Huawei S12700 Series Switches FIPS 140-2 Non-Proprietary Security Policy Issue 1.2 Date 2017-05-12 HUAWEI TECHNOLOGIES CO., LTD. Issue 1.2 (2017-05-12) Copyright © Huawei Technologies Co., Ltd. i Copyright © Huawei Technologies Co., Ltd. 2017. This document may be reproduced only in its original entirety [without revision]. Trademarks and Permissions and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd. All other trademarks and trade names mentioned in this document are the property of their respective holders. Notice The purchased products, services and features are stipulated by the contract made between Huawei and the customer. All or part of the products, services and features described in this document may not be within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information, and recommendations in this document are provided "AS IS" without warranties, guarantees or representations of any kind, either express or implied. The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but all statements, information, and recommendations in this document do not constitute a warranty of any kind, express or implied. Huawei Technologies Co., Ltd. Address: Huawei Industrial Base Bantian, Longgang Shenzhen 518129 People's Republic of China Website: http://e.huawei.com Huawei S12700 Series Switches FIPS 140-2 Non-Proprietary Security Policy Issue 1.2 (2017-05-12) Copyright © Huawei Technologies Co., Ltd. ii Contents 1 References and Definitions ....................................................................................................1 2 Introduction ...............................................................................................................................3 2.1 Security Levels................................................................................................................................................ 6 2.2 Modes of Operation ........................................................................................................................................ 6 3 Ports and Interfaces ..................................................................................................................7 4 Cryptographic Functionality.................................................................................................15 4.1 Critical Security Parameters and Public Keys.............................................................................................. 19 5 Roles, Authentication and Services.....................................................................................20 5.1 Assumption of Roles..................................................................................................................................... 20 5.2 Authentication Methods................................................................................................................................ 20 5.3 Services ......................................................................................................................................................... 21 6 Self-tests....................................................................................................................................24 7 Physical Security Policy.........................................................................................................26 7.1 Tamper Seal Placement................................................................................................................................. 26 7.1.1 S12704............................................................................................................................................ 26 7.1.2 S12708............................................................................................................................................ 28 7.1.3 S12712............................................................................................................................................ 29 8 Operational Environment .....................................................................................................32 9 Mitigation of Other Attacks Policy .....................................................................................33 10 Security Rules and Guidance ...............................................................................................34 Huawei S12700 Series Switches FIPS 140-2 Non-Proprietary Security Policy Issue 1.2 (2017-05-12) Copyright © Huawei Technologies Co., Ltd. 1 1 References and Definitions Table 1-1: References Ref Full Specification Name ESP Kent, S., “IP Encapsulating Security Payload (ESP)”, RFC 4303, Internet Engineering Task Force, December 2005. ESP-B Law, L. and J. Solinas, “Suite B Cryptography Suites for IPsec”, RFC 6379, Internet Engineering Task Force, October 2011. LDAP Semersheim, J., Ed., “Lightweight Directory Access Protocol (LDAP): The Protocol”, RFC 4511, Internet Engineering Task Force, June 2006. RADIUS Rigney, C., Rubens, A., Simpson, W. and S. Willens, “Remote Authentication Dial In User Service (RADIUS), RFC 2865, Internet Engineering Task Force, June 2000. SSH Ylonen, T. and C. Lonvick, “The Secure Shell (SSH) Connection Protocol”, RFC 4254, Internet Engineering Task Force, January 2006. SSH-B K. Igoe, “Suite B Cryptography in Suites for Secure Shell (SSH)”, Internet Engineering Task Force, May 2011. TLS Dierks, T., and E. Rescoria, “The Transport Layer Security (TLS) Protocol