St tanley Wi-Q Commmunicat tion Ser rver Crypto ograph Mod hic dule FI 140 Sec IPS 0-2 curity P Policy Prepared for: d UL/CMMVP Prepared by: d Engineerring This do ocument is n non-proprieta ary Documen Number: 99093 nt Revision 7 n: Release Date: 09/30/2013 D Stanley W Wi-Q Commmunication SServer FIPS 140-2 Security P Policy D Doc# 99093 rev 7 Revision History n Version Releasee Descrip ption of Cha ange Date 1 05/07/201 12 Initial Release R 2 05/24/201 12 Added Windows Se erver 2008 t tables 2 & 3. to Added Table 6 Acc Rights. cess Added CSCM softw version to Introduc ware n ction section. 3 06/19/201 12 Modifie Roles sec ed ction. Modifie Service In ed nputs and Ouutputs table 5. Modifie Cryptogra ed aphic Keys a Critical Security Par and rameters section. 4 06/22/201 12 Modifie Physical Security sec ed ction. 5 02/26/201 13 Modifie Physical Security sec ed ction. Modifie Services section and Service Inpu and Outp table 5. ed uts puts Modifie Power-Up Tests secti ed p ion. Removed Condition Tests sec nal ction. Removed Critical Function Tes section. F sts 6 04/18/201 13 Modifie Module and Algorith Referenc table 2 a reference to ed a hms ces and es certification numbe ers. Modifie FIPS 140 Configur ed 0-2 rations table 3. Added SHA-1 KAT to power u self tests s T up section. 7 09/30/201 13 Removed reference to non-app es proved algorrithms. Updated Table 2 Split Ta 3 in to 3a and 3b. able 3 P Page i Stanley W Wi-Q Commmunication SServer FIPS 140-2 Security P Policy D Doc# 99093 rev 7 Table of Content e ts Section Page 1  Intr roduction ........................................... .................... .................... .................... .................... 1 ...... 2  Cryyptographic Module Spe ecification .... .................... .................... .................... .................... 1 ...... 2.1  Desscription of Approved Mode ............ A M .................... .................... .................... .................... 1 ...... 2.2  Suppported Algo orithms ........................... .................... .................... .................... .................... 2 ...... 2.3  Desscription of Cryptograph Boundary.................. C hic y .................... .................... .................... 3 ...... 2.4  Blo Diagram ...................................... ock m .................... .................... .................... .................... 4 ...... 3  Cryyptographic Module Port and Interf ts faces ............ .................... .................... .................... 5 ...... 4  Rol and Services ................................ les .................... .................... .................... .................... 6 ...... 4.1  Rol ..................................................... les .................... .................... .................... .................... 6 ...... 4.2  Serrvices ................................................. .................... .................... .................... .................... 6 ...... 4.3  Serrvice Inputs and Outputs ................... a .................... .................... .................... .................... 6 ...... 5  Cryyptographic Keys and Cr ritical Securi Paramete ............... ity ers .................... .................... 7 ...... 5.1  AE Keypad & Credential Key ............ ES .................... .................... .................... .................... 7 ...... 5.2  SSL Certificate .................................... L es .................... .................... .................... .................... 7 ...... 6  Phyysical Securi ................................... ity .................... .................... .................... .................... 8 ...... 6.1  Powwer-Up Test ..................................... ts .................... .................... .................... .................... 