HUAWEI 3900-LTE Security Target 2.6
HUAWEI 3900-LTE Security Target 2.6
HUAWEI 3900-LTE Security Target 2.6
Version: 2.6
Last Update: 2011-10-17
Author: Huawei Technologies Co., Ltd.
Table of Contents
1. Introduction ___________________________________________________________________8
1.1. ST Reference __________________________________________________________________8
1.2. TOE Reference_________________________________________________________________8
1.3. TOE Overview _________________________________________________________________8
1.3.1.TOE usage ____________________________________________________________________9
1.3.2.TOE type_____________________________________________________________________10
1.3.3.Non TOE Hardware and Software________________________________________________11
1.4. TOE Description ______________________________________________________________16
1.4.1.Logical Scope _________________________________________________________________16
1.4.2.Physical Scope ________________________________________________________________20
2. Conformance claim ____________________________________________________________22
3. Security Problem Definition _____________________________________________________23
3.1. TOE Assets ___________________________________________________________________23
3.2. Threats ______________________________________________________________________23
3.2.1.Threats by Eavesdropper _______________________________________________________24
3.2.2.Threats by Internal Attacker ____________________________________________________24
3.2.3.Threats by restricted authorized user _____________________________________________24
3.3. Organizational Policies _________________________________________________________25
3.3.1.P1.Audit _____________________________________________________________________25
3.3.2.P2.S1_Encryption _____________________________________________________________25
3.3.3.P3.X2_Encryption _____________________________________________________________25
3.3.4.P4.UU_Encryption_____________________________________________________________25
3.4. Assumptions __________________________________________________________________25
3.4.1.Physical ______________________________________________________________________25
3.4.2.Personnel ____________________________________________________________________25
3.4.3.Connectivity __________________________________________________________________26
3.4.4.Support ______________________________________________________________________26
3.4.5.SecurePKI____________________________________________________________________26
4. Security Objectives ____________________________________________________________27
4.1. Security Objectives for the TOE__________________________________________________27
4.2. Security Objectives for the Operational Environment ________________________________28
4.3. Security Objectives rationale ____________________________________________________28
4.3.1.Coverage _____________________________________________________________________28
4.3.2.Sufficiency ___________________________________________________________________29
5. Security Requirements for the TOE_______________________________________________32
5.1. Security Requirements _________________________________________________________32
5.1.1.Security Audit (FAU)___________________________________________________________32
5.1.1.1.
FAU_GEN.1 Audit data generation __________________________________________32
5.1.1.2.
FAU_GEN.2 User identity association ________________________________________32
5.1.1.3.
FAU_SAR.1 Audit review __________________________________________________33
5.1.1.4.
FAU_SAR.3 Selectable Audit review _________________________________________33
5.1.1.5.
FAU_STG.1 Protected audit trail storage _____________________________________33
5.1.1.6.
FAU_STG.3 Action in case of possible audit data loss ___________________________33
5.1.2.Cryptographic Support (FCS) ___________________________________________________33
5.1.2.1.
FCS_COP.1/Sign Cryptographic operation____________________________________33
-2-
5.1.2.2.
FCS_COP.1/SSL Cryptographic operation ____________________________________34
5.1.2.3.
FCS_COP.1/UU Cryptographic operation_____________________________________34
5.1.2.4.
FCS_COP.1/S1 Cryptographic operation _____________________________________34
5.1.2.5.
FCS_COP.1/X2 Cryptographic operation _____________________________________34
5.1.2.6.
FCS_CKM.1/SSL Cryptographic key generation _______________________________35
5.1.2.7.
FCS_CKM.1/UU Cryptographic key generation________________________________35
5.1.2.8.
FCS_CKM.1/S1 Cryptographic key generation ________________________________35
5.1.2.9.
FCS_CKM.1/X2 Cryptographic key generation ________________________________35
5.1.3.User Data Protection (FDP) _____________________________________________________35
5.1.3.1.
FDP_ACC.1/Local Subset access control ______________________________________35
5.1.3.2.
FDP_ACF.1/Local Security attribute based access control _______________________36
5.1.3.3.
FDP_ACC.1/Domain Subset access control ____________________________________36
5.1.3.4.
FDP_ACF.1/Domain Security attribute based access control _____________________36
5.1.3.5.
FDP_ACC.1/EMSCOMM Subset access control________________________________37
5.1.3.6.
FDP_ACF.1/EMSCOMM Security attribute based access control _________________37
5.1.4.Identification and Authentication (FIA) ___________________________________________38
5.1.4.1.
FIA_AFL.1 Authentication failure handling ___________________________________38
5.1.4.2.
FIA_ATD.1 User attribute definition _________________________________________38
5.1.4.3.
