642
Home General

4.2.2.2.2 Protection at the transport layer

Home General19.2.0
33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
Test Name TC_PROTECT_TRANSPORT_LAYER
Threat Reference

TR 33.926 [4], clause 5.3.6.3, Weak cryptographic algorithms

Requirement Name

Protection at the transport layer

Requirement Reference

TS 33.501 [10], clause 5.9.2.1, clause 13.1, clause 13.3.2

Requirement Description

NF Service Request and Response procedure supports mutual authentication between NF consumer and NF producer as specified in TS 33.501 [10], clause 5.9.2.1.

All network functions support TLS. Network functions support both server-side and client-side certificates. The TLS profile follows the profile given in Annex E of TS 33.310 [9] with the restriction to be compliant with the profile given by HTTP/2 as defined in RFC 7540 [11] as specified in TS 33.501 [10], clause 13.1.

Authentication between network functions within one PLMN uses one of the following methods:

If the PLMN uses protection at the transport layer as described in clause 13.1, authentication provided by the transport layer protection solution is used for authentication between NFs as specified in TS 33.501 [10], clause 13.3.2.

NOTE 1: This test case only applies to service-based interfaces.

Test Purpose

Verify that TLS protocol for NF mutual authentication and NF transport layer protection is implemented in the network products based on the profile required.

Pre-Conditions

Network product documentation containing information about supported TLS protocol and certificates is provided by the vendor.

A peer implementing the TLS protocol configured by the vendor is available.

The tester bases the tests on the profile defined by 3GPP in Annex E of TS 33.310 [9] with the restriction that it is compliant with the profile given by HTTP/2 as defined in RFC 7540 [11].

Execution Steps
  1. The tester checks that compliance with the TLS profile can be inferred from detailed provisions in the network product documentation.

  2. The tester establishes a secure connection between the network product under test and the peer and verify that all TLS protocol versions and combinations of cryptographic algorithms that are mandated by the TLS profile are supported by the network product under test.

  3. The tester tries to establish a secure connection between the network product under test and the peer and verify that this is not possible when the peer only offers a feature, including protocol version and combination of cryptographic algorithms, that is forbidden by the TLS profile.

Expected Results
  • The network product under test and the peer establishes TLS if the TLS profiles used by the peer are compliant with the profile requirements in TS 33.310 [9] Annex E and RFC 7540 [11].

  • The network product under test and the peer fail to establish TLS if the TLS profiles used by the peer are forbidden in TS 33.310 [9] Annex E or RFC 7540 [11].

Expected Format of Evidence

Provide evidence of the check of the product documentation in plain text. Save the logs and the communication flow in a .pcap file.

PDFs efa2407be5188f7b6580c0fba66a0a39

4.2.2.2.2 Protection at the transport layer

Home General17.4.0
33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
Test Name TC_PROTECT_TRANSPORT_LAYER
Threat Reference

TR 33.926 [4], clause 5.3.6.3, Weak cryptographic algorithms

Requirement Name

Protection at the transport layer

Requirement Reference

TS 33.501 [10], clause 5.9.2.1, clause 13.1, clause 13.3.2

Requirement Description

"NF Service Request and Response procedure shall support mutual authentication between NF consumer and NF producer" as specified in TS 33.501 [10], clause 5.9.2.1;

"All network functions shall support TLS. Network functions shall support both server-side and client-side certificates.

The TLS profile shall follow the profile given in Annex E of TS 33.310 [9] with the restriction that it shall be compliant with the profile given by HTTP/2 as defined in RFC 7540 [11]. "

as specified in TS 33.501 [10], clause 13.1.

"Authentication between network functions within one PLMN shall use one of the following methods:

  • If the PLMN uses protection at the transport layer as described in clause 13.1, authentication provided by the transport layer protection solution shall be used for authentication between NFs."

as specified in TS 33.501 [10], clause 13.3.2.

Test Purpose

Verify that TLS protocol for NF mutual authentication and NF transport layer protection is implemented in the network products based on the profile required.

Pre-Conditions

Network product documentation containing information about supported TLS protocol and certificates is provided by the vendor.

A peer implementing the TLS protocol configured by the vendor shall be available.

The tester shall base the tests on the profile defined by 3GPP in Annex E of TS 33.310 [9] with the restriction that it shall be compliant with the profile given by HTTP/2 as defined in RFC 7540 [11].

Execution Steps
  1. The tester shall check that compliance with the TLS profile can be inferred from detailed provisions in the network product documentation.

  2. The tester shall establish a secure connection between the network product under test and the peer and verify that all TLS protocol versions and combinations of cryptographic algorithms that are mandated by the TLS profile are supported by the network product under test.

  3. The tester shall try to establish a secure connection between the network product under test and the peer and verify that this is not possible when the peer only offers a feature, including protocol version and combination of cryptographic algorithms, that is forbidden by the TLS profile.

Expected Results
  • The network product under test and the peer establish TLS if the TLS profiles used by the peer are compliant with the profile requirements in TS 33.310 [9] Annex E and RFC 7540 [11].

  • The network product under test and the peer fail to establish TLS if the TLS profiles used by the peer are forbidden in TS 33.310 [9] Annex E or RFC 7540 [11].

Expected Format of Evidence

Provide evidence of the check of the product documentation in plain text. Save the logs and the communication flow in a .pcap file.

PDFs 5066f21308038071d726a77e9c0df669

4.2.2.2.3.1 Authorization token verification failure handling within one PLMN

Home General19.2.0
33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
Test Name TC_AUTHORIZATION_TOKEN_VERIFICATION_FAILURE_ONE_PLMN
Threat Reference

TR 33.926 [4], clause 6.3.3.1, Incorrect Verification of Access Tokens

Requirement Name

Authorization token verification failure handling within one PLMN

Requirement Reference

TS 33.501 [10], clause 13.4.1.1

Requirement Description

According to TS 33.501 [10], clause 13.4.1.1, the NF Service producer verifies the access token as follows:

  • The NF Service producer ensures the integrity of the access token by verifying the signature using NRF's public key or checking the MAC value using the shared secret. If integrity check is successful, the NF Service producer verifies the claims in the access token as follows:

NOTE: Void.

  • It checks that the audience claim in the access token matches its own identity or the type of NF service producer. If a list of NSSAIs or list of NSI IDs is present, the NF service producer checks that it serves the corresponding slice(s).

  • If an NF Set ID present, the NF Service Producer checks the NF Set ID in the claim matches its own NF Set ID.

  • If the access token contains "additional scope" information (i.e. allowed resources and allowed actions (service operations) on the resources), it checks that the additional scope matches the requested service operation.

  • If scope is present, it checks that the scope matches the requested service operation.

  • It checks that the access token has not expired by verifying the expiration time in the access token against the current data/time.

  • If the verification is successful, the NF Service producer executes the requested service and responds back to the NF Service consumer. Otherwise, it replies based on OAuth 2.0 error response defined in RFC 6749 [12]. The NF service consumer optionally stores the received token(s). Stored tokens may be re-used for accessing service(s) from producer NF type listed in claims (scope, audience) during their validity time.

Test Purpose

Verify that the NF service producer does not grant service access if the verification of authorization token from a NF service consumer in the same PLMN fails.

Pre-Conditions
  • The tester shall know if the network product supports the following optional access token verification claims. If an optional claim is not supported, the associated sub-test case does not apply:

  • S-NSSAI (Test Case F)

  • NSI (Test Case G)

  • NF Set ID (Test Case H)

  • additional scope (Test Case I)

  • Test environment with a NF service consumer.

  • The NF service consumer may be simulated.

  • The network product under test has already mutually authenticated with the NF service consumer.

  • The tester has access to the interface between the NF service consumer and the network product under test.

  • The tester has the NRF's private key or the shared key.

  • The network product under test is preconfigured with the NRF's public key or the shared key.

Execution Steps

The network product under test receives the access token sent from the NF service consumer, verifies the access token based on OAuth 2.0.

Test Cases A~E are tests on failure handling by the network product under test when the mandatory claims in access token failed verification.

Test Case A: No access token

  1. The tester sends a request without a token to the network product under test.

  2. The network product under test recognized the absence of the access token and the verification of the access token fails.

Test Case B: Verification failure of the access token integrity

  1. The tester computes an access token correctly, except that the signature or the MAC is incorrect, e.g., the signature or the MAC is randomly selected, and then includes the access token in the NF Service Request sent from the NF service consumer to the network product under test.

  2. The integrity verification of the access token by the network product under test fails.

Test Case C: Incorrect audience claim in the access token

  1. The tester computes an access token correctly, except that the audience claim is incorrect, i.e., the audience claim in the access token does not match the identity or the type of the network product under test, and then includes the access token in the NF Service Request sent from NF service consumer to the network product under test.

  2. The network product under test verifies that the integrity of the access token is valid. However, the audience claim in the access token does not match its identity or type.

Test Case D: Incorrect scope claim in the access token

  1. The tester computes an access token correctly, except that the scope is incorrect, i.e., the scope does not match the requested service operation, and then includes the access token in the NF Service Request sent from the NF service consumer to the network product under test.

  2. The network product under test verifies that the integrity of the access token and the audience claim are valid. However, the scope does not match the requested service operation.

Test Case E: Expired access token

  1. The tester computes an access token correctly, except that the expiration time has expired against the current data/time, and then includes the access token in the NF Service Request sent from the NF service consumer to the network product under test.

  2. The network product under test verifies that the integrity of the access token, the audience and scope claims are all valid. However, the expiration time in the access token has expired against the current data/time.

Test Cases F~I are tests on failure handling by the network product under test when the optional claims in access token failed verification.

NOTE: The test cases below only apply to the NFs which support identifying and understanding the optional claims in the received access token.

Test Case F: Incorrect list of S-NSSAIs in the access token

  1. The tester computes an access token correctly, except that the list of S-NSSAIs is incorrect, i.e., the network product under test does not serve the slices indicated in the list of S-NSSAIs, and then includes the access token in the NF Service Request sent from NF service consumer to the network product under test.

  2. The network product under test verifies that the integrity of the access token, the audience, scope and expiration time claims are all valid. Then it further checks the list of S--NSSAIs included in the access token.

Test Case G: Incorrect list of NSIs in the access token

  1. The tester computes an access token correctly, except that the list of NSIs is incorrect, i.e., the network product under test does not serve the slices indicated in the list of NSIs, and then includes the access token in the NF Service Request sent from NF service consumer to the network product under test.

  2. The network product under test verifies that the integrity of the access token, the audience, scope and expiration time claims are all valid. Then it further checks the list of NSIs included in the access token.

Test Case H: Incorrect NF Set ID in the access token

  1. The tester computes an access token correctly, except that the NF Set ID is incorrect, i.e. the NF Set ID in the claim does not match the NF Set ID of the network product under test, and then includes the access token in the NF Service Request sent from NF service consumer to the network product under test.

  2. The network product under test verifies that the integrity of the access token, the audience, scope and expiration time claims are all valid. Then it further checks the NF Set ID included in the access token.

Test Case I: Incorrect additional scope in the access token

  1. The tester computes an access token correctly, except that the additional scope information is incorrect, i.e. the allowed resources and allowed actions on the resources do not match the requested service operations, and then includes the access token in the NF Service Request sent from the NF service consumer to the network product under test.

  2. The network product under test verifies that the integrity of the access token, the audience, scope and expiration time claims are all valid. Then it further checks the additional scope included in the access token.

Expected Results

For test cases A~E on verification failure of mandatory claims in the access token, the network product under test rejects the NF service consumer's service request based on OAuth 2.0 error response defined in RFC 6749 [12].

For test cases F~I on verification failure of optional claims in the access token, if the network product under test understands these optional claims (list of S-NSSAIs, list of NSIs, NF Set ID, additional scope), it rejects the NF service consumer's service request based on OAuth 2.0 error response defined in RFC 6749 [12].

Expected Format of Evidence

Evidence suitable for the interface, e.g., packet trace (pcap file).

PDFs 4964a9ef4c7100fed6ed4d3b67c5008c

4.2.2.2.3.1
Authorization token verification failure handling wthin one PLMN

Home General17.4.0
33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
Test Name TC_AUTHORIZATION_TOKEN_VERIFICATION_FAILURE_ONE_PLMN
Threat Reference

TR 33.926 [4], clause 6.3.3.1, Incorrect Verification of Access Tokens

Requirement Name

Authorization token verification failure handling wthin one PLMN

Requirement Reference

TS 33.501 [14], clause 13.4.1.1

Requirement Description

"13.4.1.1 Service access authorization within the PLMN

  1. The NF Service producer shall verify the access token as follows:

  2. The NF Service producer ensures the integrity of the access token by verifying the signature using NRF's public key or checking the MAC value using the shared secret. If integrity check is successful, the NF Service producer shall verify the claims in the access token as follows:

NOTE: Void.

  • It checks that the audience claim in the access token matches its own identity or the type of NF service producer. If a list of NSSAIs or list of NSI IDs is present, the NF service producer shall check that it serves the corresponding slice(s).

  • If an NF Set ID present, the NF Service Producer shall check the NF Set ID in the claim matches its own NF Set ID.

  • If the access token contains "additional scope" information (i.e. allowed resources and allowed actions (service operations) on the resources), it checks that the additional scope matches the requested service operation.

  • If scope is present, it checks that the scope matches the requested service operation.

  • It checks that the access token has not expired by verifying the expiration time in the access token against the current data/time.

  • If the verification is successful, the NF Service producer shall execute the requested service and responds back to the NF Service consumer. Otherwise it shall reply based on Oauth 2.0 error response defined in RFC 6749 [43]. The NF service consumer may store the received token(s). Stored tokens may be re-used for accessing service(s) from producer NF type listed in claims (scope, audience) during their validity time.

Test Purpose

Verify that the NF service producer does not grant service access if the verification of authorization token from a NF service consumer in the same PLMN fails.

Pre-Conditions
  • The tester shall know if the network product supports the following optional access token verification claims. If an optional claim is not supported, the associated sub-test case does not apply:

  • S-NSSAI (Test Case F)

  • NSI (Test Case G)

  • NF Set ID (Test Case H)

  • additional scope (Test Case I)

  • Test environment with a NF service consumer.

  • The NF service consumer may be simulated.

  • The network product under test has already mutually authenticated with the NF service consumer.

  • The tester shall have access to the interface between the NF service consumer and the network product under test.

  • The tester has the NRF's private key or the shared key.

  • The network product under test is preconfigured with the NRF's public key or the shared key.

Execution Steps

The network product under test receives the access token sent from the NF service consumer, verifies the access token based on Oauth 2.0.

Test Cases 1~4 are tests on failure handling by the network product under test when the mandatory claims in access token failed verification.

Test Case 1: Verification failure of the access token integrity

  1. The tester computes an access token correctly, except that the signature or the MAC is incorrect, e.g., the signature or the MAC is randomly selected, and then includes the access token in the NF Service Request sent from the NF service consumer to the network product under test.

  2. The integrity verification of the access token by the network product under test fails.

Test Case 2: Incorrect audience claim in the access token

  1. The tester computes an access token correctly, except that the audience claim is incorrect, i.e., the audience claim in the access token does not match the identity or the type of the network product under test, and then includes the access token in the NF Service Request sent from NF service consumer to the network product under test.

  2. The network product under test verifies that the integrity of the access token is valid. However, the audience claim in the access token does not match its identity or type.

Test Case 3: Incorrect scope claim in the access token

  1. The tester computes an access token correctly, except that the scope is incorrect, i.e., the scope does not match the requested service operation, and then includes the access token in the NF Service Request sent from the NF service consumer to the network product under test.

  2. The network product under test verifies that the integrity of the access token and the audience claim are valid. However, the scope does not match the requested service operation.

Test Case 4: Expired access token

  1. The tester computes an access token correctly, except that the expiration time has expired against the current data/time, and then includes the access token in the NF Service Request sent from the NF service consumer to the network product under test.

  2. The network product under test verifies that the integrity of the access token, the audience and scope claims are all valid. However, the expiration time in the access token has expired against the current data/time.

Test Cases 5~8 are tests on failure handling by the network product under test when the optional claims in access token failed verification.

NOTE: The test cases below only apply to the NFs which support identifying and understanding the optioanl claims in the received access token.

Test Case 5: Incorrect list of S-NSSAIs in the access token

  1. The tester computes an access token correctly, except that the list of S-NSSAIs is incorrect, i.e., the network product under test does not serve the slices indicated in the list of S-NSSAIs, and then includes the access token in the NF Service Request sent from NF service consumer to the network product under test.

  2. The network product under test verifies that the integrity of the access token, the audience, scope and expiration time claims are all valid. Then it further checks the list of S--NSSAIs included in the access token.

Test Case 6: Incorrect list of NSIs in the access token

  1. The tester computes an access token correctly, except that the list of NSIs is incorrect, i.e., the network product under test does not serve the slices indicated in the list of NSIs, and then includes the access token in the NF Service Request sent from NF service consumer to the network product under test.

  2. The network product under test verifies that the integrity of the access token, the audience, scope and expiration time claims are all valid. Then it further checks the list of NSIs included in the access token.

Test Case 7: Incorrect NF Set ID in the access token

  1. The tester computes an access token correctly, except that the NF Set ID is incorrect, i.e. the NF Set ID in the claim does not match the NF Set ID of the network product under test, and then includes the access token in the NF Service Request sent from NF service consumer to the network product under test.

  2. The network product under test verifies that the integrity of the access token, the audience, scope and expiration time claims are all valid. Then it further checks the NF Set ID included in the access token.

Test Case 8: Incorrect additional scope in the access token

  1. The tester computes an access token correctly, except that the additional scope information is incorrect, i.e. the allowed resources and allowed actions on the resources do not match the requested service operations, and then includes the access token in the NF Service Request sent from the NF service consumer to the network product under test.

  2. The network product under test verifies that the integrity of the access token, the audience, scope and expiration time claims are all valid. Then it further checks the additional scope included in the access token.

Expected Results

For test cases 1~4 on verification failure of mandatory claims in the access token, the network product under test rejects the NF service consumer's service request based on Oauth 2.0 error response defined in RFC 6749 [12].

For test cases 5~8 on verification failure of optional claims in the access token, if the network product under test understands these optional claims (list of S-NSSAIs, list of NSIs, NF Set ID, additional scope), it rejects the NF service consumer's service request based on Oauth 2.0 error response defined in RFC 6749 [12].

Expected Format of Evidence

Evidence suitable for the interface, e.g., Screenshot containing the operational results.

PDFs b835fb69e5c0fd83af4a2c197e2a2cd4

4.2.2.2.3.2 Authorization token verification failure handling in different PLMNs

Home General19.2.0
33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
Test Name TC_AUTHORIZATION_TOKEN_VERIFICATION_FAILURE_DIFF_PLMN
Threat Reference

TR 33.926 [4], clause 6.3.3.1, Incorrect Verification of Access Tokens

NOTE: The test case below only applies to the NFs which support identifying and understanding the producerPlmnId claim.

Requirement Name

Authorization token verification failure handling in different PLMNs

Requirement Reference

TS 33.501 [10], clause 13.4.1.2

Requirement Description

The NF service producer checks that the home PLMN ID of audience claim in the access token matches its own PLMN identity.

Test Purpose

Verify that the NF service producer does not grant service access if the verification of authorization token from a NF service consumer in a different PLMN fails.

Pre-Conditions
  • Test environment with a NF service consumer and two SEPPs (one cSEPP, one pSEPP).

  • The NF service consumer and SEPPs may be simulated.

  • The network product under test has already mutually authenticated with the NF service consumer in a different PLMN via the SEPPs.

  • The tester has the NRF's private key or the shared key.

  • The network product under test is preconfigured with the NRF's public key or the shared key.

  • The tester shall have access to the interfaces of the NF service consumer and the network product under test.

Execution Steps

The network product under test receives the access token sent from the NF service consumer, verifies the access token in accordance with the execution steps in 4.2.2.2.3.1, with the following additional test cases:

Test Case 1: incorrect PLMN ID of the NF service producer in the access token

  1. The test computes an access token correctly, except that the PLMN ID in the producerPlmnId claim of the access token is empty or different from the home PLMN ID of the network product under test, and then includes the access token in the NF Service Request sent from the NF service consumer to the network product under test through the SEPPs.

  2. The network product under test receives the access token sent from the NF service consumer through the SEPPs, verifies that the PLMN ID in the producerPlmnId claim of the access token is different from its own home PLMN identity.

Test Case 2: absent PLMN ID of the NF service producer in the access token

  1. The test computes an access token correctly, except that no producerPlmnId claim is included in the access token, and then includes the access token in the NF Service Request sent from the NF service consumer to the network product under test through the SEPPs.

  2. The network product under test receives the access token sent from the NF service consumer through the SEPPs, verifies that the access token is not a token to be used by the NF service consumer in a different PLMN, based on the absence of PLMN ID of the NF service producer in the access token.

Expected Results

For both test cases 1 and 2, the network product under test rejects the NF service consumer's service request based on OAuth 2.0 error response defined in RFC 6749 [12].

Expected Format of Evidence

Evidence suitable for the interface, e.g., Screenshot containing the operational results.

PDFs 3a9feb051fea2f36c341aff6f018d2c9

4.2.2.2.3.2 Authorization token verification failure handling in different PLMNs

Home General17.4.0
33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
Test Name TC_AUTHORIZATION_TOKEN_VERIFICATION_FAILURE_DIFF_PLMN
Threat Reference

TR 33.926 [4], clause 6.3.3.1, Incorrect Verification of Access Tokens

NOTE: The test case below only applies to the NFs which support identifying and understanding the producerPlmnId claim.

Requirement Name

Authorization token verification failure handling in different PLMNs

Requirement Reference

TS 33.501 [10], clause 13.4.1.2

Requirement Description

"The NF service producer shall check that the home PLMN ID of audience claim in the access token matches its own PLMN identity."

Test Purpose

Verify that the NF service producer does not grant service access if the verification of authorization token from a NF service consumer in a different PLMN fails.

Pre-Conditions
  • Test environment with a NF service consumer and two SEPPs (one cSEPP, one pSEPP).

  • The NF service consumer and SEPPs may be simulated.

  • The network product under test has already mutually authenticated with the NF service consumer in a different PLMN via the SEPPs.

  • The tester has the NRF's private key or the shared key.

  • The network product under test is preconfigured with the NRF's public key or the shared key.

  • The tester shall have access to the interfaces of the NF service consumer and the network product under test.

