Cambium PTP 820 FIPS 140-2 Security Policy PTP 820C PTP 820C-HP PTP 820C 2E2SX PTP 820S PTP 820N PTP 820A PTP 820G PTP 820GX Firmware: PTP820 Release 10.9.6b74 Hardware: PTP 820N, PTP 820A, with components: • PTP820 TCC-B-MC: N000082H001 • PTP820 TCC-B2: N000082H002 • PTP820 TCC-B2-XG-MC: N000082H003 • PTP820 RMC-B: N000082H004 PTP 820GX with components: • PTP820 RMC-B: N000082H004 PTP 820G, PTP 820C, PTP 820C-HP, PTP 820C 2E2SX, PTP 820S Phn-4339-002v000 Prepared by: Acumen Security 2400 Research Blvd Rockville, MD 20850 www.acumensecurity.net While reasonable efforts have been made to assure the accuracy of this document, Cambium Networks assumes no liability resulting from any inaccuracies or omissions in this document, or from use of the information obtained herein. Cambium reserves the right to make changes to any products described herein to improve reliability, function, or design, and reserves the right to revise this document and to make changes from time to time in content hereof with no obligation to notify any person of revisions or changes. Cambium does not assume any liability arising out of the application or use of any product, software, or circuit described herein; neither does it convey license under its patent rights or the rights of others. It is possible that this publication may contain references to, or information about Cambium products (machines and programs), programming, or services that are not announced in your country. Such references or information must not be construed to mean that Cambium intends to announce such Cambium products, programming, or services in your country. Copyrights This document, Cambium products, and 3rd Party software products described in this document may include or describe copyrighted Cambium and other 3rd Party supplied computer programs stored in semiconductor memories or other media. Laws in the United States and other countries preserve for Cambium, its licensors, and other 3rd Party supplied software certain exclusive rights for copyrighted material, including the exclusive right to copy, reproduce in any form, distribute and make derivative works of the copyrighted material. Accordingly, any copyrighted material of Cambium, its licensors, or the 3rd Party software supplied material contained in the Cambium products described in this document may not be copied, reproduced, reverse engineered, distributed, merged or modified in any manner without the express written permission of Cambium. Furthermore, the purchase of Cambium products shall not be deemed to grant either directly or by implication, estoppel, or otherwise, any license under the copyrights, patents or patent applications of Cambium or other 3rd Party supplied software, except for the normal non-exclusive, royalty free license to use that arises by operation of law in the sale of a product. Restrictions Software and documentation are copyrighted materials. Making unauthorized copies is prohibited by law. No part of the software or documentation may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, without prior written permission of Cambium. License Agreements The software described in this document is the property of Cambium and its licensors. It is furnished by express license agreement only and may be used only in accordance with the terms of such an agreement. High Risk Materials Cambium and its supplier(s) specifically disclaim any express or implied warranty of fitness for any high risk activities or uses of its products including, but not limited to, the operation of nuclear facilities, aircraft navigation or aircraft communication systems, air traffic control, life support, or weapons systems (“High Risk Use”). Any High Risk is unauthorized, is made at your own risk and you shall be responsible for any and all losses, damage or claims arising out of any High Risk Use. © 2020 Cambium Networks Limited. All Rights Reserved. Contents 1. Introduction....................................................................................................................................................4 1.1 Purpose ...................................................................................................................................................4 1.2 Document Organization ..........................................................................................................................4 1.3 Notices ....................................................................................................................................................5 2. PTP 820C, PTP 820C-HP, PTP 820C 2E2SX, PTP 820S, PTP 820N, PTP 820A, PTP 820G, PTP 820GX ............6 2.1 Cryptographic Module Specification.......................................................................................................6 2.1.1 Cryptographic Boundary ...................................................................................................................7 2.1.2 Modes of Operation........................................................................................................................10 