8 ...... 7  Mit tigation of Other Attacks .................. O s .................... .................... .................... .................... 8 ...... Pa ii age Stanley W Wi-Q Commmunication SServer FIPS 140-2 Security P Policy D Doc# 99093 rev 7 1 Intr roductio on This docuument defines the securi policies of the Stanle Wi-Q Com ity o ey mmunication Server ns Cryptogrraphic Modu referred to as the CSCM for simp ule, t plicity. FIPS140-2 Stanley WiQ Commu W unication Ser rver softwar version tes re sted: 3.0.27 2 Cry yptograp phic Mo odule Sp pecificat tion The CSC is a softw solution that provid secure ke retrieval a key transfer function CM ware n des ey and ns within th Stanley Wi-Q Wireles Access Co he W ss ontrol System m. Sec curity Comp ponent S Security Le evel Cryptograp Module Specificati phic e ion 1 Cryptographic Module Po and Inter c orts rfaces 1 Roles, Ser rvices, and Authenticatio A on 1 Finite State Model F M 1 Operrational Enviironment 1 Cryptographi Keys and Critical Sec C ic curity Parameterrs 1 Physical Sec P curity N/A EMI/EMC C 1 Self-Test ts 1 Design Assur D rance 1 Mitiga ation of Othe Attacks er N/A Table 1. Moodule Securi Levels ity 2.1 De escription of Appr n roved Mo ode Prior to operation, RS o SAENH.dll (Microsoft Windows) m be put in the appro W must nto oved mode o of operation In order to ensure that RSAENH.d is running in the appr n. o t dll g roved mode, follow the instructio provided in the Secu ons d urity Policies for the resp s pective Wind dows Operat ting Systems The s. CMVP certificate nu umbers can be found in ta b ables 3a and 3b. d Once RSAENH.dll is running in the approve mode of o s ed operation, the CSCM mu be config e ust gured to run in Appproved mod only, by means of a configuration application “WiQAdm de m c n n minApp.exe”. The . module does not supp switchin to any No d port ng on-Approved modes onc in operation. Once the d ce e module has been con h nfigured to ru in Approv mode, it is placed in operation by starting the un ved t nto n CSCM se ervice. Once the service successfully completes its power-on self-tests, i is consider e y n it red operation and running in Appro nal oved mode. Approved m mode is indic cated by the following status messages within the system: s Log File Indicator – “FIP 140 Mode is True” log file audit L PS e g Non-FIPS FIP configura N PS ation applica ation “WiQCConfiguratorr.exe” – “(FIIPS140)” titl bar le Page 1 Stanley W Wi-Q Commmunication SServer FIPS 140-2 Security P Policy D Doc# 99093 rev 7 2.2 Su upported Algorithm ms The follo owing algorit thms are sup pported by th CSCM. T algorithm are provi he The ms ided by the RSAENH H.DLL validdated to FIPS 140-2 unde the certifi S er icates below. CMVP Module Operating system / s Appro oved Algorith / hms O Other Algorithms Descriptio on CMVP Cert Number t. CAVP Cert. Numb P ber RSAENH.DLL Windows Se erver 2008 AES ((Cert. #739); RSA (key wrapp ping; key Microsoft Enhanced E Cert. #1010 DRBG (vendor affir G rmed); es stablishment m methodology Cryptograp Provider phic HMAC (Cert. #408) C ); pr rovides betwee 80 and 150 en RSA ( (Certs. #353 an #355); nd bi of encryptio strength; its on SHS ((Cert. #753); no on-compliant le than 80 ess Triple e-DES (Cert. #6 656) bi of encryptio strength) its on Table 2. FI 140-2 Module and A IPS M Algorithm Re eferences Page 2 Stanley W Wi-Q Commmunication SServer FIPS 140-2 Security P Policy D Doc# 99093 rev 7 2.3 De escription of Cryp n ptographi Bounda ic dary The Stan CSCM is a software only produc but for th purposes o the FIPS 140-2 valida nley i e ct, he of ation, it is consid dered a multiple-chip stanndalone mod dule. The lo ogical cryptoographic bouundary is def fined by the ex xecutable appplication file (WiQComm e mSvc.exe), t supportin libraries the ng (WiQCom mmCore.dll, WiQPortal.dll, & WiQPortalServic