FIA_SOS.1 Verification of secrets ___________________________________________39
5.1.4.4.
FIA_UAU.1 Timing of authentication ________________________________________39
5.1.4.5.
FIA_UAU.5 Multiple authentication mechanisms_______________________________39
5.1.4.6.
FIA_UID.1 Timing of identification__________________________________________39
5.1.5.Security Management (FMT) ____________________________________________________40
5.1.5.1.
FMT_MSA.1 Management of security attributes _______________________________40
5.1.5.2.
FMT_MSA.3 Static attribute initialization ____________________________________40
5.1.5.3.
FMT_SMF.1 Specification of Management Functions ___________________________40
5.1.5.4.
FMT_SMR.1 Security roles_________________________________________________41
5.1.6.TOE access (FTA) _____________________________________________________________41
5.1.6.1.
FTA_TSE.1/SEP TOE session establishment___________________________________41
5.1.6.2.
FTA_TSE.1/Local TOE session establishment _________________________________41
5.1.7.Trusted Path/Channels (FTP)____________________________________________________42
5.1.7.1.
FTP_TRP.1/WebLMT Trusted path _________________________________________42
5.1.7.2.
FTP_ITC.1/IntegratedPort Inter-TSF trusted channel __________________________42
5.2. Security Functional Requirements Rationale _______________________________________42
5.2.1.Coverage _____________________________________________________________________42
5.2.2.Sufficiency ___________________________________________________________________44
5.2.3.Security Requirements Dependency Rationale ______________________________________45
5.3. Security Assurance Requirements ________________________________________________47
5.4. Security Assurance Requirements Rationale _______________________________________48
6. TOE Summary Specification ____________________________________________________49
6.1. TOE Security Functionality _____________________________________________________49
6.1.1.Authentication ________________________________________________________________49
6.1.2.Access control_________________________________________________________________49
6.1.3.Auditing _____________________________________________________________________51
6.1.4.Communications security _______________________________________________________51
6.1.5.UU Interface Encryption________________________________________________________52
6.1.6.S1 Interface Encryption ________________________________________________________52
6.1.7.X2 Interface Encryption ________________________________________________________53
-3-
6.1.8.Resource management__________________________________________________________53
6.1.9.Security function management ___________________________________________________54
6.1.10.
Digital Signature__________________________________________________________55
7. Abbreviations, Terminology and References________________________________________57
7.1. Abbreviations _________________________________________________________________57
7.2. Terminology __________________________________________________________________58
7.3. References____________________________________________________________________58
-4-
List of figures
Figure 1 LTE/SAE network __________________________________________________________11
Figure 2 BBU3900 subrack __________________________________________________________11
Figure 3 Non TOE hardware and software environment _________________________________12
Figure 4 Software architecture _______________________________________________________16
Figure 5 TOE Logical Scope_________________________________________________________17
-5-
List of tables
Table 1 Physical Scope _____________________________________________________________21
Table 2 TOE assets ________________________________________________________________23
Table 3 Threats agents _____________________________________________________________23
Table 4 Mapping of security objectives ________________________________________________29
Table 5 Sufficiency analysis for threats________________________________________________30
Table 6 Sufficiency analysis for assumptions___________________________________________30
Table 7 Sufficiency analysis for organizational security policy ____________________________31
Table 8 Mapping SFRs to objectives __________________________________________________43
Table 9 SFR sufficiency analysis _____________________________________________________45
Table 10 Dependencies between TOE Security Functional Requirements__________________47
Table 11 Security Assurance Requirements ___________________________________________48
-6-
Changes control
Version
Date
Author
V0.10
2010-12-13
Fangxiaolei
---
V1.3
2011-04-22
Songzhuo
Modify as suggestion as
expert adviser
V1.4
2011-05-05
Songzhuo
Modify as suggestion as
expert adviser
V1.5
2011-05-17
Songzhuo
Modify as suggestion as
expert adviser
V1.6
2011-05-26
Songzhuo
Modify as suggestion as
expert adviser
V1.7
2011-05-30
Songzhuo
Modify as suggestion as
expert adviser
V1.8
2011-05-31
Songzhuo
Modify as suggestion as
expert adviser
V1.9
2011-06-01
Songzhuo
Modify as suggestion as
expert adviser
V2.0
2011-06-01
Songzhuo
Modify as suggestion as
expert adviser
V2.1
2011-06-02
Songzhuo
Modify as suggestion as
expert adviser
V2.2
2011-06-08
Songzhuo
Modify as suggestion as
expert adviser
V2.3
2011-06-22
Liubin
V2.4
2011-08-12
Jiang Liang
V2.5
2011-09-01
Jiang Liang
V2.6
2011-10-17
Jiang Liang
-7-
1.
