* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download IAS Router Common Criteria Operator Guidance
Airborne Networking wikipedia , lookup
Extensible Authentication Protocol wikipedia , lookup
Computer network wikipedia , lookup
Network tap wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Wireless security wikipedia , lookup
Multiprotocol Label Switching wikipedia , lookup
Deep packet inspection wikipedia , lookup
Wake-on-LAN wikipedia , lookup
IAS Router Common Criteria Operator Guidance Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc. Table of Contents Table of Contents .......................................................................................................................................... 2 1 Guidance Overview ............................................................................................................................... 4 2 Introduction .......................................................................................................................................... 5 3 Getting Started...................................................................................................................................... 6 4 3.1 Identification ................................................................................................................................. 6 3.2 Environment.................................................................................................................................. 6 3.2.1 Technical Requirements ........................................................................................................ 6 3.2.2 Procedural Requirements ..................................................................................................... 7 Installation ............................................................................................................................................ 9 4.1 User Accounts ............................................................................................................................... 9 4.2 Firewall ........................................................................................................................................ 12 4.2.1 Firewall Introduction ........................................................................................................... 12 4.2.2 Rules .................................................................................................................................... 14 4.2.3 Global Rules ........................................................................................................................ 19 4.2.4 Zones ................................................................................................................................... 20 4.2.5 Forwarding Rules ................................................................................................................ 21 4.2.6 Port Forwarding (Redirects) ................................................................................................ 21 4.3 5 IPsec ............................................................................................................................................ 22 4.3.1 BYPASS and DROP SPD Policies ........................................................................................... 23 4.3.2 IPSec VPN: Implementing PROTECT SPD Policies................................................................ 23 4.3.3 Protecting Syslog Audit Traffic ............................................................................................ 27 4.4 TLS ............................................................................................................................................... 28 4.5 Cryptographic Operations ........................................................................................................... 28 4.5.1 Certificate Generation and Loading .................................................................................... 28 4.5.2 Certificate Validation .......................................................................................................... 31 Security Functions ............................................................................................................................... 33 5.1 Security Audit .............................................................................................................................. 33 5.2 Key Generation ........................................................................................................................... 33 5.3 Administration ............................................................................................................................ 34 5.3.1 Administration Authentication Rules .................................................................................. 34 5.3.2 Administration Access Control ............................................................................................ 34 Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc. 5.4 Time ............................................................................................................................................ 36 5.5 Firmware Updates....................................................................................................................... 37 5.6 Welcome Banner......................................................................................................................... 37 6 Troubleshooting .................................................................................................................................. 39 7 Appendix A: Audit Records ................................................................................................................. 40 8 Appendix B: Processes ........................................................................................................................ 46 8.1 Privileges ..................................................................................................................................... 46 Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc. 1 Guidance Overview The goal of this guidance document is to: 1. 2. 3. 4. 5. 6. Uniquely Identify the IAS Router and all of its parts. Describe how to verify IAS Router upgrades. Describe how to configure the IAS Router in a manner consistent with the NDPP and VPN EP. Describe all of the CC Evaluated security functions. Describe the format of the audit records. List the processes running on the IAS Router that are capable of processing network traffic. Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc. 2 Introduction This document describes the Common Criteria evaluated security features of the IAS Router. The IAS Router was evaluated against the Network Device Protection Profile (NDPP) Extended Package VPN Gateway, Version 1.1, April 12, 2013; Protection Profile for Network Devices, Version 1.1, June 8, 2012; and Security Requirements for Network Devices Errata #3. These documents are referred to as VPNEP and NDPP thought this document. Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc. 3 Getting Started 3.1 Identification The Evaluated Device, the IAS Router, consists of the following components: • • • • IAS Router HW, one of: IAS STEW Rev. 1.0, IAS Router Micro Rev 1.0, or IAS KG-RU Rev 1.0 IAS Router Software: IASRouter-2015-11-24_50e8756_Release-x86-fips_cc.firmware IAS Router Common Criteria Operator Guidance, and the IAS STEW Hardware Manual, IAS Router Micro Hardware Manual, or IAS KG-RU Hardware Manual as applicable The IAS STEW and IAS KG-RU contain a separate Cisco 5915 Embedded Service Router component. This component is not covered under this Protection Profile. Documentation for this component can be obtained from Cisco at the following URL: http://www.cisco.com/c/en/us/support/routers/5915-embedded-servicerouter/model.html. 3.2 Environment The administrator must ensure the guidance items within this document are enforced. 