Execution Steps

The network product under test receives the access token sent from the NF service consumer, verifies the access token in accordance with the execution steps in 4.2.2.1.2.1, with the following additional test cases:

Test Case 1: incorrect PLMN ID of the NF service producer in the access token

  1. The test computes an access token correctly, except that the PLMN ID in the producerPlmnId claim of the access token is empty or different from the home PLMN ID of the network product under test, and then includes the access token in the NF Service Request sent from the NF service consumer to the network product under test through the SEPPs.

  2. The network product under test receives the access token sent from the NF service consumer through the SEPPs, verifies that the PLMN ID in the producerPlmnId claim of the access token is different from its own home PLMN identity.

Test Case 2: absent PLMN ID of the NF service producer in the access token

  1. The test computes an access token correctly, except that no producerPlmnId claim is included in the access token, and then includes the access token in the NF Service Request sent from the NF service consumer to the network product under test through the SEPPs.

  2. The network product under test receives the access token sent from the NF service consumer through the SEPPs, verifies that the access token is not a token to be used by the NF service consumer in a different PLMN, based on the absence of PLMN ID of the NF service producer in the access token.

Expected Results

For both test cases 1 and 2, the network product under test rejects the NF service consumer's service request based on Oauth 2.0 error response defined in RFC 6749 [12].

Expected Format of Evidence

Evidence suitable for the interface, e.g., Screenshot containing the operational results.

PDFs 7e87ed2d63db2b6aa71282343d453d4b

4.2.2.2.4.1 Correct handling of client credentials assertion validation failure

Home General19.2.0
33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
Test Name TC_CLIENT_CREDENTIALS_ASSERTION_VALIDATION
Threat Reference

TR 33.926 [4], clause 6.3.4.1, Incorrect validation of client credentials assertion

NOTE: The following test case only applies if the NF under test implements verification of client credentials assertions.

Requirement Name

Correct handling of client credentials assertion validation failure

Requirement Reference

TS 33.501 [10], clause 13.3.8.3

Requirement Description

The verification of the Client credentials assertion is performed by the receiving node, i.e., NRF or NF Service Producer in the following way:

  • It validates the signature of the JWS as described in RFC 7515 [16].

  • If validates the timestamp (iat) and/or the expiration time (exp) as specified in RFC 7519 [17].

  • If the receiving node is the NR F, the NRF validates the timestamp (iat) and the expiration time (exp).

  • If the receiving node is the NF Service Producer, the NF service Producer validates the expiration time and it may validate the timestamp.

  • It checks that the audience claim in the client credentials assertion matches its own type.

It verifies that the NF instance ID in the client credentials assertion matches the NF instance ID in the public key certificate used for signing the assertion.

Test Purpose

Verify that the NF under test correctly handles client credentials assertion validation failure.

Pre-Conditions
  • Test environment with a consumer NF and a SCP, which may be simulated. (Potentially simulated) consumer NF and (potentially simulated) SCP can be combined for the testing purpose.

  • The NF under test is preconfigured with the certificate of the consumer NF.

  • The NF under test is configured to require assertions for NF consumer authentication for at least one of its services.

  • The NF under test has implemented the client credentials assertion (CCA) authentication method as specified in TS 33.501 [10], clause 13.3.8.3.

  • The tester has the private key of the consumer NF.

  • The tester has access to the interface between the consumer NF and the NF under test.

Execution Steps

Test Case 1: Failed verification of the client credentials assertion integrity

  1. The tester computes a client credentials assertion correctly, except that the signature is incorrect, and then includes the client credentials assertion in the service request sent from the consumer NF to the NF under test via the SCP.

  2. The integrity verification of the client credentials assertion by the NF under test fails.

Test Case 2: Incorrect audience claim in the client credentials assertion

  1. The tester computes a client credentials assertion correctly, except that the audience claim is incorrect, i.e., the audience claim in the client credentials assertion does not match the type of the NF under test, and then includes the signed client credentials assertion in the service request sent from the consumer NF to the NF under test via the SCP.

  2. The NF under test verifies that the audience claim in the client credentials assertion does not match its type.

Test Case 3: Expired client credentials assertion

  1. The tester computes an access token correctly, except that the expiration time (exp) has expired against the current time, and then includes the signed client credentials assertion in the service request sent from the consumer NF to the NF under test via the SCP.

  2. The NF under test verifies that the expiration time in the client credentials assertion has expired against the current time.

Expected Results

For test cases 1~3, the NF under test rejects the consumer NF's service request and sends back an error message. according to the description under clause 5.2.7 of TS 29.500 [21].

Expected Format of Evidence

Evidence suitable for the interface, e.g. screenshot containing the operational results.

PDFs 95e486bcc4f17300be7bbbe1c6130181

4.2.2.2.4.1 Correct handling of client credentials assertion validation failure

Home General17.4.0
33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
Test Name TC_CLIENT_CREDENTIALS_ASSERTION_VALIDATION
Threat Reference

TR 33.926 [4], clause 6.3.x.1, Incorrect validation of client credentials assertion

Note: The following test case only applies if the NF under test implements verification of client credentials assertions.

Requirement Name

Correct handling of client credentials assertion validation failure

Requirement Reference

TS 33.501 [14], clause 13.3.8.3

Requirement Description

"The verification of the Client credentials assertion shall be performed by the receiving node, i.e., NRF or NF Service Producer in the following way:

  • It validates the signature of the JWS as described in RFC 7515 [45].

  • If validates the timestamp (iat) and/or the expiration time (exp) as specified in RFC 7519 [44].

If the receiving node is the NR F, the NRF validates the timestamp (iat) and the expiration time (exp).

If the receiving node is the NF Service Producer, the NF service Producer validates the expiration time and it may validate the timestamp.

  • It checks that the audience claim in the the client credentials assertion matches its own type.

It verifies that the NF instance ID in the client credentials assertion matches the NF instance ID in the public key certificate used for signing the assertion".

Test Purpose

Verify that the NF under test correctly handles client credentials assertion validation failure.

Editor's Note: This test case applies for Rel-16 NFs. The formulation for indicating the applicable release may need to be updated.

Pre-Conditions
  • Test environment with a consumer NF and a SCP, which may be simulated. (Potentially simulated) consumer NF and (potentially simulated) SCP can be combined for the testing purpose.

  • The NF under test is preconfigured with the certificate of the consumer NF.

  • The NF under test is configured to require assertions for NF consumer authentication for at least one of its services.

  • The NF under test has implemented the client credentials assertion (CCA) authentication method as specified in TS 33.501 [10], clause 13.3.8.3.

  • The tester has the private key of the consumer NF.

  • The tester has access to the interface between the consumer NF and the NF under test.

Execution Steps

Test Case 1: Failed verification of the client credentials assertion integrity

  1. The tester computes a client credentials assertion correctly, except that the signature is incorrect, and then includes the client credentials assertion in the service request sent from the consumer NF to the NF under test via the SCP.

  2. The integrity verification of the client credentials assertion by the NF under test fails.

Test Case 2: Incorrect audience claim in the client credentials assertion

  1. The tester computes a client credentials assertion correctly, except that the audience claim is incorrect, i.e., the audience claim in the client credentials assertion does not match the type of the NF under test, and then includes the signed client credentials assertion in the service request sent from the consumer NF to the NF under test via the SCP.

  2. The NF under test verifies that the audience claim in the client credentials assertion does not match its type.

Test Case 3: Expired client credentials assertion

  1. The tester computes an access token correctly, except that the expiration time (exp) has expired against the current time, and then includes the signed client credentials assertion in the service request sent from the consumer NF to the NF under test via the SCP.

  2. The NF under test verifies that the expiration time in the client credentials assertion has expired against the current time.

Expected Results

For test cases 1~3, the NF under test rejects the consumer NF's service request and sends back an error message.

Editor's Note: the result needs to be aligned with the relevant error handling description to be added in TS 29.500.

Expected Format of Evidence

Evidence suitable for the interface, e.g. screenshot containing the operational results.

PDFs a70c8bcec41d610834fe8e7a47ecb345

4.2.3.2.2 Protecting data and information -- Confidential System Internal Data

Home General19.2.0
33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
Test Name TC_CONFIDENTIAL_SYSTEM_INTERNAL_DATA
Threat Reference

TR 33.926 [4], clause 5.3.6.4, Insecure Data Storage

Requirement Name

Unauthorized Viewing

Requirement Reference

In accordance with industry best practice.

Requirement Description

When the system is not under maintenance, there shall be no system function that reveals confidential system internal data in the clear to users and administrators. Such functions could be, for example, local or remote O&M CLI or GUI, logging messages, alarms, configuration file exports etc. Confidential system internal data contains authentication data (i.e. PINs, cryptographic keys, passwords, cookies) as well as system internal data that is not required for systems administration and could be of advantage to attackers (i.e. stack traces in error messages).

Test Purpose

Verify that no system function reveals sensitive data in the clear

Pre-Conditions

The vendor shall provide documentation describing how confidential system internal information that could possibly be revealed in clear-text is handled by system functions.

A list of all system functions in the network product, information on how to enable and execute them should be provided as a part of the vendor's documentation. A system function is every function implemented in the network product needed by the services/functionalities provided by the network product itself.

Execution Steps
  1. Review the documentation provided by the vendor describing how confidential system internal information is handled by system functions.

  2. The tester checks whether any system functions as described in the product documentation (e.g. local or remote O&M CLI or GUI, logging messages, alarms, error messages, configuration file exports, stack traces) reveal any confidential system internal data in the clear (for example, passphrases).

Expected Results

There should be no confidential system internal data revealed in the clear by any system function.

Expected Format of Evidence

Evidence suitable for the interface, e.g. screenshot containing the operational results.

PDFs 58a0d62016cbdb07afdf9c35bcea24c8

4.2.3.2.2 Protecting data and information -- Confidential System Internal Data

Home General17.4.0
33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
Test Name TC_CONFIDENTIAL_SYSTEM_INTERNAL_DATA
Threat Reference
Requirement Name

Unauthorized Viewing

Requirement Reference
Requirement Description

When the system is not under maintenance, there shall be no system function that reveals confidential system internal data in the clear to users and administrators. Such functions could be, for example, local or remote OAM CLI or GUI, logging messages, alarms, configuration file exports etc. Confidential system internal data contains authentication data (i.e. PINs, cryptographic keys, passwords, cookies) as well as system internal data that is not required for systems administration and could be of advantage to attackers (i.e. stack traces in error messages).

Security Objective references: tba.

Test Purpose

Verify that no system function reveals sensitive data in the clear

Pre-Conditions

The vendor shall provide documentation describing how confidential system internal information that could possibly be revealed in clear-text is handled by system functions.

A list of all system functions in the network product, information on how to enable and execute them should be provided as a part of the vendor's documentation. A system function is every function implemented in the network product needed by the services/functionalities provided by the network product itself.

Execution Steps

Execute the following steps:

  1. Review the documentation provided by the vendor describing how confidential system internal information is handled by system functions.

  2. The tester checks whether any system functions as described in the product documentation (e.g. local or remote OAM CLI or GUI, logging messages, alarms, error messages, configuration file exports, stack traces) reveal any confidential system internal data in the clear (for example, passphrases).

Expected Results

There should be no confidential system internal data revealed in the clear by any system function.

Expected Format of Evidence

Evidence suitable for the interface, e.g. screenshot containing the operational results.

PDFs 70a0e473495ad2781ab2a9f7d1a21e4e

4.2.3.2.3 Protecting data and information in storage

Home General19.2.0
33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
Test Name TC_PSW_STOR_SUPPORT
Threat Reference

TR 33.926 [4], clause 5.3.6.4, Insecure Data Storage.

Requirement Name

Protecting data and information in storage.

Requirement Reference

In accordance with industry best practice.

Requirement Description

For sensitive data in (persistent or temporary) storage read access rights shall be restricted. Files of a system that are needed for the functionality shall be protected against manipulation.

In addition, the following rules apply for:

  • Systems that need access to identification and authentication data in the clear, e.g., in order to perform an authentication. Such systems shall not store this data in the clear, but scramble or encrypt it by implementation-specific means.

  • Systems that do not need access to sensitive data (e.g., user passwords) in the clear. Such systems shall hash this sensitive data with a non-broken cryptographic hash algorithm and use mechanisms to make dictionary and rainbow table attacks unviable and prevent hash collisions when using identical sensitive data. A common mechanism is e.g., using a unique, random salt per record.

NOTE 1: A "non-broken" cryptographic hash algorithm is a cryptographic hash algorithm without publicly available/published vulnerabilities.

  • Stored files on the network product: examples for protection against manipulation are the use of checksum or cryptographic methods.
Test Purpose

Verify that Password storage uses a non-broken one-way cryptographic hash algorithm. and is safe against dictionary and rainbow table attacks.

Pre-Conditions
  • The tester can access the storage of own user account password.

  • The tester has privileges to change the password.

  • The original password is P1.

  • New passwords are represented by the variable P2.

Execution Steps
  1. The tester accesses the storage where the result of P1 is, and the corresponding hash value is recorded as A.

  2. The tester changes the password with P2, then the tester records the storage hash value of the new password as B.

  3. The tester repeats the step 2 to get other records with the following requirements for password P2:

  4. at least one new password P2 differs from P1 by exactly one bit.

  5. at least one new password P2 shall be the same as P1.

  6. at least one new password P2 shall have a different length compared to P1.

  7. The tester verifies whether all the records comply with the characteristic of o a ne-way cryptographic hash result. and are safe against dictionary and rainbow table attacks.

a. All collected records contain different hash values, even if the corresponding passwords were identical.

NOTE 2: Even if P1 and P2 only differ by one bit, the resulting hash values should differ substantially. (Bit independence criterion).

b. The bit length of the hash values is fixed and independent from the password length.

c. The hash value does not contain any information that could be used for password disclosure. (e.g., contains part of the password in plain text or some sort of password length indicator).

NOTE 3: Depending on the implementation the recorded hash values A and B could be stored with their salt combined in some way (e.g., salt is prefix or suffix of hash value). The tester needs to exclude the salt when comparing records.

Expected Results

All records comply with the characteristic of one-way cryptographic hash result.

Expected Format of Evidence

Evidence suitable for the interface, e.g., screenshot containing the operation results.

PDFs c4925b48cbaaf6fd5f29f9a7a1557ba5

4.2.3.2.3 Protecting data and information in storage

Home General17.4.0
33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
Test Name TC_PSW_STOR_SUPPORT
Threat Reference
Requirement Name

Protecting data and information in storage

Requirement Reference
Requirement Description

For sensitive data in (persistent or temporary) storage read access rights shall be restricted. Files of a system that are needed for the functionality shall be protected against manipulation.

In addition, the following rules apply for:

  • Systems that need access to identification and authentication data in the clear, e.g. in order to perform an authentication. Such systems shall not store this data in the clear, but scramble or encrypt it by implementation-specific means.

  • Systems that do not need access to sensitive data (e.g. user passwords) in the clear. Such systems shall hash this sensitive data .

  • Stored files on the network product: examples for protection against manipulation are the use of checksum or cryptographic methods.

Security Objective references: tba

Test Purpose

Verify that Password storage use one-way hash algorithm.

Pre-Conditions
  • The tester can access the storage of own user account password.

  • The tester has privileges to change the password.

  • The original password is P1.

  • New passwords are represented by the variable P2.

Execution Steps
  1. The tester accesses the storage where the result of P1 is, and the corresponding hash value is recorded as A

  2. The tester changes the password with P2, then the tester records the storage hash value of the new password as B

  3. The tester repeats the step 2 to get other records.

  4. The tester verifies whether all the records comply with the characteristic of one-way hash result.

a. All collected records contain different hash values, even if the corresponding passwords were identical.

NOTE 2: Even if P1 and P2 only differ by one bit, the resulting hash values should differ substantially. (Bit independence criterion).

b. The bit length of the hash values is fixed and independent from the password length.

c. The hash value does not contain any information that could be used for password disclosure. (e.g., contains part of the password in plain text or some sort of password length indicator).

NOTE 3: Depending on the implementation the recorded hash values A and B could be stored with their salt combined in some way (e.g., salt is prefix or suffix of hash value). The tester needs to exclude the salt when comparing records.

Expected Results

All records comply with the characteristic of one-way hash result.

Expected Format of Evidence

Evidence suitable for the interface, e.g. screenshot containing the operation results.

PDFs 9bc1f0078cba683bc5fe9882110f3bf7

4.2.3.2.4 Protecting data and information in transfer

Home General19.2.0
33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
Test Name TC_PROTECT_DATA_INFO_TRANSFER_1
Threat Reference

TR 33.926 [4], clause 5.3.6, Information disclosure

Requirement Name

Protecting data and information in transfer

Requirement Reference

In accordance with industry best practice

Requirement Description
  • Usage of cryptographically protected network protocols is required.

  • The transmission of data with a need of protection shall use industry standard network protocols with sufficient security measures and industry accepted algorithms. In particular, a protocol version without known vulnerabilities or a secure alternative shall be used.

Test Purpose

Verify the mechanisms implemented to protect data and information in transfer to and from the Network Product's O&M interface.

NOTE: The test is limited to the O&M interface although the requirement does not have this limitation because the protection of standardised interfaces will be covered by regular interoperability testing and the proprietary use of HTTPS is covered in clause 4.2.5.1.

Pre-Conditions

Network product documentation containing information about supported O&M protocols is provided by the vendor,

A peer implementing the security protocol configured by the vendor (e.g. SSH client supporting SSHv2 or HTTPS client) shall be available.

Network product documentation stating which security protocols for protection of data in transit are implemented and which profiles in TS 33.310 [9] and TS 33.210 [15] are applicable is provided by the vendor

For TLS/DTLS, the tester shall base the tests on the profile defined by 3GPP in TS 33.310 [9] and TS 33.210 [15]. For IKE and IPsec, the tester shall base the tests on the profile defined by 3GPP in TS 33.210 [15]. For protocols, for which 3GPP did not define a security profile, e.g. SSH, the tester shall base the tests on a widely recognised and publicly available security profile (e.g., security profile defined by IETF or NIST).

Execution Steps
  1. The tester shall check that compliance with the selected security profile can be inferred from detailed provisions in the product documentation.

  2. The tester shall check that the default security parameters are the same as those stated in the product documentation.

  3. The tester shall establish a secure connection between the network product and the peer and verify that all protocol versions and combinations of cryptographic algorithms that are mandated by the security profile are supported by the network product and the network product does not use the deprecated or unsecure protocol versions and algorithms.

  4. The tester shall try to establish a secure connection between the network product and the peer and verify that this is not possible when the peer only offers a feature, including protocol version and combination of cryptographic algorithms, that is forbidden by the security profile.

Expected Results

The traffic is properly protected, and insecure options are not accepted by the Network Product.

Expected Format of Evidence

Provide evidence of the check of the product documentation in plain text. Save the logs and the communication flow in a .pcap file.

PDFs 2039dc2ad6677e8f4b0c4c9382501b8e

4.2.3.2.4 Protecting data and information in transfer

Home General17.4.0
33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
Test Name TC_PROTECT_DATA_INFO_TRANSFER_1
Threat Reference
Requirement Name

tba

Requirement Reference
Requirement Description
  • Usage of cryptographically protected network protocols is required.

  • The transmission of data with a need of protection shall use industry standard network protocols with sufficient security measures and industry accepted algorithms. In particular, a protocol version without known vulnerabilities or a secure alternative shall be used.

Security Objective references: tba

Test Purpose

Verify the mechanisms implemented to protect data and information in transfer to and from the Network Product's OAM interface.

NOTE: The test is limited to the OAM interface although the requirement does not have this limitation because the protection of standardised interfaces will be covered by regular interoperability testing and the proprietary use of HTTPS is covered in clause 4.2.5.1.

Pre-Conditions

Network product documentation containing information about supported OAM protocols is provided by the vendor,

A peer implementing the security protocol configured by the vendor (e.g SSH client supporting SSHv2 or HTTPS client) shall be available.

Network product documentation stating which security protocols for protection of data in transit are implemented and which profiles in TS 33.310 [9] and TS 33.210 [15] are applicable is provided by the vendor

For TLS/DTLS, the tester shall base the tests on the profile defined by 3GPP in TS 33.310 [9] and TS 33.210 [15]. For IKE and IPsec, the tester shall base the tests on the profile defined by 3GPP in TS 33.210 [15]. For protocols, for which 3GPP did not define a security profile, e.g. SSH, the tester shall base the tests on a widely recognised and publicly available security profile.

Execution Steps
  1. The tester shall check that compliance with the selected security profile can be inferred from detailed provisions in the product documentation.

  2. The tester shall establish a secure connection between the network product and the peer and verify that all protocol versions and combinations of cryptographic algorithms that are mandated by the security profile are supported by the network product.

  3. The tester shall try to establish a secure connection between the network product and the peer and verify that this is not possible when the peer only offers a feature, including protocol version and combination of cryptographic algorithms, that is forbidden by the security profile.

Expected Results

The traffic is properly protected, and insecure options are not accepted by the Network Product.

Expected Format of Evidence

Provide evidence of the check of the product documentation in plain text. Save the logs and the communication flow in a .pcap file.

PDFs 21576de0eee649eaa50b6c7c79a9bf1a

4.2.3.2.5 Logging access to personal data

Home General19.2.0
33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
Test Name TC_LOGGING_ACCESS_TO_PERSONAL_DATA
Threat Reference

TR 33.926 [4], clause 5.3.6, Information disclosure

Requirement Name

Logging access to personal data

Requirement Reference

In accordance with industry best practice

Requirement Description

In some cases, access to personal data in clear text might be required. If such access is required, access to this data shall be logged, and the log shall contain who accessed what data without revealing personal data in clear text. When for practical purposes such logging is not available, a coarser grain logging is allowed.

In some cases, the personal data stored in the log files may allow the direct identification of a subscriber. In such cases, the revealed personal information shall not expose the subscriber to any kind of privacy violation.

Test Purpose

Verify that in cases where a network product presents personal data in clear text, access attempts to such data are logged and the log information includes the user identity that has accessed the data. The test case also verifies that the personal data itself is not included in clear text in the log.

Pre-Conditions

A document which provides a description of where personal data in clear text is accessible on the network product, how it can be accessed, and details of where such access attempts are logged and how to view these logs.

Execution Steps
  1. The tester verifies, for cases where personal data is accessible in clear text, that attempts to access it are recorded in a log, that the log includes the identity of the user that has attempted to access the data, and that the log does not include the actual personal data in clear-text.

  2. The tester repeats the check for each case where personal data is accessible.

Expected Results

All access attempts to personal data (in clear text) are recorded in the described logs, with the user identity included and no personal data visible in the log.