Introduction
1.1.
ST Reference
Title
Version
Author
Publication Date
1.2.
TOE Reference
TOE Name
TOE Version
TOE Developer
1.3.
TOE Overview
3GPP Long Term Evolution (LTE), is the latest standard in the mobile
network technology tree that produced the GSM/EDGE and
UMTS/HSDPA network technologies. It is a project of the 3rd
Generation Partnership Project (3GPP), operating under a name
trademarked by one of the associations within the partnership, the
European Telecommunications Standards Institute.
Huawei 3900 series LTE eNodeB is the base station in LTE radio
networks. Its coverage and capacity are expanded through multiantenna technologies, its maintainability and testability are improved,
and thus it provides subscribers with the wireless broadband access
services of large capacity and high quality.
-8-
measures provided by the TOE. The ST provides the basis for the
evaluation of the TOE according to the Common Criteria for Information
Technology Security Evaluations (CC).
The TOE can be widely used to support the broadband wireless access
of home and enterprise users. Besides, it is used to support mobile
broadband access. In Huawei LTE solution, the TOE adopts a star
topology, in which the transmission equipment is directly connected to
the BS through FE or GE ports. The TOE networking supports various
access modes, including the FE, GE, optical fibber, x digital subscriber
line (xDSL), passive optical network (PON), microwave access, and
satellite.
Authentication
10
11
12
Access control
Auditing
Audit records are created for security-relevant events related to the use
of the TOE.
D.
Communications security
-9-
13
14
The TOE air interface support AES and SNOW 3G service data
encryption, which ensures the privacy of user session.
F.
15
S1 Interface encryption
16
UU Interface encryption
X2 Interface encryption
Resource management
17
18
19
20
Digital signature
22
- 10 -
23
25
The eNB is LTE eNodeB, which provides wireless access service for
the UE/Terminal.
26
The EPC network is the Evolved Packet Core network and consists of
the MME (Mobility Management Entity), the SGW (Service Gateway)
and UGW (User plane Gateway). It performs functions such as mobility
management, IP connection, QoS management, and billing
management.
27
The TOE runs into the BBU3900 subrack and in the RRU. The
structure of BBU3900 is shown in the following figure:
- 11 -
30
The FAN unit of the BBU3900 controls the fan speed, monitors the
temperature of the FAN unit, and dissipates the heat from the
BBU.
In the above diagram, the light blue box area belongs to the TOE while
the orange box area belongs to the TOE environment.
- 12 -
32
S-GW:
Serving Gateway, Within the EPC the S-GW is
responsible for tunnelling user plane traffic between the eNB and
the PDN-GW. To do this its role includes acting as the mobility
anchor point for the User Plane during handovers between eNB
as well as data buffering when traffic arrives for a mobile in the
LTE Idle state. Other functions performed by the S-GW include
routing, Lawful Interception and billing.
RRU: The RRU is the remote radio unit (RRU) for Huawei
Worldwide Interoperability for LTE eNodeB. The RRU mainly
performs the following functions:
o Amplifies weak signals from the antenna system, downconverting the signals to intermediate frequency (IF)
signals, performing analog-to-digital conversion, digital
down-conversion, filtering, and AGC on the IF signals,
and transmitting these signals to the baseband unit
(BBU) through the high-speed transmission link
- 13 -
- 14 -
- 15 -
1.4.
TOE Description
This section will define the logical scope of the TOE. The software
architecture of the TOE is indicated in the following figure:
36
From the Logical point of view, the following figure includes the TOE
Logical Scope, where all the connections to the TOE are indicated, and
also the way the TOE is deployed in the different boards of the product.
FTP
Server
WebLMT
SSL
M2000
BIN
MML
FTP
WebLMT
OM(Operation and
Maintenance)
X2
eNB
S1
Product Service
MME/
S-GW
HERT Platform
VxWorks OS
Hardware
LMPT
OM(Operation
and Maintenance)
Product
Service
BaseBand
Service
UU
UE
HERT Platform
VxWorks OS
Hardware
LBBI
Product Service
VxWorks OS
Hardware
RRU
- 17 -
Authentication.
Access control.
Auditing.
Communications security.
UU Interface encryption
S1 Interface encryption
X2 Interface encryption
Resource management.
Digital signature.
39
40
Part
Associated security
functionality
Security
Function
Interface
Resource
management
UU Interface
encryption
S1 Interface
encryption
X2 Interface
encryption
Communications
- 18 -
protocols:
security
HERT Platform
Transport
Management
(TM)
NA
Security functionality
management
NA
NA
Digital signature
Auditing
NA
Communication
Security
Communication
Security
NA
- 19 -
41
CPBSP
NA
Product Service
NA
NA
The release packages for LTE eNodeB are composed of software and
documents. The LTE eNodeB software packages are in the form of
binary compressed files.
