FOS FIPSCC ConfigGuide v73x
FOS FIPSCC ConfigGuide v73x
13 February 2015
Supporting Fabric OS 7.3.0 for FIPS and 7.3.0a1 for Common Criteria
© 2015, Brocade Communications Systems, Inc. All Rights Reserved.
ADX, Brocade, Brocade Assurance, the B-wing symbol, DCX, Fabric OS, HyperEdge, ICX, MLX, MyBrocade, OpenScript, The Effortless
Network, VCS, VDX, Vplane, and Vyatta are registered trademarks, and Fabric Vision and vADX are trademarks of Brocade
Communications Systems, Inc., in the United States and/or in other countries. Other brands, products, or service names mentioned may be
trademarks of others.
Notice: This document is for informational purposes only and does not set forth any warranty, expressed or implied, concerning any
equipment, equipment feature, or service offered or to be offered by Brocade. Brocade reserves the right to make changes to this document
at any time, without notice, and assumes no responsibility for its use. This informational document describes features that may not be
currently available. Contact a Brocade sales office for information on feature and product availability. Export of technical data contained in
this document may require an export license from the United States government.
The authors and Brocade Communications Systems, Inc. assume no liability or responsibility to any person or entity with respect to the
accuracy of this document or any loss, cost, liability, or damages arising from the information contained herein or the computer programs that
accompany it.
The product described by this document may contain open source software covered by the GNU General Public License or other open
source license agreements. To find out which open source software is included in Brocade products, view the licensing terms applicable to
the open source software, and obtain a copy of the programming source code, please visit http://www.brocade.com/support/oscd.
Contents
Preface..................................................................................................................................... 5
Document conventions......................................................................................5
Text formatting conventions.................................................................. 5
Command syntax conventions.............................................................. 5
Notes, cautions, and warnings.............................................................. 6
Brocade resources............................................................................................ 7
Contacting Brocade Technical Support.............................................................7
Document feedback.......................................................................................... 8
Overview of FIPS......................................................................................................................11
FIPS overview................................................................................................. 11
Public and private key management for FIPS compliance .................11
Firmware upgrade and downgrade considerations......................................... 12
FIPS mode firmware upgrade and downgrade considerations........... 12
Non-FIPS mode firmware upgrade and downgrade considerations... 13
Firmware downloading considerations............................................................13
Zeroization Functions..............................................................................................................15
Overview of zeroization ..................................................................................15
Restrictions on zeroization.................................................................. 15
Zeroization functions described ..................................................................... 15
Zeroizing a switch for FIPS............................................................................. 17
FIPS Configuration..................................................................................................................19
Overview of FIPS mode configuration.............................................................19
Displaying the FIPS configuration................................................................... 19
Fabric OS feature behaviors in FIPS and non-FIPS mode ............................ 19
LDAP functionality in FIPS mode.................................................................... 21
Setting up LDAP for FIPS mode......................................................... 22
LDAP CA certificates and FIPS mode ................................................23
Importing an LDAP CA certificate....................................................... 23
Exporting an LDAP CA certificate....................................................... 24
Deleting an LDAP CA certificate......................................................... 24
● Document conventions......................................................................................................5
● Brocade resources............................................................................................................ 7
● Contacting Brocade Technical Support.............................................................................7
● Document feedback.......................................................................................................... 8
Document conventions
The document conventions describe text formatting conventions, command syntax conventions, and
important notice formats used in Brocade technical documentation.
Format Description
bold text Identifies command names
Identifies keywords and operands
Identifies the names of user-manipulated GUI elements
Identifies text to enter at the GUI
Convention Description
bold text Identifies command names, keywords, and command options.
italic text Identifies a variable.
value In Fibre Channel products, a fixed value provided as input to a command
option is printed in plain text, for example, --show WWN.
Convention Description
NOTE
A Note provides a tip, guidance, or advice, emphasizes important information, or provides a reference
to related information.
ATTENTION
An Attention statement indicates a stronger note, for example, to alert you when traffic might be
interrupted or the device might reboot.
