Home

Certification Report

image

Contents

1. The evaluator used additional keywords listed below to search for vulnerabilities Multi function Printer e LaserJet HP M3530 o CP3525 The keywords not related to the TOE were chosen since the TOE is a similar product i e Multi Function Printer 11 5 Test Results The end result of the functional testing activities was that all tests gave expected correct results The evaluator penetration tests revealed the following e A Denial of Service was observed if a specific pattern of events was followed in the usage of the MFP Shortcuts Though not claiming FIPS 140 2 compliance a software code review revealed that the TOE did not zeroize the encryption keys and that the random number generator did not use the ANSI X9 31 RNG The MFP firmware was modified as a result of the findings of the Common Criteria testing The firmware code was changed from version P311CC to P311CCa The changes addressed the following Penetration Test PEN_TEST 8 revealed a Denial of Service vulnerability No vulnerabilities were identified by the use of shortcuts by the users since each user had to authenticate to access each function However a Denial of Service was observed if a specific pattern of events was followed in the usage of the MFP Shortcuts It was noted that after a shortcut was selected and no user authentication was entered the MFP would time out and return to the Home screen as expected However the Home screen w
2. Document No E3 0610 010 4 Dated October 27 2010 11 3 Evaluator Independent Testing The tests chosen for independent testing allow the evaluation team to exercise the TOE ina different manner than that of the developer s testing The intent of the independent tests is to give the evaluation team confidence that the TOE operates correctly in a wider range of conditions than would be possible purely using the developer s own efforts given a fixed level of resource The selected independent tests allow for a finer level of granularity of testing compared to the developer s testing or provide additional testing of functions that were not exhaustively tested by the developer The tests allow specific functions and functionality to be tested The tests reflect knowledge of the TOE gained from performing other work units in the evaluation The test environment used for the evaluation team s independent tests was identical with the test configuration used to execute the vendor tests 11 4 Evaluator Penetration Tests The evaluator examined sources of information publicly available to support the identification of possible potential vulnerabilities in the TOE The sources of the publicly available information are provided below e http cve mitre org Entries found for older versions e http google com e http osvdb org e http Awww securityfocus com Same vulnerabilities as on CVE 28 Lexmark MFPs with Hard Drives Validation
3. PROT ALT TSF Protected Data may be altered by unauthorized persons 12 Lexmark MFPs with Hard Drives Validation Report 6 Organizational Security Policies This section describes the Organizational Security Policies OSPs that apply to the TOE Table 4 Organizational Security Policies Name Definition P AUDIT LOGGING To preserve operational accountability and security records that provide an audit trail of TOE use and security relevant events will be created maintained and protected from unauthorized disclosure or alteration and will be reviewed by authorized personnel P INTERFACE MANAGEMENT To prevent unauthorized use of the input output interfaces of the TOE operation of the interfaces will be controlled by the TOE and its operational environment P SOFTWARE VERIFICATION To detect unintentional malfunction of the TSF procedures will exist to self verify TSF data P USER AUTHORIZATION To preserve operational accountability and security Users will be authorized to use the TOE only as permitted by the TOE Owner 13 Lexmark MFPs with Hard Drives Validation Report 7 High Level Description of Product Security Functionality The TOE provides the following security functionality 7 1 Audit Generation The TOE generates audit event records for security relevant events A severity level is associated with each type of auditable event only events at or
4. at the COACT CCTL in Columbia Maryland and at Lexmark International Inc in Lexington KY COACT employees performed the tests 11 1 Evaluator Functional Test Environment Testing was performed on a test configuration consisting of the following test bed configuration Figure 2 Test Configuration Setu FAX Machine ON Phone X Network Printer 1 No HDD Printer 2 No HDD Smart Card Reader InfoPrint 1940 Lexmark X463de 157 184 112 169 157 184 112 130 Printer 1 HDD Printer 2 HDD Smart Card Reader InfoPrint 1870 157 184 112 179 Lexmark X656de 157 184 112 164 y Network Monitor IP o f 157 187 112 99 ar Email Syslog Server Workstation Primary Domain Controller 157 184 112 112 157 184 112 202 10 199 21 38 10 199 46 126 An overview of the purpose of each of these systems is provided in the following table Table5 Test Configuration Overview System Purpose Workstation This system is configured to send print jobs to Printer 1 and to exchange email with the Email Server Primary This system acts as the Primary Domain Controller for the network Domain providing Active Directory Kerberos GSSAPI DNS NTP and PKI services Controller Email Syslog This system provides an SMTP server capable of receiving email from Server Printer 1 and forwarding it to a user on Workstation and a Syslog server capable of receiving and displaying Syslog messages
5. gt1 gt2 g21 g22 LR SP P311CCa and e 1988 MT Model 4859 gt1 gt2 g31 g32 LR SP P311CCa Evaluation Scheme United States NIAP Common Criteria Evaluation and Validation Scheme et Lexmark MFPs with Hard Drives Validation Report TOE Lexmark MFP Models e X466 LR BR P311CCa X656 LR MN P311CCa X658 LR MN P311CCa X738 LR FL P311CCa X860 LR SP P311CCa X862 LR SP P311CCa and e X864 LR SP P311CCa and InfoPrint MFP Models e 1940 MT Model 4570 gh1 gh2 gt1 gt2 LR BR P311CCa e 1870 MT Model 4567 gh1 gh2 gt1 gt2 LR MN P311CCa e 1880 MT Model 4568 gs1 gs2 gf1 gf2 gb1 gb2 g11 g12 g21 g22 g31 g32 LR MN P311CCa e Color 1866 MT Model 4915 gd1 gd2 gt1 gt2 LR FL P311CCa e 1948 MT Model 4857 g01 g02 g11 g12 LR SP P311CCa e 1968 MT Model 4858 gt1 gt2 g21 g22 LR SP P311CCa and 1988 MT Model 4859 gt1 gt2 g31 g32 LR SP P311CCa Protection Profile PP Identification 2600 1 Protection Profile for Hardcopy Devices Operational Environment A version 1 0 dated January 2009 PP Conformance e 2600 1 PP Protection Profile for Hardcopy Devices Operational Environment A e 2600 1 PRT SFR Package for Hardcopy Device Print Functions Operational Environment A e 2600 1 SCN SFR Package for Hardcopy Device Scan Functions Operational Environment A e 2600 1 CPY SFR Package for Hardcopy Device Copy Functions Operat
