National Information Assurance Partnership ® TM Common Criteria Evaluation and Validation Scheme Validation Report Xerox Corporation Image Overwrite Security for Xerox CopyCentre C65/C75/C90 Copier and WorkCentre Pro 65/75/90 Advanced Multifunction System including Image Overwrite Security Report Number: CCEVS-VR-04-0092 Dated: 11 February 2005 Version: 1.0 National Institute of Standards and Technology National Security Agency Information Technology Laboratory Information Assurance Directorate 100 Bureau Drive 9800 Savage Road STE 6740 Gaithersburg, MD 20899 Fort George G. Meade, MD 20755-6740 ACKNOWLEDGEMENTS Validation Team Aerospace Corporation Columbia, Maryland Common Criteria Testing Laboratory Computer Sciences Corporation Annapolis Junction, Maryland Table of Contents 1. EXECUTIVE SUMMARY ........................................................................................................................................4 2. SECURITY POLICY.................................................................................................................................................6 2.1. OVERWRITE POLICY. .............................................................................................................................................6 2.2. IDENTIFICATION AND AUTHENTICATION POLICY...................................................................................................6 2.3. SECURITY MANAGEMENT......................................................................................................................................6 3. ASSUMPTIONS .........................................................................................................................................................6 3.1. USAGE ASSUMPTIONS ...........................................................................................................................................6 3.2. ENVIRONMENTAL ASSUMPTIONS...........................................................................................................................7 4. ARCHITECTURAL INFORMATION ....................................................................................................................7 5. DOCUMENTATION .................................................................................................................................................8 6. IT PRODUCT TESTING...........................................................................................................................................8 6.1. DEVELOPER TESTING ............................................................................................................................................8 6.1.1. Evaluator Testing..........................................................................................................................................9 6.1.2. Overwrite......................................................................................................................................................9 6.1.3. Authentication...............................................................................................................................................9 6.1.4. Security Management ...................................................................................................................................9 6.1.5. Vulnerability Testing.....................................................................................................................................9 7. EVALUATED CONFIGURATION .......................................................................................................................10 8. RESULTS OF THE EVALUATION ......................................................................................................................10 9. EVALUATOR COMMENTS..................................................................................................................................10 10. SECURITY TARGET..........................................................................................................................................10 11. GLOSSARY ..........................................................................................................................................................11 12. BIBLIOGRAPHY.................................................................................................................................................12 3 1. EXECUTIVE SUMMARY This report documents the NIAP validators’ assessment of the evaluation of Xerox Corporation Image Overwrite Security for a line of copiers and multifunction systems. It presents the evaluation results, their justifications, and the conformance results. This validation report is not an endorsement of the IT product by any agency of the U.S. Government and no warranty of the IT product is either expressed or implied. The evaluation was performed by Computer Sciences Corporation (CSC), and was completed during January 2005. The information in this report is largely derived from the Evaluation Technical Report (ETR) and associated test report, both written by CSC. The evaluation determined the product to be Part 2 conformant and Part 3 conformant, and to meet the requirements of EAL 2. The product is not conformant with