CAUTION
A Caution statement alerts you to situations that can be potentially hazardous to you or cause
damage to hardware, firmware, software, or data.
DANGER
A Danger statement indicates conditions or situations that can be potentially lethal or
extremely hazardous to you. Safety labels are also attached directly to products to warn of
these conditions or situations.
Brocade resources
Visit the Brocade website to locate related documentation for your product and additional Brocade
resources.
You can download additional publications supporting your product at www.brocade.com. Select the
Brocade Products tab to locate your product, then click the Brocade product name or image to open the
individual product page. The user manuals are available in the resources module at the bottom of the
page under the Documentation category.
To get up-to-the-minute information on Brocade products and resources, go to MyBrocade. You can
register at no cost to obtain a user ID and password.
Release notes are available on MyBrocade under Product Downloads.
White papers, online demonstrations, and data sheets are available through the Brocade website.
Brocade customers
For product support information and the latest information on contacting the Technical Assistance
Center, go to http://www.brocade.com/services-support/index.html.
If you have purchased Brocade product support directly from Brocade, use one of the following methods
to contact the Brocade Technical Assistance Center 24x7.
Preferred method of contact for non- Required for Sev 1-Critical and Sev [email protected]
urgent issues: 2-High issues:
Please include:
• My Cases through MyBrocade • Continental US: 1-800-752-8061
• Problem summary
• Software downloads and licensing • Europe, Middle East, Africa, and
• Serial number
tools Asia Pacific: +800-AT FIBREE
(+800 28 34 27 33) • Installation details
• Knowledge Base
• For areas unable to access toll • Environment description
free number: +1-408-333-6061
• Toll-free numbers are available in
many countries.
• Brocade Supplemental Support augments your existing OEM support contract, providing direct
access to Brocade expertise. For more information, contact Brocade or your OEM.
• For questions regarding service levels and response times, contact your OEM/Solution Provider.
Document feedback
To send feedback and report errors in the documentation you can use the feedback form posted with
the document or you can e-mail the documentation team.
Quality is our first concern at Brocade and we have made every effort to ensure the accuracy and
completeness of this document. However, if you find an error or an omission, or you think that a topic
needs further development, we want to hear from you. You can provide feedback in two ways:
• Through the online feedback form in the HTML documents posted on www.brocade.com.
• By sending your feedback to [email protected].
Provide the publication title, part number, and as much detail as possible, including the topic heading
and page number if applicable, as well as your suggestions for improvement.
● FIPS overview................................................................................................................. 11
● Firmware upgrade and downgrade considerations......................................................... 12
● Firmware downloading considerations............................................................................13
FIPS overview
The Federal Information Processing Standards (FIPS) are a set of U.S. Federal government standards
which describe information technology practices and requirements (including document processing,
encryption algorithms and device access restrictions) for use within non-military government agencies
and by government contractors and vendors who work with those agencies.
Fabric OS 6.0.0 and later provided the capability to configure a switch to be FIPS-compliant. This guide
describes how to prepare and configure a switch for FIPS using Fabric OS 7.3.0. In this guide, “FIPS
mode” identifies a switch that is configured and operating in compliance with the FIPS standards.
NOTE
This guide also contains instructions on how to configure a Brocade FOS switch to Common Criteria
standards. Configuration instructions for Common Criteria and FIPS are mutually exclusive. Please
refer to the Common Criteria Certification on page 33 for details on how configure the Brocade FOS
switch to Common Criteria standards.
ATTENTION
When it is enabled, FIPS mode is a chassis-wide setting that affects all logical switches. Once enabled,
FIPS mode cannot be disabled.
NOTE
Brocade recommends that firmware upgrade/downgrade for switches in FIPS mode should only be
done between FIPS-certified versions of Brocade Fabric OS. Currently these are releases 7.1.0, 7.2.1,
and 7.3.0.
NOTE
Once you have upgraded the switch firmware to Fabric OS 7.3.0, if you want to use SHA1-based
signature generation and verification for SSH connections, you can disable the SHA-256 encryption by,
entering fipscfg -disable sha256. This is not recommended.