6. that provides protection from unmanaged access to the physical components and data interfaces of the TOE A ADMIN TRAINING Administrators are aware of the security policies and procedures of their organization are trained and competent to follow the manufacturer s guidance and documentation and correctly configure and operate the TOE in accordance with those policies and procedures A ADMIN TRUST Administrators do not use their privileged access rights for malicious purposes A IPSEC IPSec with ESP is used between the TOE and all remote IT systems with which it communicates over the network using IPv4 and or IPv6 A USER TRAINING TOE Users are aware of the security policies and procedures of their organization and are trained and competent to follow those policies and procedures 11 Lexmark MFPs with Hard Drives Validation Report 5 Threats The threats identified in the following table sections are addressed by the TOE and or Operating Environment The following threats are addressed by the TOE and IT environment respectively Table 3 Threats T CONF ALT TSF Confidential Data may be altered by unauthorized persons T CONF DIS TSF Confidential Data may be disclosed to unauthorized persons T DOC ALT User Document Data may be altered by unauthorized persons T DOC DIS User Document Data may be disclosed to unauthorized persons T FUNC ALT User Function Data may be altered by unauthorized persons T
7. MFPs with Hard Drives Validation Report 7 6 Fax Separation The Fax Separation security function assures that the information on the TOE and the information on the network to which the TOE is attached is not exposed through the phone line that provides connectivity for the fax function This function assures that only printable documents are accepted via incoming fax connections and that the only thing transmitted over an outgoing fax connection in the evaluated configuration is a document that was scanned for faxing 7 7 Hard Disk Encryption All user data saved on the Hard Disk is encrypted using 256 bit AES The types of data saved on the Hard Disk and therefore encrypted include buffered job data held jobs images referenced by other jobs and macros The contents of each file are automatically encrypted as they are written to the Hard Disk and automatically decrypted when the contents are read This security function is intended to protect against data disclosure if a malicious agent is able to gain physical possession of the Hard Disk This security function operates transparently to users and is always enabled in the evaluated configuration 7 8 Disk Wiping In the evaluated configuration the TOE is configured to perform automatic disk wiping with a multi pass method Files containing user data are stored on the internal hard drive until they are no longer needed At that time they are logically deleted and marked as needing to be wip
8. National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Common Criteria Evaluation and Validation Scheme Validation Report Lexmark X466 LR BR P311CCa X656 LR MN P311CCa X658 LR MN P311CCa X738 LR FL P311CCa X860 LR SP P311CCa X862 LR SP P311CCa and X864 LR SP P311CCa Multi Function Printers and InfoPrint 1940 MT Model 4570 gh1 gh2 gt1 gt2 LR BR P311CCa 1870 MT Model 4567 gh1 gh2 gt1 gt2 LR MN P311CCa 1880 MT Model 4568 gs1 gs2 gf1 gf2 gb1 gb2 g11 g12 g21 g22 g31 g32 LR MN P311CCa Color 1866 MT Model 4915 gd1 gd2 gt1 gt2 LR FL P311CCa 1948 MT Model 4857 901 g02 g11 gi2 LR SP P311CCa 1968 MT Model 4858 gt1 gt2 g21 g22 LR SP P311CCa and 1988 MT Model 4859 gt1 gt2 g31 g32 LR SP P311CCa Multi Function Printers Report Number CCEVS VR VID10373 2011 Dated 2 February 2011 National Institute of Standards and Technology National Security Agency Information Technology Laboratory Information Assurance Directorate 100 Bureau Drive 9800 Savage Road STE 6940 Gaithersburg MD 20899 Fort George G Meade MD 20755 6940 Lexmark MFPs with Hard Drives Validation Report ACKNOWLEDGEMENTS Validation Team Jerry Myers Ken Eggers Common Criteria Testing Laboratory COACT CAFE Laboratory Columbia Maryland 21046 2587 2 1 2 2 7 1 7 2 7 3 7 4 7 5 7 6 7 7 7 8 7 9 7 10 10 10 1 10 2 11 11 1 11 2 11 3 11 4 11 5 12 13 14 Lex
9. P GSSAPI use device credentials not anonymous bind so that the information retrieved from Active Directory can be restricted to a specific MFP Binds to LDAP servers for PKI authentication use user credentials from the card not anonymous bind so that the information retrieved from Active Directory can be restricted to a specific user Internal Accounts require both User ID and password rather than just User ID 20 Lexmark MFPs with Hard Drives Validation Report Audit event records are transmitted to a remote IT system as they are generated using the syslog protocol Disk wiping functionality is configured for automatic mode with a multi pass method This approach is the more secure form of disk wiping and conforms with NIST SP800 88 and the DSS Clearing and Sanitization Matrix CS SM User data sent by the MFP in email messages is sent as an attachment not as a web link No Java applications are loaded into the MFP by Administrators These applications are referred to as LES applications in end user documentation The following LES applications are installed by Lexmark before the TOE is shipped PKI Authentication PKI Held Jobs and CAC Smartcard Authentication Token No option card for downloadable emulators is installed in the TOE All fax jobs are stored on disk rather than NAND to ensure their contents are wiped upon completion of each job Incoming faxes are always held until released by an authorize
10. Report http secunia com Same vulnerabilities as on CVE htto www us cert gov Nothing found http securitytracker com Same vulnerabilities as on CVE http web nvd nist gov Same vulnerabilities as on CVE http www securityspace com Same vulnerabilities as on CVE htto www cvedetails com https www juniper net security auto vulnerabilities vuln6047 html https www infoprintsolutionscompany com internet comnelit nsf Files pjl advisor 032210 File pjl advisory 032210 pdf https www infoprintsolutionscompany com internet comnelit nsf Files ftp advisor 032210 File fto advisory 032210 pdf As noted in the list above many of the vulnerabilities found through publicly available information referred back to the CVE entries All of the vulnerabilities were mitigated or not directly related to the TOE and its intended environment No other vulnerabilities were found The evaluator performed the public domain vulnerability searches using the following key words Lexmark X466 X656 X658 X738 X860 X862 X864 Infoprint 1940 1870 1880 1866 1948 1968 1988 Linux 2 6 18 29 Lexmark MFPs with Hard Drives Validation Report These keywords were chosen since they include the developer name and model numbers of the TOE The TOE MFP incorporates a heavily customized version of the Linux 2 6 18 kernel for the O S Therefore this version of Linux was also checked for publicly available sources of vulnerability information