Expected Format of Evidence

Sample copies of the log files.

PDFs 4bffe1b1c2de22bd6f6e281eceb8fa2e

4.2.3.2.5 Logging access to personal data

Home General17.4.0
33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
Test Name TC_LOGGING_ACCESS_TO_PERSONAL_DATA
Threat Reference
Requirement Name

Logging access to personal data

Requirement Reference
Requirement Description

In some cases access to personal data in clear text might be required. If such access is required, access to this data shall be logged, and the log shall contain who accessed what data without revealing personal data in clear text. When for practical purposes such logging is not available, a coarser grain logging is allowed.

In some cases, the personal data stored in the log files may allow the direct identification of a subscriber. In such cases, the revealed personal information may not expose the subscriber to any kind of privacy violation.

Test Purpose

Verify that in cases where a network product presents personal data in clear text, access attempts to such data are logged and the log information includes the user identity that has accessed the data. The test case also verifies that the personal data itself is not included in clear text in the log.

Pre-Conditions

A document which provides a description of where personal data in clear text is accessible on the network product, how it can be accessed, and details of where such access attempts are logged and how to view these logs.

Execution Steps
  • The tester verifies, for cases where personal data is accessible in clear text, that attempts to access it are recorded in a log, that the log includes the identity of the user that has attempted to access the data, and that the log does not include the actual personal data in clear-text.

  • The tester repeats the check for each case where personal data is accessible.

  • Expected Results

    All access attempts to personal data (in clear text) are recorded in the described logs, with the user identity included and no personal data visible in the log.

    Expected Format of Evidence

    Sample copies of the log files.

    PDFs 02e23c6d9ef3a05196b24d10bc429030

    4.2.3.3.2 Boot from intended memory devices only

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_BOOT_INT_MEM_1
    Threat Reference
    Requirement Name

    Boot from intended memory devices only

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    The network product can boot only from the memory devices intended for this purpose.

    Test Purpose

    Verify that the network product can only boot from memory devices intended for this purpose (e.g. not from external memory like USB key).

    Pre-Conditions

    A document which contains information regarding the firmware access mechanism supported by the product and about the memory devices from which the network product can boot.

    Execution Steps
    1. The tester verifies that the network product is configured to boot from memory devices declared in the network product document only.

    2. The tester verifies that the network product does not boot from any undeclared memory device by preparing a bootable medium for every class of bootable memory device (e.g. CD, USB key, network boot) present in and accessible at the network product and trying to boot from this medium.

    3. The tester verifies that attempts to access and modify the firmware of the network product are permitted following successful authentication but prevented without prior successful authentication.

    Expected Results

    The network product cannot boot from a memory device that is not configured in its firmware, and access to the firmware is only possible with the correct authentication.

    Expected Format of Evidence

    Screenshot of the actual boot device configuration of the network product and firmware access mechanism/authentication.

    Textual description of the attempts of booting from prepared memory devices.

    PDFs 643f8d6f3a1acc6f9f43118729310d3c

    4.2.3.3.2 Boot from intended memory devices only

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_BOOT_INT_MEM_1
    Threat Reference
    Requirement Name

    Boot from intended memory devices only

    Requirement Reference

    to be done later

    Requirement Description

    The network product can boot only from the memory devices intended for this purpose.

    Test Purpose

    Verify that the network product can only boot from memory devices intended for this purpose (e.g. not from external memory like USB key).

    Pre-Conditions

    A document which contains information regarding the firmware access mechanism supported by the product and about the memory devices from which the network product can boot.

    Execution Steps
    1. The tester verifies that the network product is configured to boot from memory devices declared in the network product document only.

    2. The tester verifies that there is no possibility to access and modify the firmware of the network product without successful authentication and the authenticated subject (e.g., person or process) has no possibility to access and modify the firmware without privileged access rights.

    Expected Results

    The network product cannot boot from a memory device that is not configured in its firmware, and access to the firmware is only possible with the correct authentication.

    Expected Format of Evidence

    NA

    PDFs 510ff1e9738749742cfc07e061978c92

    4.2.3.3.3 System handling during excessive overload situations

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_SYSTEM_HANDLING_OF_OVERLOAD_SITUATIONS
    Threat Reference

    TR 33.926 [4], clause 5.3.7, Denial of service.

    Requirement Name

    System handling during excessive overload situations.

    Requirement Reference

    In accordance with industry best practice.

    Requirement Description

    The system shall act in a predictable way if an overload situation cannot be prevented. A system shall be built in this way that it can react on an overload situation in a controlled way. However, it is possible that a situation happens where the security measures are no longer sufficient.

    In such case it shall be ensured that the system cannot reach an undefined and thus potentially insecure state. In an extreme case this means that a controlled system shutdown is preferable to uncontrolled failure of the security functions and thus loss of system protection.

    The vendor shall provide a technical description of the network product's Over Load Control mechanisms (especially whether these mechanisms rely on cooperation of other network elements e.g. eNodeB) and the accompanying test case for this requirement checks that the description provides sufficient detail in order for an evaluator to understand how the mechanism is designed.

    Test Purpose

    Verify that the network product:

    • has a detailed technical description of the overload control mechanisms used to deal with overload scenarios;

    • has test results verifying the operation of the overload control mechanisms.

    Pre-Conditions
    • A document which provide a detailed technical description of the overload control mechanisms.

    • Test results from a test execution phase of overload control mechanism testing.

    Execution Steps
    • The tester verifies that there is:

    • A technical description providing a high-level overview of the overload control design:

    • An overview of the types of overload scenarios that the network product overload control mechanisms are expected to handle.

    • An overview of the overload control thresholds that the network product uses to trigger overload control mechanisms.

    • Description of the types of attacks that can cause an overload to the network product and how these are handled.

    • A description of how the network product discards or handles input during various overload situations including excessive overloads. i.e. where the overload is significantly greater than the thresholds where overload detection is triggered.

    • A description of how the network product security functions operate and perform during overload.

    • A description of how the network product shuts down or performs or takes other abatement or corrective actions during excessive overload conditions.

    • The tester verifies that the test results:

    • Contain details of the overload conditions used in the test execution that are consistent with the technical description document.

    • Describe test procedures used to verify the overload control mechanisms.

    • Contain data which demonstrates/indicates that the overload control mechanisms described in the technical description document have been implemented.

    • Contain details of the test set-up including the mechanisms for creating the overload. Where simulators and/or scripts are used to artificially create a load then details of these should also be included.

    Expected Results
    • A technical description provides a high-level overview of the overload control design.

    • A overview of the types of overload scenarios and overload control thresholds that are considered.

    • Description on the types of attacks that may cause an overload to the system and how these are handled.

    • A description of how the network product discards or handles input during various overload situations.

    • Describes if or how the network product security functions operate and perform during overload.

    • If parts of the system shutdown or take other abatement or corrective actions these should be described.

    Note: If some of the items listed above are not applicable to a network product then, in those cases, it should be clarified by the vendor why these items are not applicable.

    The test results should:

    • Contain details of the overload conditions used in the test execution that are consistent with the technical description document.

    • Describe the test procedures used to verify the overload control mechanisms.

    • Contain data which demonstrates/indicates that the overload control mechanisms described in the technical description document have been implemented.

    • Contain details of the test set-up including the mechanisms for creating the overload.

    Expected Format of Evidence

    Documentation showing each of the points in the results sections.

    PDFs 441b32988844654b5d750850afb3695c

    4.2.3.3.3 System handling during excessive overload situations

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_SYSTEM_HANDLING_OF_OVERLOAD_SITUATIONS
    Threat Reference
    Requirement Name

    System handling during excessive overload situations

    Requirement Reference
    Requirement Description

    The system shall act in a predictable way if an overload situation cannot be prevented. A system shall be built in this way that it can react on an overload situation in a controlled way. However it is possible that a situation happens where the security measures are no longer sufficient.

    In such case it shall be ensured that the system cannot reach an undefined and thus potentially insecure state. In an extreme case this means that a controlled system shutdown is preferable to uncontrolled failure of the security functions and thus loss of system protection.

    The vendor shall provide a technical description of the network product's Over Load Control mechanisms (especially whether these mechanisms rely on cooperation of other network elements e.g. eNode B) and the accompanying test case for this requirement will check that the description provides sufficient detail in order for an evaluator to understand how the mechanism is designed.

    Security Objective references: tba.

    Test Purpose

    Verify that the network product:

    • has a detailed technical description of the overload control mechanisms used to deal with overload scenarios;

    • has test results verifying the operation of the overload control mechanisms.

    Pre-Conditions
    • A document which provide a detailed technical description of the overload control mechanisms.

    • Test results from a test execution phase of overload control mechanism testing.

    Execution Steps
    • The tester verifies that there is:

    • A technical description providing a high-level overview of the overload control design:

    • An overview of the types of overload scenarios that the network product overload control mechanisms are expected to handle.

    • An overview of the overload control thresholds that the network product uses to trigger overload control mechanisms.

    • Description of the types of attacks that may cause an overload to the network product and how these are handled.

    • A description of how the network product discards or handles input during various overload situations including excessive overloads. i.e. where the overload is significantly greater than the thresholds where overload detection is triggered.

    • A description of how the network product security functions operate and perform during overload.

    • A description of how the network product shuts down or performs or takes other abatement or corrective actions during excessive overload conditions.

    • The tester verifies that the test results:

    • Contain details of the overload conditions used in the test execution that are consistent with the technical description document.

    • Describe test procedures used to verify the overload control mechanisms.

    • Contain data which demonstrates/indicates that the overload control mechanisms described in the technical description document have been implemented.

    • Contain details of the test set-up including the mechanisms for creating the overload. Where simulators and/or scripts are used to artificially create a load then details of these should also be included.

    Expected Results
    • A technical description provides a high-level overview of the overload control design.

    • A overview of the types of overload scenarios and overload control thresholds that are considered.

    • Description on the types of attacks that may cause an overload to the system and how these are handled.

    • A description of how the network product discards or handles input during various overload situations.

    • Describes if or how the network product security functions operate and perform during overload.

    • If parts of the system shutdown or take other abatement or corrective actions these should be described.

    Note: If some of the items listed above are not applicable to a network product then, in those cases, it should be clarified by the vendor why these items are not applicable.

    The test results should:

    • Contain details of the overload conditions used in the test execution that are consistent with the technical description document.

    • Describe the test procedures used to verify the overload control mechanisms.

    • Contain data which demonstrates/indicates that the overload control mechanisms described in the technical description document have been implemented.

    • Contain details of the test set-up including the mechanisms for creating the overload.

    Expected Format of Evidence

    Documentation showing each of the points in the results sections.

    PDFs 281a5a69fb5cf367fe6e61cfa93d1eb9

    4.2.3.3.5 Network Product software package integrity

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_SW_PKG_INTEGRITY_1
    Threat Reference

    TR 33.926 [4], clause 5.3.3.6, Malware

    Requirement Name

    Network product Software integrity validation

    Requirement Reference

    In accordance with industry best practice

    Requirement Description
    1. Software package integrity shall be validated in the installation/upgrade stage.

    2. Network product shall support software package integrity validation via cryptographic means, e.g. digital signature. To this end, the network product has a list of public keys or certificates of authorised software sources, and uses the keys to verify that the software update is originated from only these sources.

    3. Tampered software shall not be executed or installed if integrity check fails.

    4. A security mechanism is required to guarantee that only authorized individuals can initiate and deploy a software update, and modify the list mentioned in bullet 2.

    Test Purpose

    Verify that:

    1. The Network Product validates the software package integrity during the installation/upgrade stage.

    2. The software package integrity validation mechanism is performed using cryptographic mechanisms, e.g. digital signature using the public keys or certificates configured in the network product.

    3. Software that fails an integrity check is rejected by the network product.

    4. Only authorized users are allowed to install software.

    Pre-Conditions
    • A network product document containing information regarding software package integrity checks, including details of how the integrity check is carried out, where public keys or certificates of sources authorised to sign software packages are stored on the network product and who these sources are, and what evidence is created to prove that the integrity check has been executed and what the result of the check was. Documentation which describes the installation procedure including how a user is authorized and authenticated to perform installation process.

    • A valid network product software load/package and one that is not-valid (or could be deemed to have been tampered with) are available.

    Execution Steps
    1. The tester checks the permissions required to install software on the network product ensuring that a user is properly authenticated by the network product and that they have the required access privileges to perform the installation activity.

    2. The tester checks, when a software package is attempted to be installed on the network product, that the software package integrity check is executed (check for evidence of execution as described in network product documentation) and that valid software is allowed to be installed but invalid software is rejected.

    3. The tester checks the access control permissions for the software package integrity checking process, the list of public keys of authorised software sources, and any related credentials or keys for the process, to ensure that the process cannot be controlled by persons that are not authorized to do so.

    Expected Results
    • Evidence that the software package integrity check has been executed for both cases of software installation (valid and invalid software packages).

    • Authentication and access control mechanisms are in operation for software package installation and around the software package integrity checking mechanism.

    • The installation/upgrade operation fails when using an invalid software package.

    • The installation/upgrade operation is successful when using a valid software package.

    Expected Format of Evidence

    Snapshots containing the result of the installation of package A and B.

    PDFs 228113741fedd8607fe69df2557fc25f

    4.2.3.3.5 Network Product software package integrity

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_SW_PKG_INTEGRITY_1
    Threat Reference
    Requirement Name

    Network product Software integrity validation

    Requirement Reference

    to be done later

    Requirement Description
    1. Software package integrity shall be validated in the installation/upgrade stage.

    2. Network product shall support software package integrity validation via cryptographic means, e.g. digital signature. To this end, the network product has a list of public keys or certificates of authorised software sources, and uses the keys to verify that the software update is originated from only these sources.

    3. Tampered software shall not be executed or installed if integrity check fails.

    4. A security mechanism is required to guarantee that only authorized individuals can initiate and deploy a software update, and modify the list mentioned in bullet 2.

    Security Objective references: SOFTWARE INTEGRITY

    Test Purpose

    Verify that:

    1. The Network Product validates the software package integrity during the installation/upgrade stage.

    2. The software package integrity validation mechanism is performed using cryptographic mechanisms, e.g. digital signature using the public keys or certificates configured in the network product.

    3. Software that fails an integrity check is rejected by the network product.

    4. Only authorized users are allowed to install software.

    Pre-Conditions
    • A network product document containing information regarding software package integrity checks, including details of how the integrity check is carried out, where public keys or certificates of sources authorised to sign software packages are stored on the network product and who these sources are, and what evidence is created to prove that the integrity check has been executed and what the result of the check was. Documentation which describes the installation procedure including how a user is authorized and authenticated to perform installation process.

    • A valid network product software load/package and one that is not-valid (or could be deemed to have been tampered with) are available.

    Execution Steps

    The tester checks the permissions required to install software on the network product ensuring that a user is properly authenticated by the network product and that they have the required access privileges to perform the installation activity.

  • The tester checks, when a software package is attempted to be installed on the network product, that the software package integrity check is executed (check for evidence of execution as described in network product documentation) and that valid software is allowed to be installed but invalid software is rejected.

  • The tester checks the access control permissions for the software package integrity checking process, the list of public keys of authorised software sources, and any related credentials or keys for the process, to ensure that the process cannot be controlled by persons that are not authorized to do so.

    Expected Results
    • Evidence that the software package integrity check has been executed for both cases of software installation (valid and invalid software packages).

    • Authentication and access control mechanisms are in operation for software package installation and around the software package integrity checking mechanism.

    • The installation/upgrade operation fails when using an invalid software package.

    • The installation/upgrade operation is successful when using a valid software package.

    Expected Format of Evidence

    Snapshots containing the result of the installation of package A and B.

    PDFs 0193bf4d6d79c71e28a27956e889ea76

    4.2.3.4.1.1 Successful authentication and authorization of system functions

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_SYS_FUN_USAGE
    Threat Reference

    TR 33.926 [4], clause 5.3.6, Information disclosure

    Requirement Name

    Authentication and authorization for System functions

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    The usage of a system function without successful authentication on basis of the user identity and at least one authentication attribute (e.g. password, certificate) shall be prevented. System functions comprise, for example network services (like SSH, SFTP, Web services), local access via a management console, local usage of operating system and applications. This requirement shall also be applied to accounts that are only used for communication between systems. An exception to the authentication and authorization requirement are functions for public use such as those for a Web server on the Internet, via which information is made available to the public.

    Test Purpose

    To ensure that system functions shall not be used without successful authentication and authorization.

    Pre-Conditions
    1. The vendor shall supply the list of system functions which include network services, local access via a management console, local usage of operating system and applications.

    2. The vendor shall supply the list of access entries for system functions.

    Execution Steps
    1. The tester verifies that the access entries to use system functions, which are listed by the vendor, require successful authentication on basis of the user name and at least one authentication attribute.

    2. The tester also verifies that the access entries to use system functions require authorization via an access control mechanism (e.g. Discretionary access control/Ownership/Capabilities or Mandatory access control). This applies to both system functions that are locally accessible and those that are remotely accessible via a network interface.

    Expected Results

    The network product does not allow access to any system function provided by the vendor without a successful user authentication and authorization.

    Expected Format of Evidence
    • Description of executed tests and commands

    • Relevant output (e.g. Screenshot)

    PDFs 695fc5ad47a865e13d45ecd99ab46765

    4.2.3.4.1.1
    System functions shall not be used without successful authentication and authorization.

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_SYS_FUN_USAGE
    Threat Reference
    Requirement Name

    System functions shall not be used or accessed without successful authentication and authorization.

    Requirement Reference
    Requirement Description

    The usage of a system function without successful authentication on basis of the user identity and at least one authentication attribute (e.g. password, certificate) shall be prevented. System functions comprise, for example network services (like SSH, SFTP, Web services), local access via a management console, local usage of operating system and applications. This requirement shall also be applied to accounts that are only used for communication between systems. An exception to the authentication and authorization requirement are functions for public use such as those for a Web server on the Internet, via which information is made available to the public.

    Security Objective references: tba.

    Test Purpose

    To ensure that system functions shall not be used without successful authentication and authorization.

    Pre-Conditions
    1. The manufacturer shall supply the list of system functions which include network services, local access via a management console, local usage of operating system and applications.

    2. The manufacturer shall supply the list of access entries for system functions.

    Execution Steps

    The accredited evaluator's test lab is required to execute the following steps:

    1. The tester verifies, based on his/her own experience, that the list is adequate.

    2. The tester verifies that the access entries to use system functions, which are listed by the manufacturer, require successful authentication on basis of the user name and at least one authentication attribute. The tester also verifies that the access entries to use system functions require authorization via an access control mechanism (e.g. Discretionary access control/Ownership/Capabilities or Mandatory access control). This applies to both system functions that are locally accessible and those that are remotely accessible via a network interface.

    Expected Results
    1. The network product does not allow access to any system function provided by the manufacturer without a successful user authentication and authorization.
    Expected Format of Evidence

    A testing report provided by the testing agency which will consist of the following information:

    • Description of executed tests and commands

    • Relevant output (e.g. Screenshot)

    • Test result (Passed or not)

    PDFs 8445d8a786ca317502169b9266d4a4df

    4.2.3.4.1.2 Unambiguous identification of the user

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_ACCOUNT_DOCUMENTATION
    Threat Reference

    TR 33.926 [4], clause 5.3.5.1, Lack of User Activity Trace

    NOTE 3: Some typical default accounts suggest that they are shared amongst several persons (e.g. vendor_xy, support), or do not allow identification of individual users (e.g. guest, ftp, anonymous). In order to avoid overlap of this test case with clause 4.2.3.4.2.2, it is assumed for this test case that such accounts have been deleted or disabled in line with clause 4.2.3.4.2.2.

    Requirement Name

    Unambiguous identification of the user.

    Requirement Reference

    In accordance with industry best practice.

    Requirement Description

    Users shall be identified unambiguously by the network product. The network product shall support assignment of individual accounts per user, where a user could be a person, or, for Machine Accounts, an application, or a system. The network product shall not enable the use of group accounts or group credentials, or sharing of the same account between several users, by default. The network product shall support a minimum number of 50 individual accounts per user data base if not explicitly specified in a SCAS of a particular network product, so that accountability for each user is ensured even in large network operator networks. The network product shall not support user access credentials unrelated to an account.

    NOTE 1: The network product can support independent user data bases for different access methods, e.g. one data base for command shell access on OS level and another data base for GUI access. User data bases can be stored locally on the network product or on a central AAA system that the network product accesses for user authentication.

    NOTE 2: This requirement does not preclude user group concepts for access control.

    Test Purpose

    To ensure that documentation of the network product does not encourage or require the use of group accounts, group credentials, or sharing of the same account between several users. To ensure that the network product does not support credentials unrelated to an account.

    Pre-Conditions
    1. All user and group data bases for names and credentials supported by the network product are identified in the documentation accompanying the network product.

    2. All predefined accounts and groups are identified in the documentation accompanying the Network Product.

    3. Instructions of how administrator users can add accounts, groups, and credentials to the database(s) are provided in the documentation accompanying the Network Product.

    4. The operations manual describes O&M user and group concepts supported by the network product.

    Execution Steps
    1. Review the system documentation (in particular operations manual) whether it encourages or requires the use of group accounts, group credentials, or sharing of the same account between several users.

    2. Review the system documentation whether the network product requires or supports entering credentials unrelated to an account, in order to perform specific actions, e.g. to enter a "master password" for access to privileged functions.

    Expected Results

    The reviewed documentation is in line with the requirement.

    Expected Format of Evidence

    Test report that lists the reviewed documentation (incl. release dates and versions) and the findings.

    PDFs 15a5004db8a8c453f72061ba942422f1

    4.2.3.4.1.2
    Accounts shall allow unambiguous identification of the user.

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_ACCOUNT_DOCUMENTATION
    Threat Reference
    Requirement Name

    The network product shall use accounts that allow unambiguous identification of the user.

    Requirement Reference
    Requirement Description

    Users shall be identified unambiguously by the network product. The network product shall support assignment of individual accounts per user, where a user could be a person, or, for Machine Accounts, an application, or a system. The network product shall not enable the use of group accounts or group credentials, or sharing of the same account between several users, by default. The network product shall support a minimum number of 50 individual accounts per user data base if not explicitly specified in a SCAS of a particular network product, so that accountability for each user is ensured even in large operator networks. The network product shall not support user access credentials unrelated to an account.