43
44
The list of the files and documents required for the products is the
following:
Software and
Documents
Description
Remark
Software.csp
BootROM package
(In the form of binary
compressed files)
- 20 -
Software and
Documents
Description
Remark
- 21 -
2.
Conformance claim
45
46
47
48
- 22 -
3.
3.1.
TOE Assets
49
The following table includes the assets that have been considered for
the TOE:
Asset
A1.Software and
patches
A2.Stored configuration
data
Description
The integrity and confidentiality of the
system software and the patches when
in transit across the management
network should be protected from
modification and disclosure.
The integrity and confidentiality of the
stored configuration data should be
protected.
Configuration data includes the security
related parameters under the control of
the TOE (such as user account
information and passwords, audit
records, etc).
Asset value
Integrity
Confidentiality
Integrity
Confidentiality
A3. In transit
configuration data
Integrity
Confidentiality
A4. Service
Recoverability
3.2.
Threats
50
Description
An eavesdropper from the management network served by
the TOE is able to intercept, and potentially modify or reuse the data that is being sent to the TOE.
An unauthorized agent who is connected to the
management network.
An authorized user of the TOE who has been granted
authority to access certain information and perform certain
actions.
Table 3 Threats agents
51
In the first and second cases, the users are assumed to be potentially
hostile with a clear motivation to get access to the data. In the last
- 23 -
case, all authorized users of the TOE are entrusted with performing
certain administrative or management activities with regard to the
managed device. Consequently, organizational means are expected to
be in place to establish a certain amount of trust into these users.
However, accidental or casual attempts to perform actions or access
data outside of their authorization are expected. The assumed security
threats are listed below.
- 24 -
Agent
3.3.
Organizational Policies
3.3.1. P1.Audit
52
3.3.2. P2.S1_Encryption
53
3.3.3. P3.X2_Encryption
54
3.3.4. P4.UU_Encryption
55
3.4.
Assumptions
3.4.1. Physical
A.PhysicalProtection
56
3.4.2. Personnel
A.TrustworthyUsers
57
It is assumed that the organization responsible for the TOE and its
operational environment has measures in place to establish trust into
and train users of the TOE commensurate with the extent of
authorization that these users are given on the TOE. (For example,
super users and users that are assigned similar privileges are assumed
to be fully trustworthy and capable of operating the TOE in a secure
manner abiding by the guidance provided to them.)
- 25 -
3.4.3. Connectivity
A.NetworkSegregation
58
It is assumed that the network interfaces that allow access to the TOEs
user interfaces are in a management network that is separated from the
UU, S1 and X2 interface networks.
3.4.4. Support
A.Support
59
3.4.5. SecurePKI
A.SecurePKI
60
- 26 -
4.
Security Objectives
4.1.
61
62
authenticate
users
and
control
the
session
O.Authorization
63
64
65
The TOE must provide functionality to verify the integrity of the received
software patches.
O.Resources
66
67
O.S1_Encryption
68
69
70
- 27 -
4.2.
71
The TOE (i.e., the complete system including attached interfaces) shall
be protected against unauthorized physical access.
OE.NetworkSegregation
72
The TOE environment shall assure that the network interfaces that
allow access to the TOEs user interfaces are in a management
network that is separated from the networks that the TOE serves over
the UU and S1 and X2 interfaces.
OE.TrustworthyUsers
73
Those responsible for the operation of the TOE and its operational
environment must be trustworthy, and trained such that they are
capable of securely managing the TOE and following the provided
guidance.
OE.Support
74
Those responsible for the operation of the TOE and its operational
environment must ensure that the operational environment provides the
following supporting mechanisms to the TOE: Reliable time stamps for
the generation of audit records.
OE. SecurePKI
75
4.3.
4.3.1. Coverage
76
- 28 -
O.Authentication
O.Authorization
O.SecureCommunication
O.SoftwareIntegrity
O.Resources
O.Audit
O.S1_Encryption
O.X2_Encryption
O.UU_Encryption
OE.PhysicalProtection
OE.TrustworthyUsers
OE.NetworkSegregation
OE.Support
OE.SecurePKI
X
X
X
X
P4.UU_Encryption
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
4.3.2. Sufficiency
77
P3.X2_Encryption
P2.S1_Encryption
P1.Audit
A. SecurePKI
A.Support
A.NetworkSegregation
A.TrustworthyUsers
A.PhysicalProtection
T5.UnauthorizedAccess
T4.UnauthenticatedAccess
T3.UnwantedNetworkTraffic
T2.InTransitSoftware
T1.InTransitConfiguration
T2. InTransitSoftware
- 29 -
T3.UnwantedNetworkTraffic
T4.UnauthenticatedAccess
T5.UnauthorizedAccess
A.TrustworthyUsers
A.NetworkSegregation
A.Support
A. SecurePKI
Policy
P1.Audit
- 30 -
P2.S1_Encryption
P3.X2_Encryption
P4.UU_Encryption
- 31 -
5.
