4.6 TOE access........................................................................................................................................................ 15
1.6.4.7 Trusted Path/Channels ...................................................................................................................................... 15
2 CONFORMANCE CLAIMS ...........................................................................................................................17
2.1 CC CONFORMANCE CLAIMS ...........................................................................................................................17
2.2 PP AND PACKAGE CLAIMS ..............................................................................................................................17
2.3 CONFORMANCE RATIONALE ...........................................................................................................................20
3 SECURITY PROBLEM DEFINITION ..........................................................................................................21
3.1 THREAT ENVIRONMENT ..................................................................................................................................21
3.2 THREATS .........................................................................................................................................................22
3.3 ORGANISATIONAL SECURITY POLICIES ...........................................................................................................23
3.4 ASSUMPTIONS .................................................................................................................................................23
4 SECURITY OBJECTIVES ..............................................................................................................................25
4.1 SECURITY OBJECTIVES FOR THE ENVIRONMENT ............................................................................................25
5 EXTENDED COMPONENTS DEFINITION ................................................................................................26
List of Tables
Table 1: Supported Hardware Models ...........................................................................................................3
List of Figures
Figure 1: Schematic example of a BIG-IP network environment..................................................................7
1 Introduction
This section identifies the Security Target, Target of Evaluation (TOE), conformance claims, ST
organization, document conventions, and terminology. It also includes an overview of the evaluated
product.
Version: 1.3
Each of the hardware platforms includes a third party proprietary cryptographic acceleration card. All
hardware platforms, except the 2250 include the Intel Coleto Creek (8955). The 2250 model includes the
Cavium Nitrox (CN3540-500-C20). Hardware acceleration cards are not included in the TOE.
1.3.2 Acronyms
ADC Application Delivery Controller
CC Common Criteria
CMI Central Management Infrastructure
CRL Certificate Revocation List
CRLDP Certificate Revocation List Distribution Point
DTLS Datagram Transport Layer Security
EAL2 Evaluation Assurance Level 2
FPGA Field-Programmable Gate Array
GUI Graphical User Interface
HSB High-Speed Bridge
HSL High-Speed Logging
LTM Local Traffic Manager
OSP Organisational Security Policy
PP Protection Profile
SFP Security Function Policy
SFR Security Functional Requirement
SOAP Simple Object Access Protocol
SOF Strength of Function
TLS Transport Layer Security
TMM Traffic Management Microkernel
TMOS Traffic Management Operating System
TOE Target of Evaluation
TSC TSF Scope of Control
TSF TOE Security Functions
• Application Delivery Controller, which includes the Local Traffic Manager (LTM) and Access
Policy Manager (APM) modules, provides network traffic management capabilities.
BIG-IP products run on appliance hardware provided by F5. In addition, BIG-IP running as a guest
instance on F5 appliances that support F5's Virtual Clustered Multiprocessing (vCMP) environment is
included. (vCMP implements a purpose-built hypervisor that allows organizations to run multiple virtual
instances of BIG-IP on the same hardware.)
The TOE's Traffic Management Microkernel (TMM), along with additional software, provides basic
networking functionality, with the TOE operating as a network switch and reverse proxy. This includes
the following security functions:
• Security Audit: BIG-IP implements syslog capabilities to generate audit records for security-
relevant events. In addition, the BIG-IP protects the audit trail from unauthorized modifications
and loss of audit data due to insufficient space.
• Security Function Management: A command line interface (available via the traffic
management shell "tmsh"), web-based GUI ("Configuration utility"), a SOAP-based API
("iControl API"), and a REST-based API (“iControl REST API”) are offered to administrators for
all relevant configuration of security functionality. The TOE manages configuration objects in a
partition which includes users, server pools, etc. This includes the authentication of
administrators by user name and password, as well as access control based on pre-defined roles
and, optionally, groups of objects ("Profiles"). "Profiles" can be defined for individual servers and
classes of servers that the TOE forwards traffic from clients to, and for traffic that matches certain
characteristics, determining the kind of treatment applicable to that traffic. Management
capabilities offered by the TOE include the definition of templates for certain configuration
options. The management functionality also implements roles for separation of duties.
• Protection of the TSF: BIG-IP implements many capabilities to protect the integrity and
management of its own security functionality. These capabilities include the protection of
sensitive data, such as passwords and keys, self-tests, product update verification, and reliable
time stamping.
• TOE Access: Prior to interactive user authentication, the BIG-IP can display an administrative-
defined banner. BIG-IP terminates interactive sessions after an administrator-defined period of
inactivity and allows users to terminate their own authenticated session.
• Trusted Path / Channels: The TOE protects remote connections to its management interfaces
with TLS and SSH. The TOE also protects communication channels with audit servers using
TLS.
1.6.1 Introduction
Figure 1 provides a schematic example of the TOE's role and location in a networking environment. The
F5 hardware hosting BIG-IP is depicted by the two redundant network devices in the diagram. In this
example:
• Internet connections (dark red network connection) are mediated by BIG-IP to provide access to
certain resources located in an organization's internal server pool (yellow network connection),
for example to a web-based e-commerce system presenting a storefront to consumers
• Users in the organization's Intranet (orange network connection) also access resources in the
server pools to interact with the internal server pool. Although not included in the TOE, BIG-IP
provides server termination of traffic flowing to a backend server by implementing a TLS client
protocol.
• Network administrators connect to BIG-IP via a dedicated network interface (dark green network
connection) to administer the TOE
• The TOE is set up in a redundant failover configuration, with heartbeat monitoring and reporting
via a data link between the two instances (light green connections)
When deployed as two redundant systems configured in an active/standby failover configuration, the two
systems can synchronize their configuration data and provide state and persistence monitoring. The TOE
will fail over to the redundant system while maintaining a secure configuration if failures the active
device sends a request to the standby device or if the standby device detects missing heartbeats from the
active device. The new active device will continue to enforce security policies for new (and possibly
active) connections mediated by the TOE. BIG-IP uses CMI (Central Management Infrastructure), a
proprietary protocol, for the incremental exchange of configuration data and failover status between TOE
instances; CMI is encapsulated in TLS to provide integrity and confidentiality protections. In this
configuration a physical network port will be dedicated on each device for the exchange of
synchronization data and failover monitoring with the standby device. Failover / redundancy is not in the
scope of the evaluated configuration.
The TOE implements and supports the following network protocols: TLS (client and server), SSH,
HTTPS, NTP, FTP. The TOE protects remote connections to its management interfaces with TLS and
SSH. The TOE also protects communication channels with audit servers using TLS (TLSv1.1 and
TLSv1.2). The cryptographic functionality implemented in the TOE is provided by OpenSSL.
The TOE is divided into five (5) subsystems: Appliance (hardware or virtual), Traffic Management
Operating System (TMOS), Traffic Management Micro-kernel (TMM), Local Traffic Manager (LTM),
and Access Policy Manager (APM). F5’s TMOS is a Linux-based operating system customized for
performance and to execute on the TOE appliance hardware or in the TOE Virtual Clustered
Multiprocessing (vCMP) environment. The vCMP is a hypervisor that allows multiple instances of the
TOE to execute on the same underlying hardware. The TMM is the data plane of the product and all data
plane traffic passes through the TMM. The LTM controls network traffic coming into or exiting the local
area network (LAN) and provides the ability to intercept and redirect incoming network traffic. The APM
module terminates TLS-based VPN connections from remote clients although these features are not
included in the evaluated configuration.
TMOS is a Linux operating system that runs directly on appliance hardware or in a vCMP environment.
TMOS is a modified version of the RedHat Linux kernel 2.6.32-431.56.1.e16. In addition to providing the
standard operating system features (such as process management, file management, etc), the TMOS
provides the following security features for the TOE:
• Auditing functionality, using the host system's syslog capabilities. (In addition, a concept called
"high-speed logging" (HSL) allows TMM instances to send certain log traffic directly to external
audit servers.)