11. There may be two types of Users Normal and Administrator Objects are passive entities in the TOE that contain or receive information and upon which Subjects perform Operations Objects are equivalent to TOE Assets There are three categories of Objects User Data TSF Data and Functions User Data are data created by and for Users and do not affect the operation of the TOE Security Functionality TSF This type of data is composed of two types of objects User Document Data and User Function Data TSF Data are data created by and for the TOE and that might affect the operation of the TOE This type of data is composed of two types of objects TSF Protected Data and TSF Confidential Data Functions perform processing storage and transmission of data that may be present in the TOE These functions are described below Printing a function in which electronic document input is converted to physical document output Scanning a function in which physical document input is converted to electronic document output Copying a function in which physical document input is duplicated to physical document output Faxing a function in which physical document input is converted to a telephone based document facsimile fax transmission and a function in which a telephone based document facsimile fax reception is converted to physical document output Shared medium interface a function that transmits or receives User Data or TSF Data ove
12. Validation Report other items Each security template points to an authentication building block as well as an authorization building block the two building blocks may be the same or different The following summarizes the access controls and configuration parameters used by the TOE to control user access to the MFP functions provided by the TOE Printing Submission of print jobs from users on the network is always permitted Jobs that do not contain a PUL SET USERNAME statement are discarded Submitted jobs are always held on the TOE until released or deleted by a user authorized for the appropriate access control and whose userid matches the username specified when the job was submitted Scanning to Fax or Email Scanning may be performed as part of a fax or email function Only authorized users may perform scans Scanning for fax is allowed if the Enable Fax Scans configuration parameter is On and the user is authorized for the Fax Function access control Scanning for email is allowed if the user is authorized for the E mail Function access control e Copying allowed if the user is authorized for the Copy Function access control A user may view or delete their own copy jobs queued for printing Incoming faxes allowed if the Enable Fax Receive for analog fax mode or Enable Fax Receive for fax server mode configuration parameter is On Incoming faxes are always held in the queue until release
13. ain Controller Description Test Configuration Specific Details AD Users Groups User test that is a member of group Test_Group User test1 that is not a member of group Test_Group CAC user cac1 that is a member of group CAC_Group CAC user cac2 that is not a member of group CAC_Group CAC user admin that is a member of group Administrators DNS Configuration Entries for all active systems connected to IP Network NTP Configuration Acting as server No authentication required Table 8 Email Syslog Server Description Test Configuration Specific Details Syslog Configuration Receive via UDP Email Configuration No credentials required to send Email 26 Lexmark MFPs with Hard Drives Validation Report Table 9 Printer 1 Requirements Description Test Configuration Specific Details Internal Account Administrators Groups Users Restricted Internal Account Users User admin as a member of Administrators User user1 as a member of Users User user2 as a member of Users User user3 as a member of Restricted LDAP GSSAPI Configuration LDAP GSSAPI building block named LDAPGSSAPI with server Primary Domain Controller Kerberos Configuration KDC Address Primary Domain Controller KDC Port Kerberos port on Primary Domain Controller R
14. as frozen and selecting any of the icons i e Copy Fax Email had no effect Only selecting the Release Print Jobs button would unlock the MFP Home screen and normal operation could be resumed The firmware update addressed and corrected the issue 30 Lexmark MFPs with Hard Drives Validation Report Evaluator Test ET11 Analysis of the Key Zeroization Methodology revealed that the encryption keys were not zeroized The following summarizes the key zeroization after the firmware updates The RSA private key is not zeroized The 256 bit Disk Encryption Key is zeroized when disk encryption is turned off The IPSEC session keys and Diffie Hellman keys are zeroized Evaluator Tests ET08 Analysis of the RNG for the Disk Encryption and ET 13 Analysis of the ANSI X9 31 Appendix A 2 4 RNG revealed that the random number generator did not use ANSI X9 31 The following summarizes the random number generation after the firmware updates The version of OpenSSL code used by the TOE is 0 9 8 d This code has been supplemented with the ANSI X9 31 RNG from the OpenSSL version 1 2 The main functions and subfunctions of the ANSI X9 31 RNG have been implemented It was verified from source code that the ANSI X9 31 RNG is used to generate keys for the following algorithms e DES e TDES e AES e HMAC The testing of the updated firmware revealed that the product was implemented as described in the functional specification and d
15. below the severity level configured by an administrator are generated The time field is supplied by the TOE if internal time is configured by an administrator or by an NTP server if external time is configured As audit event records are generated they are forwarded to the remote syslog IT system configured by an administrator 7 2 Identification and Authentication Users are required to successfully complete the I amp A process before they are permitted to access any restricted functionality The set of restricted functionality is under the control of the administrators with the exception of submission of network print jobs which is also allowed The I amp A process is controlled by security templates that are associated with functions and menus Each security template specifies two building blocks one for authentication and the second for authorization The security template also includes a list of groups that are authorized to perform the function or access the menu that the security template is associated with When I amp A is necessary the TOE examines the authentication building block in the security template to determine what authentication mechanism should be used The general purpose mechanisms supported in the evaluated configuration are PKI authentication Internal Accounts and LDAP GSSAPI In the case of failed validations an error message is displayed on the touch panel and then the display returns to the previous screen for furth