any published Protection Profiles, but rather is targeted to satisfy the needs for protection of residual information as defined by DoD Standard 5200.28-M. The product family provides copy and copy/print/scan/fax capability. There are two primary configurations of the TOE, although with identical security features; a digital copier (DC) that provides only copy functions, and a multifunction device (MFD) that provides copy, print, scan to email, network scan, and network fax services. DC models have only a single internal hard drive (the Copy Controller HDD), whereas the MFD contains two internal hard drives (the Network Controller HDD and the Copy Controller HDD). Additionally, a removable external hard drive may be added to either model (which requires the removal of the internal hard drive(s). The primary security feature is that of the overwriting of temporary image data that is stored on the internal or optional external hard drive(s). The overwrite function is automatically invoked at the completion of each job, and can also be invoked on demand by an authorized administrator. The overwrite function prevents image data from remaining on the hard drive after the completion of any copy, print, network scan, or scan to email function. 4 IDENTIFICATION The CCEVS is a joint National Security Agency (NSA) and National Institute of Standards and Technology (NIST) effort to establish commercial facilities to perform trusted product evaluations. Under this program, security evaluations are conducted by commercial testing laboratories called Common Criteria Testing Laboratories (CCTLs) using the Common Evaluation Methodology (CEM) for Evaluation Assurance Level (EAL) 1 through EAL 4 in accordance with National Voluntary Laboratory Assessment Program (NVLAP) accreditation. The NIAP Validation Body assigns Validators to monitor the CCTLs to ensure quality and consistency across evaluations. Developers of information technology products desiring a security evaluation contract with a CCTL and pay a fee for their product’s evaluation. Upon successful completion of the evaluation, the product is added to NIAP’s Validated Products List. Table 1 provides information needed to completely identify the product, including: • The Target of Evaluation (TOE): the fully qualified identifier of the product as evaluated; • The Security Target (ST), describing the security features, claims, and assurances of the product; • The conformance result of the evaluation; • Any Protection Profile to which the product is conformant; • The organizations participating in the evaluation. Table 1: Evaluation Identifiers Item Identifier Evaluation Scheme United States NIAP Common Criteria Evaluation and Validation Scheme Target of Evaluation Xerox CopyCentre C65/C75/C90 Copier and WorkCentre Pro 65/75/90 Advanced Multifunction System1 including Image Overwrite Security. Protection Profile None Security Target Xerox CopyCentre C65/C75/C90 Copier and WorkCentre Pro 65/75/90 Advanced Multifunction System including Image Overwrite Security, Version 1.0, Rev 1.14, January 5, 2005 Evaluation Technical Report Xerox CopyCentre C65/C75/C90 Copier and WorkCentre Pro 65/75/90 Advanced Multifunction System including Image Overwrite Security, Version 1.0, January 13, 2005 Conformance Result Part 2 conformant, Part 3 conformant, EAL 2 Sponsor Xerox Corporation Developer Xerox Corporation Evaluators Computer Sciences Corporation Validators The Aerospace Corporation 1 For convenience, the product family will be referred to hereafter as DC/MFD, or Digital Copier/ MultiFunction Device. 5 2. SECURITY POLICY The Xerox product line identified enforces the following security policies: 2.1. Overwrite Policy. The TOE is available in two models; a digital copier or multifunction device copies, prints, with network scan, scan to email, and provides fax capability (MFD). Both models store temporary image data, along with associated files, that are created during any of the supported services on an internal hard drive(s), or optional external hard drive(s). The image data and associated files are overwritten—as prescribed in DoD Standard 5200.28M, using a three-pass procedure— automatically at the completion of each job that writes temporary files to the hard drive. Additionally, an administrator may invoke the overwrite function on demand (i.e., ODIO; On- Demand Image Overwrite). ODIO cancels all print, network scan, scan-to-email, or network fax jobs jobs, halts the printer interface and overwrites the contents of the sections for temporary image files. The machine then reboots.2 2.2. Identification and Authentication Policy. Because the TOE is essentially a shared office product, there are no users identified, as such. Anyone who can access the MFD—either physically or through the network interface—can exercise its capabilities. Administrators, however, are authenticated via a PIN that may be entered either through the keypad or the network interface 2.3. Security Management Only administrators have the authority to invoke management functions; to enable or disable the automatic overwrite function, invoke/abort the ODIO function, and change the system administrator PIN via the front panel. Also, only system administrators may invoke or abort the ODIO function through the web interface. 