• Time stamping, using NTP servers to obtain accurate time stamps and maintain the system clock
• Individual daemons introduced by BIG-IP packages, such as the modules implementing the LTM
and APM logic.
At the core of BIG-IP is a concept referred to as Traffic Management Microkernel (TMM), representing
the data plane of the product when compared to traditional network device architectures. It is
implemented by a daemon running with root privileges, performing its own memory management, and
having direct access to the network hardware. TMM implements a number of sequential filters both for
the “client-side” and “server-side” network interfaces served by BIG-IP. The filters implemented in TMM
include a TCP, TLS, compression, and HTTP filter, amongst others. If the hardware provides more than
one CPU, TMM runs multi-threaded (one thread per CPU). In this case, disaggregators implemented in
hardware or, depending on the underlying appliance, firmware, are responsible for de-multiplexing and
multiplexing network traffic for handling by an individual TMM thread. In addition to the actual switch
hardware, F5 appliance hardware also contains a High-Speed Bridge (HSB, implemented by means of an
FPGA) that performs basic traffic filtering functionality as instructed by TMM.
Additional plug-in filters can be added to this queue by individual product packages. These plug-ins
typically have a filter component in TMM, with additional and more complex logic in a counter-part
implemented in a Linux-based daemon (module). The plug-in modules relevant to this evaluation shown
in Figure 3 include:
• Local Traffic Manager (LTM): authentication of HTTP (based on Apache 2.2.15) traffic and
advanced traffic forwarding directives
A diagram depicting aspects of the TOE’s architecture and the boundaries of the TOE are provided in
Figure 3.
The TOE includes the hardware and software components as identified in Section 1.2.
The evaluated configuration of BIG-IP Version 12.1.3.4 LTM+APM represents a licensing option with the
following F5 modules present and operational.
The following required components can be found in the operating environment of the TOE on systems
other than those hosting the TOE:
• NTP servers
• audit servers.
Client software (e.g., the BIG-IP Client for TLS VPN connections, endpoint inspection software executed
on clients) are optional components that are not part of the TOE.
• Security Audit
• Cryptographic Support
• Security Management
• TOE Access
• Trusted Path/Channels
The following configuration specifics apply to the evaluated configuration of the TOE:
• Appliance mode is licensed. This results in root access to the TOE operating system and bash
shell being disabled.
• Disabled interfaces:
o All command shells other than tmsh are disabled. For example, bash and other user-
serviceable shells are excluded.
o Remote (i.e., SSH) access to the Lights Out / Always On Management1 capabilities of the
system is disabled.
o Serial port console (disabled by policy after the initial power on and communications setup of
the hardware)
o SSH client
1
Lights Out / Always On Management is an add-on module providing a management system for non-security
related features not required for operation of the TOE.
BIG-IP implements auditing functionality based on standard syslog functionality. This includes the
support of remote audit servers for capturing of audit records. Audit records are generated for all security-
relevant events, such as the use of configuration interfaces by administrators, the authentication of traffic,
and the application of network traffic rules.
While the TOE can store audit records locally for cases when an external log server becomes unavailable,
in the evaluated configuration an external log server is used as the primary means of archiving audit
records.
In the evaluated configuration, BIG-IP logs a warning to notify the administrator when the local audit
storage exceeds a configurable maximum size. Once the configurable maximum size is reached, BIG-IP
overwrites the oldest audit records.
All cryptographic operations, including algorithms and key generation used by the TOE are provided by
the F5 cryptographic module (OpenSSL) within the TMOS.
Various security functions in BIG-IP rely on cryptographic mechanisms for their effective
implementation. Trusted paths for the TOE administrator are provided by SSH for the tmsh administrative
interface and by TLS for the Configuration utility, iControl API and iControl REST API. For
administrative sessions, the TOE always acts as a server. For traffic sessions, the TOE may act as a TLS
client or server. Trusted channels between the TOE and external entities, such as a syslog server, are
provided by TLS connections.
For TLS sessions, the TOE implements certificate validation using the OpenSSL crypto library.
The TOE utilizes cryptographic algorithms that have been validated using the FIPS-approved and NIST-
recommended algorithms.
The underlying hardware platforms of the TOE include a third party proprietary cryptographic
acceleration card that is used to provide sufficient entropy to support random number generation (RNG).
In the evaluated configuration, the cryptographic acceleration cards are not used for acceleration or key
storage. These capabilities that are present on the accelerator cards are disabled in the evaluated
configuration.
1.6.4.3.1 Administrators
The TOE identifies individual administrative users by user name and authenticates them by passwords
stored in a local configuration database; the TOE can enforce a password policy based on overall
minimum length and number of characters of different types required. BIG-IP obscures passwords entered
by users.
Authentication of administrators is enforced at all configuration interfaces, i.e. at the shell (tmsh, via
SSH), the Configuration utility (web-based GUI), iControl API, and iControl REST API.
The TOE allows administrators to configure all relevant aspects of security functionality implemented by
the TSF. For this purpose, BIG-IP offers multiple interfaces to administrators:
• Configuration utility
The Configuration utility presents a web-based GUI available to administrators via HTTPS that
allows administration of most aspects of the TSF.
• iControl API
The iControl API is a SOAP based protocol interface that allows programmatic access to the TSF
configuration via HTTPS.
The TOE provides the ability to administer the TOE both locally and remotely using any of the four
administrative interfaces. Local administration is performed via a device directly connected to the
management port on the BIG-IP via an Ethernet cable. By default and in the evaluated configuration,
remote access to the management interfaces is only made available on the dedicated management network
port of a BIG-IP system.
BIG-IP implements a hierarchy of roles that are pre-defined to grant administrators varying degrees of
control over the basic configuration of the TOE, and additional roles are introduced for module-specific
tasks. These roles can be assigned to users by authorized administrators.
In addition to roles, the TOE allows the definition of partitions. Configuration objects, such as server
pools or service profiles, can be assigned to individual partitions, as can administrative users. This allows
administrative access of individual administrators to be restricted to configuration objects that belong to
the partition that has been assigned to the user.
The TOE is designed to protect critical security data, including keys and passwords. In addition, the TOE
includes self-tests that monitor continue operation of the TOE to ensure that it is operating correctly. The
TOE also provides a mechanism to provide trusted updates to the TOE firmware or software and reliable
timestamps in order to support TOE functions, including accurate audit recording.
The TOE implements session inactivity time-outs for Configuration utility and tmsh sessions and displays
a warning banner before establishing an interactive session between a human user and the TOE.
This chapter summarizes the security functionality provided by the TOE in order to protect the
confidentiality and integrity of network connections described below.
• Remote access to the traffic management shell (tmsh) is secured via SSH.
• Remote access to the web-based Configuration utility, iControl REST API, and iControl API is
secured via TLS.
1.6.4.7.3 OpenSSH
The TOE SSH implementation is based on OpenSSH Version OpenSSH_5.3p1; however, the TOE
OpenSSH configuration sets the implementation via the sshd_config as follows:
• The SSH protocol key exchange mechanism is limited to ecdh-sha2-nistp256 and ecdh-sha2-
nistp384
2 Conformance Claims
2.1 CC Conformance Claims
This ST was developed to Common Criteria (CC) for Information Technology Security Evaluation –April
2017 Version 3.1, Revision 5, CCMB-2017-04-001
• collaborative Protection Profile for Network Devices (NDcPP), Version 1.0, 27 February 2015
conformant
NIAP TD Applicability
0291 – NIT Technical Decision for DH14 and FCS_CKM.1 Not Applicable. The TOE does not
include DH group 14.
0290 – NIT Technical Decision for physical interruption of Applicable
trusted/path channel
0289 – NIT Technical Decision for FCS_TLSC_EXT.x.1 Test 5e Applicable
0281 – NIT Technical Decision for Testing both thresholds for SSH Applicable
rekey
0262 – NIT Technical Decision for TLS server testing – Empty Not Applicable. The TOE does not
Certificate Authorities list include FCS_TLSS_EXT.2.