16. ber 21 2010 34 Lexmark MFPs with Hard Drives Validation Report 15 List of Acronyms AES AlO BSD CAC CC CM EAL ESP FTP GSSAPI HTTP I amp A IPSec IPv4 IPv6 ISO IT KDC LAN LDAP MB MFD MFP NTP OSP PIV PJL PKI PP RFC SASL SFP SFR Advanced Encryption Standard All In One Berkeley Software Distribution Common Access Card Common Criteria Configuration Management Evaluation Assurance Level Encapsulating Security Payload File Transfer Protocol Generic Security Services Application Program Interface HyperText Transfer Protocol Identification amp Authentication Internet Protocol Security Internet Protocol version 4 Internet Protocol version 6 International Standards Organization Information Technology Key Distribution Center Local Area Network Lightweight Directory Access Protocol MegaByte Multi Function Device Multi Function Printer Network Time Protocol Organizational Security Policy Personal Identity Verification Printer Job Language Public Key Infrastructure Protection Profile Request For Comments Simple Authentication and Security Layer Security Function Policy Security Functional Requirement 35 Lexmark MFPs with Hard Drives Validation Report SMTP Simple Mail Transport Protocol ST Security Target TFTP Trivial File Transfer Protocol TOE Target of Evaluation TSF TOE Security Function Ul User Interface URL Uniform Resource Locator USB Universal Serial Bus 36 Lexmar
17. d in the evaluated configuration Only users authorized for the Release Held Faxes access control may release or delete the faxes 7 4 Management The TOE provides the ability for authorized administrators to manage TSF data Authorization is granular enabling different administrators to be granted access to different TSF data When an administrator modifies TSF data an audit record is generated The following touch panel menus are organized by the administrator menu structure Reports Menu Network Ports Menu Security Menu Settings Menu Fax Settings Menu Email Settings Menu Print Settings Setup Settings Menu The security reset jumper provides an alternate mechanism to manage some TSF data The TOE contains a hardware jumper that can be used to e erase all security templates building blocks and access controls that a user has defined i e the factory default configuration OR e force the value of each function access control to No Security all security templates and building blocks are preserved but not applied to any function 7 5 Operator Panel Lockout The Operator Panel Lockout function enables the touch panel to be locked to prevent anyone from using it until it is unlocked by an authorized user This function is enabled when a security template is associated with the Operator Panel Lock access control described above When enabled an icon is displayed on the Home page to lock the panel 15 Lexmark
18. d administrator Some form of credentials device or user is required to authenticate to the SMTP server Fax forwarding is disabled to limit the destinations for incoming faxes to the local printer only NPAP PJL and Postscript have the ability to modify system settings The capabilities specific to modifying system settings via these protocols are disabled All administrators must be authorized for all of the document processing functions print copy scan fax All network print jobs are held until released Every network print job must include a PJL SET USERNAME statement to identify the userid of the owner of the print job Held print jobs may only be released by an authenticated user with the same userid as specified in the print job Administrators are directed through operational guidance to specify passwords adhering to the following composition rules for Internal Accounts and the Backup Password e Aminimum of 8 characters e Atleast one lower case letter one upper case letter and one non alphabetic character e Nodictionary words or permutations of the user name All unnecessary network ports are disabled The following identifies the minimum hardware and software requirements for components provided by the IT Environment The TOE is a complete MFP including the firmware and hardware To be fully operational any combination of the following items may be connected to the TOE 21 Lexmark MFPs with Hard Drive
19. e datagram is discarded 7 10 Self Test During initial start up the TOE performs self tests on the hardware The integrity of the security templates and building blocks is verified by ensuring that all the security templates specified in access controls exist and that all building blocks referenced by security templates exist 16 Lexmark MFPs with Hard Drives Validation Report If any problems are detected with the hardware an appropriate error message is posted on the touch screen and operation is suspended If a problem is detected with the integrity of the security templates or building blocks the data is reset to the factory default an audit log record is generated an appropriate error message is posted on the touch screen and further operation is suspended In this case a system restart will result in the system being operational with the factory default settings for the data 17 Lexmark MFPs with Hard Drives Validation Report 8 Clarification of Scope The Target of Evaluation TOE is described using the standard Common Criteria terminology of Users Objects Operations and Interfaces Two additional terms are introduced e Channel describes both data interfaces and hardcopy document input output mechanisms and e TOE Owner is a person or organizational entity responsible for protecting TOE assets and establishing related security policies Users are entities that are external to the TOE and which interact with the TOE
20. ealm Realm configured on Primary Domain Controller Security Templates Administrators_Only with Internal_Accounts_Building_Block for authentication and authorization and group Administrators Authorized_Users with Internal_Accounts_ Building Block for authentication and authorization and group Users LDAPGSSAPI_ Users with LDAPGSSAPI for authentication and authorization and group Test_Group User Functions Enabled Fax Email Function Access Controls E mail LDAPGSSAPIL_ Users Fax Authorized_Users Solution 1 Authorized_Users All FACs restricted to Administrators Administrators_ Only Fax Configuration Enable Fax Receive On Fax Mode Analog Email Configuration Primary SMTP Gateway Email Syslog Server Primary SMTP Gateway Port Port used on Primary Domain Controller SMTP Server Authentication No authentication required User Initiated E mail None Security Audit Logging Configuration Remote Syslog Server Email Syslog Server Remote Syslog Method Normal UDP NTP Configuration Enable NTP On NTP Server Primary Domain Controller Table 10 Printer 2 Requirements Description Test Configuration Specific Details CAC Configuration Use MFP Kerberos Setup Set DC Validation Mode Device Certificate Validation A Certificate Authority certificate must be installed Kerberos Configuration KDC Address Primar