ATTENTION
A switch is considered to be in FIPS mode only if the output of fipscfg -verify fips lists the compliance
of all parameters as PASS. It is considered to be FIPS-compliant only if all parameters are passed and
the anti-tampering labels are correctly applied to the switch body.
Refer to the Fabric OS Administrator's Guide for more information on upgrading or downgrading your
firmware.
NOTE
SAS, DMM, and other third-party application images are not signed.
Overview of zeroization
Zeroization is a method of erasing electronically stored data, cryptographic keys, and critical security
parameters (CSPs) by altering or deleting the contents of the data storage to prevent recovery of the
data. Zeroization erases all potentially sensitive information in the switch memory. This includes erasing
the main memory, cache memories, and any memory locations that may contain security data, including
NVRAM and flash memory.
Restrictions on zeroization
• Zeroization parameters cannot be configured.
• Zeroization can only be invoked through the command line interface (CLI).
• Zeroization should only be performed by a local operator who has physical control of the
cryptographic module, with all network connections physically disconnected.
The following table lists the various keys used in the system that will be zeroized in a FIPS-compliant
Fabric OS module. Zeroization for individual keys can be invoked by specific commands, but zeroization
using the fipsCfg command is not configurable.
DH private keys No command required Keys will be zeroized within code before they are released from
memory.
FCAP private key secCertUtil delete -- Removes all FCAP certificates and FCAP private keys.
fcapall -nowarn
FCSP Challenge secAuthSecret -- The secAuthSecret --create command is used to input the keys,
Handshake remove and the secAuthSecret --remove command is used to remove
Authentication and zeroize the keys. All the DH-CHAP and FCAP authenticated
Protocol (CHAP) ports are disabled after zeroization.
Secret
LDAP CA certificate secCertUtil delete – The given LDAP certificate file is zeroized and deleted from the
ldapcacert certname module.
NOTE
In a dual-CP system, executing the passwdDefault command in
the active CP synchronizes passwords with the standby CP. This
causes user-defined accounts to be removed from both the active
and standby CPs and only the default accounts (root, factory,
admin, and user) are retained. The passwords for these accounts
are then set to the factory defaults.
ATTENTION
To maintain FIPS 140-2 compliance, passwords for the default
accounts (admin and user) must be changed after every
zeroization operation.
RADIUS secret aaaConfig –-remove The aaaConfig --remove command zeroizes the secret and
deletes a configured server. The aaaConfig --add command
configures the RADIUS server.
RNG seed key No command required The /dev/urandom function is used as the initial source of seed for
RNG. The RNG seed key is zeroized on every random number
generation.
SSH RSA private No command required To support passwordless login to the switch.
key
SSH ECDSA private sshUtil delprivkey To support ECDSA Key based passwordless SSH login.
Key
SSH session key No command required This key is generated for each SSH session that is established with
the host. It automatically zeroizes on session termination.
ECDSA K random No command required Used for a session and zeroized after each session.
value
TLS private keys secCertUtil delkey -all The secCertUtil delkey -all command is used to zeroize these
keys. The secCertUtil genkey command creates the keys. Only
2048-bit RSA keys are allowed in FIPS mode.
NOTE
The passwords for the default accounts (admin and user) should be changed after every zeroization
operation to maintain FIPS 140-2 compliance.
3. Power-cycle the switch.
NOTE
Remote Procedure Calls (RPC) are not supported in FIPS mode.
DH-CHAP and FCAP hashing SHA-256 with group 4 MD5 and SHA-1
algorithms
The FCAP certificate must be 2048 bits
DH-CHAP Shared Secret Minimum length of 32 bytes for secret Minimum length of 8 bytes
for secret
HTTP and HTTPS access HTTPS only (Refer to Note following table.) HTTP and HTTPS
Internet Protocol security (IPsec) Usage of AES-XCBC, MD5, and Diffie-Hellman No restrictions
group 1 are blocked. IPsec is not allowed in FIPS
mode.