0257 – NIT Technical Decision for Updating Applicable
FCS_DTLSC_EXT.x.2/FCS_TLSC_EXT.x.2 Tests 1-4
0256 – NIT Technical Decision for Handling of TLS connections Applicable
with and without mututal authentication
0255 – NIT Technical Decision for TLS Server Tests – Issue 3: Applicable
Verification of application of encryption
0235 – NIT Technical Decision adding DH group 14 to the Not Applicable. The TOE does not
selection in FCS_CKM.2 include DH group 14.
0228 – NIT Technical Decision for CA certificates - Applicable
basicConstraints validation
0227 – NIT Technical Decision for TOE acting as a TLS Client and Applicable
RSA key generation
NIAP TD Applicability
0226 – NIT Technical Decision for TLS Encryption Algorithms Applicable
0225 – NIT Technical Decision for Make CBC cipher suites Not Applicable. The TOE does not
optional in IPsec include IPSEC.
0224 – NIT Technical Decision Making DH Group 14 optional in Not Applicable. The TOE does not
FCS_IPSEC_EXT.1.11 include IPSEC.
0223 – NIT Technical Decision for "Expected" vs "unexpected" Not Applicable. The TOE does not
DNs for IPsec Communications include IPSEC.
0201 – NIT Technical Decision for Use of intermediate CA Applicable
certificates and certificate hierarchy depth
0200 – NIT Technical Decision for Password authentication for Not Applicable. The TOE does not
SSH clients include FCS_SSHC_EXT.1.
0199 – NIT Technical Decision for Elliptic Curves for Signatures Applicable
0195 – NIT Technical Decision Making DH Group 14 optional in Not Applicable. The TOE does not
FCS_IPSEC_EXT.1.11 include IPSEC.
0191 – NIT Technical Decision for Using secp521r1 for TLS Not Applicable. The TOE does not
communication include secp521r1.
0189 – NIT Technical Decision for SSH Server Encryption Applicable
Algorithms
0188 – NIT Technical Decision for Optional use of X.509 Applicable
certificates for digital signatures
0187 – NIT Technical Decision for Clarifying FIA_X509_EXT.1 Applicable
test 1
0186 – NIT Technical Decision for Applicability of X.509 Not Applicable. The TOE does not
certificate testing to IPsec include IPSEC.
0185 – NIT Technical Decision for Channel for Secure Update. Applicable
0184 – NIT Technical Decision for Mandatory use of X.509 Applicable
certificates
0183 – NIT Technical Decision for Use of the Supporting Applicable
Document
0182 – NIT Technical Decision for Handling of X.509 certificates Applicable
related to ssh-rsa and remote comms.
0181 – NIT Technical Decision for Self-testing of integrity of Applicable
firmware and software.
0170 – NIT Technical Decision for SNMPv3 Support Not Applicable. The TOE does not
include SNMPv3 support.
0169 – NIT Technical Decision for Compliance to RFC5759 and Applicable
RFC5280 for using CRLs
NIAP TD Applicability
0168 – NIT Technical Decision for Mandatory requirement for Applicable
CSR generation
0167 – NIT Technical Decision for Testing SSH 2^28 packets Applicable
0165 – NIT Technical Decision for Sending the Applicable
ServerKeyExchange message when using RSA
0164 – NIT Technical Decision for Negative testing for additional Applicable
ciphers for SSH
0160 – NIT Technical Decision for Transport mode and tunnel Not Applicable. The TOE does not
mode in IPSEC communications include IPSEC.
0156 – NIT Technical Decision for SSL/TLS Version Testing in the Applicable
NDcPP v1.0 and FW cPP v1.0
0155 – NIT Technical Decision for TLSS tests using ECDHE in the Applicable
NDcPP v1.0.
0154 – NIT Technical Decision for Versions of TOE Software in Applicable
the NDcPP v1.0 and FW cPP v1.0
0153 – NIT Technical Decision for Auditing of NTP Time Changes Applicable
in the NDcPP v1.0 and FW cPP v1.0
0152 – NIT Technical Decision for Reference identifiers for TLS in Applicable
the NDcPP v1.0 and FW cPP v1.0
0151 – NIT Technical Decision for FCS_TLSS_EXT Testing - Applicable
Issue 1 in NDcPP v1.0.
0150 – NIT Technical Decision for Removal of SSH re-key audit Applicable
events in the NDcPP v1.0 and FW cPP v1.0
0143 – NIT Technical Decision for Failure testing for TLS session Applicable
establishment in NDcPP and FWcPP
0130 – NIT Technical Decision for Requirements for Destruction of Applicable
Cryptographic Keys
0126 – NIT Technical Decision for TLS Mutual Authentication Applicable
0125 – NIT Technical Decision for Checking validity of peer Applicable
certificates for HTTPS servers
0117 – NIT Technical Decision for FIA_X509_EXT.1.1 Applicable
Requirement in NDcPP
0116 – NIT Technical Decision for a Typo in reference to Applicable
RSASSA-PKCS1v1_5 in NDcPP and FWcPP
0115 – NIT Technical Decision for Transport mode and tunnel Not Applicable. The TOE does not
mode in IPsec communication in NDcPP and FWcPP include IPSEC.
0114 – NIT Technical Decision for Re-Use of FIPS test results in Applicable
NDcPP and FWcPP
NIAP TD Applicability
0113 – NIT Technical Decision for testing and trusted updates in Not Applicable. BIG-IP uses
the NDcPP v1.0 and FW cPP v1.0 digital signatures for update
verification.
0112 – NIT Technical Decision for TLS testing in the NDcPP v1.0 Applicable
and FW cPP v1.0.
0111 – NIT Technical Decision for third party libraries and Applicable
FCS_CKM.1 in NDcPP and FWcPP
0096 – NIT Technical Interpretation regarding Virtualization Applicable
0095 – NIT Technical Interpretations regarding audit, random bit Applicable
generation, and entropy in NDcPP
0094 – NIT Technical Decision for validating a published hash in Applicable
NDcPP
0093 – NIT Technical Decision for FIA_X509_EXT.1.1 Applicable
Requirement in NDcPP
0090 – NIT Technical Decision for FMT_SMF.1.1 Requirement in Applicable
NDcPP
• Evaluation Activities for Network Device cPP, Version 1.0, 27 February 2015
• Authorized users of the TOE (i.e., administrators) who try to manipulate configuration
data that they are not authorized to access. TOE administrators, as well as administrators
of the operational environment, are assumed to be trustworthy, trained and to follow the
instructions provided to them with respect to the secure configuration and operation of
the systems under their responsibility. Hence, only inadvertent attempts to manipulate the
safe operation of the TOE are expected from this community.
The motivation of threat agents is assumed to be commensurate with the assurance level pursued
by this evaluation, i.e., the TOE intends to resist penetration by attackers with an Enhanced-
Basic attack potential.
3.2 Threats
The threats identified in this section may be addressed by the TOE, TOE environment, or a combination
of both. The threat agents are authorized persons/processes, unauthorized persons/processes, or external
IT entities not authorized to use the TOE itself. The threats identified assume that the threat agent is a
person with a low attack potential who possesses an average expertise, few resources, and low to
moderate motivation.
T.UNAUTHORIZED_ADMINISTRATOR_ACCESS
Threat agents may attempt to gain administrator access to the network device by nefarious means
such as masquerading as an administrator to the device, masquerading as the device to an
administrator, replaying an administrative session (in its entirety, or selected portions), or
performing man-in-the-middle attacks, which would provide access to the administrative session,
or sessions between network devices. Successfully gaining administrator access allows malicious
actions that compromise the security functionality of the device and the network on which it
resides.
T.WEAK_CRYPTOGRAPHY
Threat agents may exploit weak cryptographic algorithms or perform a cryptographic exhaust
against the key space. Poorly chosen encryption algorithms, modes, and key sizes will allow
attackers to compromise the algorithms, or brute force exhaust the key space and give them
unauthorized access allowing them to read, manipulate and/or control the traffic with minimal
effort.