2.2 Cryptographic Module Ports and Interfaces .........................................................................................15 2.3 Roles, Services, and Authentication......................................................................................................25 2.3.1 Authorized Roles.............................................................................................................................25 2.3.2 Authentication Mechanisms ...........................................................................................................25 2.3.3 Services ...........................................................................................................................................26 2.4 Physical Security....................................................................................................................................29 2.5 Operational Environment......................................................................................................................30 2.6 Cryptographic Key Management ..........................................................................................................31 2.6.1 Key Generation ...............................................................................................................................35 2.6.2 Key Entry/Output............................................................................................................................35 2.6.3 Zeroization Procedures ...................................................................................................................35 2.7 Electromagnetic Interference / Electromagnetic Compatibility (EMI/EMC).........................................35 2.8 Self-Tests...............................................................................................................................................35 2.8.1 Power-On Self-Tests........................................................................................................................35 2.8.2 Conditional Self-Tests .......................................................................................................................2 2.8.3 Self-Tests Error Handling...................................................................................................................2 2.9 Mitigation of Other Attacks ....................................................................................................................2 3. Secure Operation............................................................................................................................................3 3.1 Installation ..............................................................................................................................................3 3.2 Initialization...........................................................................................................................................10 3.3 Management.........................................................................................................................................11 3.3.1 SSH Usage........................................................................................................................................12 3.3.2 TLS Usage ........................................................................................................................................12 3.4 Additional Information..........................................................................................................................12 4. Appendix A: Acronyms .................................................................................................................................13 Figures Figure 1 - PTP 820C........................................................................................................................................................7 Contents Figure 2 - PTP 820C-HP ..................................................................................................................................................7 Figure 3 - PTP 820C 2E2SX .............................................................................................................................................8 Figure 4 - PTP 820S ........................................................................................................................................................8 Figure 5 - PTP 820N and PTP 820A ................................................................................................................................9 Figure 6 - PTP 820G........................................................................................................................................................9 Figure 7 - PTP 820GX .....................................................................................................................................................9 Figure 8 - PTP820 TCC-B-MC: N000082H001 Interfaces..............................................................................................15 