5.1.
Security Requirements
FAU_GEN.1.2 The TSF shall record within each audit record at least the
following information:
a)
b)
Date and time of the event, type of event, subject identity (if applicable),
and the outcome (success or failure) of the event; and
For each audit event type, based on the auditable event definitions of the
functional components included in the PP/ST. [assignment: workstation IP
(if applicable), user (if applicable), and command name (if applicable).]
Application note: There are two kinds of log files, security log file and operation log
file.
- 32 -
Application note: For each kind of log file, there are two audit files, when the new file
is full, the old one is deleted.
Application note: This requirement addresses the digital signature verification of the
remote loaded software packages.
- 33 -
Application note: This requirement addresses the encryption of the channel with the
UE.
Application note: This requirement addresses the encryption of the channel with the
MME/S-GW.
- 34 -
Application note: This requirement addresses the encryption of the channel with
other LTE eNodeB.
- 35 -
b)
- 36 -
Application note: This requirement implements the domain users access control
policy. The users will login through the TOE but authentication is performed by an
external entity which will send the operational rights to the TOE so it can exercise the
access control policy.
5.1.3.6. FDP_ACF.1/EMSCOMM
control
Security attribute
based
access
Application note: This requirement implements the M2000 access control policy.
- 37 -
Application note: The EMSCOMM user is not considered in this requirement. The
EMSCOMM user is authenticated in the TOE by automatic method and not by user
and password. Domain users are authenticated in the M2000 element of the TOE
environment, so they are also not considered in this requirement neither by the TOE
authentication functionality.
User name
User group
Password
Number of unsuccessful authentication attempts since last successful
authentication attempt
Login allowed start time
Login allowed end time
Lock status]
Application note: The EMSCOMM user is not considered in this requirement. The
EMSCOMM user is authenticated in the TOE by automatic method and not by user
and password. Domain users are authenticated in the M2000 element of the TOE
environment, so they are not considered in this requirement neither by the TOE
authentication functionality.
- 38 -
c)
Handshake command
Parameter negotiation
New web session ID request
CAPTCHA management]
On behalf of the user to be performed before the user is authenticated.
Local Users are authenticated in the TOE by user and password stored in
the TOE.
Domain users authentication is delegated in the M2000 management
element of the environment by user and password
EMSCOMM user applies a special arithmetic procedure common to both
parties, the TOE and the M2000 to proof the knowledge of the algorithm.
Handshake command
- 39 -
b)
c)
d)
Parameter negotiation
New web session ID request
CAPTCHA management ]
on behalf of the user to be performed before the user is identified.
FIA_UID.1.2 the TSF shall require each user to be successfully identified before
allowing any other TSF-mediated actions on behalf of that user.
Command groups
User groups]
- 40 -
Application note: The TOE includes default users whose associated parameters (but
the password) cannot be modified. These users are admin and guest.
Application note: These roles are only applicable to the local users. The domain
users are not maintained in the TOE, no role neither user group is assigned to a
domain user. Also, the EMSCOMM user can not be assigned to any role.
Application note: The custom user group means that the command groups are
directly assigned to the user. The domain users are not maintained by the TOE, no
role neither user group is assigned to a domain user.
Application note: This requirement addresses the VLAN separation and IP based
ACLs to avoid resource overhead in the S1/X2 interface and in the management
network.
- 41 -
Application note: The EMSCOMM user is not considered in this requirement. The
EMSCOMM user is authenticated in the TOE by automatic method and not by user
and password. Domain users are authenticated in the M2000 element of the TOE
environment, so they are not considered in this requirement neither by the TOE
authentication functionality.
5.2.