T.UNTRUSTED_COMMUNICATION_CHANNELS
Threat agents may attempt to target network devices that do not use standardized secure tunneling
protocols to protect the critical network traffic. Attackers may take advantage of poorly designed
protocols or poor key management to successfully perform man-in-the-middle attacks, replay
attacks, etc. Successful attacks will result in loss of confidentiality and integrity of the critical
network traffic, and potentially could lead to a compromise of the network device itself.
T.WEAK_AUTHENTICATION_ENDPOINTS
Threat agents may take advantage of secure protocols that use weak methods to authenticate the
endpoints – e.g., shared password that is guessable or transported as plaintext. The consequences
are the same as a poorly designed protocol, the attacker could masquerade as the administrator or
another device, and the attacker could insert themselves into the network stream and perform a
man-in-the-middle attack. The result is the critical network traffic is exposed and there could be a
loss of confidentiality and integrity, and potentially the network device itself could be
compromised.
T.UPDATE_COMPROMISE
Threat agents may attempt to provide a compromised update of the software or firmware which
undermines the security functionality of the device. Non-validated updates or updates validated
using non-secure or weak cryptography leave the update firmware vulnerable to surreptitious
alteration.
T.UNDETECTED_ACTIVITY
Threat agents may attempt to access, change, and/or modify the security functionality of the
network device without administrator awareness. This could result in the attacker finding an
avenue (e.g., misconfiguration, flaw in the product) to compromise the device and the
administrator would have no knowledge that the device has been compromised.
T.SECURITY_FUNCTIONALITY_COMPROMISE
Threat agents may compromise credentials and device data enabling continued access to the
network device and its critical data. The compromise of credentials include replacing existing
credentials with an attacker’s credentials, modifying existing credentials, or obtaining the
administrator or device credentials for use by the attacker.
T.PASSWORD_CRACKING
Threat agents may be able to take advantage of weak administrative passwords to gain privileged
access to the device. Having privileged access to the device provides the attacker unfettered
access to the network traffic, and may allow them to take advantage of any trust relationships
with other network devices.
T.SECURITY_FUNCTIONALITY_FAILURE
A component of the network device may fail during start-up or during operations causing a
compromise or failure in the security functionality of the network device, leaving the device
susceptible to attackers.
P.ACCESS_BANNER
The TOE shall display an initial banner describing restrictions of use, legal agreements, or any
other appropriate information to which users consent by accessing the TOE.
3.4 Assumptions
The assumptions are ordered into three categories: personnel assumptions, physical environment
assumptions, and operational assumptions.
A.PHYSICAL_PROTECTION
The network device is assumed to be physically protected in its operational environment and not
subject to physical attacks that compromise the security and/or interfere with the device’s
physical interconnections and correct operation. This protection is assumed to be sufficient to
protect the device and the data it contains. As a result, the cPP will not include any requirements
on physical tamper protection or other physical attack mitigations. The cPP will not expect the
product to defend against physical access to the device that allows unauthorized entities to extract
data, bypass other controls, or otherwise manipulate the device.
A.LIMITED_FUNCTIONALITY
The device is assumed to provide networking and filtering functionality as its core function and
not provide functionality/services that could be deemed as general purpose computing. For
example the device should not provide computing platform for general purpose applications
(unrelated to networking functionality).
A.NO_THRU_TRAFFIC_PROTECTION
The standard/generic network device does not provide any assurance regarding the protection of
traffic that traverses it. The intent is for the network device to protect data that originates on or is
destined to the device itself, to include administrative data and audit data. Traffic that is
traversing the network device, destined for another network entity, is not covered by the NDcPP.
It is assumed that this protection will be covered by cPPs for particular types of network devices
(e.g., firewall).
A.TRUSTED_ADMINISTRATOR
The Security Administrator(s) for the network device are assumed to be trusted and to act in the
best interest of security for the organization. This includes being appropriately trained, following
policy, and adhering to guidance documentation. Administrators are trusted to ensure
passwords/credentials have sufficient strength and entropy and to lack malicious intent when
administering the device. The network device is not expected to be capable of defending against a
malicious administrator that actively works to bypass or compromise the security of the device.
A.REGULAR_UPDATES
The network device firmware and software is assumed to be updated by an administrator on a
regular basis in response to the release of product updates due to known vulnerabilities.
A.ADMIN_CREDENTIALS_SECURE
The administrator’s credentials (private key) used to access the network device are protected by the
platform on which they reside.
4 Security Objectives
This chapter describes the security objectives for the TOE’s operating environment (i.e., security
objectives addressed by the IT domain or by non-technical or procedural means).
OE.PHYSICAL
Physical security, commensurate with the value of the TOE and the data it contains, is provided
by the environment.
OE.NO_GENERAL_PURPOSE
There are no general-purpose computing capabilities (e.g., compilers or user applications)
available on the TOE, other than those services necessary for the operation, administration and
support of the TOE.
OE.NO_THRU_TRAFFIC_PROTECTION
The TOE does not provide any protection of traffic that traverses it. It is assumed that protection
of this traffic will be covered by other security and assurance measures in the operational
environment.
OE.TRUSTED_ADMIN
TOE Administrators are trusted to follow and apply all guidance documentation in a trusted
manner.
OE.UPDATES
The TOE firmware and software is updated by an administrator on a regular basis in response to
the release of product updates due to known vulnerabilities.
OE.ADMIN_CREDENTIALS_SECURE
The administrator’s credentials (private key) used to access the TOE must be protected on any
other platform on which they reside.
TheNDcPP defines the following extended security functional requirements (SFRs). Refer to the NDcPP
for the definition of these extended SFRs since they are not redefined in this ST.
FAU_STG_EXT.1
FAU_STG_EXT.3
FCS_HTTPS_EXT.1
FCS_RBG_EXT.1
FCS_SSHS_EXT.1
FCS_TLSC_EXT.2
FCS_TLSS_EXT.1
FIA_UIA_EXT.1
FIA_UAU_EXT.2
FIA_X509_EXT.1
FIA_X509_EXT.2
FIA_X509_EXT.3
FPT_APW_EXT.1
FPT_TST_EXT.1
FPT_TUD_EXT.1
FTA_SSL_EXT.1
6 Security Requirements
The security requirements that are levied on the TOE are specified in this section of the ST. Each of them
are drawn from the NDcPP.
TOE Security Functional Requirements Required Optional Selection-
Based
(from CC Part 2)
FAU_GEN.1 Audit Data Generation √
FAU_GEN.2 User Identity Association √
FAU_STG.1 Protected Audit Trail Storage √
FCS_CKM.1 Cryptographic Key Generation √
FCS_CKM.2 Cryptographic Key Establishment √
FCS_CKM.4 Cryptographic Key Destruction √
FCS_COP.1(1) Cryptographic Operation (AES Data √
Encryption/Decryption)
FCS_COP.1(2) Cryptographic Operation (Signature √
Generation and Verification)
FCS_COP.1(3) Cryptographic Operation (Hash √
Algorithm)
FCS_COP.1(4) Cryptographic Operation (Keyed Hash √
Algorithm)
FIA_UAU.7 Protected Authentication Feedback √
FMT_MOF.1(1)/ Management of Security Functions √
AdminAct Behaviour/AdminAct
FMT_MOF.1(2)/ Management of Security Functions √
AdminAct Behaviour/AdminAct
FMT_MOF.1(1)/ Management of Security Functions √
TrustedUpdate Behaviour/TrustedUpdate
FMT_MTD.1 Management of TSF Data √
FMT_MTD.1/AdminAct Management of TSF Data/AdminAct √
FMT_SMF.1 Specification of Management Functions √
FMT_SMR.2 Restrictions on Security Roles √
FPT_STM.1 Reliable Time Stamps √
FTA_SSL.3 TSF-initiated Termination √
FTA_SSL.4 User-initiated Termination √
FTA_TAB.1 Default TOE Access Banners √
FTP_ITC.1 Inter-TSF Trusted Channel √
FTP_TRP.1 Trusted Path √
6.1 Conventions
The CC defines four operations on security functional requirements. The conventions below
define the conventions used in this ST to identify the operations completed in the PP and the
operations completed in this ST by the ST author. Some of the operations completed in this ST
by the ST author are the completion of selections of assignments relevant to on the PP. All
operations completed in the ST are surrounded by square brackets ([operation]).