LDAP CA CA certificate with public key size of 2048 bits and CA certificate is optional
signed with SHA-256 must be available. (Refer to
Note following table.)
Common certificate for FCAP Common Certificate is not supported in FIPS Supported
and HTTPS authentication mode; the FCAP certificate must be 2048 bits.
(Refer to Note following table.)
Signed firmware download Mandatory firmware signature validation (SCP Optional firmware
only) signature validation (FTP
and SCP)
RSA 2048-bit keys only.
SSH algorithms SHA-256 with Diffie-Hellman for RSA and ECDSA No restrictions
pCurve with SHA-256
HMAC-SHA1, HMAC-SHA2-256, HMAC-
SHA2-512
3DES-CBC, AES128-CBC, AES192-CBC, and
AES256-CBC cipher suites
SSH public keys RSA 2048-bit keys with SHA-256, AES-128, and RSA 1024-bit keys, RSA
ECDSA public key with SHA-256 2048-bit keys, and DSA
1024-bit keys
NOTE
Lower security certificates can be imported, but during the import you will have to confirm that you want
to use such a certificate to continue. This restriction applies to the CA, HTTPS, LDAP, and FCAP
features. This option is provided to support downgrade.
The certificate of the CA that issued the Microsoft There is no mandatory CA certificate installation on the
Active Directory server certificate must be installed switch.
on the switch.
Configure FIPS-compliant TLS ciphers [TDES-168, On the Microsoft Active Directory server, there is no
AES-128, AES-256, SHA-1, and RSA-2048] on the configuration of the FIPS-compliant TLS ciphers.
Microsoft Active Directory server. The host needs
a reboot for the changes to take effect.
The switch uses FIPS-compliant ciphers The Microsoft Active Directory server certificate is validated if
regardless of the Microsoft Active Directory server the CA certificate is found on the switch.
configuration. If the Microsoft Active Directory
server is not configured for FIPS ciphers,
authentication will still succeed.
The Microsoft Active Directory server certificate is If the Microsoft Active Directory server is configured for FIPS
validated by the LDAP client. If the CA certificate is ciphers and the switch is in non-FIPS mode, then user
not present on the switch, then user authentication authentication will succeed.
will fail.
Enter option
1 Display Domain Name Service (DNS) configuration
2 Set DNS configuration
3 Remove DNS configuration
4 Quit
Select an item: (1..4) [4] 2
Enter Domain Name: [] domain.com
Enter Name Server IP address in dot notation: [] 123.123.123.123
Enter Name Server IP address in dot notation: [] 123.123.123.124
DNS parameters saved successfully
Enter option
1 Display Domain Name Service (DNS) configuration
2 Set DNS configuration
3 Remove DNS configuration
4 Quit
Select an item: (1..4) [4] 4
Specify the DNS IP address using either IPv4 or IPv6. This address is needed for the switch to
resolve the domain name to the IP address because LDAP initiates a TCP session to connect to
your Microsoft Active Directory server. A Fully Qualified Domain Name (FQDN) is needed to
validate the server identity as mentioned in the common name of the server certificate.
3. Set the switch authentication mode and add your LDAP server by using the commands shown in
the following example. Provide the Fully Qualified Domain Name (FQDN) of the Microsoft Active
Directory server for the host name parameter while configuring LDAP.
The following example sets up LDAP for FIPS mode.
switch:admin> aaaconfig --add GEOFF5.ADLDAP.LOCAL -conf ldap -d adldap.local -p
389 -t 3
switch:admin> aaaconfig --authspec "ldap;local"
switch:admin> aaaconfig -show
RADIUS CONFIGURATIONS
=====================
RADIUS configuration does not exist.
LDAP CONFIGURATIONS
===================
Position : 1
Server : GEOFF5.ADLDAP.LOCAL
Port : 389
Domain : adldap.local
Timeout(s) : 3
Primary AAA Service: LDAP
Secondary AAA Service: Switch database
4. Set up LDAP according to the instructions in “LDAP configuration and Microsoft Active Directory” in
the Fabric OS Administrator's Guide, and then configure the following additional Microsoft Active
Directory settings.
a) To support FIPS-compliant TLS cipher suites on the Microsoft Active Directory server, allow
the SCHANNEL settings listed in Table 5 .