    NOTE 1: The network product may support independent user data bases for different access methods, e.g. one data base for command shell access on OS level and another data base for GUI access. User data bases may be stored locally on the network product or on a central AAA system that the network product accesses for user authentication.

    NOTE 2: This requirement does not preclude user group concepts for access control.

    Security Objective references: tba.

    NOTE 3: Some typical default accounts suggest that they are shared amongst several persons (e.g. vendor_xy, support), or do not allow identification of individual users (e.g. guest, ftp, anonymous). In order to avoid overlap of this test case with clause 4.2.3.4.2.2, it is assumed for this test case that such accounts have been deleted or disabled in line with clause 4.2.3.4.2.2.

    Test Purpose

    To ensure that documentation of the network product does not encourage or require the use of group accounts, group credentials, or sharing of the same account between several users. To ensure that the network product does not support credentials unrelated to an account.

    Pre-Conditions
    1. All user and group data bases for names and credentials supported by the network product are identified in the documentation accompanying the network product.

    2. All predefined accounts and groups are identified in the documentation accompanying the Network Product.

    3. Instructions of how administrator users can add accounts, groups, and credentials to the database(s) are provided in the documentation accompanying the Network Product.

    4. The operations manual describes OAM user and group concepts supported by the network product.

    Execution Steps

    The accredited evaluator's test lab is required to execute the following steps:

    1. Review the system documentation (in particular operations manual) whether it encourages or requires the use of group accounts, group credentials, or sharing of the same account between several users.

    2. Review the system documentation whether the network product requires or supports entering credentials unrelated to an account, in order to perform specific actions, e.g. to enter a "master password" for access to privileged functions.

    Expected Results
    1. The reviewed documentation is in line with the requirement.
    Expected Format of Evidence

    Test report that lists the reviewed documentation (incl. release dates and versions) and the findings.

    PDFs aa2fa7c80c1b13e2393fe4e30b4ffb55

    4.2.3.4.1.2(2) Unambiguous identification of the user

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_ACCOUNT_DEFAULTS
    Threat Reference

    TR 33.926 [4], clause 5.3.5.1, Lack of User Activity Trace

    NOTE 3: Some typical default accounts suggest that they are shared amongst several persons (e.g. vendor_xy, support), or do not allow identification of individual users (e.g. guest, ftp, anonymous). In order to avoid overlap of this test case with clause 4.2.3.4.2.2, it is assumed for this test case that such accounts have been deleted or disabled in line with clause 4.2.3.4.2.2.

    Requirement Name

    Unambiguous identification of the user.

    Requirement Reference

    In accordance with industry best practice.

    Requirement Description

    Users shall be identified unambiguously by the network product. The network product shall support assignment of individual accounts per user, where a user could be a person, or, for Machine Accounts, an application, or a system. The network product shall not enable the use of group accounts or group credentials, or sharing of the same account between several users, by default. The network product shall support a minimum number of 50 individual accounts per user data base if not explicitly specified in a SCAS of a particular network product, so that accountability for each user is ensured even in large network operator networks. The network product shall not support user access credentials unrelated to an account.

    NOTE 1: The network product can support independent user data bases for different access methods, e.g. one data base for command shell access on OS level and another data base for GUI access. User data bases can be stored locally on the network product or on a central AAA system that the network product accesses for user authentication.

    NOTE 2: This requirement does not preclude user group concepts for access control.

    Test Purpose

    To ensure that the default setup of the network product does not enable the use of group accounts or group credentials.

    Pre-Conditions
    1. All user and group data bases for names and credentials supported by the network product are identified in the documentation accompanying the network product.

    2. Instructions of how administrator users can view all existing accounts, groups, and protected credentials in the databases are provided in the documentation accompanying the Network Product.

    Execution Steps

    After login via an account with necessary access rights (e.g. Admin) search in the databases for any group credentials. Example for Linux®: /etc/gshadow

    Expected Results

    No group credentials are defined.

    Expected Format of Evidence

    Test report that lists the reviewed documentation, reviewed user and group databases, and the findings.

    PDFs 2cfddd116841167657ca2ff230061ac8

    4.2.3.4.1.2(2)
    Accounts shall allow unambiguous identification of the user.

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_ACCOUNT_DEFAULTS
    Threat Reference
    Requirement Name

    The network product shall use accounts that allow unambiguous identification of the user.

    Requirement Reference
    Requirement Description

    Users shall be identified unambiguously by the network product. The network product shall support assignment of individual accounts per user, where a user could be a person, or, for Machine Accounts, an application, or a system. The network product shall not enable the use of group accounts or group credentials, or sharing of the same account between several users, by default. The network product shall support a minimum number of 50 individual accounts per user data base if not explicitly specified in a SCAS of a particular network product, so that accountability for each user is ensured even in large operator networks. The network product shall not support user access credentials unrelated to an account.

    NOTE 1: The network product may support independent user data bases for different access methods, e.g. one data base for command shell access on OS level and another data base for GUI access. User data bases may be stored locally on the network product or on a central AAA system that the network product accesses for user authentication.

    NOTE 2: This requirement does not preclude user group concepts for access control.

    Security Objective references: tba.

    NOTE 3: Some typical default accounts suggest that they are shared amongst several persons (e.g. vendor_xy, support), or do not allow identification of individual users (e.g. guest, ftp, anonymous). In order to avoid overlap of this test case with clause 4.2.3.4.2.2, it is assumed for this test case that such accounts have been deleted or disabled in line with clause 4.2.3.4.2.2.

    Test Purpose

    To ensure that the default setup of the network product does not enable the use of group accounts or group credentials.

    Pre-Conditions
    1. All user and group data bases for names and credentials supported by the network product are identified in the documentation accompanying the network product.

    2. Instructions of how administrator users can view all existing accounts, groups, and protected credentials in the databases are provided in the documentation accompanying the Network Product.

    Execution Steps

    The accredited evaluator's test lab is required to execute the following steps:

    1. After login via an account with necessary access rights (e.g. Admin) search in the databases for any group credentials. Example for Linux®: /etc/gshadow
    Expected Results
    1. No group credentials are defined.
    Expected Format of Evidence

    Test report that lists the reviewed documentation, reviewed user and group databases, and the findings.

    PDFs 80e3b64df2cceebe42da08d038cf5ac3

    4.2.3.4.1.2(3) Unambiguous identification of the user

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_ACCOUNT_NUMBER
    Threat Reference

    TR 33.926 [4], clause 5.3.5.1, Lack of User Activity Trace

    NOTE 3: Some typical default accounts suggest that they are shared amongst several persons (e.g. vendor_xy, support), or do not allow identification of individual users (e.g. guest, ftp, anonymous). In order to avoid overlap of this test case with clause 4.2.3.4.2.2, it is assumed for this test case that such accounts have been deleted or disabled in line with clause 4.2.3.4.2.2.

    Requirement Name

    Unambiguous identification of the user.

    Requirement Reference

    In accordance with industry best practice.

    Requirement Description

    Users shall be identified unambiguously by the network product. The network product shall support assignment of individual accounts per user, where a user could be a person, or, for Machine Accounts, an application, or a system. The network product shall not enable the use of group accounts or group credentials, or sharing of the same account between several users, by default. The network product shall support a minimum number of 50 individual accounts per user data base if not explicitly specified in a SCAS of a particular network product, so that accountability for each user is ensured even in large network operator networks. The network product shall not support user access credentials unrelated to an account.

    NOTE 1: The network product can support independent user data bases for different access methods, e.g. one data base for command shell access on OS level and another data base for GUI access. User data bases can be stored locally on the network product or on a central AAA system that the network product accesses for user authentication.

    NOTE 2: This requirement does not preclude user group concepts for access control.

    Test Purpose

    To ensure that a minimum number of individual accounts per user data base is supported. The minimum number is defined in the requirement description of this clause.

    Pre-Conditions

    All user data bases for names and credentials supported by the network product are identified in the documentation accompanying the network product.

    Execution Steps

    Create accounts until the minimum number of accounts is reached.

    Expected Results

    Successful creation of the minimum number of accounts.

    Expected Format of Evidence

    Test report that lists the reviewed documentation, reviewed user databases, and the findings.

    PDFs 52f1fecb9c3e9696a79a0e17675a7a8b

    4.2.3.4.1.2(3)
    Accounts shall allow unambiguous identification of the user.

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_ACCOUNT_NUMBER
    Threat Reference
    Requirement Name

    The network product shall use accounts that allow unambiguous identification of the user.

    Requirement Reference
    Requirement Description

    Users shall be identified unambiguously by the network product. The network product shall support assignment of individual accounts per user, where a user could be a person, or, for Machine Accounts, an application, or a system. The network product shall not enable the use of group accounts or group credentials, or sharing of the same account between several users, by default. The network product shall support a minimum number of 50 individual accounts per user data base if not explicitly specified in a SCAS of a particular network product, so that accountability for each user is ensured even in large operator networks. The network product shall not support user access credentials unrelated to an account.

    NOTE 1: The network product may support independent user data bases for different access methods, e.g. one data base for command shell access on OS level and another data base for GUI access. User data bases may be stored locally on the network product or on a central AAA system that the network product accesses for user authentication.

    NOTE 2: This requirement does not preclude user group concepts for access control.

    Security Objective references: tba.

    NOTE 3: Some typical default accounts suggest that they are shared amongst several persons (e.g. vendor_xy, support), or do not allow identification of individual users (e.g. guest, ftp, anonymous). In order to avoid overlap of this test case with clause 4.2.3.4.2.2, it is assumed for this test case that such accounts have been deleted or disabled in line with clause 4.2.3.4.2.2.

    Test Purpose

    To ensure that a minimum number of individual accounts per user data base is supported. The minimum number is defined in the requirement description of this clause.

    Pre-Conditions

    All user data bases for names and credentials supported by the network product are identified in the documentation accompanying the network product.

    Execution Steps

    The accredited evaluator's test lab is required to execute the following steps:

    Create accounts until the minimum number of accounts is reached.

    Expected Results

    Successful creation of the minimum number of accounts.

    Expected Format of Evidence

    Test report that lists the reviewed documentation, reviewed user databases, and the findings.

    PDFs 0e4fee4ce8d555fa15554413ea098295

    4.2.3.4.2.1 Account protection by at least one authentication attribute.

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_ACCOUNT_PROTECTION
    Threat Reference

    TR 33.926 [4], 5.3.3.5, IP Spoofing

    Requirement Name

    Account protection by at least one authentication attribute.

    Requirement Reference

    In accordance with industry best practice.

    Requirement Description

    The various user and machine accounts on a system shall be protected from misuse. To this end, an authentication attribute is typically used, which, when combined with the user name, enables unambiguous authentication and identification of the authorized user.

    Authentication attributes include:

    • Cryptographic keys

    • Token

    • Passwords

    This means that authentication based on a parameter that can be spoofed (e.g. phone numbers, public IP addresses or VPN membership) is not permitted. Exceptions are attributes that cannot be faked or spoofed by an attacker.

    NOTE: Several of the above options can be combined (dual-factor authentication) to achieve a higher level of security. Whether or not this is suitable and necessary depends on the protection needs of the individual system and its data and is evaluated for individual cases.

    Test Purpose

    To ensure that all accounts are protected by at least one authentication attribute.

    Pre-Conditions
    1. All predefined accounts are identified in the documentation accompanying the Network Product.

    2. Instructions of how to create new accounts are provided in the documentation accompanying the Network Product.

    3. Instructions of how administrator user can view all existing accounts in the database are provided in the documentation accompanying the Network Product.

    NOTE: No test is provided here for finding undocumented hard coded accounts as such tests be impossible to define in a general way.

    Execution Steps
    1. After login via account with necessary access rights (e.g. Admin) search in the database for any undocumented account.

    2. Attempt login to all predefined accounts identified (either documented or not) with and without using the respective authentication attribute.

    3. Create a new account by following instructions in documentation.

    4. Attempt login to the newly created account.

    Expected Results
    1. It is not possible to login to any predefined account without using at least one authentication attribute that satisfies the conditions in the requirement.

    2. It is not possible to login to any newly created account without usage of at least one authentication attribute that satisfies the conditions in the requirement.

    Expected Format of Evidence

    Evidence containing the results of all login attempts, e.g. screenshots, log files, error messages.

    PDFs 9a399e6454708567f75f327248bb3140

    4.2.3.4.2.1 Account protection by at least one authentication attribute.

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_ACCOUNT_PROTECTION
    Threat Reference
    Requirement Name

    Account protection by at least one authentication attribute.

    Requirement Reference
    Requirement Description

    The various user and machine accounts on a system shall be protected from misuse. To this end, an authentication attribute is typically used, which, when combined with the user name, enables unambiguous authentication and identification of the authorized user.

    Authentication attributes include:

    • Cryptographic keys

    • Token

    • Passwords

    This means that authentication based on a parameter that can be spoofed (e.g. phone numbers, public IP addresses or VPN membership) is not permitted. Exceptions are attributes that cannot be faked or spoofed by an attacker.

    NOTE: Several of the above options can be combined (dual-factor authentication) to achieve a higher level of security. Whether or not this is suitable and necessary depends on the protection needs of the individual system and its data and is evaluated for individual cases.

    Security Objective references: tba.

    Test Purpose

    To ensure that all accounts are protected by at least one authentication attribute.

    Pre-Conditions
    1. All predefined accounts are identified in the documentation accompanying the Network Product.

    2. Instructions of how to create new accounts are provided in the documentation accompanying the Network Product.

    3. Instructions of how administrator user can view all existing accounts in the database are provided in the documentation accompanying the Network Product.

    NOTE: No test is provided here for finding undocumented hard coded accounts as such tests may be impossible to define in a general way.

    Execution Steps

    The accredited evaluator's test lab is required to execute the following steps:

    1. After login via account with necessary access rights (e.g. Admin) search in the database for any undocumented account.

    2. Attempt login to all predefined accounts identified (either documented or not) with and without using the respective authentication attribute.

    3. Create a new account by following instructions in documentation.

    4. Attempt login to the newly created account.

    Expected Results
    1. It is not possible to login to any predefined account without using at least one authentication attribute that satisfies the conditions in the requirement.

    2. It is not possible to login to any newly created account without usage of at least one authentication attribute that satisfies the conditions in the requirement.

    Expected Format of Evidence

    tba

    PDFs 4b53465e85376b8b5ff1ecceeaf8c2fa

    4.2.3.4.2.2 Deletion or disablement of predefined accounts

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_PREDEFINED_ACCOUNT_DELETION
    Threat Reference

    TR 33.926 [4], clause 5.3.3.1, Default Accounts

    Requirement Name

    Deletion or disablement of predefined accounts.

    Requirement Reference

    In accordance with industry best practice.

    Requirement Description

    All predefined or default accounts shall be deleted or disabled. Many systems have default accounts (e.g. guest, ctxsys), some of which are preconfigured with or without known passwords. These standard users shall be deleted or disabled. Should this measure not be possible the accounts shall be locked for remote login. In any case disabled or locked accounts shall be configured with a complex password as specified in clause 4.2.3.4.3.1 Password Structure. This is necessary to prevent unauthorized use of such an account in case of misconfiguration.

    Exceptions to this requirement to delete or disable accounts are accounts that are used only internally on the system involved and that are required for one or more applications on the system to function. Also, for these accounts remote access or local login shall be forbidden to prevent abusive use by users of the system.

    Test Purpose

    To ensure that predefined accounts are deleted or disabled unless there is specific exception as defined in the requirement 4.2.3.4.2.2.

    Pre-Conditions
    1. All predefined accounts are identified in the documentation accompanying the Network Product.

    2. Instructions of how administrator user can view all existing accounts in the database are provided in the documentation accompanying the Network Product.

    NOTE: No test is provided here for finding undocumented hard coded accounts as such tests can be impossible to define in a general way.

    Execution Steps
    1. Check in documentation of the existence of any documented predefined account and what is the reason for existence.

    2. After login via account with necessary access rights (e.g. Admin) search in the database for any undocumented account.

    3. Check the password complexity of such existing predefined accounts according to the test provided in clause 4.2.3.4.3.1.

    4. Attempt remote login to such predefined accounts.

    Expected Results
    1. Predefined accounts are either deleted/ disabled or, if existing, the reason is in accordance with the requirement exception.

    2. If there are active predefined accounts in accordance with the requirement exception then there is no remote login possibility.

    3. If predefined account is either disabled or locked then it shall anyway fulfil the complex password requirements as specified in clause 4.2.3.4.3.1 after enabling or unlocking it.

    Expected Format of Evidence

    Evidence can be presented in the form of screenshot/screen-capture on showing for example a remote login failure or complexity of a password of e.g. locked or disabled accounts.

    PDFs a22fe6a045aa1fe8df77230043d98bc8

    4.2.3.4.2.2
    Predefined accounts shall be deleted or disabled.

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_PREDEFINED_ACCOUNT_DELETION
    Threat Reference
    Requirement Name

    Predefined accounts shall be deleted or disabled.

    Requirement Reference
    Requirement Description

    All predefined or default accounts shall be deleted or disabled. Many systems have default accounts (e.g. guest, ctxsys), some of which are preconfigured with or without known passwords. These standard users shall be deleted or disabled. Should this measure not be possible the accounts shall be locked for remote login. In any case disabled or locked accounts shall be configured with a complex password as specified in clause 4.2.3.4.3.1 Password Structure. This is necessary to prevent unauthorized use of such an account in case of misconfiguration.

    Exceptions to this requirement to delete or disable accounts are accounts that are used only internally on the system involved and that are required for one or more applications on the system to function. Also for these accounts remote access or local login shall be forbidden to prevent abusive use by users of the system.

    Security Objective references: TBA.

    Test Purpose

    To ensure that predefined accounts are deleted or disabled unless there is specific exception as defined in the requirement 4.2.3.4.2.2.

    Pre-Conditions
    1. All predefined accounts are identified in the documentation accompanying the Network Product.

    2. Instructions of how administrator user can view all existing accounts in the database are provided in the documentation accompanying the Network Product.

    NOTE: No test is provided here for finding undocumented hard coded accounts as such tests may be impossible to define in a general way.

    Execution Steps
    1. Check in documentation of the existence of any documented predefined account and what is the reason for existence.

    2. After login via account with necessary access rights (e.g. Admin) search in the database for any undocumented account.

    3. Check the password complexity of such existing predefined accounts according to the test provided in clause 4.2.3.4.3.1.

    4. Attempt remote login to such predefined accounts.

    Expected Results
    1. Predefined accounts are either deleted/ disabled or, if existing, the reason is in accordance with the requirement exception.

    2. If there are active predefined accounts in accordance with the requirement exception then there is no remote login possibility.

    3. If predefined account is either disabled or locked then it shall anyway fulfil the complex password requirements as specified in clause 4.2.3.4.3.1 after enabling or unlocking it.

    Expected Format of Evidence

    Evidence can be presented in the form of screenshot/screen-capture on showing for example a remote login failure or complexity of a password of e.g. locked or disabled accounts.

    PDFs 13cc0d58a248bc4a968eeb2bd22f83de

    4.2.3.4.2.3 Deletion or disablement of predefined or default authentication attributes.

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_PREDEFINED_AUTHENTICATION_ATTRIBUTES_DELETION
    Threat Reference

    TR 33.926 [4], clause 5.3.3.1, Default Accounts

    Requirement Name

    Deletion or disablement of predefined or default authentication attributes

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    Predefined or default authentication attributes shall be deleted or disabled.

    Normally, authentication attributes such as password or cryptographic keys will be preconfigured from vendor, manufacturer, or developer of a system. Such authentication attributes shall be changed by automatically forcing a user to change it on 1^st^ time login to the system or the vendor provides instructions on how to manually change it.

    Test Purpose

    To ensure that predefined or default authentication attributes are deleted or disabled as defined in the requirement 4.2.3.4.2.3.

    Pre-Conditions
    1. Instructions of how administrator user can view all existing accounts in the database are provided in the documentation accompanying the Network Product.

    2. All predefined accounts and their respective predefined or default passwords are identified in the documentation accompanying the Network Product.

    NOTE: No test is provided here for finding undocumented hard coded accounts as such tests can be impossible to define in a general way.

    Execution Steps
    1. Check in documentation of the existence of any documented predefined account and what is the login password or if any cryptographic key for such accounts is preinstalled.

    2. After login via account with necessary access rights (e.g. Admin) search in the database for any undocumented account.

    3. Attempt login to such predefined accounts if existing.

    Expected Results
    1. When login is attempted to any predefined account the user is automatically forced to change login password at first time login to the system.

    2. If there is no automatic password change enforced then recommendation and clear instructions of how to manually change the password or how to create and reinstall a new cryptographic key exist in the documentation.

    Expected Format of Evidence

    Evidence can be presented in the form of screenshot/screen-capture on how the network product prompts for password change at first login. Also extracts from product documentation with clear instructions of how to change any default password or cryptographic key.

    PDFs fc746eb369f2a6c84d5ab89e93551a08

    4.2.3.4.2.3
    Predefined or default authentication attributes shall be deleted or disabled.

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_PREDEFINED_AUTHENTICATION_ATTRIBUTES_DELETION
    Threat Reference
    Requirement Name

    Predefined or default authentication attributes shall be deleted or disabled.

    Requirement Reference
    Requirement Description

    Predefined or default authentication attributes shall be deleted or disabled.

    Normally, authentication attributes such as password or cryptographic keys will be preconfigured from producer, vendor or developer of a system. Such authentication attributes shall be changed by automatically forcing a user to change it on 1^st^ time login to the system or the vendor provides instructions on how to manually change it.

    Security Objective references: TBA.

    Test Purpose

    To ensure that predefined or default authentication attributes are deleted or disabled as defined in the requirement 4.2.3.4.2.3.

    Pre-Conditions
    1. Instructions of how administrator user can view all existing accounts in the database are provided in the documentation accompanying the Network Product.

    2. All predefined accounts and their respective predefined or default passwords are identified in the documentation accompanying the Network Product.

    NOTE: No test is provided here for finding undocumented hard coded accounts as such tests may be impossible to define in a general way.

    Execution Steps
    1. Check in documentation of the existence of any documented predefined account and what is the login password or if any cryptographic key for such accounts is preinstalled.

    2. After login via account with necessary access rights (e.g. Admin) search in the database for any undocumented account.

    3. Attempt login to such predefined accounts if existing.

    Expected Results
    1. When login is attempted to any predefined account the user is automatically forced to change login password at first time login to the system.

    2. If there is no automatic password change enforced then recommendation and clear instructions of how to manually change the password or how to create and reinstall a new cryptographic key exist in the documentation.