[Refinement made in ST]: additions indicated with [bold text within brackets]
FAU_GEN.1.2 The TSF shall record within each audit record at least the following information:
a) Date and time of the event, type of event, subject identity, and the outcome
(success or failure) of the event; and
b) For each audit event type, based on the auditable event definitions of the
functional components included in the PP/ST, information specified in column three
of [Table 4].
Requirement Auditable Events Additional Audit Record
Contents
FAU_GEN.1 None. None.
FAU_GEN.2 None. None.
FAU_STG.1.2 The TSF shall be able to prevent unauthorised modifications to the stored audit
records in the audit trail.
FAU_STG_EXT.1.2 The TSF shall be able to store generated audit data on the TOE itself.
FAU_STG_EXT.1.3 The TSF shall [overwrite previous audit records according to the following rule:
[log files are numbered and the oldest log file is deleted]] when the local storage
• RSA schemes using cryptographic key sizes of 2048-bit or greater that meet the
following: FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Appendix B.3;
• ECC schemes using “NIST curves” [P-256, P-384] that meet the following: FIPS
PUB 186-4, “Digital Signature Standard (DSS)”, Appendix B.4;
] and specified cryptographic key sizes [assignment: cryptographic key sizes] that
meet the following: [assignment: list of standards].
• RSA-based key establishment schemes that meets the following: NIST Special
Publication 800-56B, “Recommendation for Pair-Wise Key Establishment
Schemes Using Integer Factorization Cryptography”;
• Elliptic curve-based key establishment schemes that meets the following: NIST
Special Publication 800-56A, “Recommendation for Pair-Wise Key
Establishment Schemes Using Discrete Logarithm Cryptography”;
] that meets the following: [assignment: list of standards].
• RSA Digital Signature Algorithm and cryptographic key sizes (modulus) [2048
bits or greater],
• Elliptic Curve Digital Signature Algorithm and cryptographic key sizes [256 bits
or greater]
]
that meet the following: [
• For RSA schemes: FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Section
5.5, using PKCS #1 v2.1 Signature Schemes RSASSA-PSS and/or RSASSA-
PKCS1v1_ 5; ISO/IEC 9796-2, Digital signature scheme 2 or Digital Signature
scheme 3,
• For ECDSA schemes: FIPS PUB 186-4, “Digital Signature Standard (DSS)”,
Section 6 and Appendix D, Implementing “NIST curves” [P-256, P-384]; ISO/IEC
14888-3, Section 6.4
].
FCS_HTTPS_EXT.1.3 The TSF shall establish the connection only if [[when the TOE is acting as a
client] the peer presents a valid certificate during handshake, [or when the TOE is
acting as a server] the peer initiates handshake].
FCS_RBG_EXT.1.2 The deterministic RBG shall be seeded by at least one entropy source that
accumulates entropy from [[two] software-based noise source, [two] hardware-based
noise source [for the non-virtualization platforms except 10000 series], [one]
hardware-based noise source [for 10000 series], [one] hardware-based noise source
[for the VCMP guest platforms]] with a minimum of [256 bits] of entropy at least
equal to the greatest security strength, according to ISO/IEC 18031:2011 Table C.1
“Security Strength Table for Hash Functions”, of the keys and hashes that it will
generate.
FCS_SSHS_EXT.1.2 The TSF shall ensure that the SSH protocol implementation supports the
following authentication methods as described in RFC 4252: public key-based,
password-based.
FCS_SSHS_EXT.1.3 The TSF shall ensure that, as described in RFC 4253, packets greater than
[256*1024] bytes in an SSH transport connection are dropped.
FCS_SSHS_EXT.1.4 The TSF shall ensure that the SSH transport implementation uses the following
encryption algorithms and rejects all other encryption algorithms: [aes128-cbc,
aes256-cbc].
FCS_SSHS_EXT.1.5 The TSF shall ensure that the SSH transport implementation uses [ssh-rsa] and
[no other public key algorithms] as its public key algorithm(s) and rejects all other
public key algorithms.
FCS_SSHS_EXT.1.6 The TSF shall ensure that the SSH transport implementation uses [hmac-sha1,
hmac-sha2-256] and [no other MAC algorithms] as its MAC algorithm(s) and rejects
all other MAC algorithm(s).
FCS_SSHS_EXT.1.7 The TSF shall ensure that [ecdh-sha2-nistp256] and [ecdh-sha2-nistp384] are the
only allowed key exchange methods used for the SSH protocol.
FCS_SSHS_EXT.1.8 The TSF shall ensure that within SSH connections the same keys are used for a
threshold of no longer than one hour, and no more than one gigabyte of transmitted
data. After either of the thresholds are reached a rekey needs to be performed.
FCS_TLSC_EXT.2.2[1] The [data plane of the] TSF shall verify that the presented
identifier matches the reference identifier according to RFC 6125.
FCS_TLSC_EXT.2.3[1] The [data plane of the] TSF shall only establish a trusted channel if the
peer certificate is valid.
FCS_TLSC_EXT.2.4[1] The [data plane of the] TSF shall present the Supported Elliptic Curves
Extension in the Client Hello with the following NIST curves: [secp256r1,
secp384r1] and no other curves.
FCS_TLSC_EXT.2.5[1] The [data plane of the] TSF shall support mutual authentication using
X.509v3 certificates.
5289
○ TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 as defined in RFC
5289
○ TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 as defined in RFC
5289
○ TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 as defined in RFC
5289
].
FCS_TLSC_EXT.2.2[2] The [data plane of the] TSF shall verify that the presented
identifier matches the reference identifier according to RFC 6125.
FCS_TLSC_EXT.2.3[2] The [data plane of the] TSF shall only establish a trusted channel if the
peer certificate is valid.
FCS_TLSC_EXT.2.4[2] The [data plane of the] TSF shall present the Supported Elliptic Curves
Extension in the Client Hello with the following NIST curves: [secp256r1,
secp384r1] and no other curves.
FCS_TLSC_EXT.2.5[2] The [data plane of the] TSF shall support mutual authentication using
X.509v3 certificates.
6.2.2.13 FCS_TLSS_EXT.1[1] TLS Server Protocol (Data Plane Server - TLS 1.1)
FCS_TLSS_EXT.1.1[1] The [data plane of the] TSF shall implement [TLS 1.1 (RFC 4346)]
supporting the following ciphersuites: [
○ TLS_RSA_WITH_AES_128_CBC_SHA as defined in RFC 3268
○ TLS_RSA_WITH_AES_256_CBC_SHA as defined in RFC 3268
○ TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA as defined in RFC 4492
○ TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA as defined in RFC 4492
○ TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA as defined in RFC 4492
○ TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA as defined in RFC 4492
○ no other ciphersuite].
FCS_TLSS_EXT.1.2[1] The [data plane of the] TSF shall deny connections from clients
requesting SSL 2.0, SSL 3.0, TLS 1.0, and [none].
FCS_TLSS_EXT.1.3[1] The [data plane of the] TSF shall [perform RSA key establishment with
key size [2048 bits, 3072 bits]; generate EC Diffie-Hellman parameters over NIST
curves [secp256r1 and secp384r1] and no other curves].
6.2.2.14 FCS_TLSS_EXT.1[2] TLS Server Protocol (Data Plane Server - TLS 1.2)
FCS_TLSS_EXT.1.1[2] The [data plane of the] TSF shall implement [TLS 1.2 (RFC 5246)]
supporting the following ciphersuites: [
FCS_TLSS_EXT.1.2[2] The [data plane of the] TSF shall deny connections from clients
requesting SSL 2.0, SSL 3.0, TLS 1.0, and [none].