3.2.1 Technical Requirements The IAS Router is compatible with the following devices, servers, and protocol versions: • • • • VPN Client o IKEv1 See Table 1 for a complete listing of modes and ciphers o IKEv2 See Table 1 for a complete listing of modes and ciphers o IPsec See Table 1 for a complete listing of modes and ciphers Syslog o Version 1 - RFC 5424 NTP o NTPv4 Server o NTPv4 Client HTTPS o TLS1.0/1.2 o See Table 1 for a complete listing of modes and ciphers Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc. Figure 1: IAS Router Simplified Networking Diagram The IAS Router includes the following protocols whose effectiveness is not evaluated as a part of the NIAP Common Criteria validation: HTTPS/TLS. Whereas these protocols may provide authentication, integrity, and confidentiality there is no assurance assigned to their use within this evaluation. Instructions within this guidance document will guide the administrator how to use those protocols which are evaluated to create an assured configuration. The IAS Router provides the following features and protocols which are outside of the scope of the NIAP Common Criteria validation: PIMv2, GRE, OSPF, and NHRP. 3.2.2 Procedural Requirements The following protections must be provided by the operational environment the IAS Router is deployed in. The Administrator must not install any additional software on the IAS Router. The IAS Router is intended to only be operated with the software provided by IA Specialists. The IAS Router is physically protected from unauthorized access. These countermeasures should be commensurate with the value of the data being protected by the IAS Router. The Administrators must be trusted, and they must follow and apply all administrator guidance. The IAS Router must be installed in the network in a manner that will allow the IAS Router to effectively enforce its policies on network traffic flowing among attached networks. See the network diagram in Section 3.2.1. More specifically, the IAS Router must be the only network entity that interconnects the trusted network(s) and the untrusted network(s). Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc. The IAS Router must be set to CSfC mode in order to operate in a VPN Protection Profile compliant mode. This is done through the “Validated Mode of Operation” dialog in the System Settings page as Figure 2: Validated Mode of Operation Dialog seen in Figure 2. Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc. 4 Installation This section describes the steps to configure the IAS Router in a manner that is consistent with the requirements in the NDPP and VPNEP. Before beginning, verify that the hardware and documentation matches Section 3.1. Connect the power and network interfaces of the IAS Router according to the IAS Router STEW, Router Micro, or KG-RU Hardware Manual, Section 3.2.1, and Section 3.2.2. 4.1 User Accounts The IAS Router ships with a default username of admin and a default password of password123. These default credentials can be used to access the device via the management web interface, which can be found by default at on a lan interface which by default includes eth0, eth1, eth2, eth3, or eth4. Web browsers that are supported include: Internet Explorer 11, Chrome 46, Firefox 22, and Safari 6. Upon initially connecting to the IAS Router the security administrator should first select the Validated Mode of Operation to match the desired validation environment. With the CSfC mode selected many of the NDPP and VPNEP requirements are automatically enforced. The Validated Mode of Operation is found under System->Validated Mode of Operation. Details of which configuration selections are available in each mode are shown below in Table 1. After the Validated Mode of Operation is set the IAS Router will reboot and all settings other than the Validated Mode of Operation will be reset to their factory default settings. After this reboot the administrator should either modify the password for the default account or create a new user account and delete the default user account. Both operations can be completed via the System->Users page. All account passwords must be chosen to include a combination of capital and lower case letters, numbers, and special characters. Easily guessed and common language (dictionary) words should be avoided. Password strength is a function of length and complexity. Longer passwords provide more protection against brute-force attacks. We recommend to use as long and as complex of a password that can be remembered. In CSfC mode, the minimum requirement is for a fifteen character password containing at least one lower case character, upper case character, digit, and special character from the set !@#$%^&*(). The minimum password length can be increased by an administrator to up to twenty-two characters. The password minimum length and other authentication settings for the system are found under the System->System Authentication options. They should be modified to the level of complexity that most appropriately matches the value of data protected by the IAS Router. Table 1: Cryptographic Mode Supported Algorithms Protocol/Operation Password Complexity Algorithm Minimum password length Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc. Standard Mode 8-22 FIPS Mode 8-22 CSFC Mode 15-22 Protocol/Operation Password Complexity Standard Mode 8-22 FIPS Mode 8-22 CSFC Mode 15-22 x x x IKEv1 Main Mode IKEv1 Aggressive Mode IKEv2 3des AES128CBC AES256CBC md5 sha sha256 sha384 sha512 dh1 - modp768 dh2 – modp1024 dh5 – modp1536 dh14 – modp2048 dh15 – modp3072 dh16 – modp4096 dh17 – modp6144 dh18 – modp8192 dh19 – ecp256 dh20 – ecp384 dh21 – ecp512 matches selected IKE integrity algo x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x 3des AES128CBC AES256CBC AES128CTR AES256CTR AES128GCM16 AES256GCM16 md5 sha sha256 sha384 sha512 dh1 - modp768 dh2 – modp1024 dh5 – modp1536 dh14 – modp2048 dh15 – modp3072 x x x x x x x x x x x x x x x x x x x x x x x x Algorithm Minimum password length Lowercase, uppercase, number, and a special character [!@#$%^&*()] IKE Encryption Integrity Key Exchange PRF ESP Encryption Integrity Key Exchange Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc. x x x x x x x x x x x x x x x x x x x Protocol/Operation Password Complexity IKE Authentication PSK Certificate signature algorithms Certificate private key types Standard Mode 8-22 x x x x x x FIPS Mode 8-22 x x x x x x CSFC Mode 15-22 adhere to password complexity rules x x x rsa_with_sha1 rsa_with_sha256 rsa_with_sha384 rsa_with_sha512 ecdsa_with_sha1 ecdsa_with_sha256 ecdsa_with_sha384 x x x x x x x ecdsa_with_sha512 x x RSA 1024 RSA 2048 RSA 4096 EC on p256 EC on p384 x x x x x x x x x x x ECDHE-ECDSA-AES256-GCM-SHA384 ECDHE-ECDSA-AES128-GCM-SHA256 ECDHE-ECDSA-AES256-SHA384 ECDHE-ECDSA-AES128-SHA256 ECDHE-RSA-AES256-GCM-SHA384 ECDHE-RSA-AES128-GCM-SHA256 ECDHE-RSA-AES256-SHA384 ECDHE-RSA-AES128-SHA256 DHE-RSA-AES256-SHA256 DHE-RSA-AES128-SHA256 AES256-SHA256 AES128-SHA256 DHE-RSA-AES256-SHA DHE-RSA-AES128-SHA x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x Algorithm Minimum password length dh16 – modp4096 dh17 – modp6144 dh18 – modp8192 dh19 – ecp256 dh20 – ecp384 dh21 – ecp512 x x x x x x x x x x TLS Ciphers web server SSL AES256-SHA Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc. Standard Mode 8-22 x FIPS Mode 8-22 x CSFC Mode 15-22 x ECDHE DHE RSA x x x x x x x x x Authentication ECDSA RSA x x x x x x Bulk Ciphers AES256 AES128 x x x x x x Message Authentication SHA384 SHA256 SHA x x x x x x x x x Protocol/Operation Password Complexity Algorithm Minimum password length AES128-SHA Key exchange/agreement 4.2 Firewall 4.2.1 Firewall Introduction A firewall Zone is a collection of Networks and a Network is a collection of Interfaces. Interfaces are mapped to Networks on the Network page via manipulation of a network’s definition. Networks can have one or more Interfaces. Networks are then assigned to Zones using the Network or Firewall page. Zones can have one or more Networks. Each Zone has a default packet handling behavior, and there is a Global Rules default traffic handling setting for any interfaces not assigned to a zone. Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc. Figure 3: Firewall Page The firewall configuration has a hierarchy. The configuration is processed in the following order until a target is reached. First, Rules and Port Forwardings are processed in their configured order. Next, the Forwarding configuration is considered. Then, the Zone configuration is processed. Finally, Global Rules are applied. Global Rules is the final catch all for traffic processing. Once a packet has been reduced to a target (ACCEPT, DROP, REJECT, LOG) then firewall processing has concluded for that packet. The default configuration of Zones, Networks, and Interfaces is visualized in the figure below including the default Forwardings and ALLOW rules that are applied to the wan Zone. Figure 4: Default Firewall Configuration Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc. 4.2.2 Rules Rules can be crafted to allow traffic to move into, out of, or between Zones at a very granular level including IPv4 source and destination address, protocol, and for TCP/UDP source and destination port. Rules are ordered and processed by priority. Rules are crafted with either a source and/or a destination zone. Depending on how the source and destination zones are assigned a rule applies to traffic flowing to the router, through the router, or from the router. Rules are processed against traffic based on source and destination zones as depicted in Table 2. NOTE: Generally, source and destination zones should be specified on firewall rules, UNLESS the rule is to match traffic specifically sourced or destined for the router itself. Table 2: IAS Router Firewall Rule Zone Usage Source Zone (empty) Destination Zone (empty) Interpretation/Applies to Creates an Output rule – Applies to all traffic sourced from the IAS router, with a destination to any zone (empty) wan Creates an Output rule—Applies to all traffic sourced from the IAS router, with a destination to zone “wan”. wan (empty) Creates an Input rule—Applies to all traffic sourced from the zone “wan”, with a destination to the IAS router. lan wan Creates a Forward rule—Applies to all traffic sourced from zone “lan”, with a destination to zone “wan”. NOTE: Any forwarding configuration, including Rules, Forwardings, or Port Forwardings (Redirections), require that the IP routing rules also permit the traffic to flow. In other words, routing defines how traffic flows, and the firewall rules simply restrict the available routes. Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc. Figure 5: Firewall Rule Creation Form Figure 6: Firewall Rules Table 4.2.2.1 Packet Filtering Setup This note shows one of the configurations and sample rules used by IAS to test packet filtering functionality. That functionality has been tested on multiple devices and network arrangements, but this document has been developed via an emulated network as follows: This configuration has three networks: • • lan (192.168.3.0) test1 (192.168.4.0) Management connection for configuring the IAS router Client network containing test host Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc. • test2 (192.168.5.0) Client network containing test host Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc. The global default rules are set to reject traffic not otherwise accepted by a given rule. Three zones are configured to correspond to the three networks; the VPN zone cannot be removed but is not used in these tests. No default forwarding between zones is enabled. The test zones here default to rejecting all, and cannot ping or otherwise contact each other. The lan zone with the management laptop accepts traffic to and from the router for configuration purposes, but without additional rules it cannot reach the test nodes. To, e.g., enable the laptop specifically to ping--and only ping---the test1 network, create a rule as follows: Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc. Note in the above rule that the test1 destination is required. Otherwise the rule would apply between the laptop and the router itself (an unnamed implicit zone). A wildcard IP could be given for the destination, but is not necessary. For the test nodes to communicate in this configuration, explicit forwarding rules must be applied, e.g., to enable nodes on the test1 network to contact nodes on the test2 network: Note again that a source and destination zone are required, as an empty zone is interpreted as the router itself. Wildcard IP addresses could be applied but are not necessary. The IAS Router Firewall has a basic understanding of connections and with just this rule will also accept responses to accepted messages, e.g., permitting an ICMP ping to return. To permit and deny specific hosts, particular IP addresses can be applied. In this rule, only Node 1 (192.168.4.10) from the test1 network is permitted to contact the test2 network, but it may communicate to any node in that network (a wildcard has been applied but is again not necessary): Conversely, the following pair of rules specifically excludes Node 1 (192.168.4.10) from contacting the test2 network, but permits other hosts from test1 to do so (tested, e.g., by changing the IP of Node 1): Note that this is a specific scenario of the packet filtering tests, denying a specific IP address from messaging a wildcard address. All such combinations of specific and wildcard addresses are permitted and functional, as is acceptance or rejection by protocol or port number.S 4.2.2.2 Logging Packets Firewall rules can be created in order to meet the requirements of logging entire packet contents for IPsec session establishment (FCS_IPSEC_EXT.1), connecting to a CA (FIA_X509_EXT.1), or logging any arbitrary connections (FPF_RUL_EXT.1). The LOG, LOG CONN, ULOG, and ULOG CONN rules can be combined to have granular packet logging rules. See Appendix A for examples of logging output. Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc. • • • • LOG: Logs basic information about the first matched packet of a connection. LOG CONN: Logs basic information about all following packets of a connection. NOTE: This does not capture the initial packet of the connection. Use a LOG rule for that. ULOG: Logs the entire packet contents (as a hexdump) of the first packet of a connection. ULOG CONN: Logs the entire packet contents (as a hexdump) of all following packets of a connection. NOTE: This does not capture the initial packet of the connection. Use a ULOG rule for that. The packet captures generated by ULOG rules can be converted to PCAP files through the use of the “text2pcap” utility. The ULOG output requires some reformatting to satisfy the requirements of “text2pcap”. A shell command to do so is: grep -e 'FIREWALL_ULOG:[[:space:]]*0x' LOG.txt \ | awk -F 'FIREWALL_ULOG: \t' '{print $2}' \ | awk -F: '{gsub(/[0-9a-f]{2}/,"& ",$2);print $1 $2}' \ | sed 's/0x/00/' \ | text2pcap -l 101 – LOG.pcap Replace “LOG” with the name of the input file. The following table provides some guidance on achieving the level of detail required by protection profile requirements. Process/feature requiring additional detail IPSec CA interactions (CRL/OCSP) IPSec SA interactions (IKE) NTP interactions Protocol Destination Port TCP Typically 80 for HTTP and 443 for HTTPS NOTE: The destination port of the CRL/OCSP URI is NOT GUARANTEED! This port is determined by the URI present in a peer’s provided identity certificate. UDP 500 and 4500 UDP 123 4.2.3 Global Rules Global Rules serve as a final catch-all for packets that pass all other rules. There are several Global Rules: • • • • Input: Followed if an incoming packet does not match any more specific rule. Available options are ACCEPT, DROP, or REJECT. Output: Followed if an outgoing packet does not match any more specific rule. Available options are ACCEPT, DROP, or REJECT. Forward: Followed if a forwarded packet does not match any more specific rule. Available options are ACCEPT, DROP, or REJECT. Masq Output Traffic: Whether to perform IP Masquerading on outgoing traffic. Available options are Enabled or Disabled. Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc. • MSS Clamping: Change the maximum segment size (MSS) of outgoing TCP connections to handle links with lower MTUs. Available options are Enabled or Disabled. To edit these fields, click the Edit button on the right hand side of the Global Rules table of the Firewall page. Figure 7: Global Rule Edit Dialog 4.2.4 Zones A firewall Zone is a collection of networks. New networks can be created on the Networks tab. Creating a new Zone is done by clicking the "Add Zone" button in the Zones table of the Firewall page. Editing or deleting an existing zone is done by clicking the corresponding buttons on each Zone's row in the Zones table. The options available for Zones are the same as the options for Global Rules specified above. Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc. Figure 8: Firewall Zone Edit Dialog 4.2.5 Forwarding Rules Forwarding rules define traffic flows between Zones. Forwarding rules are not symmetrical, so if a rule is defined to forward LAN traffic to the WAN, which does not automatically forward WAN traffic back, unless there is an explicit rule. Create a new Forwarding Rule by clicking the "Add Forward" button on the Forwarding table of the Firewall page. Editing or deleting an existing Forwarding Rule is done by clicking the corresponding buttons on each rule's row in the Forwarding table. Figure 9: Firewall Forwarding Rule Dialog 4.2.6 Port Forwarding (Redirects) Port Forwarding rules redirect traffic from a particular source IP / source port combination to an alternate destination IP / destination port. The available fields for Port Forwarding rules are: • Name: A required identifier for the rule. Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc. • • • • • • • • • • Type: DNAT (Classic Port Forwarding) or SNAT (Reverse Port Forwarding). Protocol: Any available IP protocol number. Source Zone: Specifies the traffic source zone. Must refer to one of the defined zone names. For typical port forwards this usually is wan. Destination Zone: Specifies the traffic destination zone. Must refer to one of the defined zone names. For DNAT target on Attitude Adjustment, NAT reflection works only if this is equal to lan. Source IP: Match incoming traffic from the specified source ip address. Destination IP: For DNAT, redirect matched incoming traffic to the specified internal host. For SNAT, match traffic directed at the given address. Source Port Number: Match incoming traffic originating from the given source port or port range on the client host. Destination Port Number: For DNAT, redirect matched incoming traffic to the given port on the internal host. For SNAT, match traffic directed at the given ports. Incoming Destination Port: For DNAT, match incoming traffic directed at the given destination port or port range on this host. For SNAT rewrite the source ports to the given value. Incoming Destination IP: For DNAT, match incoming traffic directed at the given destination ip address. For SNAT rewrite the source address to the given address. To create a new Port Forwarding rule, click the "Add Port Forwarding" button on the Port Forwarding table of the Firewall page. Editing or deleting an existing Forwarding Rule is done by clicking the corresponding buttons on each rule's row in the Forwarding table. Figure 10: Firewall Redirect Rule Dialog 4.3 IPsec IPSec DISCARD and BYPASS policies are configured in the IAS Router via the Firewall page. DISCARD and BYPASS policies exist in the IAS Router as firewall Forwardings and Firewall Rules. Forwardings and Rules are applied to traffic based on the structure of the firewall’s “Zones”. IPSec PROTECT policies are configured as IPSec VPN definitions via the IPSec page. Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc. 4.3.1 BYPASS and DROP SPD Policies Default BYPASS policies that allow an entire Zone to forward traffic to another Zone are called Forwardings. By default there are only Forwardings in place that allow traffic to flow to the VPN process, which has its own firewall Zone. The default Forwardings can be seen in Figure 2 above. This default configuration inhibits the per-packet bypass capabilities of the router. Granular BYPASS policies are implemented by Rules that have an ACCEPT target. Firewall Rules can also be crafted to drop traffic. Drop rules are how the IAS Router implements DISCARD policies. A REJECT rule is a special type of drop that enables the IAS Router to return an ICMP destination unreachable packet to the original packet sender. 4.3.2 IPSec VPN: Implementing PROTECT SPD Policies 4.3.2.1 IPSec Introduction The VPN process applies PROTECT policies to traffic entering the VPN firewall Zone. Only PROTECT policies can output traffic from the VPN Zone. PROTECT policies are defined in the IAS Router by defining VPN rules on the IPSec page. When the IAS Router is in the CSfC mode, as described in Section 4.1, the options for generating VPN policies are restricted to only those values that are allowed under the IAS Router’s Common Criteria validation. It is possible to configure the IAS Router to perform in a Common Criteria compliant manner without utilizing the CSfC mode, but additional care must be taken when configuring the router as the configuration defaults and configuration enforcement rules will allow the device to operate outside the acceptable Common Criteria settings. Consult section 4.1 for more detail on the algorithms permitted in CSfC mode. Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc. In accordance with Common Criteria requirements, IPSec protection is required for otherwise unprotected traffic. In the case of the IAS Router, IPSec must be configured to provide protection for Figure 11: System Services Dialog the NTP client and syslog features when they are used. NTP is sent/received on UDP port 123 and syslog traffic is sent to TCP port 514 but is configurable. Alternatively, both NTP client and syslog can be disabled using their respective configuration locations. Syslog can be disabled through the System Services Dialog, shown in Figure 11. Setting “syslog-ng” to “Disabled” will disable the Syslog client entirely. Disabling the NTP client can be done via the System Time dialog, seen in Figure 20. 4.3.2.2 PROTECT Policy Configuration The IPSec VPN page allows the user to create a new VPN definition. The VPN definition form includes fields allowing the user to select IKEv1 or IKEv2. The VPN form also allows for the selection of the desired Phase 1/IKE SA and Phase 2/CHILD SA encryption methods. The VPN form allows the selection of SA lifetimes, by default they are set to 24 hours for Phase 1/IKE and 8 hours for Phase 2/CHILD SAs. The VPN configuration form allows the user to define how the VPN will be authenticated by either a PSK or the specified certificate. Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc. Figure 12: VPN Creation Form Each item shown in the form figure above is detailed below in Table 3. Table 3: IPSec VPN Form Detail Configuration Item VPN Name Status IKE Version Transforms IKE Lifetime ESP Lifetime Description Administrative tunnel name. This configuration item is relevant only locally and the endpoints need not agree on its value. Administratively disable the tunnel configuration The version of IKE used for this VPN. The use of IKEv1 aggressive mode is not recommended, but is required for interoperability in certain applications. The cryptographic algorithms that are used for this VPN. Multiple values can be selected for each drop down. These values must match or overlap those values configured on the other VPN endpoint. IKE Lifetime is the maximum amount of time that an IKE SA is permitted to pass traffic prior to key renegotiation. ESP Lifetime is the maximum amount Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc. Range Default Required Yes Enabled or Disabled See Table 1 Enabled IKEv2 See Table 1 Yes Yes 1-24 hours 3 hour Yes 1-8 hours 1 hours Yes Configuration Item ESP Packet Limit Local Entry Point IP Local ID Local Traffic Selector Remote Entry Point IP Remote ID Description of time that an IKEv1 Phase 2 or IKEv2 CHILD_SA is permitted to pass traffic prior to key renegotiation. ESP Packet Limit is the maximum number of packets that an IKEv1 Phase 2 or IKEv2 CHILD_SA is permitted to pass prior to key renegotiation. The IP Address of this router that is used to participate in IPSec processing. The default value (%any) is a wildcard value that refers to all currently configured networks on the router. The identifying string to be used during IKE authentication. This value corresponds to the “group name” when used with Cisco EZVPN concentrators. When used with certificate authentication this value automatically defaults to the Subject Name of the certificate. This traffic selector specifies the traffic (group of IP addresses, protocols, and ports) that are to be protected by the VPN. The Local selector identifies the source fields of outbound traffic or the destination fields of inbound traffic. This value automatically populates as the entire LAN subnet. The IP Address of the remote router. This should be the public network routable address of the IPSec concentrator or entry point. This value is typically left blank for PSK VPNs. For Certificate VPNs this value is compared to the remote end point’s certificate subjectName field (AKA Subject). This field supports * wildcards for each subject subfield or for the entire field. For example: “CN=*, C=US, ST=*, O=IAS, OU=IAS_Test_Bed” or to allow all just use “*”. Alternatively, the field is also compared with any subjectAltName values of the remote, subjectAltName Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc. Range Default Required %any Yes Number greater than 1 IP or %any Yes IP, FQDN, or %any Yes Configuration Item Remote Traffic Selector Start Connection Dead Peer Detection Authentication By XAUTH XAUTH Username 4.3.3 Description values typically contain email addresses, FQDNs, or IP addresses. For example “vpn.iaspecialists.com” This traffic selector specifies the traffic (group of IP addresses, protocols, and ports) that is to be protected by the VPN. The Remote selector identifies the source fields of inbound traffic or the destination fields of outbound traffic. This item selects when the VPN should be initiated. For most cases Traffic is best option. This configuration item is relevant only locally and the endpoints need not agree on its value. This item configures how the router should monitor the VPN for failure and what the router should do in the event of a failure. For most initiator cases Retry on Traffic is the best option. For most head-end cases Clear is the best option. The interval value is the frequency with which the VPN is tested. This configuration item is relevant only locally and the endpoints need not agree on its value. Select the authentication mode. PSK and certificates are supported. If certificate is selected, then the certificate must be specified/uploaded. If IKEv1 is selected then this option appears. Selecting this option enables XAUTH authentication. If IKEv1 is selected then this option appears. The XAUTH username to use when authenticating with an entry point. Protecting Syslog Audit Traffic Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc. Range Default Required Yes Traffic, Manual, Boot Boot Yes Disable, Enable – Retry on Traffic, enable, Clear, Enable – Retry on Fail Disable Yes PSK, Certificate Enabled or Disabled Yes Disabled Syslog audit records sent to a remote server must be protected via an IPsec VPN. Ensure that the VPN configuration’s Local Traffic Selector includes the IP address of the syslog server endpoint, and includes the port number the syslog server and client run on (defaults to port 514). Figure 13 shows the System Figure 13: Syslog Destination Configuration Dialog Configuration dialog for setting the Syslog server endpoint. 4.4 TLS There are no operator configurable TLS options. The IAS Router supports only those ciphersuites permitted by Common Criteria requirements. 4.5 Cryptographic Operations 4.5.1 Certificate Generation and Loading When certificates are used to authenticate with a VPN peer the contents of the certificate dictate the method of authentication used. In order to validate a peer with RSA or ECDSA signatures both the local and the peer router’s certificates must have been correctly generated with the appropriate strength and type of credentials. Complete Certificate Authority configuration and use is outside the scope of this document and is dependent on the Certificate Authority product chosen. However, there are pieces of the certificate generation process that are performed on the IAS Router and they are outlined below. Prior to certificate generation an IAS Router must generate a private key and a Certificate Signing Request. The Private Key dictates the method of authentication used with the certificate and must be chosen to match the desired authentication method/strength. Private Key generation is performed using the Generate Private Key button on the VPN page. Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc. Figure 14: Private Key Generation Once a Private Key has been generated then the IAS Router can begin the certificate enrollment process with a Certificate Authority by creating a Certificate Signing Request. This is performed using the Generate CSR button on the VPN page. On the Generate CSR form the fields must be completed in accordance with guidance from the Certificate Authority and the desired Private Key and signature hash algorithm must be selected. Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc. Figure 15: CSR Generation Form Once the CSR is generated within the IAS Router it is downloaded for out-of-band delivery to the Certificate Authority (CA). The CA will enroll the request and return a certificate for the device to use for VPN authentication as well as any certificates required to validate the authenticity of the certificate. The returned certificate(s) are loaded into the IAS Router using the Upload Certificate button on the VPN page. This button is used to load both the device certificate as well as any Certificate Authority certificates and any other intermediate CA certificates. Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc. Figure 16: Upload Certificate Dialog 4.5.2 Certificate Validation Certificates can optionally specify a Certificate Revocation List (CRL) server or Online Certificate Status Protocol (OCSP) server URI to be used in certificate validation checking. If a certificate provided for validation includes a CRL or OCSP server URI then the IAS Router attempts to contact the server to check the revocation status of the certificate. CRL URIs are provided by specifying a “CRL Distribution Points” extension on the X509 certificate (RFC3280). Similarly, an OCSP server URI can be specified by adding an “AuthorityInfoAccess” extension. The IAS Router has a certificate validation strictness setting. The setting is on the VPN page and is called Certificate Validation. Figure 17: VPN Certificate Validation Strictness Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc. If the revocation status URL is specified in a certificate and the Certificate Validation setting is set to YES then the IAS Router will consider the certificate to be revoked if the revocation status URL is unreachable. If the validation setting is set to NO and the revocation status URL is unreachable then the IAS Router will not consider the certificate status to be revoked. In all cases the revocation status mechanism must be IPSec protected, as per Common Criteria requirements. This is accomplished by generating a VPN policy to protect the CRL or OCSP traffic. The exact parameters required to create a protecting VPN are dependent upon the configuration of the CA and its fronting VPN gateway. However, if the Certificate Validation setting is desired to be set to YES then a separate certificate chain will be required to authenticate the CRL/OCSP VPN that does NOT enforce certificate status checking. This is a chicken-or-the-egg scenario where the CRL or OCSP server must be reachable to check VPN certificate revocation status, but the revocation server must first be reachable over a VPN. Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc. 5 Security Functions This section describe the security functions that were evaluated against the NDPP and VPNEP, but were not discussed in Section 4. 5.1 Security Audit The IAS Router stores at least 4 MB of audit log data locally. The audit logs are immediately forwarded to the Syslog server, if one is configured. In the event that the Syslog server is unavailable, the IAS Router caches a maximum of 256 messages. Once the message delivery cache is full then any additional messages will be dropped. 5.2 Key Generation The IAS Router automatically generates ECDH and DH keys used for key establishment when IKE connections are initiated by the server or by a remote device. Private Key and CSR generation is explained above in Section 4.5.1. Pre-shared key input by the user must meet the same complexity and minimum length requirements enforced against user passwords, see Section 4.1. Their selection should also follow the guidance given in that section for password complexity, that is: minimum of fifteen characters, use at least one capital letter, one lower case letter, one number, and one symbol of the set !@#$%^&*() additionally all preshared keys should avoid the use of dictionary words. PSK input is performed on the VPN page using the Add PSK button/form. Figure 18: Add PSK Form In addition to text based keys the IAS Router also supports the input of bit-based keys. Bit-based keys can be entered by changing the “PSK Type” field to either Hexadecimal or Base64. In Hexadecimal mode, omit any starting “0x” prefix, simply enter plain hexadecimal digits (0-9, a-f). Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc. 5.3 Administration 5.3.1 Administration Authentication Rules User authentication is configurable via the System->System Authentication Settings form. From here the user can modify the successive unsuccessful authentication attempts, which is called “Permitted failed authentication attempts before lockout.” Additionally the lockout time is configurable via the “Lockout time in minutes” item. The same authentication attempt restrictions are placed against both the web page and the console login mechanisms. 5.3.2 Administration Access Control The IAS Router supports a granular user access control capability. Each user is individually configurable to be able to configure, view only, or have no access to each button or actionable table within the web management interface. This level of detail can be seen below in Figure 16. Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc. Figure 19: User Permission Settings Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc. 5.4 Time Time is manually configurable from the IAS Router Status page. If the router’s time is different from the system time of the management terminal by more than 25 hours then the Set System Time button flashes to help notify the administrator that the time setting requires attention. The Set System Time button opens the Set System Time dialog window and allows the user to manually manipulate the time or to configure the router’s NTP settings. The Set System Time dialog window is also reachable from the System page. The IAS Router can act as either an NTP client or as an NTP server. Each feature is individually configurable and they both operate using industry standard UDP port 123. The only Protection Profile evaluated configuration is for the router to act as an NTP client. Using the NTP server functionality is not Protection Profile compliant. There is no applied or inherent security in NTP communications. If security for NTP traffic is desired then the administrator must manually setup IPSec VPN(s) to protect NTP traffic flows. Figure 20: System Time on the Status Page Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc. Figure 21: Set System Time Dialog 5.5 Firmware Updates The IAS Router supports processing trusted firmware updates. Firmware updates may be acquired directly from IAS via product support channels. Firmware images for the IAS Router include a digital signature that is automatically validated prior to applying the firmware. To validate the digital signature the operator must execute the firmware upgrade process via the System page. Within that process the upgrade is confirmed as an authorized release from IAS via a certificate packaged in the router software. Executing the firmware upgrade process requires the user to select the firmware file for use/uploading via the browser. Once selected the firmware image is uploaded and the validation process begins. If the signature validation fails then the update is not be applied, a “Firmware Validation Error” error is presented to the user on the webpage (see below), and an audit log entry is generated (see Appendix A for details). If the signature is validated and the upgrade is processed the user is presented with a please wait dialog/timer (see below), an audit log entry is generated (see Appendix A for details), and the router automatically reboots upon completion. Figure 22: Firmware Validation Error Figure 23: Firmware Validation Success 5.6 Welcome Banner The system Welcome Banner can be modified from the System Settings page. Click the System tab from the main menu on the left hand side of the page, then click the Edit button next to "Welcome Banner Text". Enter the desired text into the dialog box that appears. Once complete, click the Save button. The figures below illustrate this process. The Welcome Banner will appear on the Login page of the web interface, and also when connecting to the serial console. Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc. Figure 24: Welcome Banner Text Edit Button Figure 25: Welcome Banner Edit Dialog Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc. 6 Troubleshooting It is possible to misconfigure the IAS Router in such a way that the administrator no longer has access to the management web page. In this scenario the user should ensure the IAS Router is powered on and fully booted. The administrator should wait for 4 minutes to ensure the device is fully booted. Then the administrator should press the front panel Reset to Defaults button and hold it for at least 13 seconds. Upon releasing the button the IAS Router will restore the factory configuration and reboot. In addition to the Reset to Defaults button, the serial console CLI provides visibility to the system logs and the ability to perform the Reset to Defaults operation. The CLI is reachable with a standard blue RJ45 console cable and a terminal emulator running 9600 baud, 8 data bits, no parity, 1 stop bit, and no flow control. The administrator must login with valid credentials to access the CLI. If the IAS Router fails in such a way that the device cannot successfully perform the power on self-test suite then the unit will reboot. It is possible for the error to clear on its own, however if the error does not or cannot self-clear then the IAS Router will continually reboot as can be observed by watching the status indicator which flashes 1-second on 1-second off during power on self-tests. The bypass self-test is performed whenever the IAS Router network/firewall configuration is modified. If the configuration has been modified in an unauthorized manner then the self-test will fail. When this happens the IAS Router is inhibited from forwarding traffic. As an example, this means that traffic can flow on the LAN between the management workstation/browser and the IAS Router, but not from the LAN to the IPSec VPN or to the WAN. In order to clear the error condition the user must click the “clear” button on the bypass error indication window. If the window is inadvertently closed or does not initially display then the user can navigate to the firewall page, open any configuration dialog and click the save button. This forces the bypass rule test to re-execute and the indication window will appear if an error is found. NOTE: It is common operating procedure for the firewall bypass error indication dialog to appear the first time the network or firewall is modified after a reset to defaults or software upgrade is performed. Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc. 7 Appendix A: Audit Records • Startup of the audit function. o Example: Mar 13 08:58:41 IASRouter syslog-ng[1631]: syslog-ng starting up; version='3.0.5' Format: [DATE] [HOSTNAME] syslog-ng[PID]: syslog-ng starting up; version=’3.0.5’ Shutdown of the audit function. o There is no nominal shutdown procedure for the audit log function. Success and failure for each command used (or attempted to be used) to configure the IAS Router. This includes all commands in Section 4 and Section 5. Each of these audit records must include the username of the administrator running the command. Including setting the time. o Example: Mar 13 09:13:27 IASRouter GUI: [email protected], o • • action=self_test, target=bypass.checksum.CHECKSUM_MATCH o o Format: [DATE] [HOSTNAME] [PROCESS]: user=[user identifier], action=[ACTION], target=[SECTION].[SUBSECTION].[NAME] Operator actions can have the following ACTION, SECTION, SUBSECTION, NAME combinations Table 4: Administrative Action Audit Log Format SECTION backup Bypass Bypass Bypass CLI CLI CLI CLI Dhcp Dhcp firewall firewall firewall firewall firewall firewall firewall firewall GUI SUBSECTION NAME checksum checksum checksum success failed timeout User_action [network name] [network name] defaults rule zone rule [object type] redirect forwarding redirect success [result] Checksum updated Bypass reset [user]@console console 20 LOGIN GUI failed 21 LOGOUT 22 LOGOUT 23 RESTART GUI GUI IPSEC timeout User_action VPN 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ACTION system self_test self_test self_test LOGIN LOGIN LOGOUT LOGOUT MODIFY DELETE MODIFY MODIFY MODIFY MODIFY DELETE MODIFY MODIFY MODIFY LOGIN Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc. dhcp_pool dhcp_pool Global_rules [rule number] [zone name] Reorder list [object number] Reorder list [forwarding number] [redirect number] [user]@[IP ADDRESS] [user]@[IP ADDRESS] SERVICE 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 ACTION MODIFY RESET_LOGOUT_TIMER MODIFY MODIFY MODIFY NEW EDIT NEW EDIT DELETE DELETE system MODIFY MODIFY MODIFY MODIFY FACTORY_RESET SECTION Kernel Logout multiwan multiwan network network network network network network network restore system system system System time settings System_manager 41 MODIFY System_manager 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 update update usb_modem usb_modem usb_modem usb_modem usb_modem users users users vpn vpn vpn vpn vpn vpn vpn vpn vpn vpn VPN IPSec wireless wireless wireless wireless firmware firmware MODIFY ADD DELETE MODIFY MODIFY NEW EDIT DELETE MODIFY DELETE MODIFY generate generate upload upload Save Save DELETE - SHRED MODIFY WIFI_SITE_SURVEY MODIFY MODIFY DELETE Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc. SUBSECTION Firewall forwarding timer interface order route gre_interface gre_interface Interface interface route interface NAME released User [network name] syslog Access banner Auto_logout_time [Old time] Mode of operation change to System Authentication settings applying signature Selected APN interface interface auto_config [device name] user user user Strict_crl_policy tunnel tunnel Private key csr certificate Private key psk xauth credential [operation] scan0 Radio[number] Wifi-iface_[index] Wifi_iface_[index] [destination] [route name] [interface name] [interface name] [interface name] [interface name] [name] [name] [New time] [mode] [valid/invalid] APN [interface name] [interface name] [on/off] [interface name] [user name] [user name] [user name] [value] [vpn name] [vpn name] [private key name] [file name] [file name] [file name] [file name] [name] [vpn name] WLAN0 [on/off] [on/off] 67 68 69 70 71 72 ACTION SECTION SUBSECTION NAME MODIFY wireless Wifi_iface_[index] AP MODIFY wireless Wifi_iface_[index] STA SAVE XAUTH CREDENTIAL MODIFY network routing pim MODIFY network routing ospf STATUS interface dropped_packets [interface name] • Failure to establish an IPsec SA. Username associated with the connection. o Example: Mar 13 11:21:30 IASRouter IPSec: test[1] to 50.78.156.51 Mar 13 11:21:34 IASRouter IPSec: with message ID 0 Mar 13 11:21:42 IASRouter IPSec: with message ID 0 Mar 13 11:21:54 IASRouter IPSec: with message ID 0 Mar 13 11:22:18 IASRouter IPSec: with message ID 0 Mar 13 11:23:00 IASRouter IPSec: with message ID 0 Mar 13 11:24:15 IASRouter IPSec: retransmits Mar 13 11:24:15 IASRouter IPSec: failed, peer not responding o Example: 06[IKE] <test|1> initiating IKE_SA 03[IKE] <test|1> retransmit 1 of request 10[IKE] <test|1> retransmit 2 of request 07[IKE] <test|1> retransmit 3 of request 16[IKE] <test|1> retransmit 4 of request 05[IKE] <test|1> retransmit 5 of request 02[IKE] <test|1> giving up after 5 02[IKE] <test|1> establishing IKE_SA Mar 13 11:33:35 IASRouter IPSec: 08[IKE] test[2] to 50.78.156.51 Mar 13 11:33:35 IASRouter IPSec: 04[IKE] NAT, sending keep alives Mar 13 11:33:35 IASRouter IPSec: 04[IKE] requests for an unknown ca Mar 13 11:33:35 IASRouter IPSec: 04[IKE] '192.168.2.205' (myself) with pre-shared Mar 13 11:33:35 IASRouter IPSec: 04[IKE] test Mar 13 11:33:36 IASRouter IPSec: 06[IKE] AUTHENTICATION_FAILED notify error o <test|2> initiating IKE_SA <test|2> local host is behind <test|2> received 1 cert <test|2> authentication of key <test|2> establishing CHILD_SA <test|2> received Example: Mar 13 11:40:35 IASRouter IPSec: 13[IKE] <test|8> initiating IKE_SA test[8] to 50.78.156.51 Mar 13 11:40:35 IASRouter IPSec: 09[IKE] <test|8> received NO_PROPOSAL_CHOSEN notify error o Status Message format: [DATE] [HOSTNAME] [PROCESS]: [IKE_ INSTANCE][IKE] <[VPN_NAME]|[VPN_NAME_ INSTANCE]> [status message content] o Initialization Message format: [DATE] [HOSTNAME] [PROCESS]: [IKE_ INSTANCE][IKE] <[VPN_NAME]|[VPN_NAME_ INSTANCE]> initiating IKE_SA [VPN_NAME][[VPN_NAME_ INSTANCE]] to [REMOTE_IP] • Establishment of an IPsec SA with a Peer. o Example: Mar 13 11:29:34 IASRouter IPSec: test[1] to 50.78.156.51 Mar 13 11:29:34 IASRouter IPSec: NAT, sending keep alives Mar 13 11:29:34 IASRouter IPSec: requests for an unknown ca Mar 13 11:29:34 IASRouter IPSec: Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc. 08[IKE] <test|1> initiating IKE_SA 04[IKE] <test|1> local host is behind 04[IKE] <test|1> received 1 cert 04[IKE] <test|1> authentication of '192.168.2.205' (myself) with pre-shared key Mar 13 11:29:34 IASRouter IPSec: 04[IKE] <test|1> establishing CHILD_SA test Mar 13 11:29:34 IASRouter IPSec: 09[IKE] <test|1> authentication of '50.78.156.51' with pre-shared key successful Mar 13 11:29:34 IASRouter IPSec: 09[IKE] <test|1> IKE_SA test[1] established between 192.168.2.205[192.168.2.205]...50.78.156.51[50.78.156.51] Mar 13 11:29:34 IASRouter IPSec: 09[IKE] <test|1> scheduling reauthentication in 10170s Mar 13 11:29:34 IASRouter IPSec: 09[IKE] <test|1> maximum