21. ed Until the wiping occurs the disk blocks containing the files are not available for use by any user Every 5 seconds the TOE checks to see if any deleted files are present and begins the disk wiping process The TOE overwrites each block associated with each deleted file including bad and remapped sectors three times first with OxOF i e 0000 1111 then with 0xFO i e 1111 0000 and finally with a block of random data supplied by the internal random number generator Each time that the device wipes a different file it selects a different block of random data This method conforms with NIST SP800 88 and the DSS Clearing and Sanitization Matrix C amp SM The TOE also overwrites RAM with a fixed pattern upon deallocation of any buffer used to hold user data 7 9 Secure Communications IPSec with ESP is required for all network datagram exchanges with remote IT systems IPSec provide confidentiality integrity and authentication of the endpoints Supported encryption options for ESP are TDES AES and DES Both SHA 1 and MD5 are supported for HMACs ISAKMP and IKE are used to establish the Security Association SA and session keys for the IPSec exchanges Diffie Hellman is used for key agreement using Oakley Groups 1 2 or 14 During the ISAKMP exchange the TOE requires the remote IT system to provide a certificate and the RSA signature for it is validated If an incoming IP datagram does not use IPSec with ESP th
22. ems are supplied to the fulfillment centers after they have been approved for release They are reproduced as needed by the fulfillment center to satisfy orders The part number on the order specifies whether Lexmark branded or InfoPrint branded materials are included in the shipment Reputable carriers that provide internet tracking capabilities are used for shipments to the customers The following documentation is delivered with the TOE Hard Drive MFP X656de MFP e Setup Installation Guide 16M1321 Hardcopy e Common Criteria Installation Supplement and Administrator Guide Hard Copy e Lexmark X651de X652de X654de X656de X656dte X658d X658de X658dme X658dfe X658dte X658dtme X658dtfe User s Guide Soft Copy e Quick Reference Guide Soft Copy e Lexmark Networking Guide Soft Copy 23 Lexmark MFPs with Hard Drives Validation Report Of the delivered documents identified above the following documents were reviewed as part of this evaluation Lexmark X651de X652de X654de X656de X656dte X658d X658de X658dme X658dfe X658dte X658dtme X658dtfe User s Guide Soft Copy This user manual is specific to the MFP delivered The delivery of each MFP includes the delivery of the user manual for that specific model Common Criteria Installation Supplement and Administrator Guide Hard Copy 10 2 Verifying Integrity of Hardware and Firmware Components The reputable carriers used for shipments ensure continuous contro
23. er user action An audit record for the failed authentication attempt is generated If validation is successful the TOE binds the username password account name email address group memberships for Internal Accounts only and name of the building block used for authentication to the user session for future use only the username and group memberships are security attributes An audit record for the successful authentication is generated The user session is considered to be active until the user explicitly logs off removes the card or the administrator configured inactivity timer for actions on the Home screen of the touch panel expires If the inactivity timer expires an audit record is generated If a user locks the touch panel the user session is terminated immediately Similarly after a user unlocks the touch panel the user session is terminated immediately 7 3 Access Control Access control validates the user access request against the authorizations configured by administrators for specific functions On a per item basis authorization may be configured as disabled no access no security open to all users or restricted via security templates some items do not support all three options Authorization is restricted by associating a security template with an item The security template assigned to each item may be the same or different as the security template s assigned to 14 Lexmark MFPs with Hard Drives
24. facilities to ensure they have the latest customer orders and Engineering Change Orders ECOs The real time communication is also used to send order status updates back to the corporate servers status updates for InfoPrint customers are relayed via Lexmark corporate servers If connectivity is lost the centers are allowed to operate autonomously for up to 18 hours If connectivity is not restored within that time processing at that center must be suspended Firmware images are supplied to the fulfillment centers after they have been approved for release The proprietary Manufacturing Execution System MES tool is responsible for coordinating the distribution of the images to the fulfillment centers The part number specified in the customer order directs the fulfillment center to install the evaluated version of firmware on the MFPs when specified by the customer Orders are received directly by Lexmark for Lexmark customers For InfoPrint customers the order is first received by InfoPrint and then electronically forwarded to Lexmark over a VPN Different part numbers are used to distinguish between equivalent Lexmark and InfoPrint models The proprietary Orion tool is used within the fulfillment centers to ensure the appropriate firmware is installed during the fulfillment process Each shipment includes a documentation CD as well as a hard copy version of the Common Criteria Installation supplement and administrator guide Masters for these it
25. from Printer 1 and Printer 2 This system may be combined with Primary Domain Controller 25 Lexmark MFPs with Hard Drives Validation Report System Purpose IP Network An IP network either IPv4 or lpv6 that is able to send a copy of the traffic between Workstation and Printer 1 to Network Monitor Printer 1 One instance of the TOE either a Lexmark or InfoPrint model without a Smart Card reader Printer 2 Second instance of the TOE either a Lexmark or InfoPrint model with a Smart Card reader Phone Network Analog telephone network providing connectivity between Printer 1 and Fax Machine This may be the Public Switched Telephone Network PSTN or Private Branch Exchange PABX or Telephone Line Emulator TLE Fax Machine Fax machine capable of exchanging faxes with Printer 1 via the Phone Network Network This system is used to act as the attack PC for the penetration tests and Monitor network monitoring The following tables provide more information about the systems and configuration information specific to the test procedures The configuration information consists of user accounts user groups and security templates to be used for the tests All active systems connected to IP Network are configured to use IPSec Table 6 Workstation Requirements Description Test Configuration Specific Details Authorized Users user Permitted Table 7 Primary Dom