    Expected Format of Evidence

    Evidence can be presented in the form of screenshot/screen-capture on how the network product prompts for password change at first login. Also extracts from product documentation with clear instructions of how to change any default password or cryptographic key.

    PDFs c520a8c037f78a4e65ca506f76560f9c

    4.2.3.4.3.1 Password Structure

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_PASSWORD_STRUCT
    Threat Reference

    TR 33.926 [4], clause 5.3.3.2, Weak Password Policies

    Requirement Name

    Password Complexity rule

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    The setting by the vendor shall be such that a network product shall only accept passwords that comply with the following complexity criteria:

    1. Absolute minimum length of 8 characters (shorter lengths shall be rejected by the network product). It shall not be possible setting this absolute minimum length to a lower value by configuration.

    2. Comprising at least three of the following categories:

    3. at least 1 uppercase character (A-Z)

    4. at least 1 lowercase character (a-z)

    5. at least 1 digit (0-9)

    6. at least 1 special character (e.g. @;!\$.)

    The network product shall use a default at least minimum length of 8 characters. The minimum length of characters in the passwords shall be configurable by the network operator. The default minimum length is the value configured by the vendor before any network operator-specific configuration has been applied. The special characters can be categorized in sets according to their Unicode category.

    The network product shall at least support passwords of a length of 64 characters or a length greater than 64 characters.

    If a central system is used for user authentication, password policy is performed on the central system and additional assurance shall be provided that the central system enforces the same password complexity rules as laid down for the local system in this subclause. If a central system is not used for user authentication, the assurance on password complexity rules shall be performed on the Network Product.

    When a user is changing a password or entering a new password, the system checks and ensures that it meets the password requirements. Above requirements shall be applicable for all passwords used (e.g. application-level, OS-level, etc.).

    Test Purpose

    To verify that password structure adheres to the password complexity criteria.

    To verify that password structure is configurable as per the complexity criteria.

    Pre-Conditions

    Tester has rights to create user account.

    Execution Steps

    A. Test Case 1

    1. The tester logs into Network Product application using admin account.

    2. The tester creates user A following the password complexity criteria.

    3. The tester logs in as user A and attempts to change their password which contains characters from all four categories mentioned in the password complexity criteria.

    B. Test Case 2

    1. The tester logins with privileged account.

    2. The tester modifies password structure policy on the network product by strengthening the policy (e.g. changing the minimum password length to 8+x, changing the minimum number of character Unicode categories to 4).

    3. The tester logs in as user A and attempts to change their password to a password with a strength of less than that permitted by the policy strengthened in step 2 above.

    Expected Results

    Tester can change password only if new password fulfil the password complexity criteria

    Expected Format of Evidence

    Evidence suitable for the interface, e.g. screenshot containing the operation result or report in text form.

    PDFs 62f4613f91ad34c9add186a542cfd298

    4.2.3.4.3.1 Password Structure

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_PASSWORD_STRUCT
    Threat Reference
    Requirement Name

    Password Complexity rule

    Requirement Reference
    Requirement Description

    The setting by the vendor shall be such that a network product shall only accept passwords that comply with the following complexity criteria:

    1. Absolute minimum length of 8 characters (shorter lengths shall be rejected by the network product). It shall not be possible setting this absolute minimum length to a lower value by configuration.

    2. Comprising at least three of the following categories:

    3. at least 1 uppercase character (A-Z)

    4. at least 1 lowercase character (a-z)

    5. at least 1 digit (0-9)

    6. at least 1 special character (e.g. @;!\$.)

    The network product shall use a default minimum length of 10 characters. The minimum length of characters in the passwords shall be configurable by the operator. The default minimum length is the value configured by the vendor before any operator-specific configuration has been applied. The special characters may be categorized in sets according to their Unicode category.

    The network product shall at least support passwords of a length of 64 characters or a length greater than 64 characters.

    If a central system is used for user authentication, password policy is performed on the central system and additional assurance shall be provided that the central system enforces the same password complexity rules as laid down for the local system in this subclause. If a central system is not used for user authentication, the assurance on password complexity rules shall be performed on the Network Product.

    When a user is changing a password or entering a new password, the system checks and ensures that it meets the password requirements. Above requirements shall be applicable for all passwords used (e.g. application-level, OS-level, etc.).

    Security Objective references: Hardening.

    Test Purpose

    To verify that password structure adheres to the password complexity criteria.

    To verify that password structure is configurable as per the complexity criteria.

    Pre-Conditions
    1. Tester has rights to create user account.
    Execution Steps

    Execute the following steps:

    A. Test Case 1

    1. The tester logs into Network Product application using admin account.

    2. The tester creates user A following the password complexity criteria.

    3. The tester logs in as user A and attempts to change their password which contains characters from all four categories mentioned in the password complexity criteria.

    B. Test Case 2

    1. The tester logins with privileged account.

    2. The tester modifies password structure policy on the network product by strengthening the policy (e.g. changing the minimum password length to 8+x, changing the minimum number of character Unicode categories to 4).

    3. The tester logs in as user A and attempts to change their password to a password with a strength of less than that permitted by the policy strengthened in step 2 above.

    Expected Results

    Tester can change password only if new password fulfil the password complexity criteria

    Expected Format of Evidence

    Evidence suitable for the interface, e.g. screenshot containing the operation result or report in text form.

    PDFs 745e11cee0e5b5bee0fdf50ee6f334fc

    4.2.3.4.3.2 Password changes

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_PASSWORD_CHANGES
    Threat Reference

    TR 33.926 [4], clause 5.3.3.2, Weak Password Policies

    Requirement Name

    Password changes

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    If a password is used as an authentication attribute, then the system shall offer a function that enables a user to change his password at any time. When an external centralized system for user authentication is used it is possible to redirect or implement this function on this system.

    Password change shall be enforced after initial login.

    The system shall enforce password change based on password management policy. In particular, the system shall enforce password expiry.

    Previously used passwords shall not be allowed up to a certain number (Password History).\ The number of disallowed previously used passwords shall be:

    • Configurable;

    • Greater than 0;

    • And its default value shall be 3. This means that the network product shall store at least the three previously set passwords. The maximum number of passwords that the network product can store for each user is up to the vendor.

    When a password is about to expire a password expiry notification shall be provided to the user.

    Above requirements shall be applicable for all passwords used (e.g. application-level, OS-level, etc.). An exception to this requirement is machine accounts.

    Test Purpose
    • To check whether the network product is provisioned with the functionality that enables its user to change the password at any time.

    • The network product enforces password change after initial login.

    • To verify the new password adheres to the password management policy and also to verify whether it has password expiry rule.

    • The network product is configured to disallow specified number of previously used passwords (Password History).

    Pre-Conditions
    1. Tester has account with username and password in the network product.

    2. Network product vendor will provide documentation for password management policy which should include details on how to change the password, configure password expiry rule and disallowing specified number of previously used passwords.

    3. The network product vendor shall supply information on how many passwords the network product can store for each user in the password history.

    4. The tester has privilege to modify the number of disallowed previously used password.

    Execution Steps

    Execute the following steps:

    A. Positive Test

    Case 1:

    Test case to enforce password change after initial login is covered in clause 4.2.3.4.2.3.

    Case 2:

    1. The tester logs into network product application using a privileged account .

    2. The network product application generates password expiry notification for user Y to force user Y to change the password.

    3. The tester logs out as a privileged user and logs on as user Y.

    4. The tester is prompted to change his password and creates a new password by following the password policy management.

    5. The network product application confirms change in password by, for example, displaying "Password Changed Successfully".

    6. The tester successfully logs-in the network product application as user Y using the new password.

    Case 3:

    1. The tester logs into network product application using a privileged account.

    2. Tester configures the network product application for number of disallowed previously used passwords to x

    3. The tester requests for a password change for user Y.

    4. The tester logs out of the privileged account and logs on as user Y

    5. The tester creates a new password by following the password policy management.

    6. If the password is not equal to any of the x previously used passwords, the network product application still accepts the new password and displays "Password Changed Successfully".

    B. Negative Test

    Case 1:

    Test case to enforce password change after initial login is covered in clause 4.2.3.4.2.3.

    Case 2:

    No negative test case for this scenario.

    Case 3:

    1. The tester logs into network product application using privileged account.

    2. Tester configures the network product application for number of disallowed previously used passwords to x for user Y.

    3. The tester logs out of the privileged account and logs in as user Y

    4. The tester requests for a password change.

    5. The tester sets the new password to a value that is among the last x passwords used previously x times.

    Expected Results

    A. Positive Test

    Case 1:

    Expected result for enforcing password change after initial login is covered in clause 4.2.3.4.2.3.

    Case 2:

    Tester can successfully change the password.

    Case 3:

    Tester can successfully change the password.

    B. Negative Test

    If the negative test case passes, this shows that network product application does not work properly and it violates the requirement.

    Case 1:

    Expected result for enforcing password change after initial login is covered in clause 4.2.3.4.2.3.

    Case 2:

    No negative test case for this scenario.

    Case 3:

    The tester cannot successfully change the password.

    Expected Format of Evidence

    Evidence suitable for the interface, e.g. screenshot contains the operation result.

    PDFs 664d49553269f9cc0fd0bba7ac346f90

    4.2.3.4.3.2 Password changes

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_PASSWORD_CHANGES
    Threat Reference
    Requirement Name

    tba

    Requirement Reference
    Requirement Description

    If a password is used as an authentication attribute, then the system shall offer a function that enables a user to change his password at any time. When an external centralized system for user authentication is used it is possible to redirect or implement this function on this system.

    Password change shall be enforced after initial login.

    The system shall enforce password change based on password management policy. In particular, the system shall enforce password expiry.

    Previously used passwords shall not be allowed up to a certain number (Password History).\ The number of disallowed previously used passwords shall be:

    • Configurable;

    • Greater than 0;

    • And its default value shall be 3. This means that the network product shall store at least the three previously set passwords. The maximum number of passwords that the network product can store for each user is up to the manufacturer.

    When a password is about to expire a password expiry notification shall be provided to the user.

    Above requirements shall be applicable for all passwords used(e.g. application-level, OS-level, etc.). An exception to this requirement is machine accounts.

    Security Objective references: tba.

    Test Purpose
    • To check whether the network product is provisioned with the functionality that enables its user to change the password at any time.

    • The network product enforces password change after initial login.

    • To verify the new password adheres to the password management policy and also to verify whether it has password expiry rule.

    • The network product is configured to disallow specified number of previously used passwords (Password History).

    Pre-Conditions
    1. Tester has account with username and password in the network product.

    2. Network product vendor will provide documentation for password management policy which should include details on how to change the password, configure password expiry rule and disallowing specified number of previously used passwords.

    3. The network product vendor shall supply information on how many passwords the network product can store for each user in the password history.

    4. The tester has privilege to modify the number of disallowed previously used password.

    Execution Steps

    Execute the following steps:

    A. Positive Test

    Case 1:

    Test case to enforce password change after initial login is covered in clause 4.2.3.4.2.3.

    Case 2:

    1 The tester logs into network product application using a privileged account .

    2 The network product application generates password expiry notification for user Y to force user Y to change the password.

    3 The tester logs out as a privileged user and logs on as user Y.

    1. The tester is prompted to change his password and creates a new password by following the password policy management.

    5 The network product application confirms change in password by, for example, displaying "Password Changed Successfully".

    6 The tester successfully logs-in the network product application as user Y using the new password.

    Case 3:

    1. The tester logs into network product application using a privileged account.

    2. Tester configures the network product application for number of disallowed previously used passwords to x

    3. The tester requests for a password change for user Y.

    4. The tester logs out of the privileged account and logs on as user Y

    5. The tester creates a new password by following the password policy management.

    6. If the password is not equal to any of the x previously used passwords, the network product application still accepts the new password and displays "Password Changed Successfully".

    B. Negative Test

    Case 1:

    Test case to enforce password change after initial login is covered in clause 4.2.3.4.2.3.

    Case 2:

    No negative test case for this scenario.

    Case 3:

    1. The tester logs into network product application using privileged account.

    2. Tester configures the network product application for number of disallowed previously used passwords to x for user Y.

    3. The tester logs out of the privileged account and logs in as user Y

    4. The tester requests for a password change.

    5. The tester sets the new password to a value that is among the last x passwords used previously x times.

    Expected Results

    A. Positive Test

    Case 1:

    Expected result for enforcing password change after initial login is covered in clause 4.2.3.4.2.3.

    Case 2:

    Tester can successfully change the password.

    Case 3:

    Tester can successfully change the password.

    B. Negative Test

    If the negative test case passes, this shows that network product application does not work properly and it violates the requirement.

    Case 1:

    Expected result for enforcing password change after initial login is covered in clause 4.2.3.4.2.3.

    Case 2:

    No negative test case for this scenario.

    Case 3:

    The tester cannot successfully change the password.

    Expected Format of Evidence

    Evidence suitable for the interface, e.g. screenshot contains the operation result.

    PDFs 57a838bb4db5ef6ae4bd1c35483ad8b1

    4.2.3.4.3.3 Protection against brute force and dictionary attacks

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_PROTECT_AGAINST_BRUTE_FORCE_AND_DICTIONARY_ATTACKS
    Threat Reference

    TR 33.926 [4], clause 5.3.3.2, Weak Password Policies

    Requirement Name

    Protection against brute force and dictionary attacks

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    If a password is used as an authentication attribute, a protection against brute force and dictionary attacks that hinder password guessing shall be implemented.

    Brute force and dictionary attacks aim to use automated guessing to ascertain passwords for user and machine accounts. Various measures or a combination of these measures can be taken to prevent this.

    The most commonly used protection measures are:

    1. Using the timer delay (this delay could be the same or increased depending the network operator's policy for each attempt, e.g. double the delay, or 5 minutes delay, or 10 minutes delay) for each newly entered password input following an incorrect entry ("tar pit").

    2. Blocking an account following a specified number of incorrect attempts, refer to 4.2.3.4.5. However, it has to be taken into account that this solution needs a process for unlocking and an attacker can force this to deactivate accounts and make them unusable.

    3. Using CAPTCHA to prevent automated attempts (often used for Web applications).

    4. Using a password disallow list to prevent vulnerable passwords.

    NOTE 1: Password management and disallow list configuration can be done in a separate node that is different to the node under test, e.g. a SSO server or any other central credential manager.

    In order to achieve higher security, it is often meaningful to combine two or more of the measures named here. It is left to the vendor to select appropriate measures.

    Above requirements shall be applicable for all passwords used (e.g. application-level, OS-level, etc.). An exception to this requirement is machine accounts.

    Test Purpose

    To ensure that the system uses a mechanism with adequate protection against brute force and dictionary attacks

    To check whether system follows commonly used preventive measures which are mentioned below.

    1. Using the timer delay (e.g. doubling wait times after every incorrect attempt, or 5 minutes delay, or 10 minutes delay) after each incorrect password input ("tar pit").

    2. Blocking an account following a specified number of incorrect attempts (typically 5). However, administrator has to keep in account that this solution needs a process for unlocking and an attacker can utilize this process to deactivate the accounts and make them unusable.

    3. Using CAPTCHA to prevent automated attempts (often used for Web interface).

    4. Using a password disallow list to prevent vulnerable passwords.

    Pre-Conditions

    This test applies only when the most commonly used protection measures used in the requirement are implemented. If they are not implemented, then the vendor documentation needs to provide alternative measures and the tester needs to develop suitable tests for these alternative measures. Since a vendor is free to select appropriate measures, only the vendor selected measures are to be tested.

    1. The password policy management of the network product is configured to use the timer delay after each incorrect password input.

    2. The password policy management is configured to block an account following a specified number of incorrect password attempts (typically 5).

    3. The web interface should be configured with CAPTCHA feature to prevent automated attempts.

    4. CAPTCHA feature is optional and test is done only if implemented.

    5. A password disallow list is configured by the tester. At least one disallow list password (a password that meets the complexity criteria but is disallow listed) is documented.

    NOTE 2: Password management and disallow list configuration may be done in a separate node that is different to the node under test, e.g. a SSO server or any other central credential manager.

    1. Tester has valid credentials as an authorized user.

    2. If the recommended protection measures mentioned in the Requirement Description are not implemented in the Network Product, the vendor provides a documentation describing the alternative measures that are implemented instead.

    Execution Steps

    A. Positive Test

    Case 1:

    Test case to use the timer delay after each incorrect password input is covered in clause 4.2.3.4.5.

    Case 2:

    Test case to block an account following a specified number of incorrect attempts is covered in clause 4.2.3.4.5.

    Case 3:

    If the network product's login web interface is configured with a CAPTCHA feature, the tester enters the valid password and correct CAPTCHA.

    Case 4:

    If the recommended protection measures mentioned in the Requirement Description are not implemented in the Network Product, the tester checks if the alternative measures described in the vendor provided documentation are meaningful and develops suitable test cases to verify their correct implementation.

    In some cases the network product class can have two or more of the attack prevention methods available, which are a combination of Cases 1-3. In such cases the tester will need to run a combination of these test cases.

    B. Negative Test

    Case 1:

    Test case to use the timer delay after each incorrect password input is covered in clause 4.2.3.4.5.

    Case 2:

    Test case to block an account following a specified number of incorrect attempts is covered in clause 4.2.3.4.5.

    Case 3:

    If the network product's login web interface is configured with a CAPTCHA feature, the tester enters the valid password without and with incorrect CAPTCHA.

    Case 4:

    The tester tries to change the password to the disallow listed password.

    Expected Results

    A. Positive Test

    Case 1:

    Expected result for the test case to use the timer delay after each incorrect password input is covered in clause 4.2.3.4.5.

    Case 2:

    Expected result for the test case to block an account following a specified number of incorrect attempts is covered in clause 4.2.3.4.5.

    Case 3:

    Tester can login only after entering the correct password and CAPTCHA.

    Case 4:

    The tester assesses the alternative measures for brute force and dictionary attack mitigation as meaningful and all developed test cases can be completed successfully.

    B. Negative Test

    Case 1:

    Expected result for the use the timer delay after each incorrect password input is covered in clause 4.2.3.4.5.

    Case 2:

    Expected result for the test case to block an account following a specified number of incorrect attempts is covered in clause 4.2.3.4.5.

    Case 3:

    Tester cannot successfully log in to the network product.

    Case 4:

    Tester cannot successfully change the password to the disallow listed password.

    Expected Format of Evidence

    Evidence suitable for the interface, e.g. screenshot containing the operation result.

    PDFs ae4b0f417cc5093321468089c63a0431

    4.2.3.4.3.3 Protection against brute force and dictionary attacks

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_PROTECT_AGAINST_BRUTE_FORCE_AND_DICTIONARY_ATTACKS
    Threat Reference
    Requirement Name

    Protection against brute force and dictionary attacks

    Requirement Reference
    Requirement Description

    If a password is used as an authentication attribute, a protection against brute force and dictionary attacks that hinder password guessing shall be implemented.

    Brute force and dictionary attacks aim to use automated guessing to ascertain passwords for user and machine accounts. Various measures or a combination of these measures can be taken to prevent this.

    The most commonly used protection measures are:

    1. Using the timer delay (this delay could be the same or increased depending the operator's policy for each attempt, e.g. double the delay, or 5 minutes delay, or 10 minutes delay) for each newly entered password input following an incorrect entry ("tar pit").

    2. Blocking an account following a specified number of incorrect attempts, refer to 4.2.3.4.5. However it has to be taken into account that this solution needs a process for unlocking and an attacker can force this to deactivate accounts and make them unusable.

    3. Using CAPTCHA to prevent automated attempts (often used for Web applications).

    4. Using a password blacklist to prevent vulnerable passwords.

    NOTE 1: Password management and blacklist configuration may be done in a separate node that is different to the node under test, e.g. a SSO server or any other central credential manager.

    In order to achieve higher security, it is often meaningful to combine two or more of the measures named here. It is left to the vendor to select appropriate measures.

    Above requirements shall be applicable for all passwords used (e.g. application-level, OS-level, etc.). An exception to this requirement is machine accounts.

    Security Objective references: tba.

    Test Purpose

    To ensure that the system uses a mechanism with adequate protection against brute force and dictionary attacks

    To check whether system follows commonly used preventive measures which are mentioned below.

    1. Using the timer delay (e.g. doubling wait times after every incorrect attempt, or 5 minutes delay, or 10 minutes delay) after each incorrect password input ("tar pit").

    2. Blocking an account following a specified number of incorrect attempts (typically 5). However administrator has to keep in account that this solution needs a process for unlocking and an attacker can utilize this process to deactivate the accounts and make them unusable.

    3. Using CAPTCHA to prevent automated attempts (often used for Web interface).

    4. Using a password blacklist to prevent vulnerable passwords.

    Pre-Conditions

    This test applies only when the most commonly used protection measures used in the requirement are implemented. If they are not implemented, then the vendor documentation needs to provide alternative measures and the tester needs to develop suitable tests for these alternative measures. Since a vendor is free to select appropriate measures, only the vendor selected measures are to be tested.

    1. The password policy management of the network product is configured to use the timer delay after each incorrect password input.

    2. The password policy management is configured to block an account following a specified number of incorrect password attempts (typically 5).

    3. The web interface should be configured with CAPTCHA feature to prevent automated attempts.

    4. CAPTCHA feature is optional and test is done only if implemented.

    5. A password blacklist is configured by the tester. At least one blacklisted password (a password that meets the complexity criteria but is blacklisted) is documented.

    NOTE 2: Password management and blacklist configuration may be done in a separate node that is different to the node under test, e.g. a SSO server or any other central credential manager.

    1. Tester has valid credentials as an authorized user.

    2. If the recommended protection measures mentioned in the Requirement Description are not implemented in the Network Product, the vendor provides a documentation describing the alternative measures that are implemented instead.

    Execution Steps

    Execute the following steps:

    A. Positive Test

    Case 1:

    Test case to use the timer delay after each incorrect password input is covered in clause 4.2.3.4.5.

    Case 2:

    Test case to block an account following a specified number of incorrect attempts is covered in clause 4.2.3.4.5.

    Case 3:

    If the network product's login web interface is configured with a CAPTCHA feature, the tester enters the valid password and correct CAPTCHA.

    Case 4:

    If the recommended protection measures mentioned in the Requirement Description are not implemented in the Network Product, the tester checks if the alternative measures described in the vendor provided documentation are meaningful and develops suitable test cases to verify their correct implementation.

    In some cases the network product class can have two or more of the attack prevention methods available, which are a combination of Cases 1-3. In such cases the tester will need to run a combination of these test cases.