IKE_SA lifetime 10710s Mar 13 11:29:34 IASRouter IPSec: 09[IKE] <test|1> CHILD_SA test{1} established with SPIs b1e64b7f_i ca2100fe_o and TS 192.168.1.0/24 === 192.168.102.0/24 o Initialization format: [DATE] [HOSTNAME] [PROCESS]: [IKE_ INSTANCE][IKE] <[VPN_NAME]|[VPN_NAME_ INSTANCE]> [status message content] o Status messages format: [DATE] [HOSTNAME] [PROCESS]: [IKE_ INSTANCE][IKE] <[VPN_NAME]|[VPN_NAME_ INSTANCE]> initiating IKE_SA [VPN_NAME][[VPN_NAME_INDEX]] to [REMOTE_IP] o IKE_SA Establishment Format: [DATE] [HOSTNAME] [PROCESS]: [IKE_ INSTANCE][IKE] <[VPN_NAME]|[VPN_NAME_ INSTANCE]> IKE_SA [VPN_NAME]{[VPN_NAME_INDEX]} established between [LOCAL_IP][[LOCAL_ID]]…[REMOTE_IP][[REMOTE_ID]] o CHILD_SA Establishment Format: [DATE] [HOSTNAME] [PROCESS]: [IKE_ INSTANCE][IKE] <[VPN_NAME]|[VPN_NAME_ INSTANCE]> CHILD_SA [VPN_NAME]{[VPN_NAME_ INSTANCE]} established with SPIs [SPI VALIES] and TS [LOCAL TS] === [REMOTE_TS] • Termination of an IPsec SA with a Peer. Username associated with the connection. Source and destination IP addresses and source and destination ports. IAS Router Interface. o Locally initiated termination of establishing SA example: Mar 13 11:15:57 IASRouter IPSec: 00[IKE] <test|1> destroying IKE_SA in state CONNECTING without notification o Locally initiated termination of establishing SA message format: [DATE] [HOSTNAME] IPSec: [IKE_ INSTANCE][IKE] <[VPN_NAME]|[VPN_NAME_INSTANCE]> destroying IKE_SA in state [state] [termination action] o Locally initiated termination of established SA example: Mar 13 11:29:31 IASRouter IPSec: 00[IKE] <test|2> deleting IKE_SA test[2] between 192.168.2.205[192.168.2.205]...50.78.156.51[50.78.156.51] o Locally initiated termination of established SA format: [DATE] [HOSTNAME] IPSec: [IKE_ INSTANCE][IKE] <[VPN_NAME]|[VPN_NAME_INSTANCE]> deleting IKE_SA [VPN_NAME][[IKE_SA INSTANCE]] between [LOCAL_IP][[LOCAL_IDENTITY]]…[PEER_IP][[PEER_IDENTITY]] o Remotely initiated termination of established SA example: Mar 13 11:40:13 IASRouter IPSec: 09[IKE] <test|7> received DELETE for IKE_SA test[7] Mar 13 11:40:13 IASRouter IPSec: 09[IKE] <test|7> deleting IKE_SA test[7] between 192.168.2.205[192.168.2.205]...50.78.156.51[50.78.156.51] o Remotely initiated termination of established SA format: [DATE] [HOSTNAME] IPSec: [IKE_ INSTANCE][IKE] <[VPN_NAME]|[VPN_NAME_INSTANCE]> received DELETE for IKE_SA [VPN_NAME][[IKE_SA INSTANCE]] Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc. o Remotely initiated termination of established SA format: [DATE] [HOSTNAME] IPSec: [IKE_ INSTANCE][IKE] <[VPN_NAME]|[VPN_NAME_INSTANCE]> deleting IKE_SA [VPN_NAME][[IKE_SA INSTANCE]] between [LOCAL_IP][[LOCAL_IDENTITY]]…[PEER_IP][[PEER_IDENTITY]] • • Failure/termination of an established IPsec SA due to an error. IP address of the non-IAS Router endpoint. Reason for the failure in a human readable format (i.e. not an error code). o “Error” terminations look the same as user induced terminations. Application of ‘log’ packet filter rules, including the source and destination IP addresses, source and destination ports, transport layer protocol, IAS Router interface. o Example: Mar 13 12:02:07 IASRouter firewall: [11023.355722] FIREWALL_LOG:IN=br-lan OUT=ipsec0 MAC=00:30:18:c3:86:c5:00:23:55:6c:48:70:08:00 SRC=192.168.1.238 DST=192.168.102.102 LEN=60 TOS=0x00 PREC=0x00 TTL=127 ID=975 PROTO=ICMP TYPE=8 CODE=0 ID=1 SEQ=16 o Example: Mar 13 12:13:08 IASRouter firewall: [11685.086809] FIREWALL_LOG:IN=br-lan OUT=ipsec0 MAC=00:30:18:c3:86:c5:00:23:55:6c:48:70:08:00 SRC=192.168.1.238 DST=192.168.102.102 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=2588 DF PROTO=TCP SPT=57833 DPT=80 WINDOW=8192 RES=0x00 SYN URGP=0 o Format: [DATE] [HOSTNAME] firewall: [[uptime stamp]] FIREWALL_LOG: IN=[input interface] OUT=[output interface] MAC=[MAC frame (SRC, DST, Type)] SRC=[source IP address] DST=[destination IP address] LEN=[IP packet length] TOS=[type of service “type” field] PREC=[type of service “precedence” field] TTL=[time to live value] ID=[unique id] PROTO=[protocol name or number] [additional packet details, protocol specific, see for more detail] Application of ‘ULOG’ packet filter rules. o Example: Sep 20 22:43:05 IASRouter FIREWALL_ULOG: ICMP echo reply, id 28857, seq 4, length 64 Sep 20 22:43:43 IASRouter FIREWALL_ULOG: 0000 4001 36bf c0a8 0301 [email protected]..... Sep 20 22:43:43 IASRouter FIREWALL_ULOG: 041c 70b9 0004 b96e ff55 ........p....n.U Sep 20 22:43:43 IASRouter FIREWALL_ULOG: 0700 0000 0000 cdef abcd .....+.......... Sep 20 22:43:43 IASRouter FIREWALL_ULOG: efab cdef abcd efab cdef ................ Sep 20 22:43:43 IASRouter FIREWALL_ULOG: abcd efab cdef abcd efab ................ Sep 20 22:43:43 IASRouter FIREWALL_ULOG: .... o 192.168.3.1 > 192.168.3.10: 0x0000: 4500 0054 bc8e 0x0010: c0a8 030a 0000 0x0020: 0000 0000 d92b 0x0030: efab cdef abcd 0x0040: abcd efab cdef 0x0050: cdef abcd Format: [DATE] [HOSTNAME] FIREWALL_ULOG: [SRC IP] > [DST IP]: [Packet details] [DATE] [HOSTNAME] FIREWALL_ULOG: [tab][hexdump of packet contents] Note that when using syslog, depending on the receiver (notably including rsyslog) and its settings, the [tab] control character at the start of the hexdump may be rendered by the receiver as its octal encoding, “#011”, i.e., the output format will be: [DATE] [HOSTNAME] FIREWALL_ULOG: [SRC IP] > [DST IP]: [Packet details] [DATE] [HOSTNAME] FIREWALL_ULOG: #011[hexdump of packet contents] • Changes to the time caused by the NTP server. Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc. o Example: Nov 22 12:11:00 IASRouter GUI [email protected], action=MODIFY, target=System time settings.OLD=11/22/2015 08:09 .NEW=11/22/2015 12:11 o Format: [DATE] [HOSTNAME] ntpd[[PID]] action=MODIFY, target=System time settings.OLD=[DATE] .NEW=[DATE] • Establishing session with CA to validate certificate o Example: May 5 15:13:51 IASRouter IPSec: 01[CFG] <test|1> 'http://192.168.2.44/home/Downloads/crl.pem' ... o fetching crl from Format: [DATE] [HOSTNAME] IPSec: [IKE_ INSTANCE][CFG] <[VPN_NAME]|[VPN_NAME_INSTANCE]> fetching crl from ‘[CRL_or_OCSP_URI]’ ... NOTE: If more detail is desired, such as source interface, address, and port then firewall LOG/ULOG rules must be generated to trigger on the interesting traffic. In order to create a firewall LOG rule that captures traffic from the management plane the rule must have source zone = ANY and destination zone = ANY. Depending on the additional detail of interest, the protocol and ports can be curtailed to limit the number of audit events. See Section 4.2.2.1 for more details. Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc. 8 Appendix B: Processes Processes that process network traffic. Process kernel HW Privilege Ring 0 SW Privilege root syslog-ng Ring 3 root odhcpd Ring 3 root lighttpd Ring 3 root charon Ring 3 root ntpd Ring 3 root dnsmasq Ring 3 root pimd Ring 3 root quagga Ring 3 opennhrp Ring 3 root root Description Provides the IP network stack. Includes Ethernet, IP, TCP, UDP, ARP, GRE Generates logging messages and sends them to the configured server DHCP server provides DHCP addresses to network clients as configured Web server operating on port 443 with TLS serves the management web page IPsec process: perform/process IKE protocol and IPSec SA establishment Serves and retrieves time as configured using standard UDP port 123 DNS redirection daemon provides name resolution for network clients PIMv2 routing daemon implementing the PIMv2 routing protocol management OSPF routing daemon implementing the OSPF routing protocol NHRP routing daemon implementing the NHRP routing protocol 8.1 Privileges root – the root software privilege has access rights to the entire system. Ring 0 – The most privileged level of an x86 processor. Reserved for the kernel. Ring 3 – The least privileged level of an x86 processor. Generally defined for use by applications. Version 1.0.8, December 21, 2015 ©2015 Information Assurance Specialists, Inc.