26. he only source for outgoing faxes is the scanner Hard Disk Encryption All use data submitted to the TOE and stored on the hard disk is encrypted to protect its confidentiality in the event the hard drive was to be removed from the TOE Disk Wiping In the evaluated configuration the TOE automatically overwrites disk blocks used to store user data as soon as the data is no longer required The mechanism used to perform the overwrite complies with NIST SP800 88 and the DSS Clearing and Sanitization Matrix C amp SM available at http www sdisac com clearing and _sanitization_matrix doc Secure Communication The TOE protects the confidentiality and integrity of all information exchanged over the attached network by using IPSec with ESP for all network communication Self Test During initial start up the TOE performs self tests on its hardware components and the integrity of the building blocks and security templates 2 Identification The CCEVS is a joint National Security Agency NSA and National Institute of Standards and Technology NIST effort to establish commercial facilities to perform trusted product evaluations Under this program security evaluations are conducted by commercial testing laboratories called Common Criteria Testing Laboratories CCTLs using the Common Evaluation Methodology CEM for Evaluation Assurance Level EAL 1 through EAL 4 in accordance with National Voluntary Laboratory Assessment Program NVLAP accred
27. id not uncover any undocumented interfaces or other security vulnerabilities in the final evaluated version The evaluation team tests and vulnerability tests substantiated the security functional requirements in the ST 31 Lexmark MFPs with Hard Drives Validation Report 12 Results of the Evaluation The evaluator devised a test plan and a set of test procedures to test the TOE s mitigation of the identified vulnerabilities by testing the product for selected identified vulnerabilities The results of the testing activities were that all tests gave expected correct results No vulnerabilities were found to be present in the evaluated TOE The results of the penetration testing are documented in the vendor and CCTL proprietary report Lexmark Multi Function Printers and InfoPrint Multi Function Printers with Hard Drives Test Report Document No E3 0610 010 4 dated October 27 2010 The evaluation determined that the product meets the requirements for EAL 3 The details of the evaluation are recorded in the Evaluation Technical Report ETR which is controlled by COACT Inc 32 Lexmark MFPs with Hard Drives Validation Report 13 Validator Comments None 33 Lexmark MFPs with Hard Drives Validation Report 14 Security Target Lexmark X466 X656 X658 X738 X860 X862 X864 Multi Function Printers and InfoPrint 1940 1870 1880 Color 1866 1948 1968 1988 Multi Function Printers Security Target Version 2 8 Dated Octo
28. ional Environment A e 2600 1 FAX SFR Package for Hardcopy Device Fax Functions Operational Environment A and e 2600 1 SMI SFR Package for Hardcopy Device Shared medium Interface Functions Operational Environment A Lexmark MFPs with Hard Drives Validation Report Security Target Lexmark X466 X656 X658 X738 X860 X862 X864 Multi Function Printers and InfoPrint 1940 1870 1880 Color 1866 1948 1968 1988 Multi Function Printers Security Target Version 2 8 October 21 2010 Evaluation Technical Report Evaluation Technical Report for the Lexmark Multi Function Printers and InfoPrint Multi Function Printers with Hard Drives Document No E3 0710 014 4 Dated October 26 2010 Conformance Result Part 2 extended and Part 3 conformant Version of CC CC Version 3 1 1 2 3 4 and all applicable NIAP and International Interpretations effective on August 20 2009 Version of CEM CEM Version 3 1 and all applicable NIAP and International Interpretations effective on August 20 2009 Sponsor Lexmark International Inc 740 New Circle Road Lexington KY 40550 Developer Lexmark International Inc 740 New Circle Road Lexington KY 40550 Evaluator s COACT Incorporated Greg Beaver Pascal Patin David J Cornwell Douglas Spoerl Brian Pleffner Validator s NIAP CCEVS Jerry Myers Ken Eggers 2 2 Applicable Interpretations The following NIAP and Internat
29. ional Interpretations were determined to be applicable when the evaluation started NIAP Interpretations None International Interpretations None Lexmark MFPs with Hard Drives Validation Report 3 TOE Description The TOE provides the following functions related to MFPs Printing producing a hardcopy document from its electronic form Scanning producing an electronic document from its hardcopy form Copying duplicating a hardcopy document Faxing scanning documents in hardcopy form and transmitting them in electronic form over telephone lines and receiving documents in electronic form over telephone lines and printing them in hardcopy form All of the MFPs included in this evaluation provide the same security functionality Their differences are in the speed and type i e color or monochrome of printing For the InfoPrint MFPs a common brand name is used for MFPs both with and without a hard drive Therefore the MT Model is also included in the specification to limit the MFPs in this evaluation to only those including a hard drive Multiple MT Models are listed since they distinguish options such as staplers and paper tray sizes 10 Lexmark MFPs with Hard Drives Validation Report 4 Assumptions The assumptions listed below are assumed to be met by the environment and operating conditions of the system Table 2 Assumptions A ACCESS MANAGED The TOE is located in a restricted or monitored environment
30. itation The NIAP Validation Body assigns Validators to monitor the CCTLs to ensure quality and consistency across evaluations Developers of information technology products desire a security evaluation contract with a CCTL and pay a fee for their product s evaluation Upon successful completion of the evaluation the product is added to NIAP CCEVS Validated Products List Table 1 provides information needed to completely identify the product including e The Target of Evaluation TOE the fully qualified identifier of the product as evaluated e The Security Target ST describing the security features claims and assurances of the product e The conformance result of the evaluation e The organizations and individuals participating in the evaluation 2 1 Product Identification Identification for this evaluation is included in Table 1 Evaluation Identifier below Table 1 Evaluation Identifier Lexmark MFP Models e X466 LR BR P311CCa X656 LR MN P311CCa X658 LR MN P311CCa X738 LR FL P311CCa X860 LR SP P311CCa X862 LR SP P311CCa and X864 LR SP P311CCa and a MFP Models 1940 MT Model 4570 gh1 gh2 gt1 gt2 LR BR P311CCa e 1870 MT Model 4567 gh1 gh2 gt1 gt2 LR MN P311CCa 1880 MT Model 4568 gs1 gs2 gf1 gf2 gb1 gb2 g11 g12 g21 g22 g31 g32 LR MN P311CCa Color 1866 MT Model 4915 gd1 gd2 gt1 gt2 LR FL P311CCa 1948 MT Model 4857 g01 g02 g11 g12 LR SP P311CCa 1968 MT Model 4858