Version 1.2”. RFC 5246, Internet Engineering Task Force, August 2008. TLS-B Salter, M and R. Housely, “Suite B Profile for Transport Layer Security (TLS)”, Internet Engineering Task Force, January 2012. Table 1-2: Acronyms and Definitions (for terms not defined in FIPS 140-2 and associated documents) Term Definition AAA Authentication, Authorization and Accounting - access control, policy enforcement and auditing framework for computing systems, e.g. LDAP BCM Broadcom ESP Encapsulated Security Payload (a subset of IPsec, Internet Protocol Security) eSAP Enterprise Service Application Platform GUI Graphical User Interface HFCL Huawei FIPS Cryptographic Library IETF Internet Engineering Task Force, a standards body IPC Inter-process Communication IPOS IP Operating System L2MC Layer 2 MultiCast LDAP Lightweight Directory Access Protocol LPU Line Processing Unit MPU Main Processing Unit Huawei S12700 Series Switches FIPS 140-2 Non-Proprietary Security Policy Issue 1.2 (2017-05-12) Copyright © Huawei Technologies Co., Ltd. 2 Term Definition MVL Marvel RFC Request For Comment; the prefix used by IETF for internet specifications. SFU Switched Fabric Unit SSH Secure Shell VPN Virtual Private Network VRP Versatile Routing Platform TLS Transport Layer Security TSM Terminal Security Management UDP User Datagram Protocol Huawei S12700 Series Switches FIPS 140-2 Non-Proprietary Security Policy Issue 1.2 (2017-05-12) Copyright © Huawei Technologies Co., Ltd. 3 2 Introduction The Huawei SWITCH are multi-chip standalone cryptographic modules enclosed in hard, commercial grade metal cases. The cryptographic boundary for these modules is the enclosure. The primary purpose of these modules is to provide secure communication for data transmitted between different networks. The modules provide network interfaces for data input and output. The appliance encryption technology uses FIPS approved algorithms. FIPS approved algorithms are approved by the U.S. government for protecting Unclassified data. The module is designated as a limited operational environment under the FIPS 140-2 definitions. The module includes a firmware load service to support necessary updates. New firmware versions within the scope of this validation must be validated through the FIPS 140- 2 CMVP. Any other firmware loaded into this module is out of the scope of this validation and require a separate FIPS 140-2 validation. Table 2-1: Cryptographic Module Configurations Module (Base Model)* HW P/Ns and Versions FW Version S12704 Base Model P/N: 02114480 Version E.3 MPU P/N: 03030RPE SFU P/N: 03030RPF LPU P/N: 03030SGN Tamper Seals P/N: 4057-113016 V200R010C00SPC900B900 S12708 Base Model P/N: 02114178 Version Q.3 MPU P/N: 03030RPE SFU P/N: 03030RPF LPU P/N: 03030SGN Tamper Seals P/N: 4057-113016 V200R010C00SPC900B900 S12712 Base Model P/N: 02114180 Version P.3 MPU P/N: 03030RPE SFU P/N: 03030RPF LPU P/N: 03030SGN Tamper Seals P/N: 4057-113016 V200R010C00SPC900B900 * Note that the FIPS validated configuration is the base model with the following interface cards installed:  Qty. 2 Main Processing Unit (MPU) interface cards  Qty. 1 Switched Fabric Unit (SFU) interface card  Qty. 1 Line Processing Unit (LPU) interface card Unpopulated card slots are covered by faceplates. Each interface card and faceplate is protected with tamper-evident seals (refer to Section 7.1). Figure 2-1: – Figure 2-6: show the cryptographic boundary of the module. Huawei S12700 Series Switches FIPS 140-2 Non-Proprietary Security Policy Issue 1.2 (2017-05-12) Copyright © Huawei Technologies Co., Ltd. 4 Figure 2-1: S12704 (Top, Right, Front) Figure 2-2: S12704 (Bottom, Left, Back) Figure 2-3: S12708 (Top, Left, Front) Figure 2-4: S12708 (Bottom, Left, Back) Huawei S12700 Series Switches FIPS 140-2 Non-Proprietary Security Policy Issue 1.2 (2017-05-12) Copyright © Huawei Technologies Co., Ltd. 5 Figure 2-5: S12712 (Top, Left, Front) Figure 2-6: S12712 (Top, Right, Back) Figure 2-7: Firmware Block Diagram Huawei S12700 Series Switches FIPS 140-2 Non-Proprietary Security Policy Issue 1.2 (2017-05-12) Copyright © Huawei Technologies Co., Ltd. 6 2.1 Security Levels The FIPS 140-2 security levels for the module are as follows: Table 2-2: Security Level of Security Requirements Security Requirement Security Level Cryptographic Module Specification 2 Cryptographic Module Ports and Interfaces 2 Roles, Services, and Authentication 3 Finite State Model 2 Physical Security 2 Operational Environment N/A Cryptographic Key Management 2 EMI/EMC 2 Self-Tests 2 Design Assurance 3 Mitigation of Other Attacks N/A 2.2 Modes of Operation The module supports both an Approved and non-Approved mode of operation. By default, the module comes configured in the non-Approved mode. See Section 10, Security Rules and Guidance for instructions on how to configure the module to function in the Approved mode operation. Huawei S12700 Series Switches FIPS 140-2 Non-Proprietary Security Policy Issue 1.2 (2017-05-12) Copyright © Huawei Technologies Co., Ltd. 7 3 Ports and Interfaces The S12700 Series Switches provide a number of physical and logical interfaces, and the physical interfaces provided by the module are mapped to the four FIPS 140-2 defined logical interfaces: data input, data output, control input, and status output. The logical interfaces and their mapping are described in Table 3-1. Figure 3-1: S12704 Ports – Front Panel Huawei S12700 Series Switches FIPS 140-2 Non-Proprietary