    B. Negative Test

    Case 1:

    Test case to use the timer delay after each incorrect password input is covered in clause 4.2.3.4.5.

    Case 2:

    Test case to block an account following a specified number of incorrect attempts is covered in clause 4.2.3.4.5.

    Case 3:

    If the network product's login web interface is configured with a CAPTCHA feature, the tester enters the valid password without and with incorrect CAPTCHA.

    Case 4:

    1. The tester tries to change the password to the blacklisted password.
    Expected Results

    A. Positive Test

    Case 1:

    Expected result for the test case to use the timer delay after each incorrect password input is covered in clause 4.2.3.4.5.

    Case 2:

    Expected result for the test case to block an account following a specified number of incorrect attempts is covered in clause 4.2.3.4.5.

    Case 3:

    Tester can login only after entering the correct password and CAPTCHA.

    Case 4:

    The tester assesses the alternative measures for brute force and dictionary attack mitigation as meaningful and all developed test cases can be completed successfully.

    B. Negative Test

    Case 1:

    Expected result for the use the timer delay after each incorrect password input is covered in clause 4.2.3.4.5.

    Case 2:

    Expected result for the test case to block an account following a specified number of incorrect attempts is covered in clause 4.2.3.4.5.

    Case 3:

    Tester cannot successfully log in to the network product.

    Case 4:

    Tester cannot successfully change the password to the blacklisted password.

    Expected Format of Evidence

    Evidence suitable for the interface, e.g. screenshot containing the operation result.

    PDFs 991623421da22ebc086f3b2b2e58ca02

    4.2.3.4.3.4 Hiding password display

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_HIDING_PASSWORD_DISPLAY
    Threat Reference

    TR 33.926 [4], clause 5.3.3.3, Password peek

    Requirement Name

    Hiding password display

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    The password shall not be displayed in such a way that it could be seen and misused by a casual local observer. Typically, the individual characters of the password are replaced by a character such as "*". Under certain circumstances an individual character may be displayed briefly during input. Such a function is used, for example, on smartphones to make input easier. However, the entire password is never output to the display in plaintext.

    Above requirements shall be applicable for all passwords used (e.g. application-level, OS-level, etc.). An exception to this requirement is machine accounts.

    Test Purpose

    Verify that the given password is not visible to the casual local observer.

    Pre-Conditions

    Tester has account with username and password in the network product.

    Execution Steps
    1. The network product will display the login screen.

    2. The tester enters the username.

    3. The tester enters the password.

    Expected Results

    The password shall not be displayed in such a way that it could be seen and misused by a casual local observer. Typically, the individual characters of the password are replaced by a character such as "*". Under certain circumstances an individual character may be displayed briefly during input. Such a function is used, for ex ample, on smartphones to make input easier. However, the entire password is never output to the display in plaintext.

    Expected Format of Evidence

    Evidence suitable for the interface, e.g. screenshot contains the operation results.

    PDFs 78d90b7cf57d01c11523693d43ba2a55

    4.2.3.4.3.4 Hiding password display

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_HIDING_PASSWORD_DISPLAY
    Threat Reference
    Requirement Name

    tba

    Requirement Reference
    Requirement Description

    The password shall not be displayed in such a way that it could be seen and misused by a casual local observer. Typically, the individual characters of the password are replaced by a character such as "*". Under certain circumstances it may be permissible for an individual character to be displayed briefly during input. Such a function is used, for ex ample, on smartphones to make input easier. However, the entire password is never output to the display in plaintext.

    Above requirements shall be applicable for all passwords used(e.g. application-level, OS-level, etc.). An exception to this requirement is machine accounts.

    Security Objective references: tba.

    Test Purpose

    Verify that the given password is not visible to the casual local observer.

    Pre-Conditions

    Tester has account with username and password in the network product.

    Execution Steps

    Execute the following steps:

    1. The network product will display the login screen.

    2. The tester enters the username.

    3. The tester enters the password.

    Expected Results

    The password shall not be displayed in such a way that it could be seen and misused by a casual local observer. Typically, the individual characters of the password are replaced by a character such as "*". Under certain circumstances it may be permissible for an individual character to be displayed briefly during input. Such a function is used, for ex ample, on smartphones to make input easier. However, the entire password is never output to the display in plaintext.

    Expected Format of Evidence

    Evidence suitable for the interface, e.g. screenshot contains the operation results.

    PDFs a4c5bcb06d56448f34a56af02313fb8f

    4.2.3.4.4.1 Network Product Management and Maintenance interfaces

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_MUTUAL_AUTHENTICATION-ON_NETWORK_PRODUCT_MANAGEMENT_PROTOCOLS
    Threat Reference

    TR 33.926 [4], clause 5.3.8.6, Insecure Network Services

    Requirement Name

    Network Product Management and Maintenance interfaces

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    The network product management shall support mutual authentication mechanisms, the mutual authentication mechanism can rely on the protocol used for the interface itself or other means.

    Test Purpose

    Verify that:

    There is mutual authentication of entities for management interfaces on the network product.

    Pre-Conditions

    Documentation that lists each of the management protocols and describes the authentication mechanism used for each one.

    Execution Steps
    1. The tester checks that the authentication mechanisms have been configured on the network product.

    2. The tester triggers communication between network product and a test entity that has a legitimate authentication credential.

    3. Then, the tester triggers communication between network product and a test entity that doesn't have a legitimate authentication credential.

    Expected Results
    • Mutual authentication is successful and communication between network product and the entity with correct credentials can be established.

    • Mutual authentication fails and communication between the network product and the entity with incorrect credentials cannot be established.

    Expected Format of Evidence

    Test result pass/fail recorded by tester.

    PDFs 84fc5554bfcaa7b58072c5b39312b854

    4.2.3.4.4.1 Network Product Management and Maintenance interfaces

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_MUTUAL_AUTHENTICATION-ON_NETWORK_PRODUCT_MANAGEMENT_PROTOCOLS
    Threat Reference
    Requirement Name

    Network Product Management and Maintenance interfaces

    Requirement Reference
    Requirement Description

    The network product management shall support mutual authentication mechanisms, the mutual authentication mechanism can rely on the protocol used for the interface itself or other means.

    Security Objective references: Secure Network Product Administration.

    Test Purpose

    Verify that:

    There is mutual authentication of entities for management interfaces on the network product.

    Pre-Conditions

    Documentation that lists each of the management protocols and describes the authentication mechanism used for each one.

    Execution Steps
    1. The tester checks that the authentication mechanisms have been configured on the network product.

    2. The tester triggers communication between network product and a test entity that has a legitimate authentication credential.

    3. Then, the tester triggers communication between network product and a test entity that doesn't have a legitimate authentication credential.

    Expected Results
    • Mutual authentication is successful and communication between network product and the entity with correct credentials can be established.

    • Mutual authentication fails and communication between the network product and the entity with incorrect credentials cannot be established.

    Expected Format of Evidence

    Test result pass/fail recorded by tester.

    PDFs 9014ad1a668942e7d5fb6e32bd87377f

    4.2.3.4.5 Policy regarding consecutive failed login attempts

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_FAILED_LOGIN_ATTEMPTS
    Threat Reference

    TR 33.926 [4], clause 5.3.7, Denial of service

    Requirement Name

    Policy regarding consecutive failed login attempts

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    a. The maximum permissible number of consecutive failed user account login attempts should be configurable by the network operator. The definition of the default value set at manufacturing time for maximum number of failed user account login attempts shall be less than or equal to 8, typically 5. After the maximum permissible number of consecutive failed user account login attempts is exceeded by a user there shall be a block delay in allowing the user to attempt login again. This block delay and also the capability to set period of the block delay, e.g. double the delay, or 5 minutes delay, or 10 minutes delay, after each login failure should be configurable by the network operator. The default value set at manufacturing time for this delay shall be greater than or equal to 5 sec.

    b. If supported, infinite (permanent) locking of an account that has exceeded maximum permissible number of consecutive failed user account login attempts should also be possible via configuration, with the exception of administrative accounts which shall get only temporarily locked.

    Test Purpose

    To ensure that the policy regarding failed login attempts is adhered to.

    Case 1: Testing for requirement 4.2.3.4.5 a)

    Pre-Conditions
    1. At least one user account has been created as per vendor instructions.

    2. Directions of how to configure the maximum permissible number of consecutive failed user account login attempts and the default value of this number are identified in the documentation accompanying the Network Product. Default value shall be stated as well.

    3. Directions of how to configure the block delay in allowing a user attempt to login again when the number of failed login attempts has exceeded the maximum number are identified in the documentation accompanying the Network Product. Default value of the delay shall be stated as well.

    Execution Steps
    1. Check default values from precondition 2 and 3.

    2. Perform consecutive failed login attempts for the user account until the default maximum number from precondition 2 is reached.

    3. Attempt again one extra login, which fails again.

    4. Attempt one extra login in less time than the default for the delay of precondition 3, using the correct credentials.

    5. Attempt one extra login in more time than the default for the delay of precondition 3, using the correct credentials.

    Expected Results
    1. Default values from precondition 2 and 3 are in accordance with the requirement.

    2. In execution step 2, 3 and 4, the login attempt shall be rejected in all cases.

    3. In execution step 5, it is verified that the user can login only at the last login attempt.

    Expected Format of Evidence

    Evidence containing the results of all login attempts, e.g. screenshots, log files, configurations, error messages.

    Case 2: Testing for requirement 4.2.3.4.5 b)

    PDFs d50265dd071d65d4e503f558c7b7fc14

    4.2.3.4.5 Policy regarding consecutive failed login attempts

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_FAILED_LOGIN_ATTEMPTS
    Threat Reference
    Requirement Name

    tba

    Requirement Reference
    Requirement Description

    a. The maximum permissible number of consecutive failed user account login attempts should be configurable by the operator. The definition of the default value set at manufacturing time for maximum number of failed user account login attempts shall be less than or equal to 8, typically 5. After the maximum permissible number of consecutive failed user account login attempts is exceeded by a user there shall be a block delay in allowing the user to attempt login again. This block delay and also the capability to set period of the block delay, e.g. double the delay, or 5 minutes delay, or 10 minutes delay, after each login failure should be configurable by the operator. The default value set at manufacturing time for this delay shall be greater than or equal to 5 sec.

    b. If supported, infinite (permanent) locking of an account that has exceeded maximum permissible number of consecutive failed user account login attempts should also be possible via configuration, with the exception of administrative accounts which shall get only temporarily locked.

    Security Objective references: tba.


    Test Purpose

    To ensure that the policy regarding failed login attempts is adhered to.

    Case 1: Testing for requirement 4.2.3.4.5 a)

    Pre-Conditions
    1. At least one user account has been created as per manufacturer's instructions.

    2. Directions of how to configure the maximum permissible number of consecutive failed user account login attempts and the default value of this number are identified in the documentation accompanying the Network Product. Default value shall be stated as well.

    3. Directions of how to configure the block delay in allowing a user attempt to login again when the number of failed login attempts has exceeded the maximum number are identified in the documentation accompanying the Network Product. Default value of the delay shall be stated as well.

    Execution Steps

    The accredited evaluator's test lab is required to execute the following steps:

    1. Check default values from precondition 2 and 3.

    2. Perform consecutive failed login attempts for the user account until the default maximum number of precondition 2 is reached.

    3. Attempt again one extra login, which fails again.

    4. Attempt one extra login in less time than the default for the delay of precondition 3, using the correct credentials.

    5. Attempt one extra login in more time than the default for the delay of precondition 3, using the correct credentials.

    Expected Results
    1. Default values from precondition 2 and 3 are in accordance with the requirement.

    2. In execution step 4, the login attempt shall be rejected in all cases.

    3. In execution step 5, the login attempt shall be accepted.

    4. In execution step 6, it is verified that the user can login only at the last login attempt.

    Expected Format of Evidence

    tba

    Case 2: Testing for requirement 4.2.3.4.5 b)

    PDFs 18cad92772ca96853be38724f30fe7a9

    4.2.3.4.5(2) Policy regarding consecutive failed login attempts

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_FAILED_LOGIN_ATTEMPTS
    Threat Reference

    TR 33.926 [4], clause 5.3.7, Denial of service

    Requirement Name

    Policy regarding consecutive failed login attempts

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    a. The maximum permissible number of consecutive failed user account login attempts should be configurable by the network operator. The definition of the default value set at manufacturing time for maximum number of failed user account login attempts shall be less than or equal to 8, typically 5. After the maximum permissible number of consecutive failed user account login attempts is exceeded by a user there shall be a block delay in allowing the user to attempt login again. This block delay and also the capability to set period of the block delay, e.g. double the delay, or 5 minutes delay, or 10 minutes delay, after each login failure should be configurable by the network operator. The default value set at manufacturing time for this delay shall be greater than or equal to 5 sec.

    b. If supported, infinite (permanent) locking of an account that has exceeded maximum permissible number of consecutive failed user account login attempts should also be possible via configuration, with the exception of administrative accounts which shall get only temporarily locked.

    Test Purpose

    To ensure that the policy regarding failed login attempts is adhered to.

    Case 1: Testing for requirement 4.2.3.4.5 a)

    Pre-Conditions
    1. At least one user account has been created as pervendor's instructions.

    2. Directions of how to configure the maximum permissible number of consecutive failed user account login attempts and the default value of this number are identified in the documentation accompanying the Network Product. Default value shall be stated as well.

    3. Directions of how to optionally configure permanent locking for non-administrative accounts shall be stated as well.

    Execution Steps
    1. Check default values from precondition 2.

    2. Perform consecutive failed login attempts for the user account until the default maximum number of precondition 2 is reached.

    3. Attempt again one extra login, which fails again.

    4. Attempt one extra login in more time than the default for the delay of precondition 3, using the correct credentials.

    5a. If supported enable permanent locking of accounts exceeding the maximum permissible number of consecutive failed user account login attempts and repeat steps 1-4 for an unprivileged user.

    5b. If supported enable permanent locking of accounts exceeding the maximum permissible number of consecutive failed user account login attempts and repeat steps 1-4 for a user with administrative access rights.

    Expected Results

    In execution step 5a it is verified that the user cannot login at any execution step.

    In execution step 5b it is verified that an administrator user can successfully login only at execution step 5b.

    Expected Format of Evidence

    Evidence containing the results of all login attempts, e.g. screenshots, log files, configurations, error messages.

    PDFs 73cc7fa41347411c744b07ab0e2c390d

    4.2.3.4.5(2) Policy regarding consecutive failed login attempts

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_FAILED_LOGIN_ATTEMPTS
    Threat Reference
    Requirement Name

    tba

    Requirement Reference
    Requirement Description

    a. The maximum permissible number of consecutive failed user account login attempts should be configurable by the operator. The definition of the default value set at manufacturing time for maximum number of failed user account login attempts shall be less than or equal to 8, typically 5. After the maximum permissible number of consecutive failed user account login attempts is exceeded by a user there shall be a block delay in allowing the user to attempt login again. This block delay and also the capability to set period of the block delay, e.g. double the delay, or 5 minutes delay, or 10 minutes delay, after each login failure should be configurable by the operator. The default value set at manufacturing time for this delay shall be greater than or equal to 5 sec.

    b. If supported, infinite (permanent) locking of an account that has exceeded maximum permissible number of consecutive failed user account login attempts should also be possible via configuration, with the exception of administrative accounts which shall get only temporarily locked.

    Security Objective references: tba.


    Test Purpose

    To ensure that the policy regarding failed login attempts is adhered to.

    Case 1: Testing for requirement 4.2.3.4.5 a)

    Pre-Conditions
    1. At least one user account has been created as per manufacturer's instructions.

    2. Directions of how to configure the maximum permissible number of consecutive failed user account login attempts and the default value of this number are identified in the documentation accompanying the Network Product. Default value shall be stated as well.

    3. Directions of how to optionally configure permanent locking for non-administrative accounts shall be stated as well.

    Execution Steps

    The accredited evaluator's test lab is required to execute the following steps:

    1. Check default values from precondition 2.

    2. Perform consecutive failed login attempts for the user account until the default maximum number of precondition 2 is reached.

    3. Attempt again one extra login, which fails again.

    4. Attempt one extra login in more time than the default for the delay of precondition 3, using the correct credentials.

    5a. If supported enable permanent locking of accounts exceeding the maximum permissible number of consecutive failed user account login attempts and repeat steps 1-4 for a normal user.

    5b. If supported enable permanent locking of accounts exceeding the maximum permissible number of consecutive failed user account login attempts and repeat steps 1-4 for a user with administrative access rights.

    Expected Results

    In execution step 5a it is verified that the user cannot login at any execution step.

    In execution step 5b it is verified that an administrator user can successfully login only at execution step 5b.

    Expected Format of Evidence

    tba

    PDFs 2c97955ffa4c9856b06278943f9503ab

    4.2.3.4.6.1 Authorization policy

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_AUTHORIZATION_POLICY
    Threat Reference

    TR 33.926 [4], clause 5.3.8.2, Over-Privileged Processes/Services

    Requirement Name

    Authorization policy

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    The authorizations for accounts and applications shall be reduced to the minimum required for the tasks they have to perform.

    Authorizations to a system shall be restricted to a level in which a user can only access data and use functions that he needs in the course of his work. Suitable authorizations shall also be assigned for access to files that are components of the operating system or of applications or that are generated by the same (e.g. configuration and logging files).

    Alongside access to data, execution of applications and components shall also take place with rights that are as low as possible. Applications should not be executed with administrator or system rights.

    Test Purpose

    Verify authorization policy is in place and that user access and data access in the system are according to the authorization policy.

    Pre-Conditions

    Documentation describing the authorization policy defined for the system including details on the lowest access rights assigned to user accounts, access to data, application execution and components.

    Execution Steps
    1. Assign access rights (e.g. read only) to user accounts, data files, and applications.

    2. Operations, that are allowed as per authorization policy (as defined in the network product documentation), are attempted via the different user accounts, data files, and applications.

    Expected Results
    1. User accounts, data files, and applications are allowed to be accessed (e.g. able to read but not write to a file, able to execute an application as a user account without administrator rights, etc.) according to the access rights assigned.

    2. User accounts, data files, and applications are not allowed to be accessed above the access rights assigned (e.g. able to write to a read only file, able to execute an application as an administrator, etc.).

    Expected Format of Evidence

    Pass/fail results as recorded by the tester.

    PDFs f96521af557775b1bf1dd18bc82c7942

    4.2.3.4.6.1 Authorization policy

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name
    Threat Reference
    Requirement Name

    tba

    Requirement Reference
    Requirement Description

    The authorizations for accounts and applications shall be reduced to the minimum required for the tasks they have to perform.

    Authorizations to a system shall be restricted to a level in which a user can only access data and use functions that he needs in the course of his work. Suitable authorizations shall also be assigned for access to files that are components of the operating system or of applications or that are generated by the same (e.g. configuration and logging files).

    Alongside access to data, execution of applications and components shall also take place with rights that are as low as possible. Applications should not be executed with administrator or system rights.

    Security Objective references: tba.

    verify authorization policy is in place and that user access and data access in the system are according to the authorization policy.

    Test Purpose
    Pre-Conditions

    Documentation describing the authorization policy defined for the system including details on the lowest access rights assigned to user accounts, access to data, application execution and components.

    Execution Steps
    1. Assign access rights (e.g. read only) to user accounts, data files, and applications.

    2. Operations, that are allowed as per authorization policy (as defined in the network product documentation), are attempted via the different user accounts, data files, and applications.

    Expected Results
    1. User accounts, data files, and applications are allowed to be accessed (e.g. able to read but not write to a file, able to execute an application as a user account without administrator rights, etc.) according to the access rights assigned.

    2. User accounts, data files, and applications are not allowed to be accessed above the access rights assigned (e.g. able to write to a read only file, able to execute an application as an administrator, etc.).

    Expected Format of Evidence

    Pass/fail results as recorded by the tester.

    PDFs cfc55ae542fdef3b9a9d6192c6db26f4

    4.2.3.4.6.2 Role-based access control

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_RBAC_SUPPORT
    Threat Reference

    TR 33.926 [4], clause 5.3.8.2, Over-Privileged Processes/Services

    Requirement Name

    Role-based access control

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    The network product shall support Role Based Access Control (RBAC). A role-based access control system uses a set of controls which determines how users interact with domains and resources. The domains could be Fault Management (FM), Performance Management (PM), System Admin, etc. The RBAC system controls how users or groups of users are allowed access to the various domains and what type of operation they can perform, i.e. the specific operation command or command group (e.g. View, Modify, Execute).

    The network product supports RBAC, in particular, for O&M privilege management for network product Management and Maintenance, including authorization of the operation for configuration data and software via the network product console interface.

    Test Purpose

    Verify that users are granted access with role-based privileges.

    Pre-Conditions

    Documentation describing the role-based access control system including details on which user roles are defined.

    Execution Steps
    1. User accounts which are assigned to different access roles are created.

    2. The tester attempts operations via the different user accounts, that are allowed by different roles (as defined in the network product documentation).

    Expected Results
    1. Users that are assigned to a role that is not allowed to execute an operation are prevented from executing the operation.

    2. Users that are assigned to a role that is allowed to execute an operation can successfully execute the operation.

    Expected Format of Evidence

    Pass/fail results as recorded by the tester.

    PDFs 32901c26f3cb11d2fd1b695ad7a868d1

    4.2.3.4.6.2 Role-based access control

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name
    Threat Reference
    Requirement Name

    tba

    Requirement Reference
    Requirement Description

    The network product shall support Role Based Access Control (RBAC). A role-based access control system uses a set of controls which determines how users interact with domains and resources. The domains could be Fault Management (FM), Performance Management (PM), System Admin, etc. The RBAC system controls how users or groups of users are allowed access to the various domains and what type of operation they can perform, i.e. the specific operation command or command group (e.g. View, Modify, Execute).

    The network product supports RBAC, in particular, for OAM privilege management for network product Management and Maintenance, including authorization of the operation for configuration data and software via the network product console interface.

    Security Objective references: tba.

    Test Purpose

    Verify that users are granted access with role-based privileges.

    Pre-Conditions

    Documentation describing the role based access control system including details on which user roles are defined.

    Execution Steps
    1. User accounts which are assigned to different access roles are created.

    2. Operations, that are allowed by different roles (as defined in the network product documentation), are attempted via the different user accounts.

    Expected Results
    1. Users that are assigned to a role that is not allowed to execute an operation are prevented from executing the operation.

    2. Users that are assigned to a role that is allowed to execute an operation can successfully execute the operation.

    Expected Format of Evidence

    Pass/fail results as recorded by the tester.

