POSTAL SECURITY DEVICE NON-PROPRIETARY SECURITY POLICY Version 12.0 This document may be reproduced or transmitted only in its entirety without revision. PSD Security Policy Page 1/17 Contents Contents ............................................................................................................................................1 Figures...............................................................................................................................................1 1 INTRODUCTION ...........................................................................................................................2 2 CRYPTOGRAPHIC MODULE SPECIFICATION ...................................................................................2 3 SENSITIVE SECURITY PARAMETERS MANAGEMENT.......................................................................7 4 PORTS AND INTERFACES ............................................................................................................ 10 5 ROLES, SERVICES AND AUTHENTICATION.................................................................................... 11 6 OPERATIONAL ENVIRONMENT................................................................................................... 12 7 PHYSICAL SECURITY ................................................................................................................... 12 8 SELF-TESTS................................................................................................................................. 13 9 DESIGN ASSURANCE .................................................................................................................. 14 10 MITIGATION OF OTHER ATTACKS............................................................................................ 14 11 APPENDIX A - Glossary............................................................................................................ 15 12 APPENDIX B – List of Changes ................................................................................................. 15 Figures Figure 1 – Neopost Postal Security Device..................................................................................................................... 2 Figure 2 – PSD Configuration.......................................................................................................................................... 3 Figure 3 – PSD Firmware Version................................................................................................................................... 3 Figure 4 – FIPS 140-2 Security Level............................................................................................................................... 4 Figure 5 – FIPS Approved Algorithms Details and Use ................................................................................................... 6 Figure 6 – FIPS Allowed Security Functions.................................................................................................................... 6 Figure 7 – Non-Approved Security Functions................................................................................................................. 6 Figure 8 – Critical Security Parameters .......................................................................................................................... 8 Figure 9 – TLS v1.0 Handshake Protocol Critical Security Parameters (independent of country configuration)........... 8 Figure 10 – TLS v1.0 Record Protocol Critical Security Parameters (independent of country configuration) ............... 8 Figure 11 – Public Security Parameters.......................................................................................................................... 9 Figure 12 – Interface .................................................................................................................................................... 10 Figure 13 – Roles, Services, Operators......................................................................................................................... 11 PSD Security Policy Page 2/17 1 INTRODUCTION This document forms a Cryptographic Module Security Policy for Neopost Postal Security Device under the terms of the FIPS 140-2 validation. This document contains a statement of the security rules under which the PSD operates. 2 CRYPTOGRAPHIC MODULE SPECIFICATION 2.1 PSD Overview The Neopost Postal Security Device (PSD) is a cryptographic module embedded within the postal franking machines. The PSD performs all franking machine’s cryptographic and postal security functions and protect the Critical Security Parameters (CSPs) and Postal Relevant Data from unauthorized access. The PSD (Figure 1) is a multi-chip embedded cryptographic module enclosed within a hard, opaque, plastic enclosure encapsulating the epoxy potted module which is wrapped in a tamper detection envelope with a tamper response mechanism. This enclosure constitutes the cryptographic module’s physical boundary. The PSD was designed to securely operate when voltage supplied to the module is between +5V and +17V and the environmental temperature is between -30°C and 84°C. Figure 1 – Neopost Postal Security Device PSD Security Policy Page 3/17 2.2 PSD Configuration PSD (Cryptographic Module) Description Hardware P/N A0014227-B and A0014227-C Firmware Version a22.17.01, a22.17.02 a23.08.01, a23.08.03 a28.02.01, a28.02.04 a28.05, a28.08 NIST Approved Security Functions AES (Cert. #2565) Version A0018322A YES YES YES YES CMAC (Cert. #2566) Version A0018326A YES YES YES YES ECDSA1 (Cert. #441) Version A0018325A YES YES YES YES HMAC (Cert. #1583) Version A0018327A NO NO NO YES HMAC (Cert. # 1603) Version A0019557 YES YES YES NO CVL (Cert. #92) Version A0018320A YES YES YES YES RNG (Cert. #1217) Version A0018328A YES YES YES YES RSA2 (Cert. #1314) Version A0018321A YES YES YES YES SHS3 (Cert. #2162) Version A0018324A YES YES YES YES Figure 2 – PSD Configuration Country (Postal Authority)/Specification Firmware Version USPS/ IBI_Lite a23.08.01, a23.08.03 USPS/ IMI_2013 a28.02.01, a28.02.04 UK Royal Mail a22.17.01, a22.17.02 UK Royal Mail/EIB a28.05 TNT a23.08.03 CPC a22.17.02, a23.08.03 DPAG a22.17.02, a23.08.03 a28.08 Figure 3 – PSD Firmware Version 1 non-compliant for ECDSA SigGen P192 2 non-compliant for RSA key lengths less than 2048-bit (less than 112 bits of encryption strength) 3 SHA-1 is non-compliant when used for hashing (e.g. used with RSA or ECDSA SigGen function) PSD Security Policy Page 4/17 2.3 FIPS Security Level Compliance The PSD is designed to meet the overall requirements applicable for Level 3 of FIPS 140-2. Security Requirements Level Cryptographic Module Specification 3 Cryptographic Module Ports and Interfaces 3 Roles, Services and Authentication 3 Finite State Model 3 Physical Security 3 + EFP/EFT Operational Environment N/A Cryptographic Key Management 3 EMI/EMC 3 Self-Tests 3 Design Assurance 3 Mitigation of Other Attacks 3 Figure 4 – FIPS 140-2 Security Level 2.4 Security Industry Protocols The cryptographic module implements the TLS v1.04 protocol and uses only one cipher suite (TLS-DHE- RSA-WITH-AES-128-CBC-SHA). The TLS v1.0 protocol is composed of TLS Handshake protocol (used for mutual authentication and TLS pre-master secret establishment) and TLS Record protocol (used for application data confidentiality and integrity). 4 This protocol has not been reviewed or tested by the CAVP and CMVP PSD Security Policy Page 5/17 2.5 Modes of Operation Approved Mode of Operation The PSD cryptographic module has only one mode of operation that uses both FIPS and non-FIPS approved algorithms. The details and use of FIPS Approved algorithms are presented below: Algorithm Usage Characteristics Cert. # AES (CBC) Encryption/Decryption of:  CSPs for storage within the module  Data exchanged using the TLS Record protocol CBC (e/d; 128); 2565 SHS (SHA-1) Hashing algorithm used for:  Digital signature process: o RSA SigVer,  HMAC Generation SHA-1 (BYTE-only) 2162 SHS (SHA-256) Hashing algorithm used for:  Digital signature process: o ECDSA P224  HMAC Generation SHA-256 (BYTE-only) 2162 HMAC (SHA-1) TLS messages authentication (Key Sizes Ranges Tested: KS