Security Policy Issue 1.2 (2017-05-12) Copyright © Huawei Technologies Co., Ltd. 8 Figure 3-2: S12704 Ports – Back Panel Huawei S12700 Series Switches FIPS 140-2 Non-Proprietary Security Policy Issue 1.2 (2017-05-12) Copyright © Huawei Technologies Co., Ltd. 9 Figure 3-3: S12708 Ports – Front Panel Huawei S12700 Series Switches FIPS 140-2 Non-Proprietary Security Policy Issue 1.2 (2017-05-12) Copyright © Huawei Technologies Co., Ltd. 10 Figure 3-4: S12708 Ports – Back Panel Huawei S12700 Series Switches FIPS 140-2 Non-Proprietary Security Policy Issue 1.2 (2017-05-12) Copyright © Huawei Technologies Co., Ltd. 11 Figure 3-5: S12712 Ports – Front Panel Huawei S12700 Series Switches FIPS 140-2 Non-Proprietary Security Policy Issue 1.2 (2017-05-12) Copyright © Huawei Technologies Co., Ltd. 12 Figure 3-6: S12712 Ports – Back Panel Huawei S12700 Series Switches FIPS 140-2 Non-Proprietary Security Policy Issue 1.2 (2017-05-12) Copyright © Huawei Technologies Co., Ltd. 13 Table 3-1: Module Ports and Interfaces Qty. S12704 Qty. S12708 Qty: S12712 Port Description Logical Interface Type 2 2 2 MPU Card Slot Main Processing Unit connection Control in, data in, data out, status out. See Table 3-2. 4 8 12 LPU Card Slots1 Network traffic Control in, data in, data out, status out. See Table 3-3. 2 4 4 SFU Card Slot2 Network traffic Control in, data in, data out, status out. See Table 3-4. 8 8 8 Power Module Slot Power Power 2 2 2 Monitor Card Slot Device Status Status Out 2 4 5 Fan Module Fan slot N/A The FIPS validated configuration for each model includes two Main Processing Units (MPUs) with the following ports and interfaces: Figure 3-5: MPU Card Ports Table 3-2: MPU Card Ports and Interfaces Mapping Port Description Logical Interface Type 1. USB USB interface Control in, data in, data out, status out 2. CLK1 & CLK2 Two GE ports (Reserved) NA 3. GE Port Two GE Ports (Reserved) NA 4. Console & Mini USB Console Serial console via RJ45 & miniUSB Control in, data in, data out, status out 5. ETH management port Management Ethernet interface Control in, data in, data out, status out LEDs ACT, Run/ALM, CSS ID and Master LEDs Status out RST Button Reset the card Control in 1 In the FIPS configuration, 1 LPU card is installed and the rest of the slots are covered with a faceplate. 2 In the FIPS configuration, 1 SFU card is installed and the rest of the slots are covered with a faceplate. Huawei S12700 Series Switches FIPS 140-2 Non-Proprietary Security Policy Issue 1.2 (2017-05-12) Copyright © Huawei Technologies Co., Ltd. 14 The FIPS validated configuration for each model includes one Line Processing Unit (LPU) with the following ports and interfaces: Figure 3-6: LPU Card Ports Table 3-3: LPU Card Ports and Interfaces Mapping Port Description Logical Interface Type Service ports (48) Copper or fiber ports, GE/XGE/40GE/100GE Control in, data in, data out, status out LEDs LINK/ACT, RUN/ALM LEDs Status out The FIPS validated configuration for each model includes one Switched Fabric Unit (SFU) with the following ports and interfaces: Figure 3-7: SFU Card Ports Table 3-4: SFU Card Ports and Interfaces Mapping Port Description Logical Interface Type BASE-X ports (8) 10G BASE-SFP+ optical ports Control in, data in, data out, status out LEDs LINK/ALM, RUN/ALM, Master and CSS LEDs Status out Huawei S12700 Series Switches FIPS 140-2 Non-Proprietary Security Policy Issue 1.2 (2017-05-12) Copyright © Huawei Technologies Co., Ltd. 15 4 Cryptographic Functionality The cryptographic protocols and primitives implemented and used by the modules are listed in this section. Table 4-1 and Table 4-2 list the TLS ciphersuites available in the Approved and non-Approved modes, respectively. Table 4-3 lists the SSH security methods; unlike TLS ciphersuites, SSH methods are independently selectable and may be used in any combination. The module supports both an Approved and a non-Approved mode of operation. By default, the module comes configured in the non-Approved mode. In the Approved mode, only the services listed in Tables 5-2 and 5-3 are available; further, the SSHv2 service is constrained to use only the Approved SSH options listed in Table 4-3. In the non-approved mode, all services in Tables 5-2, 5-3 and 5-4 are available for use, and all SSH options from Table 4-3 are available. The module supports https using TLS ciphersuites below in the Approved mode, supporting TLS to redirect all http connections to https (with TLS) and FTP to FTPS (with TLS) and to assure that a user cannot accidently downgrade browser security. Table 4-1: TLS Ciphersuites used in the Approved mode Cipher Suite String (OpenSSL enumeration) TLS KX AU Cipher Digest TLS_RSA_WITH_AES_256_SHA 1.1, 1.2 RSA RSA AES-256 SHA-1, SHA-2 TLS_RSA_WITH_AES_128_SHA 1.1, 1.2 RSA RSA AES-128 SHA-1, SHA-2 TLS_DHE_RSA_WITH_AES_256_SHA 1.1, 1.2 DH RSA AES-256 SHA-1, SHA-2 TLS_DHE_DSS_WITH_AES_256_SHA 1.1, 1.2 DH DSA AES-256 SHA-1, SHA-2 TLS_DHE_RSA_WITH_AES_128_SHA 1.1, 1.2 DH RSA AES-128 SHA-1, SHA-2 TLS_DHE_DSS_WITH_AES_128_SHA 1.1, 1.2 DH DSA AES-128 SHA-1, SHA-2 TLS_RSA_AES_256_CBC_SHA256 1.2 RSA RSA AES-256 SHA-2 Table 4-2: TLS Ciphersuites used in the Non-Approved mode Cipher Suite String (OpenSSL enumeration) TLS KX AU Cipher Digest TLS_RSA_WITH_DES_CBC_SHA 1.0, 1.1, 1.2 RSA RSA DES SHA-1 TLS_RSA_WITH_RC4_128_MD5 1.2 RSA RSA RC4 MD5 TLS_RSA_WITH_RC4_128_SHA 1.2 RSA RSA RC4 SHA-1 TLS_RSA_WITH_NULL_MD5 1.0 RSA RSA NULL MD5 TLS_RSA_WITH_NULL_SHA 