5.2.1. Coverage
78
- 42 -
O.S1_Encryption
O.X2_Encryption
O.UU_Encryption
O.SoftwareIntegrity
O.Resources
O.Authorization
O.SecureCommunication
FAU_GEN.1
FAU_GEN.2
FAU_SAR.1
FAU_SAR.3
FAU_STG.1
FAU_STG.3
FDP_ACC.1/Local
FDP_ACF.1/Local
FDP_ACC.1/Domain
FDP_ACF.1/Domain
FDP_ACC.1/EMSCOMM
FDP_ACF.1/EMSCOMM
FIA_AFL.1
FIA_ATD.1
FIA_UAU.1
FIA_UAU.5
FIA_UID.1
FIA_SOS.1
FMT_MSA.1
FMT_MSA.3
FMT_SMF.1
FMT_SMR.1
FTA_TSE.1/SEP
FTA_TSE.1/Local
FCS_COP.1/SSL
FCS_CKM.1/SSL
FCS_COP.1/UU
FCS_CKM.1/UU
FCS_COP.1/S1
FCS_CKM.1/S1
FCS_COP.1/X2
FCS_CKM.1/X2
FCS_COP.1/Sign
FTP_TRP.1/WebLMT
FTP_ITC.1/IntegratedPort
O.Authentication
O.Audit
- 43 -
5.2.2. Sufficiency
79
Rationale
O.Audit
O.Authentication
O.Authorization
O.SecureCommunication
- 44 -
O.UU_Encryption
O.S1_Encryption
O.X2_Encryption
O.Resource
O.SoftwareIntegrity
81
Dependencies
FAU_GEN.1
FPT_STM.1
FAU_GEN.2
FAU_GEN.1
FIA_UID.1
- 45 -
Resolution
Not resolved.
The system hardware or an external
time source using NTP protocol will
provide a reliable time.
FAU_GEN.1
FIA_UID.1
FAU_SAR.1
FAU_SAR.3
FAU_STG.1
FAU_STG.3
FAU_GEN.1
FAU_SAR.1
FAU_GEN.1
FAU_STG.1
[FDP_ITC.1 |
FDP_ITC.2 |
FCS_CKM.1]
FCS_COP.1/Sign
FCS_CKM.4
FDP_ACC.1/Local
FDP_ACF.1/Local
FDP_ACC.1/Domain
FDP_ACF.1
FDP_ACC.1
FMT_MSA.3
FDP_ACF.1
FDP_ACC.1
FDP_ACF.1/Domain
FDP_ACC.1/EMSCOMM
FMT_MSA.3
FDP_ACF.1
FDP_ACC.1
FDP_ACF.1/EMSCOMM
FIA_AFL.1
FIA_ATD.1
FIA_UAU.1
FIA_UAU.5
FIA_UID.1
FIA_SOS.1
FMT_MSA.1
FMT_MSA.3
FMT_SMF.1
FMT_SMR.1
FTA_TSE.1/SEP
FTA_TSE.1/Local
FCS_COP.1/SSL
FMT_MSA.3
FIA_UAU.1
None
FIA_UID.1
None
None
None
FAU_GEN.1
FAU_SAR.1
FAU_GEN.1
FAU_STG.1
Not resolved.
The digital certificate used for
signature verification is loaded as
part of the manufacture process.
Not resolved.
The digital certificate used for
signature verification is loaded as
part of the manufacture process and
are never destructed.
FDP_ACF.1/Local
FDP_ACC.1/Local
FMT_MSA.3
FDP_ACF.1/Domain
FDP_ACC.1/Domain
Not resolved.
The dependency with FMT_MSA.3 is
not resolved because the attributes of
the access control policy are not
under the control of the TOE.
FDP_ACF.1/ EMSCOMM
FDP_ACC.1/ EMSCOMM
Not resolved.
The dependency with FMT_MSA.3 is
not resolved because the attributes of
the access control policy are not
under the control of the TOE.
FIA_UAU.1
FIA_UID.1
[FDP_ACC.1 |
FDP_IFC.1]
FDP_ACC.1
FMT_SMR.1
FMT_SMR.1
FMT_SMF.1
FMT_MSA.1
FMT_SMR.1
None
FIA_UID.1
None
None
[FDP_ITC.1 |
FDP_ITC.2 |
FCS_CKM.1]
FMT_SMF.1
FMT_MSA.1
FMT_SMR.1
FCS_CKM.4
- 46 -
FIA_UID.1
FCS_CKM.1/SSL
Not resolved.
The generated keys are not
externally accessible so they do not
FCS_COP.1/SSL
FCS_CKM.4
Not resolved.
The generated keys are not
externally accessible so they do not
need to be securely removed.
[FDP_ITC.1 |
FDP_ITC.2 |
FCS_CKM.1]
FCS_CKM.1/UU
FCS_CKM.4
Not resolved.
The generated keys are not
externally accessible so they do not
need to be securely removed.
[FCS_CKM.2 |
FCS_COP.1]
FCS_COP.1/UU
FCS_CKM.4
Not resolved.
The generated keys are not
externally accessible so they do not
need to be securely removed.