FCS_TLSS_EXT.1.3[2] The [data plane of the] TSF shall [perform RSA key establishment with
key size [2048 bits, 3072 bits]; generate EC Diffie-Hellman parameters over NIST
curves [secp256r1 and secp384r1] and no other curves].
6.2.2.15 FCS_TLSS_EXT.1[3] TLS Server Protocol (Control Plane Server - TLS 1.1)
FCS_TLSS_EXT.1.1[3] The [control plane of the] TSF shall implement [TLS 1.1 (RFC 4346)]
supporting the following ciphersuites: [
FCS_TLSS_EXT.1.2[3] The [control plane of the] TSF shall deny connections from clients
requesting SSL 2.0, SSL 3.0, TLS 1.0, and [none].
FCS_TLSS_EXT.1.3[3] The [control plane of the] TSF shall [perform RSA key establishment
with key size [2048 bits, 3072 bits]; generate EC Diffie-Hellman parameters over
NIST curves [secp256r1 and secp384r1] and no other curves].
6.2.2.16 FCS_TLSS_EXT.1[4] TLS Server Protocol (Control Plane Server - TLS 1.2)
FCS_TLSS_EXT.1.1[4] The [control plane of the] TSF shall implement [TLS 1.2 (RFC 5246)]
supporting the following ciphersuites: [
FCS_TLSS_EXT.1.2[4] The [control plane of the] TSF shall deny connections from clients
requesting SSL 2.0, SSL 3.0, TLS 1.0, and [none].
FCS_TLSS_EXT.1.3[4] The [control plane of the] TSF shall [perform RSA key establishment
with key size [2048 bits, 3072 bits]; generate EC Diffie-Hellman parameters over
NIST curves [secp256r1 and secp384r1] and no other curves].
FIA_UIA_EXT.1.2 The TSF shall require each administrative user to be successfully identified and
authenticated before allowing any other TSF-mediated actions on behalf of that
administrative user.
FIA_X509_EXT.1.2 The TSF shall only treat a certificate as a CA certificate if the basicConstraints
extension is present and the CA flag is set to TRUE.
FIA_X509_EXT.2.2 When the TSF cannot establish a connection to determine the validity of a
certificate, the TSF shall [allow the administrator to choose whether to accept the
certificate in these cases].
FIA_X509_EXT.3.2 The TSF shall validate the chain of certificates from the Root CA upon receiving
the CA Certificate Response.
• Security Administrator.
FMT_SMR.2.2 The TSF shall be able to associate users with roles.
• The Security Administrator role shall be able to administer the TOE locally;
• The Security Administrator role shall be able to administer the TOE remotely
are satisfied.
6.2.5.2 FPT_SKP_EXT.1 Protection of TSF Data (for reading of all symmetric keys)
FPT_SKP_EXT.1.1 The TSF shall prevent reading of all pre-shared keys, symmetric keys, and
private keys.
FPT_TUD_EXT.1.2 The TSF shall provide Security Administrators the ability to manually initiate
updates to TOE firmware/software and [no other update mechanism].
FPT_TUD_EXT.1.3 The TSF shall provide means to authenticate firmware/software updates to the
TOE using a [digital signature mechanism] prior to installing those updates.
capabilities: audit server, [no other capabilities] that is logically distinct from other
communication channels and provides assured identification of its end points and
protection of the channel data from disclosure and detection of modification of the
channel data.
FTP_ITC.1.2 The TSF shall permit the TSF, or the authorized IT entities to initiate
communication via the trusted channel.
FTP_ITC.1.3 The TSF shall initiate communication via the trusted channel for [transmission of
syslog records to syslog audit servers,].
FTP_TRP.1.2 The TSF shall permit remote administrators to initiate communication via the
trusted path.
FTP_TRP.1.3 The TSF shall require the use of the trusted path for initial administrator
authentication and all remote administration actions.
Assurance
Assurance Class Assurance Component Name
Component ID
Assurance
Assurance Class Assurance Component Name
Component ID
In addition, the TOE will provide the evidence necessary for the evaluators to perform the evaluation
activities defined in the Evaluation Activities for Network Device cPP document.
• audit events
events related to the security and administrative functionality implemented by the TOE; this type
of audit log captures most of the events specified in this ST
• system events
events related to the TOE operating system as well as status of TOE components, such as the
syslog-ng daemon
Traffic
(other)
Packet
(mcp)
Audit
Audit
Local
Filter
Host name The host name of the system that logged the X X X X
event message.
System
Traffic
(other)
Packet
(mcp)
Audit
Audit
Local
Filter
Status code The status code associated with the event. X X
Timestamp The time and date that the system logged the X X X X X
event message.
The TOE includes within each audit record the information required by FAU_GEN.1.2 and specified in
Table 4. For changes to time (FPT_STM.1), the TOE records the origin of the change attempt as ntpd
when the time is changed by NTP itself and the username when the change is attempted by an
administrator.
This functionality implements FAU_GEN.1 and FAU_GEN.2.
BIG-IP supports (and the evaluated configuration mandates) logging to external syslog hosts. Audit
records in transit to the remote host are protected by TLS channels.
The syslog mechanism provided by the underlying Linux system (which is the operating system of the
TOE) is used for the creation and forwarding of audit records. In the evaluated configuration, all audit
records are sent to both local and remote storage automatically. The audit records are sent to the remote
storage immediately. In addition, BIG-IP implements a high-speed logging mechanism for data traffic
(logging packet filter events and local traffic events) in TMM that is compatible with syslog. The TOE
supports TLS channels to audit servers for the protection of audit records sent from the TOE to an
external audit server.
For the case that the remote syslog host becomes unavailable, audit records are stored locally in syslog
files managed, and protected against unauthorized access, by using file permission bits in the underlying
Linux host. The TOE will attempt to periodically reestablish the connection with the remote syslog host
indefinitely. The TOE retries within seconds of each connection failure. The TOE implements a buffer to
store audit records collected during the period of time when the remote syslog host is unavailable. If the
connection is reestablished before the buffers overflow, no audit records are lost. If the connection is
reestablished after the buffers overflow, audit records are lost. Locally stored audit records are also
available for review through the administrative interfaces of the TOE. Only users in the Administrator
role can modify those records. The TOE does not support deletion of audit records by authorized users.
BIG-IP logs a warning if the local space for syslog files on the box exceeds a configurable maximum size.
The TOE implements a local syslog file rotation scheme that numbers the locally archived syslog files.
The TOE will delete the oldest syslog file once the maximum size for local syslog file space is exceeded.
A cron job runs every two minutes to check the audit trail storage partition in order to accomplish this.
The evaluated configuration requires allocation of 7 GB of audit storage, and a warning to be logged
when 90 % of the storage space are exhausted. The administrator receives the warnings when reviewing
the log files as instructed the CC guidance document.
This functionality implements FAU_STG.1, FAU_STG_EXT.1, and FAU_STG_EXT.3.
Higher-level protocol stacks can use the F5 cryptographic module (OpenSSL) in order to implement
trusted traffic communications:
• Management GUI (browser client to TOE)
• SSH session for tmsh (SSH client to SSH server on TOE)
• Remote logging via syslog (TOE to syslog server)
The TLS stack in TMM uses the host-provided library to implement the remaining, traffic-related TLS
functionality use cases described above (also referred to as "traffic TLS").
Replay detection (and rejection) is inherent to the protocols used by BIG-IP to establish communications
of a trusted nature, i.e. TLS/HTTPS and SSH.
The TOE generates asymmetric cryptographic keys that are compliant with FIPS PUB 186-4 and meet the
following:
Key Key Establishment Key sizes / Usage
Generation Scheme NIST curves
Scheme
RSA RSA Key sizes: TLS certificate
2048, 3072
NIST SP 800-56B TLS ephemeral session keys
SSH key pair
The TLS static keys are created once, imported
to the TOE, and stored on disk until the
Administrator creates a new key. The SSH key
pair is crated on first boot.