1.0 RSA RSA NULL SHA-1 TLS_DHE_RSA_WITH_DES_CBC_ SHA 1.2 DH RSA DES SHA-1 Huawei S12700 Series Switches FIPS 140-2 Non-Proprietary Security Policy Issue 1.2 (2017-05-12) Copyright © Huawei Technologies Co., Ltd. 16 Cipher Suite String (OpenSSL enumeration) TLS KX AU Cipher Digest TLS_DHE_DSS_WITH_3DES_EDE_ CBC_SHA 1.2 DH (2048) DSA Triple-DES SHA-1 TLS_DHE_DSS_WITH_AES_128_CBC_ SHA256 1.2 DH (2048) DSA AES-128 SHA-256 TLS_DHE_DSS_WITH_AES_128_CBC_ SHA 1.0, 1.1, 1.2 DH (2048) DSA AES-256 SHA-1 TLS_DHE_DSS_WITH_AES_256_CBC_ SHA256 1.2 DH DSA AES-256 SHA-256 TLS_DHE_DSS_WITH_AES_256_CBC_ SHA 1.0, 1.1, 1.2 DH DSA AES-256 SHA-1 TLS_DHE_DSS_WITH_AES_128_CBC_ SHA256 1.2 DH DSA AES-128 SHA-256 TLS1_CK_RSA_RC4_128_SHA 1.1,1.2 RSA RSA AES-256 SHA-1 The module uses SSHv2 over a shell interface via the console serial port to perform module configuration and administration. Table 4-3: SSH Security Methods Available in Each Mode SSH Security Methods Approved Mode Non-Approved Mode Key Exchange diffie-hellman-group14-sha1 X X diffie-hellman-group-exchange-sha1 X X Server Host Key (Authentication) ssh-dss X X ssh-rsa X X ssh-ecdsa X X Digest hmac-md5-96 X hmac-md5-128 X hmac-sha1 X X hmac-sha1-96 X X hmac-sha2-96 X X Hmac-sha256 X X Cipher des-cbc X aes128-ctr X aes-256-ctr X aes-128-cbc X aes-256-cbc X X 3des-cbc X X In the non-Approved mode, the module supports SSH v1.5 with the same set of algorithms listed above. Huawei S12700 Series Switches FIPS 140-2 Non-Proprietary Security Policy Issue 1.2 (2017-05-12) Copyright © Huawei Technologies Co., Ltd. 17 Table 4-4, Table 4-5 and Table 4-6 list all Approved, Allowed and non-Approved algorithms used by the library, respectively. Table 4-4: Approved Algorithms CAVP Cert. # Algorithm Standard Mode/Method Strength3 Use Library: HFCL 4400 AES FIPS 197, SP 800-38A CBC 128 or 256 Data Encryption/ Decryption 4400 2924 AES HMAC SP 800-38F Key Wrap 128 or 256 Key Establishment 2372 2924 Triple-DES HMAC SP 800-38F Key Wrap 112 Key Establishment 1107 (CVL) TLS4 KDF SP 800-135 1.0/1.1 (SHA-1) 1.2 (SHA-256) KDF used to derive TLS session keys SSH2 KDF SP 800-135 SHA-1, SHA-256, SHA-384, SHA-512 KDF used to derive SSH v2 session keys 1418 DRBG5 SP 800- 90A Hash_DRBG 256 Deterministic Random Bit Generation 1175 DSA FIPS 186-4 Mod 2048 Mod 2048 (SHA-1; for protocol use only) Mod 2048 (SHA-1/256) Key generation Signature Generation Signature Verification 1057 ECDSA FIPS 186-4 P-256, P-384, P-521 P-256, P-384, P-521 (SHA-2) P-256, P-384, P-521 (SHA-2) Key generation Signature Generation Signature Verification 2924 HMAC FIPS 198-1 HMAC-SHA-1 HMAC-SHA-256 128 256 Message Authentication 2380 RSA FIPS 186-4 Mod 2048 Mod 2048 (SHA-1/256; SHA-1 for protocol use only) Mod 2048 (SHA-1/256) Key generation Signature Generation Signature Verification 3627 SHS FIPS 180-4 SHA-1 SHA-2: SHA-256/384/512 Message Digest Generation 2372 Triple-DES SP 800-67 TCBC 3-Key Data Encryption/ Decryption 3 Strength indicates DRBG Strength, Key Lengths, Curves or Moduli 4 The TLS, and SSH protocols have not been reviewed or tested by the CAVP and CMVP 5 No prediction resistance; block_cipher_df used for instantiation. Huawei S12700 Series Switches FIPS 140-2 Non-Proprietary Security Policy Issue 1.2 (2017-05-12) Copyright © Huawei Technologies Co., Ltd. 18 Table 4-5: Allowed Algorithms Algorithm (Establishment) Strength Use Diffie-Hellman Key Agreement DH Group 14 (2048-bit modulus) (key establishment methodology provides 112 bits of encryption strength). Key establishment. HMAC-SHA-1-96 Based on HMAC Cert. #2924 Message authentication in SSH HMAC-SHA-256-128 Based on HMAC Cert. #2924 Message authentication in SSH MD5 No strength claimed. TLS 1.0/1.1 password hash. NDRNG Internal entropy source with rationale to support the claimed DRBG security strength. DRBG (Cert. #1418) entropy input. RSA Key Wrapping 2048-bit modulus (key establishment methodology provides 112 bits of encryption strength). Key establishment. Table 4-6: Non-Approved Algorithms (Used only in the non-Approved Mode) Algorithm Use AES-XCBC-MAC Data encryption/decryption AES CTR (non-compliant) Data encryption/decryption DES Data Encryption/Decryption Diffie-Hellman DH Group 1 (768-bit modulus): Key exchange within SSH HMAC-MD5 Message Digest Generation MD5 Message Digest Generation RC4 TLS encryption RSA (non-compliant) 512 or 1024 bit key sizes for signature generation Triple-DES (non-compliant) 2-key for data encryption/decryption. SNMP KDF (non-compliant) KDF used to derive SNMP keys.6 6 Keys derived from the SNMP protocol cannot be used in the Approved mode. Huawei S12700 Series Switches FIPS 140-2 Non-Proprietary Security Policy Issue 1.2 (2017-05-12) Copyright © Huawei Technologies Co., Ltd. 19 4.1 Critical Security Parameters and Public Keys All CSPs used by the module are described in this section. Table 4-7: Critical Security Parameters (CSPs) Name Description and usage AUTH-PW Authentication Passwords, minimum of 8 characters DRBG-EI Entropy input (1024 bytes) to the hash_df used to instantiate the Approved Hash_DRBG. DRBG-STATE SP 800-90A Hash_DRBG V and C values (SHA-256, 440-bit V, per IG 14.5). SSH-DH SSH Diffie-Hellman private component (2048-bit). Ephemeral DH private key used in SSH. SSH-Priv SSH private key. RSA (2048), DSA (2048), or ECDSA private key used to establish SSH sessions. SSH-SENC SSH Session Encryption Key. AES-128, AES-256 or 3-Key Triple-DES key for SSH message