POSTAL SECURITY DEVICE SECURITY POLICY Version 3.0 This document is non-proprietary. It may be reproduced or transmitted only in its entirety without revision. PSD Security Policy – v3.0 Contents Contents ............................................................................................................................................ 1 Figures ............................................................................................................................................... 1 1 INTRODUCTION ........................................................................................................................... 2 2 CRYPTOGRAPHIC MODULE SPECIFICATION ................................................................................... 2 3 SENSITIVE SECURITY PARAMETERS MANAGEMENT....................................................................... 6 4 PORTS AND INTERFACES .............................................................................................................. 9 5 ROLES, SERVICES AND AUTHENTICATION.................................................................................... 10 6 OPERATIONAL ENVIRONMENT ................................................................................................... 11 7 PHYSICAL SECURITY ................................................................................................................... 11 8 SELF-TESTS................................................................................................................................. 12 9 DESIGN ASSURANCE .................................................................................................................. 13 10 MITIGATION OF OTHER ATTACKS ............................................................................................ 13 11 GLOSSARY .............................................................................................................................. 13 Revision History ............................................................................................................................... 13 Figures Figure 1 – Neopost Postal Security Device ..................................................................................................................... 2 Figure 2 – PSD Configuration.......................................................................................................................................... 3 Figure 3 – FIPS 140-2 Security Level ............................................................................................................................... 3 Figure 4 – FIPS Approved Algorithms ............................................................................................................................. 4 Figure 5 – FIPS Allowed Security Functions .................................................................................................................... 5 Figure 6 – Non-Approved Security Functions ................................................................................................................. 5 Figure 7 – Critical Security Parameters .......................................................................................................................... 6 Figure 8 – TLS v1.2 Handshake Protocol Critical Security Parameters ........................................................................... 7 Figure 9 – TLS v1.2 Record Protocol Critical Security Parameters ................................................................................. 7 Figure 10 – Public Security Parameters .......................................................................................................................... 8 Figure 11 – Interface ...................................................................................................................................................... 9 Figure 12 – Roles, Services, Operators ......................................................................................................................... 10 Page 1/15 PSD Security Policy – v3.0 1 INTRODUCTION This document forms a Cryptographic Module Security Policy for Neopost Postal Security Device under the terms of the FIPS 140-2 validation. This document contains a statement of the security rules under which the PSD operates. 2 CRYPTOGRAPHIC MODULE SPECIFICATION 2.1 PSD Overview The Neopost Postal Security Device (PSD) is a cryptographic module embedded within the postal franking machines. The PSD performs all franking machine’s cryptographic and postal security functions and protect the Critical Security Parameters (CSPs) and Postal Relevant Data from unauthorized access. The PSD (Figure 1) is a multi-chip embedded cryptographic module enclosed within a hard, opaque, plastic enclosure encapsulating the epoxy potted module which is wrapped in a tamper detection envelope with a tamper response mechanism. This enclosure constitutes the cryptographic module’s physical boundary. The PSD was designed to securely operate when voltage supplied to the module is between +5V and +17V and the environmental temperature is between -30°C and 84°C. Figure 1 – Neopost Postal Security Device Page 2/15 PSD Security Policy – v3.0 2.2 PSD Configuration PSD (Cryptographic Module) Description Hardware P/N A0014227B Firmware P/N A0038091A Firmware Version a30.00 ECDSA (Cert. #517) A0038110A AES (Cert. #2875) A0038111A SHS (Cert. #2416) A0038112A AES (Cert. #2874) A0038113A NIST Approved Security Functions CVL (Cert. #310) A0038114A RSA (Cert. #1513) A0038115A DRBG (Cert. #518) A0038116A HMAC (Cert. #1813) A0038118A Figure 2 – PSD Configuration 2.3 FIPS Security Level Compliance The PSD is designed to meet the overall requirements applicable for Level 3 of FIPS 140-2. Security Requirements Level Cryptographic Module Specification 3 Cryptographic Module Ports and Interfaces 3 Roles, Services and Authentication 3 Finite State Model 3 Physical Security 3 + EFP/EFT Operational Environment N/A Cryptographic Key Management 3 EMI/EMC 3 Self-Tests 3 Design Assurance 3 Mitigation of Other Attacks 3 Figure 3 – FIPS 140-2 Security Level 2.4 Security Industry Protocols 1 The cryptographic module implements the TLS v1.2 protocol and uses only one cipher suite (TLS-DHE-RSA-WITH- AES-128-CBC-SHA256). The TLS protocol is composed of TLS Handshake protocol (used for mutual authentication and TLS pre-master secret establishment) and TLS Record protocol (used for application data confidentiality and integrity). 1 This protocol has not been reviewed or tested by the CAVP and CMVP Page 3/15 PSD Security Policy – v3.0 2.5 Modes of Operation The module supports a single mode of operation in which the module alternates service by service between Approved and non-Approved modes of operation. When the module executes the services not relying on cryptographic functions or relying on Approved algorithms, it is said to operate in an Approved mode of operation. Corollary, when the services relying on non-Approved algorithms are executed, the module is said to operate in a non-Approved mode of operation. The module includes a Stamp Configuration and a Variant file which indicates that the module is in either FIPS mode or non-FIPS mode of operation. This is accessed as part of the Read Part Number service. The PSD supports the following FIPS Approved security functions in Approved Mode of Operation: Algorithm Usage Characteristics Cert. # Encryption/Decryption of:  AES (CBC) CSPs for storage within the module, CBC (e/d; 128); 2874  Data exchanged using the TLS Record protocol Hashing algorithm used for:  SHS (SHA-1) HMAC Generation, SHA-1 (BYTE-only) 2416  Indicia Authentication Hashing algorithm used for:  SHS (SHA-256) HMAC Generation, SHA-256 (BYTE-only) 2416  Digital signature process HMAC (SHA-1) Indicia Authentication (Key Sizes Ranges Tested: KS