31. k MFPs with Hard Drives Validation Report 16 Bibliography The following list of standards was used in this evaluation e Common Criteria for Information Technology Security Evaluation Part 1 Introduction and General Model Version 3 1 Revision 2 dated September 2007 e Common Criteria for Information Technology Security Evaluation Part 2 Security Functional Requirements Version 3 1 Revision 2 dated September 2007 e Common Criteria for Information Technology Security Evaluation Part 3 Security Assurance Requirements Version 3 1 Revision 2 dated September 2007 e Common Methodology for Information Technology Security Evaluation Part 1 Version 3 1 Revision 2 dated September 2007 e Guide for the Production of PPs and STs Version 0 9 dated January 2000 37
32. l of the packages during shipment The shipping documentation received with an MFP identifies Lexmark or InfoPrint as appropriate as the source of the shipment Customers may verify this information via the shipper s web site The version number of software installed on the MFP may be printed once it is operational to ensure the evaluated version is installed The Common Criteria Installation supplement and administrator guide provides the following instructions to verify the physical interfaces and installed firmware Inspect the MFP to verify that only one network interface is installed There should be no optional network parallel or serial interfaces Note USB ports that perform document processing functions are disabled at the factory Turn the MFP on using the power switch From the home screen touch Menus gt Reports gt Menu Settings Page Several pages of device information will print Under Installed Features verify that no Download Emulator DLE option cards have been installed If you find additional interfaces or if a DLE card has been installed contact your Lexmark representative before proceeding To verify the firmware version under Device Information locate Base and Network Contact your Lexmark representative to verify that the Base and Network values are correct and up to date 24 Lexmark MFPs with Hard Drives Validation Report 11 IT Product Testing Testing was completed on October 27 2010
33. mark MFPs with Hard Drives Validation Report Table of Contents Executive Summary Identification Product Identification Applicable Interpretations TOE Description Assumptions Threats Organizational Security Policies High Level Description of Product Security Functionality Audit Generation Identification and Authentication Access Control Management Operator Panel Lockout Fax Separation Hard Disk Encryption Disk Wiping Secure Communications Self Test Clarification of Scope Architecture Information Product Delivery Delivery of Hardware Components Verifying Integrity of Hardware and Firmware Components IT Product Testing Evaluator Functional Test Environment Functional Test Results Evaluator Independent Testing Evaluator Penetration Tests Test Results Results of the Evaluation Validator Comments Security Target N N A 10 11 12 13 14 14 14 14 15 15 16 16 16 16 16 18 20 23 23 24 25 25 28 28 28 30 32 33 34 Lexmark MFPs with Hard Drives Validation Report 15 List of Acronyms 16 Bibliography Figure 1 Figure 2 Table 1 Table 2 Table 3 Table 4 Table 5 Table 6 Table 7 Table 8 Table 9 Table 10 Table 11 List of Figures TOE Moda aa Test Contiguration Setup DL A een A List of Tables Evaltation M elea e actives aera ete aa es han e PAS SUD ONS it lil did idad TOTNES ALS AAN aa Organizational Security Policies ooooncncnicnnnnncnocnconoonconoo
34. ncn nono cononononcnononos Test Configuration OVervieW ooooccoconcnoccconooncononncononnno nono nonncnnoonon non nico nonnnononanannoss Workstation Requirements ta ii Primary Domain Controller tecocis rt loiirsdciais de Email SV SIO SEO il ie lado Printer Reg irementS ils aoc a a a Printer 2 ROquireMSAiS siii ANTS C1767 9 Monta E earner N arate Lexmark MFPs with Hard Drives Validation Report 1 Executive Summary This report documents the NIAP Validators assessment of the CCEVS evaluation of the following Lexmark Multi Function Printers MFPs at EAL3 X466 LR BR P311CCa X656 LR MN P311CCa X658 LR MN P311CCa X738 LR FL P311CCa X860 LR SP P311CCa X862 LR SP P311CCa and X864 LR SP P311CCa and the following InfoPrint MFPs at EAL3 e 1940 MT Model 4570 gh1 gh2 gt1 and gt2 LR BR P311CCa e 1870 MT Model 4567 gh1 gh2 gt1 and gt2 LR MN P311CCa 1880 MT Model 4568 gs1 gs2 gf1 gf2 gb1 gb2 g11 g12 g21 g22 g31 and g32 LR MN P311CCa Color 1866 MT Model 4915 gd1 gd2 gt1 and gt2 LR FL P311CCa 1948 MT Model 4857 g01 g02 g11 and g12 LR SP P311CCa 1968 MT Model 4858 gt1 gt2 g21 and g22 LR SP P311CCa and 1988 MT Model 4859 gt1 gt2 g31 and g32 LR SP P311CCa It presents the evaluation results their justifications and the conformance result The evaluation was performed by the CAFE Laboratory of COACT Incorporated located in Columbia Maryland The evaluati
35. ntly in development which require many operations to be performed locally via the touch screen panel In addition this mechanism is preferred over remote management capability because it requires physical access to the TOE is more resistant to brute force password attacks and precludes network based attacks on the management functions Disk encryption is enabled Access controls are configured for all TSF data so that only authorized administrators are permitted to manage those parameters All network communication is required to use IPSec with ESP to protect the confidentiality and integrity of the information exchanged Certificates presented by remote IT systems are validated Support for AppleTalk NetWare IPX and LexLink are disabled since these protocols do not provide confidentiality and integrity protection I amp A may use Internal Accounts and or LDAP GSSAPI on a per user basis The Backup Password mechanism may be enabled at the discretion of the administrators If PKI authentication is used all I amp A must use the PKI authentication mechanism No other I amp A mechanisms are included in the evaluation because they provide significantly lower strength than the supported mechanisms LDAP GSSAPI and PKI authentication require integration with an external LDAP server such as Active Directory This communication uses default certificates the LDAP server must provide a valid certificate to the TOE Binds to LDAP servers for LDA