encrypt/decrypt. SSH-SMAC SSH Session Authentication Key. HMAC-SHA 160-bit session key for SSH message authentication. TLS-Host-Priv TLS private key. RSA (2048) or DSA (2048) private key used to establish TLS sessions. TLS-DH-Priv TLS Diffie-Hellman private component (2048-bit). Ephemeral DH private key used in TLS. TLS-PMS TLS pre-master secret (size dependent on the key exchange method) used to derive TLS-SENC and TLS-SMAC. TLS-SENC TLS Session Encryption Keys. AES-128, AES-256 or 3-Key Triple-DES key for TLS message encrypt/decrypt. TLS-SMAC TLS Session Authentication Keys. HMAC-SHA-1 (160-bit) or HMAC- SHA-256 (256-bit) session key for TLS message authentication. Table 4-8: Public Keys Name Description and usage SSH-Peer-Pub SSH public key. RSA (2048) or DSA (2048) public key used for SSH client authentication. SSH-Pub SSH public key. RSA (2048) or DSA (2048) public key used for SSH session establishment. SSH-DH-Pub SSH Diffie-Hellman public component (2048 bit). Ephemeral DH public key used in SSH. TLS-Host-Pub TLS public key. RSA (2048) or DSA (2048) public key used for TLS session establishment. TLS-DH-Pub TLS Diffie-Hellman public component (2048 bit). Ephemeral DH public key used in TLS. FW-Update-Pub RSA (2048) public key used to verify firmware updates. Huawei S12700 Series Switches FIPS 140-2 Non-Proprietary Security Policy Issue 1.2 (2017-05-12) Copyright © Huawei Technologies Co., Ltd. 20 5 Roles, Authentication and Services 5.1 Assumption of Roles The module does not support a maintenance role or bypass capability. The module supports concurrent use by End Users and Administrators. The cryptographic module enforces the separation of roles by the partitioning of major subsystems (such as end user traffic vs. shell or administrative functions), and by partitioning of the administrative interfaces (e.g. by organization of the web GUI pages). Authentication status does not persist across module power cycles. To change roles, an operator must first log out, then log in using another role. Table 5-1 lists the available roles; the options for authentication type and data are common across roles. Table 5-1: Roles Description Role Authentication ID Description Type Data Management User (CO) Cryptographic Officer – Has full access to administer and configure the module as well as delegate admin access control rights to Administrators. Identity-based (using Local password verification or digital signature verification) Username and Password or X.509 certificate Monitoring User (MU) Accesses audit logs for diagnostic information End User (EU) Typical end user switch network traffic. 5.2 Authentication Methods The Local password verification method requires an 8 character minimum password using characters from at least two categories of printable character sets (upper case, lower case, special character, and numbers). Since there are 28 possible special characters, 10 number characters and 26 upper or lower case characters, the weakest password that meets the policy but whose components are still chosen randomly would be 7 digits and one upper or lower case character. This results in an upper bound probability of (10^7) x 26. So, the probability of guessing the password with a single attempt is 1/(2.6x10^8), which is less than one in 1,000,000. For SSH connections, after n consecutive unsuccessful authentication attempts, the module will lockout additional authentication requests for a minimum of 5 minutes. The default value for n is 3, but per the security rules must be less than 2600. The probability of false authentication in a one minute period is 2599/(2.6x10^8) = 1/100038. Huawei S12700 Series Switches FIPS 140-2 Non-Proprietary Security Policy Issue 1.2 (2017-05-12) Copyright © Huawei Technologies Co., Ltd. 21 For console access, after 1 unsuccessful attempt, the module requires a waiting period of 5 seconds before accepting another authentication attempt. Thus, only 12 authentication attempts are possible over the console in a one minute period. The probability of a false authentication in a one minute period is 12/(2.6x10^8), which is less than 1 in 100,000. The digital signature verification method, used for SSH client-side authentication, is based on the verification of a 2048-bit RSA or DSA digital signature, which has a minimum equivalent computational resistance to attack of 2112 . The probability of a successful random attempt is 1/ (2112 ), which is less than 1/1,000,000. Processing speed limits the number of failed authentication attempts in a one-minute period to 120 attempts. The probability of a success with multiple consecutive attempts in a one-minute period is 120/(2112 ), which is less than 1/100,000. 