ceClient.dll), and Micros Enhance soft ed Cryptogrraphic Provid (RSAEN der NH.dll). RSA AENH.dll is a previously validated F s FIPS 140-2 module (Certs. #989, #1002, #10 #1012, #1330, and # ( , 010, # #1337). The physical em e mbodiment i the is general purpose com p mputer or hard dware applia ance on whic the CSCM operates. The physica ch M al cryptograaphic bounddary contains the general purpose com s mputing hard dware of the system exe e ecuting the applic cation. This system hard s dware includ the centr processin unit(s), ca des ral ng ache and mai in memory (RAM), system bus, and peripherals including d drives a other per d s disk and rmanent mas ss storage devices, netw d work interfac cards, key ce yboard, and a terminal devices. any l The mod was teste and found to be comp dule ed d pliant with th FIPS 140 requirem he 0-2 ments on the following platforms: g Opera ating Enviro onment Commu unication Seerver RSA AENH.DLL Windows Server 2008, SP2** Softwar Version 3. re .0.27 Refe erence CMV Cert. #101 VP 10** Table 3a. FIPS 14 e 40-2 Tested Configurations ** CMVP Certificate #1010 was tested on ve e ersion Wind dows Server 2008 (which is Window h ws Server 20 SP 1 at release date) while the Stanley Com 008 r ), S mmunication Server Cryp n ptographic M Module was teste on Windo Server 2008 SP2. Th testing lab ed ows he boratory affi irms that the differences e between the two serv packs do not interfer with the c vice o re correct opera ation of the m module. Stanley Security Solu S utions affirm that the module also e ms m executes (as described in this securit n ty policy) on the follow o wing operatin systems: ng Opera ating Enviro onment Commu unication Se erver RSA AENH.DLL Windows XP Profeessional, SP3 Softwar Version 3. 3 re .0.27 Refeerence CMV Cert. #989 VP 9 Windows Vista (U Ultimate), SP1 Refe erence CMV Cert. #100 VP 02 Windows Server 2003, SP2 Refe erence CMV Cert. #101 VP 12 Windows 7 Ultima Edition ate Refe erence CMV Cert. #133 VP 30 Windows Server 2008 (R2) Refe erence CMV Cert. #133 VP 37 Table 3b. FIPS 140-2 Vendor Affi rmed Config F V gurations The CMV makes no statement as to the cor VP o a rrect operatio of the mo on odule or the s security strengths of the gen nerated keys when porte and execu in an op s ed uted perational en nvironment n listed on the not validation certificate. n Page 3 Stanley W Wi-Q Commmunication SServer FIPS 140-2 Security P Policy D Doc# 99093 rev 7 2.4 Bl lock Diag gram Figure 1. Block Dia agram Page 4 Stanley W Wi-Q Commmunication SServer FIPS 140-2 Security P Policy D Doc# 99093 rev 7 3 Cry yptograp phic Mo odule Po orts and Interfac ces The CSC provides the followin ports and interfaces: CM ng CSCM Module M Ports and Interfaces d Interface e Logical Physi ical Data Input Data read from Access Control database GPC D Disk Data receive via Secure TCP from an ex ed T xternal AMS P Portal Gateway (PG) y Ethern Port net Data read from a configura ation file GPC D Disk Data Out tput Data written to Access Con n ntrol Database e GPC D Disk Data sent via Secure TCP to an external A AMS Portal G Gateway (PG) Ethern Port net Control Input Data read from Access Control database GPC H Hard Disk Data receive via Secure TCP from an ex ed T xternal AMS P Portal Gateway (PG) y Ethern Port net Data read from a configura ation file GPC H Hard Disk Status Ou utput Log Files GPC H Hard Disk Data written to Access Con n ntrol Database e GPC H Hard Disk NA PC Po ower Supply Power In nput Table 4. Ports and Int P terfaces Page 5 Stanley W Wi-Q Commmunication SServer FIPS 140-2 Security P Policy D Doc# 99093 rev 7 4 Ro oles and Service es 4.1 Ro oles The CSC supports two distinct roles: Cryp CM t ptographic O Officer (CO) and User. Th CO is the he e individua al(s) responssible for crea ating and ma anaging crypptographic ke through the key life cycle, eys while the User is the individual(s who retrie e s) eves data enc cryption key and uses th for secu ys hem ure communications. As ssumption of roles is def f fined by sele ection of serv vices in a Le 1 device evel e. Roles are assumed by the selectio of the ser e y on rvices. 