Bundesdruckerei GmbH Public p. 1 Security Target Bdrive Windows Client developed by Bundesdruckerei GmbH Status: Final Classification Public Date: 2021-03-16 Version: 1.00 Author: SRC/mfs, TÜViT/wgr / TÜViT/bay QA: SRC/job, SRC/ed, SRC/sch p. 2 Public Bundesdruckerei GmbH Document history Version Date Approval Remark 1.00 2021-03-16 TÜViT/bay Public release Bundesdruckerei GmbH Public p. 3 Contents 1 ST Introduction........................................................................................................................6 1.1 ST Reference ............................................................................................................................6 1.2 TOE Reference .........................................................................................................................6 1.3 TOE Overview...........................................................................................................................6 The Bdrive system ...............................................................................................................6 Bdrive Server & Identity Provider.........................................................................................7 1.4 TOE Description........................................................................................................................8 General description..............................................................................................................8 Security features ..................................................................................................................9 TOE deliverables................................................................................................................10 TOE Hardware and Software Environment .......................................................................10 Connectivity Aspects..........................................................................................................11 TOE Boundaries.................................................................................................................11 TOE Delivery......................................................................................................................12 2 CC Conformance...................................................................................................................13 PP claim.............................................................................................................................13 Package claim....................................................................................................................13 Conformance rationale.......................................................................................................13 3 Security Problem Definition.................................................................................................14 3.1 Assets......................................................................................................................................14 3.2 Subjects, Objects and Operations ..........................................................................................16 Subjects .............................................................................................................................16 Objects...............................................................................................................................17 Operations..........................................................................................................................17 3.3 Threats ....................................................................................................................................18 T.UnauthLocalAccess ........................................................................................................18 T.UnauthRemoteAccess ....................................................................................................18 T.DisclosureKey.................................................................................................................18 T.DisclosurePW .................................................................................................................18 T.DisclosureMKey..............................................................................................................18 T.Residual..........................................................................................................................19 3.4 Organizational Security Policies .............................................................................................19 OSP.Recovery ...................................................................................................................19 OSP.UserApproval.............................................................................................................19 3.5 Assumptions............................................................................................................................19 A.Installation.......................................................................................................................19 A.Credentials......................................................................................................................19 A.Malware ..........................................................................................................................20 A.Admin..............................................................................................................................20 A.User ................................................................................................................................20 A.Physical ..........................................................................................................................20 A.TrustedBackend .............................................................................................................20 4 Security Objectives...............................................................................................................21 4.1 Security Objectives for the TOE..............................................................................................21 O.Keygen Key generation..................................................................................................21 p. 4 Public Bundesdruckerei GmbH O.Access Access to data ...................................................................................................21 O.UserAuthentication Authentication of BDrive Users.......................................................21 O.Integrity Integrity of file contents and file information.....................................................21 O.Authentication Authentication of external entities ..........................................................21 O.Residual Protection of residual information ...................................................................21 4.2 Security Objectives for the Operational Environment .............................................................21 OE.Installation....................................................................................................................21 OE.Credentials...................................................................................................................22 OE.Malware .......................................................................................................................22 OE.Admin...........................................................................................................................22 OE.User .............................................................................................................................22 OE.Physical........................................................................................................................22 OE.TrustedBackend...........................................................................................................22 OE.MasterKey....................................................................................................................22 4.3 Security Objective Rationale...................................................................................................22 5 Extended Components Definition .......................................................................................25 5.1 FCS_RNG Generation of random numbers............................................................................25 6 Security Requirements.........................................................................................................26 6.1 Security functional policy (SFP) ..............................................................................................26 6.2 Security Functional Requirements ..........................................................................................27 Class FCS: Cryptographic support ....................................................................................27 Class FDP: User Data Protection ......................................................................................29 Class FIA: Identification and Authentication ......................................................................31 Class FMT: Security Management.....................................................................................32 Class FTA: TOE Access ....................................................................................................33 Class FTP: Trusted path/channels.....................................................................................34 6.3 Security Assurance Requirements..........................................................................................35 6.4 Security Requirements Rationale ...........................................................................................35 Security Functional Requirements