3. ASSUMPTIONS 3.1. Usage Assumptions The system is expected to be used in what has traditionally been known as “a relatively benign environment.” That is, all the information on the system is at the same level of sensitivity, and all users are authorized for that level of information (although they do not necessarily have access to all the data). However, users are not expected to be trustworthy; they may make attempts to bypass system security controls or otherwise exceed their authorizations to data and system resources. 2 The details of the image overwrite function are slightly different in each of the models. For a more detailed description, please refer to the Security Target (TOE Summary Specification, Sections 6.1.1, and 6.1.2) 6 Administrators are assumed to be trusted (i.e., non-malicious) and competent to carry out their responsibilities. 3.2. Environmental Assumptions It is presumed that the MFD has been delivered, installed, and configured in accordance with documented procedures, which includes installation and setup by an authorized Xerox technician.. No explicit assumptions are made relative to physical controls. However, the system is essentially a piece of standard office equipment. As such, it would be accorded the kind of physical controls associated with the specific environment in which it is located. The implicit assumption is that control of access to the MFD is consistent with the level of sensitivity of the data that is being processed. 4. ARCHITECTURAL INFORMATION The essential elements of the TOE models are: • Network Controller (MFD only)—processes print, network scan, scan-to-email, and network fax tasks; • Copy Controller—processes copy tasks; • User interface (UI)—detects soft and hard button actuations and provides graphical prompts to the user; • Image Output Terminal (IOT)—performs copy/print paper feeding and transport. On the MFD models (i.e., WorkCentre 65/75/90) all jobs, except for print, are submitted via the Local UI directly to the Copy Controller. Print jobs are submitted via the Web UI to the Network Controller which then passes them to the Copy Controller. Copy Controller eventually passes copy and print jobs to an image output module (IOT). Network scan, scan-to-email, and network fax tasks are recognized by Copy Controller as being neither print nor copy jobs, and passes them to the Network Controller for processing and delivery to their ultimate destination. The MFD models, as noted earlier, have two internal hard drives; the Network Controller HDD and the Copy Controller HDD. Digital copier models (i.e., CopyCentre C65/C75/C90) support only the copy function. Jobs are submitted via the Local UI to the Copy Controller. After processing, the job is passed to the image output function. These models have but a single internal hard drive, the Copy Controller HDD. Each time a job transits or is processed by a controller, temporary image data (i.e., the data submitted and other files created during job processing) is created and stored on that controller’s hard drive. Ultimately, the temporary image data is overwritten by the Image Overwrite function, either automatically or by invocation of the “in demand” feature by an authorized administrator. 7 5. DOCUMENTATION Because the MFD provides no user security services, there is no user documentation other than the normal guidance relative to the functional features of the device. Furthermore, the TOE is installed and configured by trained Xerox technicians. As a result, no consumer-oriented installation, startup, and configuration guidance is needed. However, there is guidance provided for the administrator that identifies the responsibilities and functions available to the administrator. During the course of the evaluation, the CCTL had access to an extensive amount of documentation and evidence3 , covering: • Interface specifications; • Design details and system internals; • User and administrator guidelines; • Configuration management • Delivery and installation procedures, and operation guidance; • Vendor test plans, test suites, and test results; • Vulnerability assessment documentation and strength of function analyses; • Security Target 6. IT PRODUCT TESTING 6.1. Developer Testing Evaluator analysis of the developer’s test plans, test scripts, and test results demonstrate accurate correspondence between the tests identified and the functional specification, and that the developer’s testing is adequate to satisfy the requirements of EAL2. The developer’s tests were largely focused on the externally visible behavior of the TOE, with security testing covering the automatic overwrite, on-demand overwrite (i.e., ODIO) changing of the administrator’s PIN, and the authentication function. For each of the developer tests, the evaluators analyzed the test procedures to determine whether the procedures were relevant to, and sufficient for the function being tested. They also verified that the test documentation showed results that were consistent with the expected results for each test script. 3 A complete list of the documentation used during the evaluation is included in Section 3.5 of the Evaluation Technical Report for a Target of Evaluation, Version 1.0, January 13, 2005. 