36. on was completed on 2 February 2011 The information in this report is largely derived from the Evaluation Technical Report ETR written by COACT and submitted to the Validators The evaluation determined the product conforms to the CC Version 3 1 Revision 2 Part 2 and Part 3 to meet the requirements of Evaluation Assurance Level EAL 3 resulting in a pass in accordance with CC Part 1 paragraph 175 The TOE is any of the Lexmark MFPs and InfoPrint MFPs with model identifiers specified above The MFPs are multi functional printer systems with scanning fax and networked capabilities Their capabilities extend to walk up scanning and copying scanning to fax scanning to email and servicing print jobs through the network The MFPs feature an integrated touch sensitive operator panel The major security features of the TOE are e All Users are identified and authenticated as well as authorized before being granted permission to perform any restricted TOE functions e Administrators authorize Users to use the functions of the TOE e User Document Data are protected from unauthorized disclosure or alteration e User Function Data are protected from unauthorized alteration 5 Lexmark MFPs with Hard Drives Validation Report e TSF Data of which unauthorized disclosure threatens operational security are protected from unauthorized disclosure e TSF Data of which unauthorized alteration threatens operational security are protec
37. r a communications medium which is or can be shared by other 18 Lexmark MFPs with Hard Drives Validation Report users such as wired or wireless network media and most radio frequency wireless media Figure 1 TOE Model 19 Lexmark MFPs with Hard Drives Validation Report 9 Architecture Information The following configuration options apply to the evaluated configuration of the TOE The TOE includes the single Ethernet interface that is part of the standard configuration of every MFP model No optional network interfaces are installed No optional parallel or serial interfaces are installed These are for legacy connections to specific IT systems only All USB ports on the MFPs that perform document processing functions are disabled In the operational environments in which the Common Criteria evaluated configuration is of interest the users typically require that all USB ports are disabled If PKI authentication is used the card reader is physically connected to a specific USB port during TOE installation in the evaluated configuration this USB port is limited in functionality to acting as the interface to the card reader If a card reader is installed the PKI authentication functionality is the only I amp A mechanism that can be used All management functions are performed via the touch screen panel and the HTTP S server for remote management is disabled This is done to align the TOE with the P2600 protection profiles curre
38. s Validation Report A LAN for network connectivity The TOE supports IPv4 and IPv6 A telephone line for fax capability IT systems that submit print jobs to the MFP via the network using standard print protocols IT systems that send and or receive faxes via the telephone line An IT system acting as the remote syslog recipient of audit event records sent from the TOE LDAP server to support Identification and Authentication I amp A This component is optional depending on the type s of I amp A mechanisms used Card reader and cards to support PKI authentication using Common Access Card CAC or Personal Identity Verification PIV cards This component is optional depending on the type s of I amp A mechanisms used The supported card readers are Omnikey 5121 SmartCard Reader Omnikey 5321 SmartCard Reader e Omnikey 5125 SmartCard Reader Omnikey 3121 SmartCard Reader Any other Omnikey SmartCard Readers that share the same USB Vendor IDs and Product IDs with the above readers example Omnikey 3021 and SCM SCR 331 22 Lexmark MFPs with Hard Drives Validation Report 10 Product Delivery 10 1 Delivery of Hardware Components Fulfillment centers receive hardware shipments from the factory in sealed containers The centers are responsible for integration of the hardware installation of the firmware and shipment to the customer The centers have secure real time communication with the Lexmark corporate
39. ted from unauthorized alteration e Document processing and security relevant system events are recorded and such records are protected from disclosure or alteration by anyone except for authorized personnel The TOE provides the following security functionality Audit Generation The TOE generates audit event records for security relevant events and transmits them to a remote IT system using the syslog protocol Identification and Authentication The TOE supports I amp A with a per user selection of internal accounts processed by the TOE or integration with an external LDAP server in the operational environment PKI authentication may also be specified in which case all authentication must use PKI A Backup Password mechanism may also be enabled Access Control Access controls configured for functions e g fax usage and menu access are enforced by the TOE Management Through the touch panel authorized administrators may configure access controls and perform other TOE management functions Operator Panel Lockout Authorized users may lock and unlock the touch panel When the touch panel is locked print jobs are still accepted but they are queued on the disk drive until the touch panel is unlocked Fax Separation The TOE ensures that only fax traffic is sent or received via the attached phone line Incoming traffic is processed as fax data only no management access or other data access is permitted In the evaluated configuration t
40. y Domain Controller KDC Port Kerberos port on Primary Domain Controller Realm Realm configured on Primary Domain Controller Security Templates Administrators_Only with PKI_Auth for authentication and authorization and group Administrators CAC_Users with PKI_Auth for authentication and authorization and group CAC_Group User Functions Enabled Copy Function Access Controls Copy CAC_Users All other required FACs Administrators_Only Security Audit Logging Remote Syslog Server Email Syslog Server 27 Lexmark MFPs with Hard Drives Validation Report Description Test Configuration Specific Details Configuration Remote Syslog Method Normal UDP NTP Configuration Enable NTP On NTP Server Primary Domain Controller Table 11 Network Monitor Description Test Configuration Specific Details Penetration and Attack windows XP Professional SP3 1095 Internet Explorer 8 0 6001 18702 Firefox 3 6 8 WinZip 10 ZENMAP GUI 5 21 Snaglt 8 WireShark 1 4 0 Nessus Version 4 2 Revision 11 Paros Proxy 3 2 13 11 2 Functional Test Results The repeated developer test suite includes all of the developer functional tests Additionally each of the Security Function and developer tested TSFI are included in the CCTL test suite Results are found in the Lexmark Multi Function Printers and InfoPrint Multi Function Printers with Hard Drives Test Report

Download Pdf Manuals

image

Related Search

Related Contents

Ronda 160 Montageanleitung DE_FR  Woods Equipment GILL STR48S-2 User's Manual  PowerNET P-600  GSM VoIP Gateway User Guide - PLANET Technology Corporation.  PCQ715A90V  Cómo escanear  Avis d`émission - Côte d`Albâtre  Aerotech NDrive HL Manual  マイクロジェット・クライオトラップ MODEL MJT  取扱説明書 AQUA-LIFT MAX-MOON  

Copyright © All rights reserved.
Failed to retrieve file