The TOE can act as a receiver or both sender
and receiver depending upon the deployment.
When acting as a receiver, decryption errors
are handled in a side channel resistant method
and reported as MAC errors.
The TOE also generates TLS session keys and SSH session keys.
The TOE offers administrative interfaces for creating a private key and certificate signing request (CSR).
See Section 7.3.2 for more information on CSRs.
This implements FCS_CKM.1 and FCS_CKM.2.
Key seeds, prime Stack/heap After each key These are zeroized in OpenSSL by
generation numbers has been calling OPENSSL_cleanse(), which
generated. overwrites the memory upon
release
TLS Session Stack/heap After session The TLS session keys are created
keys has ended within OpenSSL during session
initiation.
TLS private keys On the Upon deletion Private keys are zeroized when they
in TLS disk by are deleted by the administrator.
certificates administrator. Zeroization is done by overwriting
the file once with zeroes and
deleting the file.
SSH Session Stack/heap After session The SSH session keys are created
keys has ended within OpenSSL during session
initiation.
SSH SSH keys On the Upon deletion SSH keys are zeroized when using
disk by the key-swap utility. Zeroization is
administrator. done by overwriting the file once
with zeroes and deleting the file.
Message digest
sizes: 160 bits
Block size: 512 bits
Message digest
sizes: 256 bits
Message digest
sizes: 384 bits
The random bit stream from the entropy source will be fed to the Linux DRNG on demand, such that if
the entropy in the Linux DRNG runs low (and thus the threshold that causes /dev/random to block will
reached soon), fresh entropy is inserted and the entropy estimate in the Linux RNG is increased. This will
attempt to ensure that sufficient entropy is available in the Linux DRNG to avoid blocking applications
that read from /dev/random, or will release any applications that have become blocked. Since the
/dev/urandom interface also draws from the Linux kernel entropy pool input of the random bit stream will
also ensure that /dev/urandom is initialized and reseeded. The increase in the entropy estimate caused by
the transfer of the random bit stream is not equal to the number of bits transferred, rather it scaled by a
factor which is dependent on the entropy source.
7.2.5 SSH
The TOE implements a SSH v2 server and a SSH v2 client. The SSH client is not used for
communication with trusted external IT entities and will be disabled in the TOE. Administrators can
connect to the TOE remotely using SSH via a dedicated network interface. Administrators are
authenticated locally by user name and password; remote authentication (via LDAP or AD) is not
supported by the TOE.
The SSH implementation is compliant with RFCs 4251, 4252, 4253, 4254, 5656, 6668.
SSH connections to the TOE's command line interface are protected using SSH version 2, using transport
encryption algorithm AES CBC mode with 128 and 256 bit-sizes keys, transport data integrity protection
hashing algorithm HMAC-SHA1 and HMAC-SHA2-256, and public key authentication algorithm ssh-
rsa. The SSH implementation monitors packet size on all channels and limits packet size as suggested in
RFC 4253 Section 6.1; the maximum packet size is (256*1024) bytes with larger packets being silently
dropped. Additionally, the SSH implementation has hard-coded ecdh-sha2-nistp256 and ecdh-sha2-
nistp384 key exchange; diffie-hellman-group1-sha1 key exchange is intentionally disabled.
The SSH connection session key will be renegotiated after either of two thresholds has been reached. SSH
connection session keys will be renegotiated after one hour of use. In addition, the SSH connection
session key will be renegotiated after an administrator-configured maximum amount of data, the
RekeyLimit, is transmitted over the connection. The administrative guidance will instruct the user to not
set the RekeyLimit to a value greater that 1 GB.
When acting as a TLS server, BIG-IP does not operate on or process reference identifier fields in the
BIG-IP certificate. It's up to an Administrator to load the desired X.509 certificate and up to TLS clients
to verify it.
The BIG-IP TLS server only checks the Common Name (CN) and DNS name in SAN when BIG-IP
performs client authentication. For BIG-IP acting as TLS client, the TOE checks Common Name (CN)
and DNS name. The BIG-IP TLS client supports ECDH in the Client Hello by default. This can
optionally be disabled by removing the corresponding cipher suites, although individual curves cannot be
configured. The DN or SAN in the certificate is compared by requiring an exact match.
Use of wildcards for reference identifiers constructed by the TOE and certificate pinning for TLS client
connections are not supported by the TOE.
When acting as a TLS server, BIG-IP generates key establishment parameters using RSA with key size
2048 and 3072 bits and over NIST curves secp256r1 and secp384r1. The TLS server key exchange
message parameters (ECDH) are as defined / required by the RFC 5246 Section 7.4.3 for TLS 1.2, RFC
4346 Section 7.4.3 for TLS 1.1, and RFC 4492. For example, its classic ECDH using named curves with
predefined parameters. The TOE does not support DHE_RSA cipher suites, so server key exchange
messages are not sent.
Configuration Utility, iControl API, and iControl REST API. HTTP over TLS (HTTPS) is an application-
level protocol for distributed, collaborative, hypermedia information systems transmitted over a TLS
connection. The TOE implements HTTPS per RFC 2818, HTTP over TLS. Checking the validity of peer
certificates is described in Section 7.3.2.
• The minimum duration specifies the minimum number of days before which users cannot change
their passwords; the default is 0 and the valid range is from 0 to 255.
• The maximum duration specifies the maximum number of days a password is valid; users must
change their passwords before the maximum duration is reached, the default is 99999 days.
• Password memory specifies that the system records the specified number of passwords that the
user has used in the past. Users cannot reuse a password that is in the list. The default is 0 and the
valid range is from 0 to 127.
Access to the TOE for individual users can be disabled ("locked") after a configured number of failed
authentication attempts; which, in the evaluated configuration, the default is 3 with a valid range from 1
to 10. Administrators and User Managers have to manually unlock accounts that have been locked by the
TOE.
This functionality implements FIA_PMG_EXT.1.
The TOE offers administrative interfaces for creating a private key and certificate signing request (CSR).
The CSR may include the following information: public key, common name, organization, organizational
unit, country, locality, state / province, country, e-mail address, subject alternative name. After the CRS is
created, the administrator must export the CSR outside the TOE. Outside the scope of the TOE, the
administrator provides the CSR to the CA and then the CA returns the certificate to the administrator.
Using the administrative interface, the administrator can then import the certificate into the TOE.
The only method supported by the TOE for obtaining a CA certificate is for the administrator to save a
certificate to a text file and import it into the TOE. The certificates are stored in a text file. The TOE is
capable of importing X.509v3 certificates and certificates in the PKCS12 format. The TOE is also capable
of creating and using a self-signed certificate.
The TOE checks the validity of the certificates when the profile using the certificate is loaded and when
the certificate is used by the TOE, including during authentication. If the certificates are modified, the
digital signature verification would detect that the certificate had been tampered with and the certificate
would be invalid. Administrators can ensure that the certificates presented have not been revoked by
importing a certificate revocation list (CRL) into the TOE.
A certificate chain includes the root CA certificate, certificates of intermediate CAs, and the end entity
certificate. The certificate chain consists of all the certificates necessary to validate the end certificate.
Administrators can upload trusted device certificates (root CA certificates) into the TOE to identify which
certificates are trusted. The TOE performs full certificate chain checking using Public Key Infrastructure
X.509, verifies the expiration of the certificate (assuming a reliable time provided by the NTP server), and
verifies its revocation using CRLs.
When the validity of a certificate cannot be established, the TOE will allow the administrator to choose
whether or not to accept the certificate.
This implements FIA_X509_EXT.1, FIA_X509_EXT.2, FIA_X509_EXT.3.
• tmsh shell commands – provide a command line interface, accessible through an SSH client
• iControl API – SOAP-based programming interface over HTTPS.
• iControl REST API – REST-based programming interface over HTTPS.
