HP A-Series Especificações Página 34

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 66
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 33
Security Target Version 1.02, 08/16/2013
34
Assurance Activity Design
Assurance Activity - Guidance
Assurance Activity - Testing
FCS_IPSEC_EXT.1.7
The evaluator shall check to ensure that
the TSS describes how pre-shared keys
are established and used in authentication
of IPsec connections.
The description in the TSS shall also
indicate how pre-shared key
establishment is accomplished for both
TOEs that can generate a pre-shared key
as well as TOEs that simply use a pre-
shared key.
The evaluator shall check that the operational
guidance describes how pre-shared keys are to
be generated and established for a TOE.
The description in the operational guidance
shall also indicate how pre-shared key
establishment is accomplished for both TOEs
that can generate a pre-shared key as well as
TOEs that simply use a pre-shared key.
The evaluator shall also perform the following test:
Test 1: The evaluator shall generate a pre-shared key
and use it, as indicated in the operational guidance, to
establish an IPsec connection between two peers. If
the TOE supports generation of the pre-shared key,
the evaluator shall ensure establishment of the key is
carried out for an instance of the TOE generating the
key as well as an instance of the TOE merely taking
in and using the key.
FCS_IPSEC_EXT.1.8
The evaluator shall check the operational
guidance to ensure it describes the generation of
pre-shared keys, including guidance on
generating strong keys and the allowed
character set. The evaluator shall check that this
guidance does not limit the pre-shared key in a
way that would not satisfy the requirement.
While the administrator (in contravention to the
operational guidance) can choose a key that
does not conform to the requirement, there is no
requirement that the TOE check the key to
ensure it meets the rules specified in this
component. However, should the administrator
choose to create a password that conforms to the
rules above (and the operational guidance); the
TOE should not prohibit such a choice.
The evaluator shall also perform the following test;
this may be combined with Test 1 for
FCS_IPSEC_EXT.1.7:
Test 1: The evaluator shall generate a pre-shared 22
characters long key that meets the composition
requirements above. The evaluator shall then use this
key to successfully establish an IPsec connection.
While the evaluator is not required to test that all of
the special characters or lengths listed in the
requirement are supported, it is required they justify
the subset of those characters chosen for testing, if a
subset is indeed used.
FCS_RBG_(EXT).1.1
FCS_RBG_(EXT).1.2
Documentation shall be producedand
the evaluator shall perform the
activitiesin accordance with Annex D
[see NDPP], Entropy Documentation and
Assessment.
The evaluator shall also perform the following tests,
depending on the standard to which the RBG
conforms.
Implementations Conforming to FIPS 140-2, Annex
C
…[see NDPP]…
Implementations Conforming to NIST Special
Publication 800-90
…[see NDPP]…
The following paragraphs contain more information
on some of the input values to be generated/selected
by the evaluator.
Entropy input: the length of the entropy input
value must equal the seed length.
Nonce: If a nonce is supported (CTR_DRBG with
no df does not use a nonce), the nonce bit length is
one-half the seed length.
Personalization string: The length of the
personalization string must be <= seed length. If
the implementation only supports one
personalization string length, then the same length
can be used for both values. If more than one
string length is support, the evaluator shall use
personalization strings of two different lengths. If
the implementation does not use a personalization
string, no value needs to be supplied.
Additional input: the additional input bit lengths
have the same defaults and restrictions as the
personalization string lengths.
FCS_SSH_EXT.1.1
Vista de página 33
1 2 ... 29 30 31 32 33 34 35 36 37 38 39 ... 65 66

Comentários a estes Manuais

Sem comentários