Figure 9 - PTP820 TCC-B2: N000082H002 and PTP820 TCC-B2-XG-MC: N000082H003 Interfaces ............................16 Figure 10 - PTP820 RMC-B: N000082H004 Interfaces.................................................................................................17 Figure 11 - PTP 820G Interfaces...................................................................................................................................18 Figure 12 - PTP 820GX Interfaces ................................................................................................................................19 Figure 13 - PTP 820C Interfaces (Front and Back) .......................................................................................................20 Figure 14 - PTP 820S Interfaces (Front and Back)........................................................................................................21 Figure 15 - PTP 820C and PTP 820S Interfaces Side.....................................................................................................21 Figure 16 - PTP 820C 2E2SX Interfaces (Front and Back).............................................................................................22 Figure 17 - PTP 820C 2E2SX Interfaces Side ................................................................................................................22 Figure 18 - PTP 820C-HP Interfaces (Front and Back)..................................................................................................23 Figure 19 - PTP 820C-HP Interfaces Side .....................................................................................................................24 Figure 20 - TEL Placement for PTP 820C and PTP 820S Models (1 of 5)........................................................................3 Figure 21 - TEL Placement for PTP 820C and PTP 820S Models (2 of 5)........................................................................4 Figure 22 - TEL Placement for PTP 820C and PTP 820S Models (3 of 5)........................................................................4 Figure 23 - TEL Placement for PTP 820C and PTP 820S Models (4 of 5)........................................................................4 Figure 24 - TEL Placement for PTP 820C and PTP 820S Models (5 of 5)........................................................................5 Figure 25 - TEL Placement for PTP 820C-HP (1 of 5)......................................................................................................5 Figure 26 - TEL Placement for PTP 820C-HP (2 of 5)......................................................................................................5 Figure 27 - TEL Placement for PTP 820C-HP (3 of 5)......................................................................................................6 Figure 28 - TEL Placement for PTP 820C-HP (4 of 5)......................................................................................................6 Figure 29 - TEL Placement for PTP 820C-HP (5 of 5)......................................................................................................6 Figure 30 - TEL Placement for PTP 820G (1 of 3) ...........................................................................................................7 Figure 31 - TEL Placement for PTP 820G (2 of 3) ...........................................................................................................7 Figure 32 - TEL Placement for PTP 820G (3 of 3) ...........................................................................................................7 Figure 33 - TEL Placement for PTP 820GX (1 of 5) .........................................................................................................8 Figure 34 - TEL Placement for PTP 820GX (2 of 5) .........................................................................................................8 Figure 35 - TEL Placement for PTP 820GX (3 of 5) .........................................................................................................8 Figure 36 - TEL Placement for PTP 820GX (4 of 5) .........................................................................................................8 Figure 37 - TEL Placement for PTP 820GX (5 of 5) .........................................................................................................9 Figure 38 - TEL Placement for PTP 820N and PTP 820A (1 of 4)....................................................................................9 Figure 39 - TEL Placement for PTP 820N and PTP 820A (2 of 4)..................................................................................10 Figure 40 - TEL Placement for PTP 820N and PTP 820A (3 of 4)..................................................................................10 Figure 41 - TEL Placement for PTP 820N and PTP 820A (4 of 4)..................................................................................10 Contents Tables Table 1 - Security Levels ................................................................................................................................................6 Table 2 - Tested Configurations...................................................................................................................................10 Table 3 - Supported Algorithms...................................................................................................................................11 Table 4 - Module Interface Mapping for PTP820 TCC-B-MC: N000082H001 (PTP 820N and PTP 820A) ....................15 Table 5 - Module Interface Mapping for PTP820 TCC-B2: N000082H002 and PTP820 TCC-B2-XG-MC: N000082H003 (PTP 820N and PTP 820A).....................................................................................................................................16 Table 6 - Module Interface Mapping for PTP820 RMC-B: N000082H004 (PTP 820N and PTP 820A) .........................17 Table 7 - Module Interface Mapping for PTP 820G .....................................................................................................18 Table 8 - Module Interface Mapping for PTP 820GX...................................................................................................19 Table 9 - Module Interface Mapping for PTP 820C and PTP 820S...............................................................................21 Table 10 - Module Interface Mapping for PTP-820C 2E2SX ........................................................................................23 Table 11 - Module Interface Mapping for PTP 820C-HP..............................................................................................24 Table 12 - Authentication Mechanism Details.............................................................................................................25 Table 13 - Services, Roles and Key/CSP access ............................................................................................................26 Table 14 – Non-Security Relevant Services..................................................................................................................29 Table 15 - Details of Cryptographic Keys and CSPs......................................................................................................31 Table 16 - Acronyms ....................................................................................................................................................13 FIPS 140-2 Security Policy Phn-4339-002v000 4 | P a g e 1. Introduction This is a non-proprietary FIPS 140-2 Security Policy for Cambium Networks and the following Cambium Networks products: PTP 820C, PTP 820C-HP, PTP 820C 2E2SX, PTP 820S, PTP 820N, PTP 820A, PTP 820G, PTP 820GX. Below are the details of the certified products: Hardware Version #: • PTP 820N, PTP 820A, with components: o PTP820 TCC-B-MC: N000082H001 o PTP820 TCC-B2: N000082H002 o PTP820 TCC-B2-XG-MC: N000082H003 o PTP820 RMC-B: N000082H004 • PTP 820GX with components: o PTP820 RMC-B: N000082H004 • PTP 820G, PTP 820C, PTP 820C-HP, PTP 820C 2E2SX, PTP 820S Software Version #: PTP820 Release 10.9.6b74 FIPS 140-2 Security Level: 2 1.1 Purpose This document was prepared as part of the Federal Information Processing Standard (FIPS) 140-2 validation process. The document describes how PTP 820C, PTP 820C-HP, PTP 820C 2E2SX, PTP 820S, PTP 820N, PTP 820A, PTP 820G, and PTP 820GX meet the security requirements of FIPS 140-2. It also provides instructions to individuals and organizations on how to deploy the product in a secure FIPS-approved mode of operation. The target audience of this document is anyone who wishes to use or integrate any of these products into a solution that is meant to comply with FIPS 140-2 requirements. 1.2 Document Organization The Security Policy document is one document in a FIPS 140-2 Submission Package. In addition to this document, the Submission Package contains: • Vendor Evidence document • Finite State Machine • Other supporting documentation as additional references This Security Policy and the other validation submission documentation were produced by Acumen Security, under contract to Cambium Networks. With the exception of this Non-Proprietary Security Policy, the FIPS 140-2 Submission Package is proprietary to Cambium Networks and is releasable only under appropriate non-disclosure agreements. FIPS 140-2 Security Policy Phn-4339-002v000 5 | P a g e 1.3 Notices This document may be freely reproduced and distributed in its entirety without modification. FIPS 140-2 Security Policy Phn-4339-002v000 6 | P a g e 2. PTP 820C, PTP 820C-HP, PTP 820C 2E2SX, PTP 820S, PTP 820N, PTP 820A, PTP 820G, PTP 820GX PTP 820C, PTP 820C-HP, PTP 820C 2E2SX, PTP 820S, PTP 820N, PTP 820A, PTP 820G, and PTP 820GX (the module) are multi-chip standalone modules validated at FIPS 140-2 Security Level 2. Specifically, the modules meet that following security levels for individual sections in FIPS 140-2 standard: Table 1 - Security Levels # Section Title Security Level 1 Cryptographic Module Specification 2 2 Cryptographic Module Ports