8 6.1.1. Evaluator Testing Although the developer’s testing was considered adequate, the evaluators also tested each of the security functions as defined in the Security Target, running the entire developer test suite. Specifically: • Image overwrite • Authentication • Security management were all tested. The evaluators also developed additional tests to further exercise the system functions (e.g., testing the ability of the TOE to recognize, and reject, undefined file types), and executed a number of tests to determine whether the TOE is vulnerable to attacks aimed at bypassing the security functions or subverting the basic protection mechanisms. 6.1.2. Overwrite Developer tests were reproduced. Additionally, the overwrite function was checked—by examining the contents of the hard drive—to verify that both the automatic overwrite and the on-demand overwrite (i.e., ODIO) result in the directory being cleared and the image data and associated temporary files being overwritten. A test was added by the evaluators to validate the system behavior upon a system crash. 6.1.3. Authentication Evaluator tests were performed using both the keypad and the web interface to verify that the administrator authentication function performs as specified in the TOE specifications, and that the administrator can perform no authorized functions prior to authentication. 6.1.4. Security Management The evaluators performed tests to verify the functioning of the administrator functions, and the consistency of the administrator’s PIN between subsystems (i.e., keypad and web interface). 6.1.5. Vulnerability Testing The purpose of vulnerability testing is to determine the existence and exploitability of flaws or weaknesses in the MFD. The evaluators tested the ability of the TOE to handle unrecognized files (e.g., .doc files), as well as a number of known attack scenarios (e.g., FTP bounce attack, buffer overflow attempts). Testing revealed a vulnerability that involved the ability to introduce arbitrary Postscript files, leading to some serious consequences. The problem was corrected with a patch had been developed specifically to address this problem (i.e., Patch 18). 9 7. EVALUATED CONFIGURATION Testing was performed on both the Xerox CopyCentre and WorkCentre Pro models with System Software Set 1.001.02.074. The complete listing of firmware and software versions for each element within the product lines can be found in section 2.1 of the Security Target. The evaluation results apply to the Image Overwrite Security for the Xerox copyCentre C55/C65/C90 Copiers and WorkCentre Pro 65/75/90 Advanced Multifunction System. 8. RESULTS OF THE EVALUATION4 The TOE was found to provide the capabilities defined by the Security Target, and to satisfy all the requirements of EAL2. 9. EVALUATOR COMMENTS There are no Evaluator Comments. 10. SECURITY TARGET The ST, Xerox CopyCentre C65/C75/C90 and WorkCentre Pro 65/75/90 Advanced Multifunction System,including Image Overwrite; Version 1.0, Revision 1.14, January 5, 2005 is included here by reference. 4 The terminology in this section is defined in CC Interpretation 008, specifying new language for CC Part 1, section/Clause 5.4. 10 11. GLOSSARY CC Common Criteria CCEVS Common Criteria Evaluation and Validation Scheme CCTL Common Evaluation Testing Laboratory CEM Common Evaluation Methodology EAL Evaluation Assurance Level ETR Evaluation Technical Report MFD Multifunction Device NIAP National Information Assurance Partnership NIST National Institute of Standards & Technology NSA National Security Agency PP Protection Profile ST Security Target TOE Target of Evaluation TSF TOE Security Function TSFI TOE Security Function Interface 11 12 12. BIBLIOGRAPHY [1] Common Criteria for Information Technology Security Evaluation – Part 1: Introduction and general model, dated August 1999, Version 2.1. [2] Common Criteria for Information Technology Security Evaluation – Part 2: Security functional requirements, dated August 1999, Version 2.1. [3] Common Criteria for Information Technology Security Evaluation – Part 2: Annexes, dated August 1999, Version 2.1. [4] Common Criteria for Information Technology Security Evaluation – Part 3: Security assurance requirements, dated August 1999, Version 2.1. [5] Common Evaluation Methodology for Information Technology Security – Part 1: Introduction and general model, dated 1 November 1998, version 0.6. [6] Common Evaluation Methodology for Information Technology Security – Part 2: Evaluation Methodology, dated August 1999, version 1.0. [7] Security Target, Xerox CopyCentre C65/C75/C90 Copier and WorkCentre Pro 65/75/90 Advanced Multifunction System including Overwrite Security; Version 1.0, Revision 1.14, January 5, 2005. [8] Common Criteria Testing Laboratory Penetration Test Plan and Report (Second Pass), Xerox CopyCentre C65/C75/C90 Copier and WorkCentre Pro 65/75/90 Advanced Multifunction System, Version 1.1, December 15, 2004. [9] CSC Common Criteria Laboratory Independent Test Plan and Report (Second Pass), Xerox CopyCentre C65/C75/C90 Copier and WorkCentre Pro 65/75/90 Advanced Multifunction System, Version 1.1, December 10, 2004. [10] Evaluation Technical Report for a Target of Evaluation, Xerox CopyCentre C65/C75/C90 Copier and WorkCentre Pro 65/75/90 Advanced Multifunction System including Image Overwrite Security, Version 1.0, Revision 1.14, January 5, 2005.