TABLE 5 Active Directory keys to modify
Key Sub-key
Ciphers 3DES
Hashes SHA1
Protocols TLSv1.0
b) Enable the FIPS algorithm policy on the Microsoft Active Directory server.
WARNING!!!
About to delete certificate: swLdapca.pem
ARE YOU SURE (yes, y, no, n): [no] y
Deleted LDAP certificate successfully
ATTENTION
You need both securityadmin and admin permissions to enable FIPS mode.
To enable FIPS mode on a Brocade Fabric OS device, complete the following steps.
1. Connect to the device and log in using an account with admin permissions.
2. Disable password distribution for the switch by completing the following steps.
a) Enter fddcfg --localreject PWD. PWD is the name of the password database
b) Optional: Enter fddcfg --show to confirm that password distribution has been disabled on
this switch.
The following example illustrates this set of commands. The changed setting is called out for
illustrative purposes.
device:admin> fddcfg --localreject PWD
Local Switch Configured to reject policies.
IPFILTER - accept
(output truncated)
3. Zeroize the switch by completing the following steps.
a) Log in to the switch using an account with securityadmin permissions.
b) Enter fipscfg --zeroize to zeroize the switch.
c) Power-cycle the switch.
Complete the following steps to configure the switch for FIPS.
4. Log in to the switch again using an account with securityadmin permissions.
5. Use the passwd command to change the passwords for all existing user accounts.
6. Use the ipfilter --addrule command to delete or block access to the Telnet port. The rule policy
name and rule number can be arbitrary, but the value for -sip must be any, the value for -dp must
be 23, the value for -proto must be tcp, and the value for -act must be deny.
The following example illustrates this command.
device:admin> ipfilter --addrule new_ipv4 -rule 1 -sip any -dp 23 -proto tcp -act
deny
7. Use the ipfilter --addrule command to delete or block access to the HTTP port. The rule policy
name and rule number can be arbitrary, but the value for -sip must be any, the value for -dp must
be 80, the value for -proto must be tcp, and the value for -act must be deny.
The following example illustrates this command.
device:admin> ipfilter --addrule new_ipv4 -rule 1 -sip any -dp 80 -proto tcp -act
deny
8. Use the ipfilter --show command to display the rule numbers.
The following example illustrates this command.
device:admin> ipfilter --show
Name: default_ipv4, Type: ipv4, State: active
Rule Source IP Protocol Dest Port Action
1 any tcp 22 permit
2 any tcp 23 permit
3 any tcp 80 permit
4 any tcp 443 permit
5 any udp 161 permit
6 any udp 123 permit
7 any tcp 600 - 1023 permit
8 any udp 600 - 1023 permit
Name: default_ipv6, Type: ipv6, State: active
Rule Source IP Protocol Dest Port Action
1 any tcp 22 permit
2 any tcp 23 permit
3 any tcp 80 permit
4 any tcp 443 permit
5 any udp 161 permit
6 any udp 123 permit
7 any tcp 600 - 1023 permit
8 any udp 600 - 1023 permit
9. Use the ipfilter --delrule command to delete or block access to the RPC port. This is accomplished
by removing the last two rules in the policy, using the same rule name as in the previous steps. In
this case they are rules 7 and 8 (based on the results of the previous step).
The following example illustrates these commands.
device:admin> ipfilter --delrule new_ipv4 -rule 8
device:admin> ipfilter --delrule new_ipv4 -rule 7
10.Repeat steps 5 through 7 and then step 9 for the IPv6 policy. (There is no need to repeat step 8.)