5.3 Services All services implemented by the module are summarized next, with additional detail in Table 5-5 provided for traceability of cryptographic functionality and access to CSPs and public keys by services. Table 5-2: Authenticated Module Services Service Description CO MU EU Module Reset Reboot the module via reset CLI command or WebGUI. This service executes the suite of self- tests required by FIPS 140-2. X X Reset to Factory Resets to factory defaults by deleting the module’s configuration file and rebooting the system. X X Configure System (includes Firmware Update) Update module firmware, module configuration, file management, and logging configuration. X X Configure Network Network Interface configuration and management. X X Status Monitoring and Reporting Including Monitor and Dashboard GUI, provides module status (CPU usage, etc.) and logs. X X User Management and Authentication Creating users and setting access rights. X X7 SSHv2 Configure SSH v2 parameter, provide entry of CSPs. X HTTPS HTTP over TLS 1.1/1.2 X 7 Only Management Users with a user level set between 3 and 15 can manage other administrator accounts Huawei S12700 Series Switches FIPS 140-2 Non-Proprietary Security Policy Issue 1.2 (2017-05-12) Copyright © Huawei Technologies Co., Ltd. 22 Service Description CO MU EU Switched network traffic Provide service through L2TP, GRE and MPLS. X (Note: This is a condensed list of services for the purposes of this Security Policy. The full list of module commands can be found in the module’s User manual. The link to the User Manual is provided below in Section 10). Table 5-3: Unauthenticated Module Services Service Description Power-up Self-tests This service executes the suite of self-tests required by FIPS 140-2 by power cycling the module. Switched Network Traffic Management DHCP, DNS, traffic routing, NTP, NAT network traffic. Show Status This service provides the current status of the cryptographic module via LEDs and other unauthenticated status outputs. Table 5-4: Services only available in Non-FIPS mode Service Description Remote AAA Connection to remote AAA server (RADIUS, TACACS) SNMP v1/v2/v3 Configuration, administration and monitoring FTP File upload and download TFTP File upload and download SSHv1.5 Config and Manage device over SSH HTTP Config and Manage device through WebGUI Telnet Using telnet to remotely manage and maintain several devices without the need to connect each device to a terminal, data is transmitted using TCP in plaintext. Table 5-5 defines the relationship between access to CSPs and the different module services. The modes of access shown in the table are defined as: G = Generate: The module generates the CSP. R = Read: The module reads the CSP. The read access is typically performed before the module uses the CSP. E = Execute: The module executes using the CSP. W = Write: The module writes the CSP. The write access is typically performed after a CSP is imported into the module, when the module generates a CSP, or when the module overwrites an existing CSP. Z = Zeroize: The module zeroizes the CSP. Huawei S12700 Series Switches FIPS 140-2 Non-Proprietary Security Policy Issue 1.2 (2017-05-12) Copyright © Huawei Technologies Co., Ltd. 23 Table 5-5: CSP/Public Key Access Rights within Services Services AUTH-PW DRBG-EI DRBG-STATE SSH-DH SSH-Priv SSH-SENC SSH-SMAC TLS-Host-Priv TLS-DH-Priv TLS-PMS TLS-SENC TLS-SMAC SSH-Peer-Pub SSH-Pub SSH-DH-Pub TLS-Host-Pub TLS-DH-Pub FW-Update-Pub Unauthenticated Power-up Self-tests -- GE G -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- Switched Network Traffic Management -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- Show Status -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- Management User (CO) Module Reset -- GE G -- -- Z Z -- -- Z Z Z -- -- -- -- -- -- Reset to Factory Z GE Z GZ Z Z Z Z Z Z Z Z Z Z Z Z Z Z -- Configure System E -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- Configure Network -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- Status Monitoring and Reporting -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- User Management and Authentication R W Z -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- SSHv2 -- G RE G RE G RE W G RE W G RE W G RE W -- -- -- -- -- RE G RE G RE W Z -- -- -- HTTPS -- G RE G RE -- -- -- -- RE W RE W RE W RE W RE W -- -- -- RE RE RE W Monitoring User (MU) Module Reset -- GE G -- -- Z Z -- -- Z Z Z -- -- -- -- -- -- Reset to Factory Z GE Z GZ Z Z Z Z Z Z Z Z Z Z Z Z Z Z -- Configure System E -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- Configure Network -- -- -- -- -- -- -- -- -- -- -- -- -- -- Status Monitoring and Reporting -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- User Management and Authentication R W Z -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- End User (EU) Switched Network Traffic E -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- The Module Reset service instantiates the DRBG, with 1024 bytes entropy input (DRBG-EI) produced by the Allowed NDRNG. The generation of DRBG-State uses the [SP 800-90A] Hash_df with 513 bits of entropy input. Internally generated symmetric keys are the result of unmodified output from the DRBG. The zeroization of session keys by this service covers the case of module shutdown or power-cycle while a secure channels session (SSH, TLS) is active. The Show Status service does not access CSPs or public keys. Huawei S12700 Series Switches FIPS 140-2 Non-Proprietary Security Policy Issue 1.2 (2017-05-12) Copyright © Huawei Technologies Co., Ltd. 24 6 Self-tests Each time the module is powered up it tests that the cryptographic algorithms still operate correctly and that sensitive data have not been damaged. Power up self–tests are available on demand by power cycling the module. On power up or reset, the module performs the self tests described in below. All KATs must be completed successfully prior to any other use of cryptography by the module. Once called, the initialization function does not allow any user intervention. All data output via the data output interface is inhibited when an error state exists and during self-tests. Upon successful completion