    PDFs d20deca123e50eeb041eb54e3726d45b

    4.2.3.5.1 Protecting sessions -- logout function

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_PROTECTING_SESSION_LOGOUT
    Threat Reference

    TR 33.926 [4], clause 5.3.6, Information disclosure

    Requirement Name

    Protecting sessions -- logout function

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    The system shall have a function that allows a signed in user to logout at any time. All processes under the logged in user ID shall be terminated on log out. The network product shall be able to continue to operate without interactive sessions.

    Only for debugging purposes, processes under a logged in user ID may be allowed to continue to run after detaching the interactive session.

    Test Purpose

    To ensure a signed in user can logout at any time.

    Pre-Conditions
    • The vendor shall declare that it has a function that allows a signed in user to logout at any time.

    • The tester has privileges to create a new account or use an existing account.

    Execution Steps
    1. The tester creates a new account.

    2. The tester uses the new account or an existing account to log into network product. After x minutes the tester tries to logout network product.

    NOTE: The value of x can be arbitrarily set by the tester.

    Expected Results

    The tester can use a new account or an existing account to log into network product and logout network product after x minutes.

    Expected Format of Evidence

    Settings, and configurations used

    PDFs e5e7de427c932b6e4b11336bcc0dee1d

    4.2.3.5.1 Protecting sessions -- logout function

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_PROTECTING_SESSION_LOGOUT
    Threat Reference
    Requirement Name

    Protecting sessions -- logout function

    Requirement Reference
    Requirement Description

    The system shall have a function that allows a signed in user to logout at any time. All processes under the logged in user ID shall be terminated on log out. The network product shall be able to continue to operate without interactive sessions.

    Only for debugging purposes, processes under a logged in user ID may be allowed to continue to run after detaching the interactive session.

    Security Objective references: tba.

    Test Purpose

    To ensure a signed in user can logout at any time.

    Pre-Conditions
    • The manufacturer shall declare that it has a function that allows a signed in user to logout at any time.

    • The tester has privileges to create a new account or use an existing account.

    Execution Steps

    The accredited evaluator's test lab is required to execute the following steps:

    1. The tester creates a new account.

    2. The tester uses the new account or an existing account to log into network product. After x minutes the tester tries to logout network product.

    NOTE: The value of x can be arbitrarily set by the tester.

    Expected Results
    • The tester can use a new account or an existing account to log into network product and logout network product after x minutes.
    Expected Format of Evidence

    A testing report provided by the testing agency which will consist of the following information:

    Settings, and configurations used

  • Test result (Passed or not)

  • PDFs 181d118f622c78d4a349b5c81901f97b

    4.2.3.5.2 Protecting sessions -- Inactivity timeout

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_PROTECTING_SESSION_INAC_TIMEOUT
    Threat Reference

    TR 33.926 [4], clause 5.3.6, Information disclosure

    Requirement Name

    Protecting sessions -- inactivity timeout

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    An O&M user interactive session shall be terminated automatically after a specified period of inactivity. It shall be possible to configure an inactivity time-out period.

    Note: The kind of activity required to reset the timeout timer depends on the type of user session.

    Test Purpose

    To ensure an O&M user interactive session shall be terminated at inactivity timeout.

    Pre-Conditions
    • The tester has privileges to create an O&M user interactive session.

    • The tester has privileges to configure the inactivity time-out period for user interactive session.

    • Session log should be enabled.

    Execution Steps
    1. The tester creates O&M user A interaction session.

    2. The tester configures the inactivity time-out period for user A to x minute, for example 1 minute.

    3. The tester does not make any actions on the network production in x minutes. After that, the tester checks whether O&M user A interaction session has been terminated automatically.

    Expected Results

    In step 3, O&M user A interaction session has been terminated automatically after x minute.

    Expected Format of Evidence
    • Session log

    • Settings, protocols and configurations used

    PDFs 7eb8b3dc76bb9d4c37bb6d0778fb9ded

    4.2.3.5.2 Protecting sessions -- Inactivity timeout

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name
    TC_PROTECTING_SESSION_ INAC TIMEOUT
    Threat Reference
    Requirement Name

    Protecting sessions -- inactivity timeout

    Requirement Reference
    Requirement Description

    An OAM user interactive session shall be terminated automatically after a specified period of inactivity. It shall be possible to configure an inactivity time-out period.

    Note: The kind of activity required to reset the timeout timer depends on the type of user session.

    Test Purpose

    To ensure an OAM user interactive session shall be terminated at inactivity timeout.

    Pre-Conditions
    • The tester has privileges to create an OAM user interactive session.

    • The tester has privileges to configure the inactivity time-out period for user interactive session.

    • Session log should be enabled.

    Execution Steps
    1. The tester creates OAM user A interaction session.

    2. The tester configures the inactivity time-out period for user A to x minute, for example 1 minute.

    3. The tester does not make any actions on the network production in x minutes. After that, the tester checks whether OAM user A interaction session has been terminated automatically.

    Expected Results
    • In step 3, OAM user A interaction session has been terminated automatically after x minute.
    Expected Format of Evidence

    A testing report provided by the testing agency which will consist of the following information:

    • Session log

    • Settings, protocols and configurations used

    • Test result (Passed or not)

    Security Objective references: tba.

    PDFs 4acce6b6dfead96dea162c045e098972

    4.2.3.6.1 Security event logging

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_SECURITY_EVENT_LOGGING
    Threat Reference

    TR 33.926 [4], clause 5.3.4.4, Log Tampering

    Requirement Name

    Security event logging

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    Security events shall be logged together with a unique system reference (e.g. host name, IP or MAC address) and the exact time the incident occurred. For each security event, the log entry shall include user name and/or timestamp and/or performed action and/or result and/or length of session and/or values exceeded and/or value reached.

    IETF RFC 3871 [3], section 2.11.10 specifies the minimum set of security events. Each vendor shall document what security events the product logs so that it can be verified by testing.

    In particular, it shall be possible to log the following events (which are intended to be supported by the network product and which can be enabled by default at manufacturing time or at a later time by the network operator):

    +---------------+-----------------------+------------------------------+ | EventTypes | Description | Event data to be logged | +---------------+-----------------------+------------------------------+ | Incorrect | Records any user | • Username, | | login | incorrect login | | | attempts | attempts to the | • Source (IP address) if | | | network product | remote access | | | | | | | | • Timestamp | +---------------+-----------------------+------------------------------+ | Administrator | Records any access | • Username, | | access | attempts to accounts | | | | that have system | • Timestamp, | | | privileges. | | | | | • Length of session, | | | | | | | | • Source (IP address) if | | | | remote access | +---------------+-----------------------+------------------------------+ | Account | Records all account | • Administrator username, | | a | administration | | | dministration | activity, i.e. | • Administered account, | | | configure, delete, | | | | enable, and disable. | • Activity performed | | | | (configure, delete, enable | | | | and disable) | | | | | | | | • Timestamp | +---------------+-----------------------+------------------------------+ | | | | +---------------+-----------------------+------------------------------+ | Resource | Records events that | • Value exceeded, | | Usage | have been triggered | | | | when system parameter | • Value reached | | | values such as disk | | | | space, CPU load over | (Here suitable threshold | | | a longer period have | values shall be defined | | | exceeded their | depending on the individual | | | defined thresholds. | system.) | | | | | | | | • Timestamp | +---------------+-----------------------+------------------------------+ | Configuration | Changes to | • Change made | | change | configuration of the | | | | network device | • Username | +---------------+-----------------------+------------------------------+ | Reboot/s | This event records | • Action performed (reboot, | | hutdown/crash | any action on the | shutdown, etc.) | | | network device that | | | | forces a reboot or | • Username (for intentional | | | shutdown OR where the | actions) | | | network device has | | | | crashed. | • Timestamp | +---------------+-----------------------+------------------------------+ | Interface | Change to the status | • Interface name and type | | status change | of interfaces on the | | | | network device (e.g. | • Status (shutdown, missing | | | shutdown) | link, etc.) | | | | | | | | • Timestamp | +---------------+-----------------------+------------------------------+

    In addition, optionally it shall be possible to log also the following event (if supported):

    +---------------+-----------------------+------------------------------+ | EventTypes | Description | Event data to be logged | +---------------+-----------------------+------------------------------+ | Change of | Any change of group | • Administrator username, | | group | membership for | | | membership or | accounts | • Administered account, | | accounts | | | | | | • Activity performed (group | | | | added or removed) | | | | | | | | • Timestamp. | +---------------+-----------------------+------------------------------+

    Test Purpose

    To verify that the network product correctly logs all required security event types.

    Pre-Conditions
    • The following information shall be provided by the documentation accompanying the network product:

    • The log where the event is recorded and how it can be accessed (e.g. the complete path).

    • If the event type is enabled by default or how to enable it.

    • What O&M services can be used on the Network Product in the configuration according to the pre-requisites for testing in clause 4.1 and how to use them.

    • The tester has the needed administrative privileges to sufficiently perform the tests

    • If needed for testing specific O&M services, a tester machine is available.

    Execution Steps

    For each O&M service perform the following test steps

    1.- The Tester sequentially triggers each security event listed in the requirement, while covering each option detailed in the individual security event descriptions.

    2.- The Tester verifies whether the security events, and their individual options, were correctly logged. In particular it is verified whether they include at least the event data specified as required to be logged.

    Expected Results

    All security events are appropriately logged, including all required event data.

    Expected Format of Evidence
    • List of O&M services

    • Commands executed per O&M services

    • The relevant parts of the logs in appropriate form (e.g. file, screenshot)

    PDFs a2414edb3950569f6ecd8be8f9014d13

    4.2.3.6.1 Security event logging

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_SECURITY_EVENT_LOGGING
    Threat Reference
    Requirement Name

    Security event logging

    Requirement Reference
    Requirement Description

    Security events shall be logged together with a unique system reference (e.g. host name, IP or MAC address) and the exact time the incident occurred. For each security event, the log entry shall include user name and/or timestamp and/or performed action and/or result and/or length of session and/or values exceeded and/or value reached.

    IETF RFC 3871, section 2.11.10 specifies the minimum set of security events. Each vendor shall document what security events the product logs so that it can be verified by testing.

    In particular, it shall be possible to log the following events (which are intended to be supported by the network product and which can be enabled by default at manufacturing time or at a later time by the operator):

    +---------------+-----------------------+------------------------------+ | EventTypes | Description | Event data to be logged | +---------------+-----------------------+------------------------------+ | Incorrect | Records any user | • Username, | | login | incorrect login | | | attempts | attempts to the | • Source (IP address) if | | | network product | remote access | | | | | | | | • Timestamp | +---------------+-----------------------+------------------------------+ | Administrator | Records any access | • Username, | | access | attempts to accounts | | | | that have system | • Timestamp, | | | privileges. | | | | | • Length of session, | | | | | | | | • Source (IP address) if | | | | remote access | +---------------+-----------------------+------------------------------+ | Account | Records all account | • Administrator username, | | a | administration | | | dministration | activity, i.e. | • Administered account, | | | configure, delete, | | | | enable, and disable. | • Activity performed | | | | (configure, delete, enable | | | | and disable) | | | | | | | | • Timestamp | +---------------+-----------------------+------------------------------+ | | | | +---------------+-----------------------+------------------------------+ | Resource | Records events that | • Value exceeded, | | Usage | have been triggered | | | | when system parameter | • Value reached | | | values such as disk | | | | space, CPU load over | (Here suitable threshold | | | a longer period have | values shall be defined | | | exceeded their | depending on the individual | | | defined thresholds. | system.) | | | | | | | | • Timestamp | +---------------+-----------------------+------------------------------+ | Configuration | Changes to | • Change made | | change | configuration of the | | | | network device | • Username | +---------------+-----------------------+------------------------------+ | Reboot/s | This event records | • Action performed (reboot, | | hutdown/crash | any action on the | shutdown, etc.) | | | network device that | | | | forces a reboot or | • Username (for intentional | | | shutdown OR where the | actions) | | | network device has | | | | crashed. | • Timestamp | +---------------+-----------------------+------------------------------+ | Interface | Change to the status | • Interface name and type | | status change | of interfaces on the | | | | network device (e.g. | • Status (shutdown, missing | | | shutdown) | link, etc.) | | | | | | | | • Timestamp | +---------------+-----------------------+------------------------------+

    In addition, optionally it shall be possible to log also the following event (if supported):

    +---------------+-----------------------+------------------------------+ | EventTypes | Description | Event data to be logged | +---------------+-----------------------+------------------------------+ | Change of | Any change of group | • Administrator username, | | group | membership for | | | membership or | accounts | • Administered account, | | accounts | | | | | | • Activity performed (group | | | | added or removed) | | | | | | | | • Timestamp. | +---------------+-----------------------+------------------------------+

    Security Objective references: tba.

    Test Purpose

    To verify that the network product correctly logs all required security event types.

    Pre-Conditions
    • The following information shall be provided by the documentation accompanying the network product:

    • The log where the event is recorded and how it can be accessed (e.g. the complete path).

    • If the event type is enabled by default or how to enable it.

    • What O&M services can be used on the Network Product in the configuration according to the pre-requisites for testing in clause 4.1 and how to use them.

    • The tester has the needed administrative privileges to sufficiently perform the tests

    • If needed for testing specific O&M services, a tester machine is available.

    Execution Steps

    For each O&M service perform the following test steps

    • The Tester sequentially triggers each security event listed in the requirement, while covering each option detailed in the individual security event descriptions.

    • The Tester verifies whether the security events, and their individual options, were correctly logged. In particular it is verified whether they include at least the event data specified as required to be logged.

    Expected Results

    All security events are appropriately logged, including all required event data.

    Expected Format of Evidence

    The testing report contains the following information for each security event:

    • List of O&M services

    • Commands executed per O&M services

    • The relevant parts of the logs in appropriate form (e.g. file, screenshot)

    • Test result (Passed or not)

    PDFs b9309d5e868c1f12f775f750c9eb8132

    4.2.3.6.2 Log transfer to centralized storage

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_LOG_TRANS_TO_CENTR_STORAGE
    Threat Reference

    TR 33.926 [4], clause 5.3.4.4, Log Tampering

    Requirement Name

    Log transfer to centralized storage

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    a. The Network Product shall support forwarding of security event logging data to an external system. Secure transport protocols in accordance with clause 4.2.3.2.4, shall be used.

    b. Log functions should support secure uploading of log files to a central location or to an external system for the Network Product that is logging.

    Test Purpose

    To ensure log shall be transferred to centralized storage.

    Pre-Conditions
    • The vendor shall list the protocols which transfer security event logging data (in accordance with clause 4.2.3.2.4).

    • The session between network product and central location or external system for network product log functions has been set up.

    • The tester has privilege to operate network product and related logs can be outputted.

    Execution Steps
    1. The tester configures the network product to forward event logs to an external system (according to bullet a) of requirement) and related logs are sent out.

    2. The tester checks whether the used transport protocol is secure protocol (in accordance with clause 4.2.3.2.4).

    3. The tester checks whether the central location or external system for network product log functions has stored the related logs.

    4. The tester configures the network product for secure upload of event log files to an external system (according to bullet b) of requirement) and performs a log file upload.

    5. The tester checks whether the used transport protocol for log file upload is a secure protocol (in accordance with clause 4.2.3.2.4).

    6. The tester checks whether the central location or external system for network product log functions has stored the related logs.

    Expected Results
    • The listed transport protocols are secure protocols.

    • The used transport protocol for log file upload is a secure standard protocol.

    • The tester finds that the central location or external system for network product log functions has stored the related logs.

    Expected Format of Evidence
    • Settings, protocols and configurations used,

    • Screenshot

    PDFs ebe0640d2fe0ea0122814d95d2765b03

    4.2.3.6.2 Log transfer to centralized storage

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name
    TC_LOG TRANS_TO_CENTR STORAGE
    Threat Reference
    Requirement Name

    Log transfer to centralized storage

    Requirement Reference
    Requirement Description

    a. The Network Product shall support forwarding of security event logging data to an external system. Secure transport protocols in accordance with clause 4.2.3.2.4, shall be used.

    b. Log functions should support secure uploading of log files to a central location or to an external system for the Network Product that is logging.

    Security Objective references: tba.

    Test Purpose

    To ensure log shall be transferred to centralized storage.

    Pre-Conditions
    • The manufacturer shall list the standard protocols which transfer security event logging data.

    • The session between network product and central location or external system for network product log functions has been set up.

    • The tester has privilege to operate network product and related logs can be outputted.

    Execution Steps
    1. The tester configures the network product to forward event logs to an external system (according to bullet a) of requirement) and related logs are sent out.

    2. The tester checks whether the used transport protocol is secure protocol.

    3. The tester checks whether the central location or external system for network product log functions has stored the related logs.

    4. The tester configures the network product for secure upload of event log files to an external system (according to bullet b) of requirement) and performs a log file upload.

    5. The tester checks whether the used transport protocol for log file upload is a secure standard protocol.

    6. The tester checks whether the central location or external system for network product log functions has stored the related logs.

    Expected Results
    • The listed transport protocols are secure protocols.

    • The used transport protocol for log file upload is a secure standard protocol.

    • The tester finds that the central location or external system for network product log functions has stored the related logs.

    Expected Format of Evidence

    A testing report provided by the testing agency which will consist of the following information:

    • Settings, protocols and configurations used,

    • Screenshot

    • Test result (Passed or not)

    PDFs 1ec97ca48e16ebfaf93fb65e1da02c29

    4.2.3.6.3 Protection of security event log files

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_EVENT_LOG
    Threat Reference

    TR 33.926 [4], clause 5.3.6.12, Log Disclosure

    Requirement Name

    Protection of security event log files

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    The security event log shall be access controlled (file access rights) so only privileged users have access to the log files.

    Test Purpose

    Verify that the log(s) is(are) only accessible by privileged user(s).

    Pre-Conditions

    Documentation describing where logs are stored and how these logs are accessed and the Network Product interfaces that these logs can be access from.

    Execution Steps
    1. The tester attempts to access log files using users accounts with and without the correct permissions for accessing log files.

    2. Repeat the test as described in step 1 using each of the interfaces as described in the Network Product documentation.

    Expected Results

    The tester checks that log files are accessible when a user with the appropriate authorisation attempts to access them and fails when a user without the correct permissions attempts to access them

    Expected Format of Evidence

    Evidence containing the operational results as, e.g. screenshots, log files, packet captures, error messages.

    PDFs 4d133610188931e02fe3055da235a0e5

    4.2.3.6.3 Protection of security event log files

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name
    Threat Reference
    Requirement Name

    Protection of security event log files

    Requirement Reference
    Requirement Description

    The security event log shall be access controlled (file access rights) so only privileged users have access to the log files.

    Security Objective references: tba.

    Test Purpose

    Verify that the log(s) is(are) only accessible by privileged user(s).

    Pre-Conditions
    • Documentation describing where logs are stored and how these logs are accessed and the Network Product interfaces that these logs can be access from.
    Execution Steps
    1. The tester attempts to access log files using users accounts with and without the correct permissions for accessing log files.

    2. Repeat the test as described in step 1 using each of the interfaces as described in the Network Product documentation.

    Expected Results

    The tester checks that log files are accessible when a user with the appropriate authorisation attempts to access them and fails when a user without the correct permissions attempts to access them

    Expected Format of Evidence

    Pass/fail result as recorded by the tester.

    PDFs c9353d6fe1a1acc4898a0be0519b0cb7

    4.2.4.1.1.1 Handling of growing content

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_HANDLING_OF_GROWING_CONTENT
    Threat Reference

    TR 33.926 [4], clause 5.3.7, Denial of service

    Requirement Name

    Handling of growing content.

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    Growing or dynamic content (e.g. log files, uploads) shall not influence system functions. A file system that reaches its maximum capacity shall not stop a system from operating properly. Therefore, countermeasures shall be taken such as usage of dedicated filesystems, separated from main system functions, or quotas, or at least a file system monitoring to ensure that this scenario is avoided.

    Test Purpose

    To verify that the growing or dynamic content does not influence system functions.

    Pre-Conditions
    1. Growing or dynamic content sources like e.g. log files and their paths are documented.

    2. Measures that are taken to protect system functions from growing or dynamic content that can exhaust file system capacity are documented.

    3. All logging capabilities that are not enabled by default are enabled manually as per the documentation instructions.

    Execution Steps
    1. Tester checks that the sources that are susceptible to being exhausted have been documented and measures aimed to counteract this are described.

    2. Tester enables monitoring of the system operation.

    3. Tester initiates traffic that causes increase of log files and monitors the system behaviour until the log file either reaches its quota or until file system is exhausted.

    4. In case file uploading is allowed (e.g. via SFTP) the tester initiates file uploading and tries to exhaust the file system.

    Expected Results

    It is verified that system operation is not influenced by growing or dynamic content at any case.

    Expected Format of Evidence

    System monitoring data (e.g. Alarms, logs, CPU utilization, etc.).

    PDFs 4c57ee5db1a0101538f92fcdc53facda

    4.2.4.1.1.1 Handling of growing content

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_HANDLING_OF_GROWING_CONTENT
    Threat Reference
    Requirement Name

    Growing (dynamic) content shall not influence system functions.

    Requirement Reference
    Requirement Description

    Growing or dynamic content (e.g. log files, uploads) shall not influence system functions. A file system that reaches its maximum capacity shall not stop a system from operating properly. Therefore, countermeasures shall be taken such as usage of dedicated filesystems, separated from main system functions, or quotas, or at least a file system monitoring to ensure that this scenario is avoided.

    Test Purpose

    To verify that the growing or dynamic content does not influence system functions.

    Pre-Conditions
    1. Growing or dynamic content sources like e.g. log files and their paths are documented.

    2. Measures that are taken to protect system functions from growing or dynamic content that may exhaust file system capacity are documented.

    3. All logging capabilities that are not enabled by default are enabled manually as per the documentation instructions.

    Execution Steps
    1. Tester checks that the sources that are susceptible to being exhausted have been documented and measures aimed to counteract this are described.

    2. Tester enables monitoring of the system operation.

    3. Tester initiates traffic that causes increase of log files and monitors the system behaviour until the log file either reaches its quota or until file system is exhausted.

    4. In case file uploading is allowed (e.g. via SFTP) the tester initiates file uploading and tries to exhaust the file system.

    Expected Results
    1. It is verified that the taken measures are sufficient so that system operation is not influenced by growing or dynamic content at any case.
    Expected Format of Evidence

    System monitoring data (e.g. Alarms, logs, CPU utilization, etc.).