The following example illustrates these commands.
device:admin> ipfilter --addrule new_ipv6 -rule 1 -sip any -dp 23 -proto tcp -act
deny
device:admin> ipfilter --addrule new_ipv6 -rule 1 -sip any -dp 80 -proto tcp -act
deny
device:admin> ipfilter --delrule new_ipv6 -rule 8
device:admin> ipfilter --delrule new_ipv6 -rule 7
NOTE
Do not use FTP services for the commands in these steps.
a) Use the configUpload command to save the existing configuration to the server.
device:admin> configupload -all -p scp 192.0.2.3,Administrator,config.out
NOTE
FIPS compliance requires that you do not use MD5 and SHA-1 hashes, or Diffie-Hellman groups 0
through 3 within the DH-CHAP and FCAP authentication protocols.
a) Enter authUtil --set -h sha256 to set the hash type for the DH-CHAP and FCAP
authentication protocols to SHA-256.
b) Enter authUtil --set -g 4 to set the Diffie-Hellman group to 4. Group 4 is the only Diffie-
Hellman group allowed for FIPS.
c) Optional: You can verify these configurations using the authUtil --show command.
ATTENTION
Do not define FCIP Internet Key Exchange or Internet Protocol security (IPsec) policies.
15.Enter ipSecConfig --disable to disable IPsec for Ethernet.
16.For FX8-24, disable IPsec for FCIP connections. The procedure depends on the type of extension
blade used. For FX8-24 extension blades, enter portCfg fciptunnel [slot]/port modify -ipsec 0.
Refer to theFabric OS Administrator's Guide for instructions on disabling IPsec for FCIP
connections on other devices.
17.Enter portCfg --mgmtif delete to disable in-band management.
18.Use the portDisable port_number command to disable each E_Port on the switch.
You must disable the ports before disabling in-flight encryption.
19.Enter portCfgEncrypt --disable to disable in-flight encryption for the switch E_Ports.
20.Use the portEisable port_number command to re-enable each E_Port on the switch.
The following example illustrates this series of commands for port 0.
device:admin> portdisable 0
device:admin> portcfgencrypt --disable 0
device:admin> portenable 0
21.Optional: If TACACS+ authentication, PAP, or CHAP are configured, enter aaaConfig --authspec
local to disable authspec mode.
22.Install the LDAP CA certificate on the switch and Microsoft Active Directory server.
Refer to LDAP CA certificates and FIPS mode on page 23 for detailed instructions.
NOTE
The LDAP CA certificate should be RSA 2048-bit signed with SHA-256.
23.Enter snmpConfig --set seclevel to turn on SNMP security.
When prompted to select the SNMP GET Security Level, enter 0, for no security. When prompted to
select the SNMP SET Security Level, enter 3, for no access.
The following example illustrates this series of commands.
device:admin> snmpconfig --set seclevel
NOTE
If the switch is set for LDAP, refer to the instructions in Setting up LDAP for FIPS mode on page 22.
26.Enter configure and respond to the following prompts to enable signed firmware:
• System services: No
• cfgload attributes: Yes
• Enforce secure config Upload/Download: Press Enter to accept the default.
• Enforce firmware signature validation: Yes
The following example illustrates this series of commands.
device:admin> configure
NOTE
Security must be off or disabled before you disable switch write access and read-only access.
27.If you are not logged in using the root account, log out and log in with that account.
28.Enter fipsCfg --disable bootprom to disable access to the boot PROM.
NOTE
This command can be entered only from the root account. It must be entered before disabling the
root account.
29.Enter userConfig --change root -e no to disable access to the root account.
By disabling the root account, RADIUS and LDAP users with root permissions are blocked in FIPS
mode.
30.Enter fipsCfg --enable fips to enable FIPS mode.
31.Power-cycle the switch or director. Continue after it has restarted.
32.Enter fipsCfg --verify fips to ensure that all verifications are passed. If a verification passes, “PASS”
is displayed. If a verification fails, “FAIL” is displayed.
The following is an example of a partially FIPS-compliant switch:
device:admin> fipscfg --verify fips
Notice for this switch that ipFilter, SNMP, LDAP and FCAP certificates, and SSH compliance all
failed. This switch would not be FIPS-compliant.