of the self-tests the modules SYS LED will go from Red to Green. If a failure of a self-test occurs, the module enters an error state, outputs the following error message on the console and forces the module to reboot: “Self-Test Fail…” Table 6-1: Power Up Self-tests Test Target (Cert. #) Description Firmware Integrity 32 bit CRC performed over all code AES (#4400) Separate encrypt, decrypt KATs using 128 and 256 bit keys and CBC. Diffie Hellman Shared secret calculation KAT DRBG (#1418) SHA-256 Hash DRBG test. Performed conditionally (where initial use at power-up is the condition) per SP 800-90 Section 11. DSA (#1175) Pairwise consistency test of n=2048 bit signature generation and signature verification. ECDSA (#1057) Pairwise consistency test of P-256 signature generation and signature verification. HMAC (#2924) Separate HMAC generation and verification KATs, using SHA-1, SHA-256 RSA (#2380) Separate KATs of n=2048 bit signature generation and signature verification. SHS (#3627) Separate KAT of SHA-1, SHA-256, SHA-384, SHA-512 Triple-DES (#2372) Separate encrypt, decrypt KATs using 3-key TCBC. Table 6-2: Conditional Self-tests Test Target Description NDRNG AS09.42 Continuous RNG Test performed on each NDRNG access. DRBG AS09.42 Continuous RNG Test performed on each DRBG access. ECDSA Pairwise Consistency Test performed on each ECDSA key pair generation DSA Pairwise Consistency Test performed on each DSA key pair generation Huawei S12700 Series Switches FIPS 140-2 Non-Proprietary Security Policy Issue 1.2 (2017-05-12) Copyright © Huawei Technologies Co., Ltd. 25 Test Target Description RSA Pairwise Consistency Test performed on each RSA key pair generation. Firmware Load RSA 2048 and SHA-256 signature verification performed by the firmware load service. Huawei S12700 Series Switches FIPS 140-2 Non-Proprietary Security Policy Issue 1.2 (2017-05-12) Copyright © Huawei Technologies Co., Ltd. 26 7 Physical Security Policy The cryptographic modules each include the following physical security mechanisms:  Production-grade components and production-grade opaque enclosure  Tamper-evident material and seals An operator in the CO role is responsible for the following:  Applying the tamper seals per Section 7.1 below. The tamper evident seals shall be installed for the module to operate in a FIPS Approved mode of operation. The CO is responsible for having control at all times of any unused seals.  Inspecting the tamper seals based on the schedule described in Table 7-1 below. Table 7-1: Physical Security Inspection Guidelines Mechanism Recommended Frequency of Inspection/Test Tamper-evident Seals Inspect tamper-evident seals monthly. If evidence of tamper exists, the CO should zeroize the module immediately and reapply tamper-evident seals. 7.1 Tamper Seal Placement 7.1.1 S12704 The module includes twenty-seven (27) tamper-evident seals, which are applied to the module as follows:  Sixteen (16) seals applied to the front frame and each card or card plate, preventing removal of individual components and cover plates(see #1 to #16 in Figure 7-1)  Two (2) seals applied to the center network card (see #17 and #18 in Figure 7-1)  Four (4) seals applied to the back and fan covers (see #19 to #22 in Figure 7-2)  Four (4) seals applied to the back, covering holes (see #23 to #26 in Figure 7-2)  One (1) seal applied to the back and ventilation air filter (see #27 in Figure 7-2) Huawei S12700 Series Switches FIPS 140-2 Non-Proprietary Security Policy Issue 1.2 (2017-05-12) Copyright © Huawei Technologies Co., Ltd. 27 Figure 7-1: Tamper Seal Locations - Front Figure 7-2: Tamper Seal Locations - Back Huawei S12700 Series Switches FIPS 140-2 Non-Proprietary Security Policy Issue 1.2 (2017-05-12) Copyright © Huawei Technologies Co., Ltd. 28 7.1.2 S12708 The module includes forty four (44) tamper-evident seals, which are applied to the module as follows:  Twenty-eight (28) seals applied to the front frame and each card or card plate, preventing removal of individual components and cover plates (see #1 to #28 in Figure 7-3)  Two (2) seal applied to the front center card, preventing removal (see #29 to #30 in Figure 7-3)  Eight (8) seals applied to the back and fan covers (see #31 to #38 in Figure 7-4)  Four (4) seals applied to the back, covering holes (see #39 to #42 in Figure 7-4)  Two (2) seals applied to the back and ventilation air filter (see #43 and #44 in Figure 7-4) Figure 7-3: Tamper Seal Locations - Front Huawei S12700 Series Switches FIPS 140-2 Non-Proprietary Security Policy Issue 1.2 (2017-05-12) Copyright © Huawei Technologies Co., Ltd. 29 Figure 7-4: Tamper Seal Locations - Back 7.1.3 S12712 The module includes fifty-one (51) tamper-evident seals, which are applied to the module as follows:  Thirty-six (36) seals applied to the front frame and each card or card plate, preventing removal of individual components and cover plates (see #1 to #36 in Figure 7-5)  Two (2) seals applied to the front center card, preventing removal (see #37 and #38 in Figure 7-5)  Ten (10) seals applied to the back and fan covers (see #39 to #48 in Figure 7-6)  Three (3) seals applied to the back and ventilation air filter (see #49 to #51 in Figure 7-6) Huawei S12700 Series Switches FIPS 140-2 Non-Proprietary Security Policy Issue 1.2 (2017-05-12) Copyright © Huawei Technologies Co., Ltd. 30 Figure 7-5: Tamper Seal Locations - Front Huawei S12700 Series Switches FIPS 140-2 Non-Proprietary