and Interfaces 2 3 Roles, Services, and Authentication 2 4 Finite State Model 2 5 Physical Security 2 6 Operational Environment N/A 7 Cryptographic Key Management 2 8 EMI/EMC 3 9 Self-Tests 2 10 Design Assurances 3 11 Mitigation Of Other Attacks N/A 2.1 Cryptographic Module Specification The PTP 820 series is a service-centric microwave platform for HetNet hauling. The platform includes a full complement of wireless products that provide innovative, market-leading backhaul and fronthaul solutions. Powered by a software-defined engine and sharing a common operating system, PTP820 Release 10.9.6b74, the PTP 820 platform, delivers ultra-high capacities while supporting any radio transmission technology, any network topology, and any deployment configuration. FIPS 140-2 Security Policy Phn-4339-002v000 7 | P a g e 2.1.1 Cryptographic Boundary The cryptographic boundary for the modules is defined as encompassing the "top," "front," "left," "right," and "bottom" surfaces of the case and all portions of the "backplane" of the case. The following figures provide a physical depiction of the cryptographic modules: Figure 1 - PTP 820C Figure 2 - PTP 820C-HP FIPS 140-2 Security Policy Phn-4339-002v000 8 | P a g e Figure 3 - PTP 820C 2E2SX Figure 4 - PTP 820S FIPS 140-2 Security Policy Phn-4339-002v000 9 | P a g e Figure 5 - PTP 820N and PTP 820A Figure 6 - PTP 820G Figure 7 - PTP 820GX The PTP 820G, PTP 820C, PTP 820C 2E2SX, PTP 820C-HP and PTP 820S are fixed configuration. The PTP 820GX has slots for Radio Modem Card RMC-B (PTP820 RMC-B: N000082H004). The PTP820 RMC-B: N000082H004 provides the modem interface between the Indoor Unit (IDU) and the Radio Frequency Unit (RFU). Finally, the PTP 820N and PTP 820A have slots to insert the following cards: • Traffic and Control Card (TCC): The Traffic Control Card (TCC) provides the control functionality for the PTP 820N and PTP 820A units. It also provides Ethernet management and traffic interfaces. There are three variants of this card: PTP820 TCC-B2-XG-MC: N000082H003: Required for Multi-Carrier ABC configurations. Provides 2 x FE Ethernet management interfaces, 2 x GbE optical interfaces, 2 x GbE electrical interfaces, and 2 x dual mode electrical or cascading interfaces. PTP820 TCC-B-MC: N000082H001: Required for Multi-Carrier ABC configurations. Provides 2 x FE Ethernet management interfaces and 2 x GbE combo interfaces (electrical or optical) for Ethernet traffic. FIPS 140-2 Security Policy Phn-4339-002v000 10 | P a g e PTP820 TCC-B2: N000082H002: Provides 2 x FE Ethernet management interfaces, 2 x GbE optical interfaces, 2 x GbE electrical interfaces, and 2 x dual mode electrical or cascading interfaces. • Radio Modem Card-B (PTP820 RMC-B: N000082H004): The Radio Modem Card (RMC) provides the modem interface between the Indoor Unit (IDU) and the Radio Frequency Unit (RFU). Additionally, the following cards can be configured on PTP 820GX, PTP 820N, and PTP 820A modules. These cards provide port density but do not contain any security-relevant functionality: • Ethernet/Optical Line Interface Card (E/XLIC) • STM-1/OC3 • STM-1 RST • E1/T1 • 10Gb Ethernet/Optical Line Interface Card (LIC-X-E10) • Radio Interface Card (RIC-D) The models included in this FIPS validation have been tested in the following configurations: Table 2 - Tested Configurations Model Cards PTP 820N • Single or dual TCC • Dual PTP820 RMC-B: N000082H004 • Dual Power supplies PTP 820A • Single or dual TCC • Dual PTP820 RMC-B: N000082H004 • Dual Power supplies PTP 820G Fixed configuration PTP 820GX • Dual PTP820 RMC-B: N000082H004 PTP 820C Fixed configuration PTP 820C-HP Fixed configuration PTP 820C 2E2SX Fixed configuration PTP 820S Fixed configuration 2.1.2 Modes of Operation The modules have a single mode of operation which is the FIPS-Approved mode (when configured as per the instructions in Section 3: Secure Operation). Any usage of the Non-FIPS Approved services described in Table 13 would result in non-Approved operation. The following table lists the FIPS approved algorithms supported by the modules: FIPS 140-2 Security Policy Phn-4339-002v000 11 | P a g e Table 3 - Supported Algorithms Cryptographic Algorithm CAVP Cert. # Usage Firmware Cryptographic Implementation AES CBC ( e/d; 128, 256 ); ECB ( e/d; 128 ); CTR ( int only; 256 ); CFB128 ( e/d; 128 ) GCM1 ( e/d; 128, 256; 192 tested but not used) KW ( AE , AD , AES-256 , INV , 128 , 256 , 192 , 320 , 4096 ) 4017 Used for control/management plane encryption/decryption SHS SHA-1 (BYTE-only) SHA-224 (BYTE-only, tested but not used) SHA-256 (BYTE-only) SHA-384 (BYTE-only) SHA-512 (BYTE-only) 3313 Used for control/management plane message digests. SHA-1 is permitted within SSH and IPSec protocols, and legacy signature verification only. HMAC HMAC-SHA1 (Key Size Ranges Tested: KSBS) HMAC-SHA256 ( Key Size Ranges Tested: KSBS ) HMAC-SHA384 (Key Size Ranges Tested: KSBS) HMAC-SHA512 (Key Size Ranges Tested: KSBS) 2619 Used for control/management plane message authentication SP 800-90A DRBG (HMAC-SHA-256) HMAC_Based DRBG: [ Prediction Resistance Tested: Enabled and Not Enabled ( SHA-256 ) 1195 Used for control/management plane random bit generation 1 GCM IV generation tested in accordance with IG A.5, scenario 1 (TLS). The IV is generated only for use with GCM encryption within the TLSv1.2 protocol. The ciphersuites supported by the module are identified in section 3.3.2 of this document. FIPS 140-2 Security Policy Phn-4339-002v000 12 | P a g e Cryptographic Algorithm CAVP Cert. # Usage FIPS 186-4 RSA Key Generation, Signature Generation and Signature Verification 186-4KEY(gen): FIPS186-4_Random_e PGM (ProbPrimeCondition): 2048 PPTT:( C.3 ) ALG[ANSIX9.31] Sig(Gen): (2048 SHA( 256 , 384 , 512 )) (3072 SHA( 256 , 384 , 512 )) Sig(Ver): (1024 SHA( 1 , 256 , 384 , 512 )) (2048 SHA( 1 , 256 , 384 , 512 )) (3072 SHA( 1 , 256 , 384 , 512 )) ALG[RSASSA-PKCS1_V1_5] SIG(gen) (2048 SHA( 224 , 256 , 384 , 512 )) (3072 SHA( 224 , 256 , 384 , 512 )) SIG(Ver) (1024 SHA( 1 , 224 , 256 , 384 )) (2048 SHA( 1 , 224 , 256 , 384 , 512 )) (3072 SHA( 1 , 224 , 256 , 384 , 512 )) [RSASSA-PSS]: Sig(Gen): (2048 SHA( 224 , 256 , 384 , 512 )) (3072 SHA( 224 , 256 , 384 , 512 )) Sig(Ver): (1024 SHA( 1 SaltLen( 128 ) , 224 SaltLen( 128 ) , 256 SaltLen( 128 ) , 384 SaltLen( 128 ) , 512 SaltLen( 128 ) )) (2048 SHA( 1 , 224 , 256 , 384 , 512 )) (3072 SHA( 1 SaltLen( 128 ) , 224 SaltLen( 128 ) , 256 SaltLen( 128 ) , 384 SaltLen( 128 ) , 512 SaltLen( 128 ) )) 2060 Used for control/management plane key generation, signature generation, and signature verification CVL (SNMPv3, SSH and TLS)2 TLSv1.2 (SHA-256) SSH (SHA-1, 256) SNMP (SHA-1) 840 Used for key derivation within management protocols CVL (IKEv1 SHA-256; tested but not used on Freescale P1012 based platforms) C1315 Used for key derivation within IPsec KTS (key establishment methodology provides 256 bits of encryption strength) AES: 4017 Used for key transport on the data plane KTS3 (key establishment methodology provides 128 or 256 bits of encryption strength) AES: 4017 HMAC: 2619 Used for key transport on the mnagement plane 2 Note that CAVP and CMVP has not reviewed or tested the SSH, SNMPv3, IKEv1 and TLS protocols 3 The management plane implements KTS using both AES (CBC and GCM modes) and optionally HMAC. If negotiating a GCM-based TLS cipher suite, then only GCM is used for the KTS function. FIPS 140-2 Security Policy Phn-4339-002v000 13 | P a g e Cryptographic Algorithm CAVP Cert. # Usage CKG4 (vendor affirmed) N/A Symmetric key and asymmetric seed generation KAS-SSC5 (vendor affirmed) •dhEphem (2048- and 3072-bit safe primes •Ephemeral Unified (P-256 curve) N/A Diffie-Hellman and Elliptic Curve Diffie-Hellman Key Agreement Kernel Cryptographic Implementation AES-CBC ( e/d; 256; tested but not used on Freescale P1012 based platforms) C1316 Used for data encryption/decryption within IPsec HMAC-SHA-256 (Key Size Ranges Tested: KS Shelf Management > Main Card Redundancy (In the TCC Protection switch mode field, select Cold Switch Over) 10 Change the default CO password • 3.4 Changing Your Password Once the final step is performed the module will prompt the CO to reboot. Upon successful reboot the module will enter the approved mode of operation. Once the module has been configured, the FIPS mode status can be verified: • 6 Viewing the Security Parameters 3.3 Management Protocols such as RADIUS, netconf, HTTP, SNMPv1, and SNMPv2 are not approved for use and shall remain disabled. When in FIPS 140-2 compliance mode, only the following algorithms are used for SSH and TLS communications. FIPS 140-2 Security Policy Phn-4339-002v000 12 | P a g e 3.3.1 SSH Usage When in FIPS mode, the module supports only the following symmetric encryption algorithm: • AES_256_CBC The following Message Authentication Code (MAC) algorithm is supported in FIPS mode: • hmac-sha1 The following key exchange algorithms are supported in FIPS mode: • diffie-hellman-group-exchange-sha256 • diffie-hellman-group-exchange-sha1 • diffie-hellman-group14-sha1 Only the password-based authentication mode is supported. 3.3.2 TLS Usage When in FIPS 140-2 compliance mode, only the following ciphersuites are available for TLSv1.2 communications: • ECDHE-RSA-AES256-GCM-SHA384 • ECDHE-RSA-AES256-SHA384 • DHE-RSA-AES256-GCM-SHA384 • AES256-GCM-SHA384 • DHE-RSA-AES256-SHA256 • AES256-SHA256 • ECDHE-RSA-AES128-GCM-SHA256 • ECDHE-RSA-AES128-SHA256 • DHE-RSA-AES128-SHA256 • DHE-RSA-AES128-GCM-SHA256 • AES128-GCM-SHA256 • AES128-SHA256 3.4 Additional Information For additional information regarding FIPS 140-2 compliance, see the relevant User Manuals. FIPS 140-2 Security Policy Phn-4339-002v000 13 | P a g e 4. Appendix A: Acronyms This section describes the acronyms used throughout the document. Table 16 - Acronyms Acronym Definition TEL Tamper Evidence Labels CO Crypto Officer CRNGT Continuous Random Number Generator Test CSEC Communications Security Establishment Canada CVL Component Validation List FIPS Federal Information Processing Standard KDF Key Derivation Function NIST National Institute of Standards and Technology POST Power-On Self-Test PWCT Pairwise Consistency Test