• If there are no FAILS, the switch firmware and certificates are FIPS-compliant. The switch as a
whole is not considered FIPS-compliant until the external tamper-evident seals have been
correctly applied. Refer to FIPS 140-2 Security Seal Application Procedures for instructions on
how to apply these seals.
• If there are FAILS, correct the indicated problems, power-cycle the switch or director, and repeat
this step.
ATTENTION
Before a switch is considered FIPS-compliant, you must also install the removable front cover (if
applicable) and correctly apply the anti-tamper labels. Refer to the FIPS Security Seal Procedures
manual for your switch to get directions on where and how to apply the labels.
Power-on self-tests
A power-on self-test (POST) is invoked by powering on the switch in FIPS mode and does not require
any operator intervention. If any KATs fail, the switch goes into a FIPS Error state, which reboots the
system to start the test again. If the switch continues to fail the FIPS POST, you will need to return
your switch to your switch service provider for repair. Refer to the Fabric OS Troubleshooting and
Diagnostics Guide for information about preparing a case for your service provider.
Conditional tests
These conditional tests are for the random number generators and are executed to verify the
randomness of the random number generator. The conditional tests are executed each time prior to
using the random number provided by the random number generator.
The results of the POST and conditional tests are recorded in the system log or are output to the local
console. This action includes logging both passing and failing results. Refer to the Fabric OS
Troubleshooting and Diagnostics Guide for instructions on how to recover if your system cannot get out
of the conditional test mode.
● Overview......................................................................................................................... 33
● TOE network interface.................................................................................................... 33
● TOE firmware update...................................................................................................... 34
● Configuring the FOS switch for Common Criteria........................................................... 35
● Cryptographic Configurations in Common Criteria..........................................................36
● Self tests......................................................................................................................... 37
● Commands supported in Common Criteria.....................................................................38
● Audit messages...............................................................................................................38
Overview
This chapter contains steps for configuring the Brocade FOS switch for Common Criteria (CC)
standards with version 7.3.0a (NDPP -Protection profile for Network Devices) .
Common Criteria certification for a device enforces a set of security standards and feature limitations on
a device to be compliant with the Common Criteria standards, similar to placing the device in FIPS
mode. To better understand the Common Criteria certification and the associated security functions that
are subjected to certification, refer to the Brocade Communications Systems, Inc. Brocade Directors
and Switches 7.3 (NDPP11e3) Security Target document.
Brocade FOS switches provide switching functionality used in Fibre channel domain. The FOS device
management functions are isolated through authentication. Once administrators log in with specific
credentials, their access is limited to commands for which they have privileges and role-based
permissions. Additionally, network management communication paths are protected against
modification and disclosure using SSHv2.
FIPS 140-2 level2 specifies the security requirements that are satisfied by a cryptographic module
utilized within a security system protecting sensitive information of the system.
Brocade FOS switches running FOS version 7.3.0a1 are designed to support FIPS compliance mode.
All cryptographic algorithms required and used in CC are certified by FIPS certifications.
NOTE
To determine if the FOS device and current software version is Common Criteria certified, see https://
www.niap-ccevs.org/CCEVS_Products/pcl.cfm.
NOTE
If the installation fails, an error with details are displayed and the download procedure is terminated.
The public key file on the switch contains only one public key. It is only able to validate firmware
signed using one corresponding private key. If the private key changes in future releases, you must
change the public key on the switch by using the firmwareDownload command. When a new
firmware is downloaded, firmware download always replaces the public key file on the switch with what
is in the new firmware. This allows you to have planned firmware key changes.
Firmware Download:
Perform the following tasks to download the firmware.
1. Brocade uploads the signed firmware as a tar file with its associated MD5 on secure location.
NOTE
File location and version details are provided to the customer.
2. Download and verify with the MD5.
Configure...
NOTE
Repeat steps a to e for default_ipv6 too.
8. Administrator should ensure that the FTP mode of transfer is not selected for the following
operations.
a. Upload the system configuration.
b. Download the system configuration.
c. Save the RASLOG, TRACE, supportshow, core file, FFDC data, and other support
information.
d. Download the firmware.