The first three interfaces are independent. The tmsh interface is the most complete; though none of the
three are proper subsets of each other. iControl REST APIs utilize tmsh shell command(s) to perform the
desired operation, so it is basically a front-end to the tmsh shell commands. As such, the functions
provided by the iControl REST API are a proper subset of the set of tmsh commands.
These four administrative interfaces require users to identify and authenticate themselves prior to
performing any administrative functions.
The TOE comes with a pre-defined “admin” user with the Administrator role assigned that cannot be
deleted. A password is assigned to the “admin” user during setup of the TOE. Local user accounts are
managed by administrators in the Administrator or User Manager role and stored in the TOE's local user
database. Management includes creating and deleting users, as well as changing another user's password
(every user can change their own password), role, or partition the user has access to, and enabling or
disabling terminal access for the user. However, User Managers that have access to only one partition
cannot change the partition access of other users, and cannot change their own partition access or role.
(More on roles can be found in Section 7.4.1.)
Some general configuration options include the definition of an administrative IP address for the TOE's
management network interface, configuration of remote logging, configuration of auditing, configuration
of TOE security functions, enable/disable services, manage TSF data, configure the login access banner,
configure session inactivity timeout, configure cryptographic functionality, configure the RekeyLimit
which defines how much data can be transmitted within an SSH connection before rekeying, and the
configuration of trusted updates.
BIG-IP uses the concept of virtual servers to define destinations that BIG-IP accepts (client) traffic for.
Virtual servers are represented by an IP address and service (such as HTTP). The actual resources that
BIG-IP forwards the traffic to are referred to as nodes, represented by their IP address. Nodes can be
grouped into pools, for example for the purpose of load balancing. (A client sends an HTTP request to
BIG-IP's virtual server address, and BIG-IP will then select a node from the pool associated with the
virtual server to forward the request to.) Virtual servers are a management tool used to simplify the
configuration of filtering and processing incoming network requests.
In order to determine the treatment of different types of traffic, such as requiring client authentication or
inspection of HTTP code at the application layer, administrators can assign profiles to virtual servers.
Profiles contain detailed instructions on how the different traffic management-related security functions
of the TOE are applied to matching traffic.
This functionality implements FMT_SMF.1.
The tasks that users can perform on objects, depending on their role, are grouped into hierarchical access
levels:
• User Managers have write access to user account objects in the Common partition, except those
with the Administrator role assigned to them.
Administrator This role grants users complete access to all partitioned and non-partitioned objects
on the system, manage remote user accounts and change their own passwords. This
includes trusted updates and the management of all security functions and TSF data.
Resource This role grants users complete access to all partitioned and non-partitioned objects
Administrator on the system, except user account objects. Additionally, users with this role can
change their own passwords. This includes management of all security functions and
TSF data, including remote users, remote roles, but not other user management
functions.
User Manager Users with the User Manager role that have access to all partitions can create,
User accounts with the User Manager role can change their own passwords.
Manager This role grants users permission to create, modify, and delete virtual servers, nodes,
pools, pool members, custom profiles, and custom monitors. Users in this role can
view all objects on the system and change their own passwords.
Certificate This role grants users permission to manage device certificates and keys, as well as
Manager perform Federal Information Processing Standard (FIPS) operations.
Application This role grants users permission to modify nodes, pools, pool members, monitors
Editor and change their own passwords. These users can view all objects on the system.
In addition, the Application Editor has full access to the APM-related configuration
objects in BIG-IP. In particular, this includes the following authorizations with
regard to management capabilities offered by the Configuration utility:
Statistics - Read-only
Local Traffic feature - Read-only access for Virtual Servers, Profiles, iRules, SNATs,
and SSL Certificates; Modification (but not creation or deletion) of Nodes, Pools,
Pool Members, and Monitors; Enabling/Disabling Nodes and Monitors
Access Profiles - Modification (but not Creation/Deletion) and activation of access
policies with the exception of the "Max Concurrent Users" field
VLAN Based Routing - Read-only access for VLAN, Self-IP, and VLAN Gateways;
Creation/Modification/Deletion of VLAN Selection Agents
System features - Read-only access; can change password for users in Application
Editor role
Operator This role grants users permission to enable or disable nodes and pool members.
These users can view all objects.
Auditor This role grants users permission to view all configuration data on the system,
including logs and archives. Users with this role cannot create, modify, or delete any
data, nor can they view TLS keys or user passwords.
Guest This role grants users permission to view all objects on the system in their partition
and Common partition.
• In storage for local user authentication, the TOE’s administrative interfaces do not offer any
interface to retrieve user passwords or configuration files.
• In transit between remote users and the TOE, the TOE implements SSH and TLS to protect the
communication.
Pre-shared keys (such as credentials for remote servers), symmetric keys, and private keys are stored in
the TOE's configuration files. The TOE does not offer an interface to retrieve the contents of its
configuration files. Passwords are stored in a salted hashed format.
This functionality implements FPT_APW_EXT.1 and FPT_SKP_EXT.1.
7.5.2 Self-tests
The following self-tests are implemented by the TOE:
• The BIOS Power-On Self-Test POST test is only run at power on
• The OpenSSL integrity tests are run at power on and reboot (during OpenSSL initialization) for
OpenSSL.
• The software integrity check (i.e., sys-icheck utility) is run at power on and reboot to check the
integrity of the RPMs. This self-test can be run at any time.
• The cryptographic algorithm self-tests provided by OpenSSL are run at power on and.
The BIOS POST is a diagnostic program that checks the basic components required for the hardware to
operate, tests the memory, and checks the disk controller, the attached disks, and the network controllers.
The BIOS POST tests cannot be run on demand.
The fipscheck utility is a standard Open Source utility for verifying the integrity of OpenSSL during
initialization.
The sys-icheck utility provides software integrity testing by comparing the current state of files in the
system to a database created at install time and modified only through authorized system update
mechanisms. When a discrepancy is detected, the utility reports that discrepancy. The utility can be run at
any time during system operation, and will just report errors. However, once the system is placed into the
Common Criteria configuration it is enabled to run at each boot, and will halt the boot if errors are found.
The TOE will execute self-tests at power-on to test the cryptographic algorithms and random number
generation using known answer tests for each of the algorithms. If a power-on test fails, the boot process
will halt.
The self-tests implemented by the TOE which are described in this section cover all aspects of the TSF
are therefore and are sufficient for demonstrating that the TSF is operating correctly in the intended
environment.
This functionality implements FPT_TST_EXT.1(1) and FPT_TST_EXT.1(2).
on the F5 official site adjacent to the software archives. Note: The update verification implementation
does not utilize certificates; only digital signatures.
The BIG-IP verifies the SHA256 hash of software archives, using 2048-bit RSA digital signature
algorithm. If the signature is verified, the software update is installed. If the signature does not verify, the
software update installation fails / aborts. The administrative guidance will instruct the customer to
download the update again or contact F5 support.
This functionality implements FPT_TUD_EXT.1.
Network administrators connect to the TOE remotely via a dedicated network interface to administer the
TOE. Administrators are authenticated locally by user name and password; remote authentication (via
LDAP or AD) is not supported by the TOE. The TOE implements the following trusted paths, which are
logically distinct from other communication paths and provide assured identification of both end points,
as well as protecting the transmitted data from disclosure and providing detection of modification of the
transmitted data:
• TLS Connections to the TOE via the web-based Configuration utility, iControl API and the
iControl REST API are protected by TLS. TLS sessions are limited to TLS versions 1.1 and 1.2,
using the cipher suites identified in FCS_TLSS_EXT.1[3]-[4].
• SSH Connections to the TOE's command line interface are protected using SSH version 2 as
defined in FCS_SSHS_EXT.1. Additionally, the SSH implementation has hard-coded ecdh-sha2-
nistp256 and ecdh-sha2-nistp384 key exchange; diffie-hellman-group1-sha1 key exchange is
intentionally disabled.
This functionality implements FTP_TRP.1.