4.2 Se ervices  SSL session key negotiati - Negotiate secure S commun k ion SSL nications wit Portal Gat th teway  Secure data tr ransmission – WCF SSL method cal with Port Gateway L lls tal  Show status - Log file ind dicating apprroved mode status  Self-test – SH HA-1 Softwa integrity and SHA-1 KAT tests e are executed at s startup.  Database inte D eraction - SQ calls to in QL nteract with t database the e 4.3 Se ervice Inp puts and Outputs The CSC roles are assumed by the selectio of the foll CM y on lowing servi ices: Service user CO data in nput dat output ta status outp put SSL sessi key negotia ion ation x none non ne pass/fail secure data transmission encryption n x none SSL encrypted L pass/fail secure data transmission decryption n x SSL en ncrypted non ne pass/fail show statu us x none non ne plaintext self-tests x none non ne pass/fail database interaction i x encrypt ted enc crypted plaintext Table 5. Serv Inputs a Outputs T vice and Page 6 Stanley W Wi-Q Commmunication SServer FIPS 140-2 Security P Policy D Doc# 99093 rev 7 5 Cry yptograp phic Key and Critical S ys C Security Param y meters The CSC provides secure management of the followin CSPs: CM t ng Segment Keypad Key (AES Encry K ypted session key) n Segment Credential Ke (AES Enc C ey crypted session key) SSL Certif ficate (AES Encrypted SSL informat E S tion) SHA1 Soft ftware Integrity HASH (A Encryp AES pted) AES HardCCoded Key CS SP CO Role - Access Rig e ghts User R - Access R Role Rights Segment Keypad Key d read only y read on nly Segment Credent Key tial read only y read on nly SS Certificate SL read only y read on nly SH Software Integrity HASH HA1 I H read only y read on nly AE HardCoded Key ES d read only y read on nly Table 6. Access Right A ts 5.1 AE Keypa & Cred ES ad dential Ke ey These ke (Segment Sign-On ke are inpu and AES e eys t eys) ut encrypted us sing a (non-F FIPS) configura ation applica ation. The CSCM retriev AES enc ves crypted session keys, AE decrypts, and ES wraps in SSL tunnel to deliver to the externa Portal Gate o al eway device for use in the secure w es wireless communication. 5.2 SS Certifi SL icates The certi ificates are generated usi a (non-FIPS) configu g ing uration appli ication. The CSCM retriieves AES encrypted certif ficates, AES decrypts, an uses the c nd certificates to negotiate s o secure SSL communications. Page 7 Stanley W Wi-Q Commmunication SServer FIPS 140-2 Security P Policy D Doc# 99093 rev 7 6 Phy ysical Security S The CSC is a softw only mo CM ware odule and as such, the ph s hysical secu urity is accom mplished by installatio of the sof on ftware on a GPC. The GPC physica security is accomplishe by production G G al ed grade com mponents. Self – Teests 6.1 Po ower-Up Tests Upon use assumptio of role or manual re-start the CSC performs known-ans er on CM s swer tests for the r following cryptograp function g phic ns:  SHA-1 Softw Integrity Test ware y  SHA-1 KAT Upon suc ccessful com mpletion of th power-up self-tests; th following is output to the log file he p he g o e: “FIPS 14 Mode is True” 40 T If power- self-tests do not com -up s mplete succes ssfully, the f following is output to the log file: e “Self Tes Failed. St st topping Serv vice”. Then the module w exit. will In additio to the self on f-tests descri ibed above, the RSAEN NH.dll cryptoographic mod perform its dule ms own self--tests as desc cribed in the security policies associ e iated with th RSAENH.dll Module he (referenc Tables 3a and 3b). ce 7 Mit tigation of Othe Attack er ks The CSC does not mitigate any attacks bey CM y yond the sco of FIPS 1 ope 140-2 Page 8