[FDP_ITC.1 |
FDP_ITC.2 |
FCS_CKM.1]
FCS_CKM.1/X2
FCS_CKM.4
Not resolved.
The generated keys are not
externally accessible so they do not
need to be securely removed.
[FCS_CKM.2 |
FCS_COP.1]
FCS_COP.1/X2
FCS_CKM.4
Not resolved.
The generated keys are not
externally accessible so they do not
need to be securely removed.
[FDP_ITC.1 |
FDP_ITC.2
|
FCS_CKM.1]
FCS_CKM.1/S1
FCS_CKM.4
Not resolved.
The generated keys are not
externally accessible so they do not
need to be securely removed.
[FCS_CKM.2 |
FCS_COP.1]
FCS_COP.1/S1
FCS_CKM.4
Not resolved.
The generated keys are not
externally accessible so they do not
need to be securely removed.
FCS_CKM.1/SSL
FCS_COP.1/UU
FCS_CKM.1/UU
FCS_COP.1/X2
FCS_CKM.1/X2
FCS_COP.1/S1
FCS_CKM.1/S1
FTP_TRP.1/WebLMT
None
FTP_ITC.1/IntegratedPort
None
5.3.
82
The security assurance requirements for the TOE are the Evaluation
Assurance Level 3 components as specified in [CC] Part 3, augmented
with ALC_CMC.4 and ALC_CMS.4. No operations are applied to the
assurance components.
- 47 -
Assurance class
Development
Guidance documents
Life-cycle support
Security Target
evaluation
Tests
Vulnerability
assessment
Assurance
Family
ADV_ARC
ADV_FSP
ADV_IMP
ADV_INT
ADV_SPM
ADV_TDS
AGD_OPE
AGD_PRE
ALC_CMC
ALC_CMS
ALC_DEL
ALC_DVS
ALC_FLR
ALC_LCD
ALC_TAT
ASE_CCL
ASE_ECD
ASE_INT
ASE_OBJ
ASE_REQ
ASE_SPD
ASE_TSS
ATE_COV
ATE_DPT
ATE_FUN
ATE_IND
AVA_VAN
5.4.
83
- 48 -
6.
6.1.
6.1.1. Authentication
84
85
The TOE authenticates the local users based on individual user IDs
and passwords. User IDs are unique within the TOE and stored
together with associated passwords and other security attributes in the
TOEs configuration database. Those attributes can be configured by
users with the appropriate rights. (FIA_ATD.1, FMT_SMF.1)
86
87
88
89
90
The TOE also provide login time control mechanism: Each account can
be configured with the login time segment, including the valid date
range, time segment, and week restriction. Any login is prohibited
beyond the configured time segment. (FMT_SMF.1, FTA_TSE.1/Local)
- 49 -
1. The system sorts users with the same operation rights into a
group to facilitate authorization and user management of the
administrator. The TOE supports five predefined user groups
(Administrator, Operator, User, Guest and Custom). The TOE
grants default command group rights to Administrator, Operator,
User and Guest which cant be modified. (FMT_SMR.1)
2. The TOE divides the system commands to different groups which
is called command groups according to different functions. LTE
eNodeB creates 22 default command groups in which the
commands are preconfigured and cant be modified by user. And
it provides 10 non-default command groups to which user adds or
removes commands. (FDP_ACF.1/Local)
3. User groups are allowed to access one or more command groups.
(FDP_ACF.1/Local)
4. The users that have a custom user group are directly related to
the command groups accessible by them.
5. Therefore, a user has access to a command if its user group is
associated with a command group that contains the command the
user wants to access. (FDP_ACC.1/Local)
6. This access control policy is used to restrict the ability to modify
the users and commands relationship. (FMT_MSA.1,
FMT_MSA.3)
7. If the user is the admin special user, access is always granted
regardless the command group.
92
93
The domain access control policy allows users managed by the M2000
to execute commands in the TOE. The management of the security
attributes of this access control policy is out of the scope of the TOE.
Each time a domain user logs in the TOE (through the integration port
or through the WebLMT), the TOE send the used user and password to
the M2000 which performs user authentication and return to the user
the commands that the user can execute. If the M2000 user belongs to
the Administrator group, access to all functionality is always granted.
(FDP_ACC.1/Domain, FDP_ACF.1/Domain).
94
95
Note that some MML commands can only be executed through the
appropriate interface, for example, is non sense using the MOD PWD
- 50 -
6.1.3. Auditing
97
98
There exist two kinds of audit files, the operation log and the security
log.