NOTE
Since FCIP IKE or IPSec are not certified for CC compliance, do not configure them.
9. Disable IPSec management interface using the ipsecconfig --disable command.
10.Disable In-Band management interface if it is already configured.
11.Disable In-Flight encryption using the portcfgencrypt --disable portnumber command.
NOTE
Do not define TACACS+ authspec mode.
12.Configure PEAP MS-CHAP V2 for RADIUS authentication if required. If RADIUS server is configured
for authentication, obfuscate the RADIUS shared secret during configuration. For example,
Self tests
The table provides detailed information about the tests that are executed during the boot up of the
switch to confirm the authenticity of the algorithms.
NOTE
During a self test failure, Brocade recommends that you restart the system and test again. If the failure
persists, then proceed with the Return Materials Authorization (RMA) request for the Fabric OS device.
Algorithm Description
TDES This module implements a KAT for the encrypt and decrypt operations of Triple
DES in the CBC mode of operation.
The test passes only if the calculated output equals the known output for both
operations. The Triple DES KAT must execute successfully before using Triple
DES functionality
AES This module implements a known answer test (KAT) for encrypt/ decrypt
operation of AES-128 block size and 256 key size in the CBC mode of operation.
The test passes only if the calculated result equals the known result for both
encryption/decryption. The AES KAT must execute successfully before accessing
AES functionality.
HMAC SHA-1 This module implements the short messages test as part of KAT for SHA-1 and
later the HMAC validation testing is done.
Short Messages Test-tests the ability to correctly generate message digests for
messages of smaller length.
HMAC SHA-256 This module implements the short messages test as part of KAT for SHA-256 and
later the HMAC validation testing is done.
Short Messages Test-tests the ability to correctly generate message digests for
messages of smaller length.
DRNG This module tests whether the random number generated is deterministic. This
test compares a known seed and known output against the random number
generated.
RSA sign/verify This module implements a KAT for signing and verification operation of RSA. The
test passes only if the signature is verified. The KAT must execute successfully
before the operator can access RSA functionality.
AES GCM This module implements a KAT for AES encryption and decryption using GCM.
SHA512 This module implements the SHA 512 short message test as of KAT.
HMAC SHA512 This module implements the short messages test as part of KAT for SHA-512 and
later the HMAC validation testing is done.
Short Messages Test-tests the ability to correctly generate message digests for
messages of smaller length.
Audit messages
Audit messages are generated based on security events. All Audit messages will include ID, time,
module ID, switch name and the message.
• TS-1009: The audit message indicates that the time was updated using the date CLI. For example:
Apr 1 10:10:01 Brocade300AD raslogd: 2013/04/01-10:10:01, [TS-1009], 90, WWN 10:00:00:05:1e:
74:84:73 | FID 128, INFO, Brocade300AD, Date changed by user.
• TS-1010: The audit message indicates that the time was updated from a NTP server. For example:
2015/01/22-11:16:21, [TS-1010], 29, FID 128, INFO, sw0, NTP Server Time Update from
2015/01/22-11:16:19.920251 to 2015/01/22-11:16:21.983630
• RAS-2006: The audit message indicates that a syslog server IP address has been added. For
example:
Feb 5 21:27:05 10.38.37.150 raslogd: AUDIT, 2015/02/05-21:27:04 (GMT), [RAS-2006], INFO,
SECURITY, admin/admin/NONE/console/CLI, ad_0/Brocade300/CHASSIS, 7.3.0a1, , , , , , , Syslog
server IP address 10.38.37.40 added.
• RAS-2007: The audit message indicates that a syslog server IP address has been removed. For
example:
Feb 5 21:27:43 10.38.37.150 raslogd: AUDIT, 2015/02/05-21:27:43 (GMT), [RAS-2007], INFO,
SECURITY, admin/admin/NONE/console/CLI, ad_0/Brocade300/CHASSIS, 7.3.0a1, , , , , , , Syslog
server IP address 10.38.37.40 removed.