Rationale.....................................................................35 Rationale for SFR dependencies.......................................................................................39 Security Assurance Requirements Rationale ....................................................................41 7 TOE Summary Specification................................................................................................42 7.1 Login........................................................................................................................................42 7.2 Logout .....................................................................................................................................42 7.3 Management of access rights to files and folders...................................................................42 7.4 Generation of user-specific meta data....................................................................................43 7.5 Generation of general meta data ............................................................................................43 7.6 Key generation ........................................................................................................................43 7.7 File encryption.........................................................................................................................43 7.8 File authentication...................................................................................................................43 7.9 File fragmentation ...................................................................................................................43 7.10 Key encryption & decryption ...................................................................................................44 7.11 Secure channels to other trusted IT products.........................................................................44 7.12 Certificate Validation ...............................................................................................................44 Appendix ...............................................................................................................................................45 Bibliography..........................................................................................................................................46 Bundesdruckerei GmbH Public p. 5 p. 6 Public Bundesdruckerei GmbH 1 ST Introduction 1.1 ST Reference Document Title: Security Target Bdrive Windows Client Document Version Version 1.00 Document Date: 2021-03-16 Company: Bundesdruckerei GmbH (BDR) CC Version: 3.1, Revision 5 Evaluation Assurance Level: EAL2 1.2 TOE Reference TOE Name: Bdrive Windows Client TOE Version: BDrive 3.50.89.4 Developer: Bundesdruckerei GmbH Product Type: Cryptographic file scrambler for exchange of company data Certification-ID: BSI-DSZ-CC-1106 1.3 TOE Overview The Bdrive system The Bdrive system provides a solution for storing and sharing for files of all types. The system consists of the following components, each of them contributing to the security of the whole system: 1. Bdrive Client (the TOE which is a cryptographic file scrambler for exchange of company data (TOE type)) 2. Bdrive Server, including the Access Control List (ACL) database 3. Identity Provider (IDP), including the certificate database 4. Web frontends for administration 5. Web Services for File Sharing (Linkshare, Droppad, Web Client) The Bdrive Server and the IDP are server solutions that are located in secured operating envi- ronments at the premises of Bundesdruckerei GmbH. The following entities outside of the Bdrive system are involved: • PKI provided by D-TRUST (connected to the components IDP and to the Bdrive Client via OCSP) • Cloud servers used as storage locations from several cloud providers (connected to the Bdrive Server and Client). To increase reliability and availability the number of phys- ically separate servers should be as high as possible and of special importance when the cloud storage providers are selected. • the workstation (incl. hardware, software and operating system) in the end-user envi- ronment where the Bdrive Client is installed The TOE ensures: • Confidentiality of the files during up- and download • Integrity of the files Bundesdruckerei GmbH Public p. 7 As a main feature of the Bdrive system, plain files of a user are available and decrypted only on the workstation the Bdrive Client is installed on, cf. Figure 1. The Bdrive Server, the IDP and the cloud storage locations have no access to the plain files of Users. The BDrive System utilizes Erasure Encoding for forward error correction (erase encoding). Files encrypted by the Client will be split into n different chunks such that k < n arbitrarily chosen chunks suffice to restore the original encrypted file. That is achieved by computing m additional parity chunks, which can be used to replace at most m missing chunks. In order to ensure a high availability, these n chunks are stored on distinct cloud servers (see information on the cloud servers above). The TOE is the Bdrive Client, which is a software solution delivered to the end-user and can be installed on devices running the operating system Windows 7 Professional, Windows 7 Enter- prise and Windows 10, see sec. 1.4 for more details. The Bdrive system allows for the recovery of file contents that belong to a specific company with the help of a so-called Company Masterkey. Please note that this recovery mechanism is not realized by the TOE itself but requires assistance from the Bdrive administration. Additionally the TOE offers the ability to share files with users outside the company without access to own account utilizing the Linkshare functionality. In this scenario the TOE encrypts the metadata for exactly one file for a time-restricted virtual user, which allows him to download the encrypted file parts via link from the cloud and reassemble them in the browser. No access to other folders or files is granted and after expiring the link and the corresponding access keys will be automatically deleted. The TOE also allows the user to receive files from users without an own account via Droppad. An upload link created by the TOE permits users in ownership of this link to drop files for the creator of the link, e.g. like a mailbox. The files are encrypted and split in chunks in the Browser but are only downloaded by the TOE after explicitly accepting them. Bdrive Server & Identity Provider Beyond the TOE, two other components of the Bdrive system are briefly described in the fol- lowing: Bdrive Server • generation and distribution of storage coordinates on the Cloud Servers in form of Signed URLs; the Bdrive Server retrieves the storage coordinates for read/write ac- cess to the Cloud Servers via connections (5) in Figure 1. These so called Signed URLs are made available to the TOE via connection (1) in Figure 1. The TOE uses these Signed URLs in order to download/upload the encrypted file chunks via connec- tion (6) in Figure 1 directly to the Cloud Storage Provider. • (physical) RNG • verification of the authentication token sent from the Bdrive Client via connection (1) in Figure 1 after initial client side TLS connection. • management and storage of general Meta Data Arrays (MDAs, cf. Section 1.4.1); these general MDAs are exchanged between Bdrive Client and Bdrive Server via con- nection (1) in Figure 1. • establishing TLS connection (see (3) in Figure 1) to IDP; • management and storage of Access Control Lists (ACLs) for files and folders; Please be aware that die BDrive Client is used to generate invitations to a shared folder. The technical implementation for the ACLs is done on server side. IDP (Identity Provider) p. 8 Public Bundesdruckerei GmbH • supports the client in remote user authentication. There is one instance of the IDP for the following authentication method: o authentication by client certificate • establishing of TLS connections to Bdrive Client (connection (2) in Figure 1) and Bdrive Server (connection (3) in Figure 1); • connection to the PKI (external) including the revocation of certificates via connection (4) in Figure 1; The TOE itself has also a connection to the external PKI (7) to send OCSP requests to check the validity of certificates. Finally the TOE uses the services of the workstation as a platform (8). • generation of certificate requests towards Certificate Service Manager (CSM), an ex- ternal entity provided by D-Trust that receives these certificate requests. Certificates are issued by D-Trust upon successful verification of certification requests. Cloud Server 1 Cloud Server 2 Cloud Server N BDrive Server, incl. ACL database IDP (Identity Provider), incl. Certificate Database BDrive Client (Software Application) (1) (2) (4) (5) (5) (5) (6) Operating environment End-user environment PKI Work- station (8) (7) (3) Figure 1: Overview of the Bdrive system components and the external entities involved. 1.4 TOE Description General description The TOE implements the Bdrive Client for the Windows platform. It implements a secure, dis- tributed file storage allowing the following authentication mode (cf. the description in sec. 7.1): Bundesdruckerei GmbH Public p. 9 • User authentication certificate plus password which protects the private part of the au- thentication key. Each consumer device of a user receives a unique authentication certificate, and files are shared between all devices of the user. Optionally, a user has the possibility to share files/fold- ers with several other users in the same company. Additionally the user can utilize Linkshare or Droppad functionality to exchange or receive files with arbitrary individuals outside the com- pany context. The storage scheme realizes forward error correction (erase coding) together with crypto- graphic means for encryption and authentication. As soon as the Bdrive Client has retrieved k