1. Security log: Records user operations related to the system
security, including user behaviour and configuration commands,
for example, account locking due to consecutive login failure and
updating the security policy
2. Operation log: Records all MML commands run by users.
99
For each of these kinds there exist two files that are rotated in the
following way: if one exceeds 1MB the oldest file is deleted and a new
one is created. (FAU_STG.3)
100
101
Where available, the data recorded with each audit record includes the
unique user ID associated with a subject during authentication.
(FAU_GEN.2)
102
Users with the appropriate rights can review the audit records available
in the database. The TOE offers search functionality based on time
intervals, user IDs, interface, and/or result. (FAU_SAR.1, FAU_SAR.3)
104
105
106
108
109
111
- 52 -
112
114
115
The TOE provides VLAN to separate the traffic from different flow
planes, which reduce traffic storms and avoid resource overhead.
- 53 -
117
118
The TOE supports IP-based Access Control List (ACL) to filter traffic
destined to TOE which might cause system overload and service
interruption.
119
The ACL provides a simple security policy that controls the incoming
and outgoing data of unauthorized users. The ACL determines what
data is allowed to enter the transmission port and what data is not
allowed to enter the transmission port. In this way, the ACL filters the
illegitimate data.
120
The ACL controls the network access, preventing the network attacks.
In addition, the ACL filters out illegitimate data flows, improving the
network performance.
121
The ACL consists of multiple rules. Each rule contains the following
filtering conditions:
1. Protocol type (IP, ICMP, TCP, UDP, and SCTP)
2. Source IP address and mask
3. Source port range
4. Destination IP address and mask
5. Destination port range
6. Differentiated Services Code Point (DSCP) value
7. ACL Action (Deny, Permit)
122
The ACL rules can be preset in the S1/X2 network interfaces, and the
ACL Action can be designated in advance. In this way, the
communication flows can be permitted or denied, and the illegitimate
data can be filtered. This method effectively prevents illegitimate
intrusions and malicious packet attacks, ensuring the security of
network devices. (FMT_SMF.1, FTA_TSE.1/SEP).
- 54 -
the
communication
between
4. Configuration of IPSec for the communication between MME/SGW and the TOE.
5. Configuration of IPSec for the communication between the TOE
and others LTE eNodeB.
6. Configuration of VLAN for the different plane between the TOE
environment and the TOE.
7. Configuration of ACL for the communication between the TOE
environment and the TOE.
8. Configuration of the Air interface.
9. Authorized administrators are able to configure a system-wide
password policy that is then enforced by the TOE. Besides the
minimum length of the password, which can be set to be between
6 and 32 characters, administrator has the option to enforce the
use of specific characters (numeric, alphanumeric low or capital,
and special characters).
124
126
127
The CSP files will be the files downloaded from the FTP server to
update the TOE software and this way exercise the digital signature
mechanism implemented in the TOE.
128
- 55 -
129
This way, a directory structure is stored in the CSP file. This structure is
expected to contain some important files:
130
131
- 56 -
7.
7.1.
Abbreviations
Abbreviations
ACL
AKA
ASPF
BS
BIN
CC
CPBSP
CPRI
DSCP
EMS/M2000
ETH
FE
FTP
FTPs
SCTP
GE
GSM
ICMP
IKE
IP
HERT
HERT -BBU
IPSec
LTE
NE
NMS
NTP
MAC
MML
MPT
BBI
OAM (OM)
OSS
RRM
SEC
SFP
SFR
SSL
ST
SWM
TCP
Full Spelling
Access Control List
Authentication and Key Agreement
Application Specific Packet Filter
Base Station
Huaweis binary interface
Common Criteria
Common Platform Board Support Package
Common Public Radio Interface
Differentiated Services Code Point
Element Management System(M2000)
Ethernet
Fast Ethernet
File Transfer Protocol
FTP-over-SSL
Stream Control Transport Protocol
Gigabit Ethernet
Global System for Mobile Communications
Internet Control Message Protocol
Internet Key Exchange
Internet Protocol
Huawei Enhanced Radio Technology
Huawei Enhanced Radio Technology-Base Band
Unit
IP Security Protocol
Long term evolution
Network Element
Network Management System
The Network Time Protocol
Medium Access Control
Man-Machine Language
Main Processing&Transmission unit
Base-Band Interface board
Operation Administration and Maintenance
Operations Support System
Radio Resource Management
Operator Security management
Small form-factor pluggable
Security Functional Requirement
Security Socket Layer
Security Target
Software management
Transfer Control Protocol
- 57 -
TLS
TOE
TSF
TR
TRAN
UDP
UMTS
USB
VISP
VLAN
VPP
7.2.
Terminology
132
This section contains definitions of technical terms that are used with a
meaning specific to this document. Terms defined in the [CC] are not
reiterated here, unless stated otherwise.
133
134
135
7.3.
References
136
137
- 58 -