Security Policy Issue 1.2 (2017-05-12) Copyright © Huawei Technologies Co., Ltd. 31 Figure 7-6: Tamper Seal Locations - Back Huawei S12700 Series Switches FIPS 140-2 Non-Proprietary Security Policy Issue 1.2 (2017-05-12) Copyright © Huawei Technologies Co., Ltd. 32 8 Operational Environment The module is designated as a limited operational environment under the FIPS 140-2 definitions. Huawei S12700 Series Switches FIPS 140-2 Non-Proprietary Security Policy Issue 1.2 (2017-05-12) Copyright © Huawei Technologies Co., Ltd. 33 9 Mitigation of Other Attacks Policy The modules have not been designed to mitigate attacks outside the scope of FIPS 140-2. Huawei S12700 Series Switches FIPS 140-2 Non-Proprietary Security Policy Issue 1.2 (2017-05-12) Copyright © Huawei Technologies Co., Ltd. 34 10 Security Rules and Guidance The module design corresponds to the module security rules. The module implements and enforces the following security rules: 1. An unauthenticated operator does not have access to any CSPs or cryptographic services. 2. The module inhibits data output during power up self-tests and error states. 3. Status information does not contain CSPs or sensitive data that if misused could lead to a compromise of the module. 4. Zeroization overwrites all CSPs. 5. The module does not share CSPs between the Approved mode of operation and the non- Approved mode of operation. The following security rules must be adhered to for operation in the FIPS 140-2 Approved mode: 6. Upon first time initialization, the Root Administrator (CO) shall authenticate to the module using the default username and password: Username: admin Password: Admin@huawei 7. Set the workmode to FIPS: The following CLI command initiates the steps for placing the controller in FIPS approved mode of operations, and enabling all necessary algorithm restrictions. All necessary self-tests are carried out in both FIPS and non-FIPS modes. [quidway]set work-mode fips Warning: The work mode of device will change and system will restart. Continue? [Y/N]: y After completing the steps, saving the configuration and rebooting, the Controller stays in FIPS mode unless the FIPS mode is explicitly disabled. The non-approved cryptographic algorithms do not get used in FIPS mode unless they are explicitly configured. To view the current mode of operation, the following CLI command needs to be used: [quidway]display work-mode Work mode: FIPS Upon the reboot the CO shall update from the default username and password. The minimum password strength is enforced by the module per Section 3.2. The CO can then create Administrator and End User accounts and proceed with module configuration per the vendor provided user manual (available here: http://support.huawei.com/enterprise/en/switch/s12700-pid-20985028). A crypto officer can use the following CLI command to set user passwords: [quidway-aaa]local-user user-name password irreversible-cipher password [quidway-aaa]local-user user-name service-type https/ssh [quidway-aaa]local-user user-name privilege level 15 [quidway-aaa]local-aaa-user password policy administrator (optional) Note that this and all subsequent configuration steps may also be performed through HTTPS. However, only the CLI commands are included in this document. Huawei S12700 Series Switches FIPS 140-2 Non-Proprietary Security Policy Issue 1.2 (2017-05-12) Copyright © Huawei Technologies Co., Ltd. 35 8. Configure SSH using the following: [quidway]ssh user user-name [quidway] ssh user user-name authentication-type {password | rsa | password-rsa | all | dsa | password-dsa} [quidway] ssh user username service-type stelnet / sftp [quidway] rsa local-key-pair create, or dsa local-key-pair create. [quidway] ssh server key-exchange dh_group_exchange_sha1 9. Configure an HTTPS Certificate The following commands configure the web server to use the manufacturer-installed switch device certificate for the HTTPS server. It must be executed after enabling FIPS mode of operation: [quidway] ssl policy policy-name Load a PEM certificate or certificate chain. Run either of the following commands based on whether a user obtains a digital certificate or certificate chain from the CA. [quidway] certificate load pem-cert cert-filename key-pair { dsa | rsa } key-file key- filename auth-code cipher auth-code A PEM digital certificate is loaded and the private key file is specified. Or: [quidway] certificate load pem-chain cert-filename key-pair { dsa | rsa } key-file key- filename auth-code cipher auth-code A PEM certificate chain is loaded and the private key file is specified. [quidway] certificate load asn1-cert cert-filename key-pair { dsa | rsa } key-file key- filename An ASN1 digital certificate is loaded and the private key file is specified. [quidway] certificate load pfx-cert cert-filename key-pair { dsa | rsa } { mac cipher mac-code | key-file key-filename } auth-code cipher auth-code A PFX digital certificate is loaded and the private key file is specified. [quidway] http secure-server ssl-policy policy-name In non-FIPS mode, a self-signed certificate may be used for the HTTPS server. 10. The CO must not configure the failed authentication limit setting for more than 2599. 11. Save and Reboot After executing the above commands, you must save the configuration and reboot the system: save reboot An operator of the module can determine if the module is running the in Approved mode of operation by adhering to the above rules.