    PDFs 6f580005d2c964c0b397b424ab8e38b5

    4.2.4.1.1.2 Handling of ICMP

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_HANDLING_OF_ICMP
    Threat Reference

    TR 33.926 [4], clause 5.3.7, Denial of service

    The test for this requirement can be carried out using a suitable tool or manually by performing the steps described below. If a tool is used then the tester needs to provide evidence, e.g. by referring to the documentation of the tool, that the tool actually provides functionality equivalent to the steps described below.

    Requirement Name

    Processing of ICMPv4 and ICMPv6 packets

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    Processing of ICMPv4 and ICMPv6 packets which are not required for operation shall be disabled on the network product. In particular, there are certain types of ICMP4 and ICMPv6 that are not used in most networks, but represent a risk.

    ICMP message types which on receipt lead to responses or to configuration changes are not mentioned in this requirement, but they may be necessary to support relevant and specified networking features. Those shall be documented.

    Certain ICMP types are generally permitted and do not need to be specifically documented. Those are marked as "Permitted" in below table.

    The network product shall not send certain ICMP types by default, but it may support the option to enable utilization of these types (e.g. for debugging). This is marked as "Optional" in below table.

    +-------------+-----------+--------------+-------------+-------------+ | Type (IPv4) | Type | Description | Send | Respond to | | | (IPv6) | | | | +-------------+-----------+--------------+-------------+-------------+ | 0 | 128 | Echo Reply | Optional | N/A | | | | | | | | | | | (i.e. as | | | | | | automatic | | | | | | reply to | | | | | | "Echo | | | | | | Request") | | +-------------+-----------+--------------+-------------+-------------+ | 3 | 1 | Destination | Permitted | N/A | | | | Unreachable | | | +-------------+-----------+--------------+-------------+-------------+ | 8 | 129 | Echo Request | Permitted | Optional | +-------------+-----------+--------------+-------------+-------------+ | 11 | 3 | Time | Optional | N/A | | | | Exceeded | | | +-------------+-----------+--------------+-------------+-------------+ | 12 | 4 | Parameter | Permitted | N/A | | | | Problem | | | +-------------+-----------+--------------+-------------+-------------+ | N/A | 2 | Packet Too | Permitted | N/A | | | | Big | | | +-------------+-----------+--------------+-------------+-------------+ | N/A | 135 | Neighbour | Permitted | Permitted | | | | Solicitation | | | +-------------+-----------+--------------+-------------+-------------+ | N/A | 136 | Neighbour | Permitted | N/A | | | | A | | | | | | dvertisement | | | +-------------+-----------+--------------+-------------+-------------+

    The network product shall not respond to, or process (i.e. do changes to configuration), under any circumstances certain ICMP message types as marked in below table.

    +----------+---------+-----------+-----------+-----------+-----------+ | Type | Type | De | Send | Respond | Process | | (IPv4) | (IPv6) | scription | | to | (i.e. do | | | | | | | changes | | | | | | | to | | | | | | | confi | | | | | | | guration) | +----------+---------+-----------+-----------+-----------+-----------+ | 5 | 137 | Redirect | N/A | N/A | Not | | | | | | | Permitted | +----------+---------+-----------+-----------+-----------+-----------+ | 13 | N/A | Timestamp | N/A | Not | N/A | | | | | | Permitted | | +----------+---------+-----------+-----------+-----------+-----------+ | 14 | N/A | Timestamp | Not | N/A | N/A | | | | Reply | Permitted | | | | | | | | | | | | | | (i.e. as | | | | | | | automatic | | | | | | | reply to | | | | | | | "Tim | | | | | | | estamp") | | | +----------+---------+-----------+-----------+-----------+-----------+ | N/A | 133 | Router | N/A | Not | Not | | | | Sol | | Permitted | Permitted | | | | icitation | | | | +----------+---------+-----------+-----------+-----------+-----------+ | N/A | 134 | Router | N/A | N/A | Not | | | | Adve | | | Permitted | | | | rtisement | | | | +----------+---------+-----------+-----------+-----------+-----------+

    Test Purpose

    To verify that the network product does not reply to certain ICMP types in accordance with the requirement. To verify that the network product does not send 'Time Exceeded'.

    To verify that the network product does not process the following ICMPv4 and ICMPv6 types:

    • "Redirect (5)"

    • Router Solicitation

    • Router Advertisement

    Pre-Conditions
    • The vendor provides documentation whether the network product supports IPv4 and/or IPv6.

    • If applicable, the tester has the needed system privileges for confirming that the ICMP messages with types "Not Permitted" to process are indeed not leading to configuration changes.

    • If applicable, the tester has the needed system privileges for confirming that certain ICMP message types are dropped by the network product on receipt.

    • A tester machine is available and equipped with a suitable ICMP packets generator tool.

    Execution Steps

    The following needs to be done for all IP protocol versions (IPv4 and/or IPv6) supported by the network element.

    For verifying that the network product does not reply to ICMP messages with types where this is not permitted: The tester sends samples of the applicable ICMP messages from the tester machine to the network product and verifies that

    • the messages are dropped on receipt by the network product (e.g. by means of appropriate firewall rules),

    • or no response is sent out towards the test machine,

    • or there are other means ensuring that the ICMP messages cannot trigger a response.

    For verifying that the network product does not change its configuration due to receiving ICMP messages with types where this is not permitted: The tester sends samples of the applicable ICMP messages from the tester machine to the network product and verifies that

    • the messages are dropped on receipt by the network product (e.g. by means of appropriate firewall rules),

    • or the network product's applicable system configuration remains unchanged upon receipt of the messages,

    • or there are other means ensuring that the ICMP messages cannot lead to configuration changes.

    The tester verifies consistency between the documentation in regard to ICMP and the network product.

    Expected Results

    The ICMP messages which are "Not Permitted" to generate a response from the network product do not generate a response.

    The ICMP messages which are "Not Permitted" to change the configuration of the network element do not change the configuration.

    ICMP message types which lead to responses or to configuration changes on receipt, if neither mentioned in the requirement nor in the documentation, are not enabled.

    Expected Format of Evidence
    • Tools used and their configuration

    • Tool output

    PDFs 1775c2cedc154b97758f7a14e9e7b837

    4.2.4.1.1.2 Handling of ICMP

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_HANDLING_OF_ICMP
    Threat Reference
    Requirement Name

    Processing of ICMPv4 and ICMPv6 packets

    Requirement Reference
    Requirement Description

    Processing of ICMPv4 and ICMPv6 packets which are not required for operation shall be disabled on the network product. In particular, there are certain types of ICMP4 and ICMPv6 that are not used in most networks, but represent a risk.

    ICMP message types which on receipt lead to responses or to configuration changes are not mentioned in this requirement, but they may be necessary to support relevant and specified networking features. Those must be documented.

    Certain ICMP types are generally permitted and do not need to be specifically documented. Those are marked as "Permitted" in below table.

    The network product shall not send certain ICMP types by default, but it may support the option to enable utilization of these types (e.g. for debugging). This is marked as "Optional" in below table.

    +-------------+-----------+--------------+-------------+-------------+ | Type (IPv4) | Type | Description | Send | Respond to | | | (IPv6) | | | | +-------------+-----------+--------------+-------------+-------------+ | 0 | 128 | Echo Reply | Optional | N/A | | | | | | | | | | | (i.e. as | | | | | | automatic | | | | | | reply to | | | | | | "Echo | | | | | | Request") | | +-------------+-----------+--------------+-------------+-------------+ | 3 | 1 | Destination | Permitted | N/A | | | | Unreachable | | | +-------------+-----------+--------------+-------------+-------------+ | 8 | 129 | Echo Request | Permitted | Optional | +-------------+-----------+--------------+-------------+-------------+ | 11 | 3 | Time | Optional | N/A | | | | Exceeded | | | +-------------+-----------+--------------+-------------+-------------+ | 12 | 4 | Parameter | Permitted | N/A | | | | Problem | | | +-------------+-----------+--------------+-------------+-------------+ | N/A | 2 | Packet Too | Permitted | N/A | | | | Big | | | +-------------+-----------+--------------+-------------+-------------+ | N/A | 135 | Neigbor | Permitted | Permitted | | | | Solicitation | | | +-------------+-----------+--------------+-------------+-------------+ | N/A | 136 | Neighbor | Permitted | N/A | | | | A | | | | | | dvertisement | | | +-------------+-----------+--------------+-------------+-------------+

    The network product shall not respond to, or process (i.e. do changes to configuration), under any circumstances certain ICMP message types as marked in below table.

    +----------+---------+-----------+-----------+-----------+-----------+ | Type | Type | De | Send | Respond | Process | | (IPv4) | (IPv6) | scription | | to | (i.e. do | | | | | | | changes | | | | | | | to | | | | | | | confi | | | | | | | guration) | +----------+---------+-----------+-----------+-----------+-----------+ | 5 | 137 | Redirect | N/A | N/A | Not | | | | | | | Permitted | +----------+---------+-----------+-----------+-----------+-----------+ | 13 | N/A | Timestamp | N/A | Not | N/A | | | | | | Permitted | | +----------+---------+-----------+-----------+-----------+-----------+ | 14 | N/A | Timestamp | Not | N/A | N/A | | | | Reply | Permitted | | | | | | | | | | | | | | (i.e. as | | | | | | | automatic | | | | | | | reply to | | | | | | | "Tim | | | | | | | estamp") | | | +----------+---------+-----------+-----------+-----------+-----------+ | N/A | 133 | Router | N/A | Not | Not | | | | Sol | | Permitted | Permitted | | | | icitation | | | | +----------+---------+-----------+-----------+-----------+-----------+ | N/A | 134 | Router | N/A | N/A | Not | | | | Adve | | | Permitted | | | | rtisement | | | | +----------+---------+-----------+-----------+-----------+-----------+

    The test for this requirement can be carried out using a suitable tool or manually by performing the steps described below. If a tool is used then the tester needs to provide evidence, e.g. by referring to the documentation of the tool, that the tool actually provides functionality equivalent to the steps described below.

    Test Purpose

    To verify that the network product does not reply to certain ICMP types in accordance with the requirement. To verify that the network product does not send 'Time Exceeded'.

    To verify that the network product does not process the following ICMPv4 and ICMPv6 types:

    • "Redirect (5)"

    • Router Solicitation

    • Router Advertisement

    Pre-Conditions
    • The tester knows whether the network product supports IPv4 and/or IPv6:

    • If applicable, the tester has the needed system privileges for confirming that the ICMP messages with types "Not Permitted" to process are indeed not leading to configuration changes..

    • If applicable, the tester has the needed system privileges for confirming that certain ICMP message types are dropped by the network product on receipt.

    • A tester machine is available and equipped with a suitable ICMP packets generator tool.

    Execution Steps

    The following needs to be done for all IP protocol versions (IPv4 and/or IPv6) supported by the network element.

    For verifying that the network product does not reply to ICMP messages with types where this is not permitted: The tester sends samples of the applicable ICMP messages from the tester machine to the network product and verifies by appropriate means that

    • the messages are dropped on receipt by the network product (e.g. by means of appropriate firewall rules),

    • or no response is sent out towards the test machine,

    • or there are other means ensuring that the ICMP messages cannot trigger a response.

    For verifying that the network product does not change its configuration due to receiving ICMP messages with types where this is not permitted: The tester sends samples of the applicable ICMP messages from the tester machine to the network product and verifies by appropriate means that

    • the messages are dropped on receipt by the network product (e.g. by means of appropriate firewall rules),

    • or the network product's applicable system configuration remains unchanged upon receipt of the messages,

    • or there are other means ensuring that the ICMP messages cannot lead to configuration changes.

    The tester utilizes appropriate means to verify consistency between the documentation in regard to ICMP and the network product.

    Expected Results

    The ICMP messages which are "Not Permitted" to generate a response from the network product do not generate a response.

    The ICMP messages which are "Not Permitted" to change the configuration of the network element do not change the configuration.

    ICMP message types which lead to responses or to configuration changes on receipt, if neither mentioned in the requirement nor in the documentation, are not enabled.

    Expected Format of Evidence

    The following information needs to be retained and included into the report as appropriate:

    • Tools used and their configuration

    • Tool output

    • Test result (Passed or not)

    PDFs 85290e82dbc1cf0bd70bbd80a41f672b

    4.2.4.1.1.3 Handling of IP options and extensions

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_HANDLING-IP-OPTIONS-AND-EXTENSIONS
    Threat Reference

    TR 33.926 [4], clause 5.7.3, Denial of service

    The test for this requirement can be carried out using a suitable tool or manually by performing the steps described below. If a tool is used then the tester needs to provide evidence, e.g. by referring to the documentation of the tool, that the tool actually provides functionality equivalent to the steps described below.

    Requirement Name

    Handling of IP options and extensions

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    IP packets with unnecessary options or extension headers shall not be processed. IP options and extension headers (e.g. source routing) are only required in exceptional cases. So, all packets with enabled IP options or extension headers shall be filtered.

    Test Purpose

    To verify that the network product provides functionality to filter out IP packets with unnecessary options or extension headers in reference to RFC 7126 [20].

    Pre-Conditions
    • The vendor declares in the documentation accompanying the network product at least the following information:

    • The support of filtering capability for IP packets with unnecessary options or extensions headers.

    • The actions performed by the network product when an IP packet with unnecessary options or extensions headers is received (e.g. the packet is dropped, the options or extensions are ignored and the packet is treated as if it has no IP options, etc.).

    • Guidelines on how to enable and configure this filtering capability.

    • The network product has at least one physical interface named if1 supporting both IPv4 and IPv6. If the network product does not support IPv6 then IPv6 related steps and checks are skipped.

    • A network traffic analyser on the network product (e.g. TCPDUMP) or an external traffic analyser directly connected to the network product is available.

    • The tester has administrative privileges.

    • A tester machine is available with a tool able to send IPv4 packets with the IP Options and IPv6 packets (if supported by the network product) with Extension Header set (e.g. Scapy).

    Execution Steps
    1. The tester logs in the network product.

    2. The tester configures on the network product a filtering rule to drop all IP packets containing an IP Option set

    a. The tester establishes an O&M session on if1 interface

    b. Using the tool (e.g. Scapy) the tester sends from the tester machine an IPv4 TCP SYN packet with an appropriate destination port to if1 interface without setting any IP Options

    c. Using the network traffic analyser, the tester verifies that the IP packet is received by the network product and the tester verifies that the corresponding ACK message is sent back.

    d. Using the tool (e.g. Scapy) the tester sends an IPv4 TCP SYN packet with an appropriate destination port and an IP Option set to the if1 interface

    e. Using the network traffic analyser, the tester verifies that the IP packet is received by the network product but no ACK message is sent back. This confirms the packet is dropped as expected from the filtering rule.

    1. The tester configures on the network product a filtering rule to drop all incoming packets based on specific Extension Header Types, e.g. packets with the Routing Header extension. Skip Step 3 if the network product does not support IPv6.

    a. Using the tool (e.g. Scapy) the tester sends from the tester machine an IPv6 TCP SYN packet with an appropriate destination port to if1 interface without setting any extension header

    b. Using the network traffic analyser, the tester verifies that the IP packet is received by the network product and the tester verifies that the corresponding ACK message is sent back.

    c. Using the tool (e.g. Scapy) the tester sends an IPv6 TCP SYN packet with an appropriate destination port and an extension header set to the if1 interface

    d. Using the network traffic analyser, the tester verifies that the IP packet is received by the network product but no ACK message is sent back. This confirms the packet is dropped as expected from the filtering rule.

    Expected Results

    The network product discards IPv4 packets with unnecessary options in reference to RFC 7126 [20] or IPv6 packets (assuming the network product supports IPv6) with extension header.

    Expected Format of Evidence
    • Used tools and their configurations

    • Settings and configurations used

    • Pcap trace

    • Screenshot

    PDFs c8643ceb5e26428c0e46b383a2421aec

    4.2.4.1.1.3 Handling of IP options and extensions

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_HANDLING-IP-OPTIONS-AND-EXTENSIONS
    Threat Reference
    Requirement Name

    IP packets with unnecessary options or extension headers shall not be processed.

    Requirement Reference
    Requirement Description

    IP packets with unnecessary options or extension headers shall not be processed. IP options and extension headers (e.g. source routing) are only required in exceptional cases. So, all packets with enabled IP options or extension headers shall be filtered.

    The test for this requirement can be carried out using a suitable tool or manually by performing the steps described below. If a tool is used then the tester needs to provide evidence, e.g. by referring to the documentation of the tool, that the tool actually provides functionality equivalent to the steps described below.

    Test Purpose

    To verify that the network product provides functionality to filter out IP packets with unnecessary options or extension headers.

    Pre-Conditions
    • The manufacturer declares in the documentation accompanying the network product at least the following information:

    • The support of filtering capability for IP packets with unnecessary options or extensions headers.

    • The actions performed by the network product when an IP packet with unnecessary options or extensions headers is received (e.g. the packet is dropped, the options or extensions are ignored and the packet is treated as if it has no IP options, etc.) .

    • Guidelines on how to enable and configure this filtering capability.

    • The network product has at least one physical interface named if1 supporting both IPv4 and IPv6. If the network product does not support IPv6 then IPv6 related steps and checks may be skipped.

    • A network traffic analyser on the network product (e.g. TCPDUMP) or an external traffic analyser directly connected to the network product is available .

    • The tester has administrative privileges.

    • A tester machine is available with a tool able to send IPv4 packets with the IP Options and IPv6 packets (if supported by the network product) with Extension Header set (e.g. Scapy).

    Execution Steps
    1. The tester logs in the network product.

    2. The tester configures on the network product a filtering rule to drop all IP packets containing an IP Option set

    a. The tester establishes an O&M session on if1 interface

    b. Using the tool (e.g. Scapy) the tester sends from the tester machine an IPv4 TCP SYN packet with an appropriate destination portto if1 interface without setting any IP Options

    c. Using the network traffic analyser, the tester verifies that the IP packet is received by the network product and the tester verifies that the corresponding ACK message is sent back.

    d. Using the tool (e.g. Scapy) the tester sends an IPv4 TCP SYN packet with an appropriate destination port and an IP Option set to the if1 interface

    e. Using the network traffic analyser, the tester verifies that the IP packet is received by the network product but no ACK message is sent back. This confirms the packet is dropped as expected from the filtering rule.

    1. The tester configures on the network product a filtering rule to drop all incoming packets based on specific Extension Header Types, e.g. packets with the Routing Header extension. Step 3 may be skipped if the network product does not support IPv6.

    a. Using the tool (e.g. Scapy) the tester sends from the tester machine an IPv6 TCP SYN packet with an appropriate destination port to if1 interface without setting any extension header

    b. Using the network traffic analyser, the tester verifies that the IP packet is received by the network product and the tester verifies that the corresponding ACK message is sent back.

    c. Using the tool (e.g. Scapy) the tester sends an IPv6 TCP SYN packet with an appropriate destination port and an extension header set to the if1 interface

    d. Using the network traffic analyser, the tester verifies that the IP packet is received by the network product but no ACK message is sent back. This confirms the packet is dropped as expected from the filtering rule.

    Expected Results

    The network product discards IPv4 packets with unnecessary options or IPv6 packets (assuming the network product supports IPv6) with extension header.

    Expected Format of Evidence

    A testing report provided by the testing agency which will consist of the following information:

    • Used tools and their configurations

    • Settings and configurations used

    • Pcap trace

    • Screenshot

    • Test result (Passed or not)

    PDFs ec64872267f693e3f49cdb9ede7127c2

    4.2.4.1.2.1 Authenticated Privilege Escalation only

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_OS_PRIVILEGE
    Threat Reference

    TR 33.926 [4], clause 5.3.8.7, Elevation of Privilege via Unnecessary Network Services

    Requirement Name

    Authenticated Privilege Escalation only.

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    There shall not be a privilege escalation method in interactive sessions (CLI or GUI) which allows a user to gain administrator/root privileges from another user account without re-authentication.

    Implementation example: Disable insecure privilege escalation methods so that users are required to (re-)login directly into the account with the required permissions.

    Test Purpose

    To ensure that privileged operating system functions shall not be used without successful authentication and authorization, and that violations of this requirement are documented and strictly limited in number and functionality.

    Pre-Conditions
    1. The vendor shall provide documentation of the operating system(s) used in the network product.

    2. The vendor shall supply a list "A" of operating system functions which a system user can use to explicitly gain higher privileges, and how these functions are configured. Unix® example: sudo command and its configuration file /etc/sudoers or used Linux® capabilities.

    3. The vendor shall supply a list "B" of operating system commands, GUI functions, and files which will execute specifically limited tasks automatically with higher privileges, even when used by a low-privileged user. List "B" shall also contain:

    4. configuration of these commands and GUI functions;

    5. owner and permission settings of files;

    6. justification for having the command, GUI function or file on the network product\ Unix® example: root-owned files with SUID and SGID permissions or Linux® capabilities;

    7. capabilities of the aforementioned files.

    NOTE: Linux® capabilities can provide a subset of root user privileges to a process rather than granting total root access. Some capabilities can be used for privilege escalation

    Execution Steps
    1. The tester logs into the network product and verifies that list "A" matches the vendor provided documentation.

    2. The tester verifies that entries in the list "A" require successful authentication for all users without exception, on basis of the user name and at least one authentication attribute.

    3. The tester logs into the network product and verifies that list "B" is accurate based on the vendor provided documentation mentioned in the pre-conditions in this clause. Unix® example: To list files with SUID and SGID permissions and Linux® capabilities, the following commands can be used:

    SUID: find / -perm -4000 -type f -exec ls {} ; > suid_files.txt

    SGID: find / -perm -2000 -type f -exec ls {} ; > sgid_files.txt

    Capabilities: getcap -r / 2>/dev/null

    1. The tester verifies that file entries in the list "B" do not have write permissions for anyone else than the owner.

    2. The tester verifies that entries in the list "B" only allow execution of specifically limited tasks which are needed on this network product, based on his expert knowledge of the operating system(s) used in the network product, and operating system documentation.

    3. The tester logs into the network product and tests for every entry in the list "B" that it does not provide a means to execute arbitrary functions with administrator/root privileges, e.g. via a shell escape.

    Expected Results
    1. The network product does not allow a user to gain administrator/root privileges from another user account without re-authentication.

    2. If a network product provides functions and files which execute specifically limited tasks automatically with higher privileges, it ensures that these limits cannot be bypassed.

    3. The system documentation about means for a user to gain administrator/root privileges from another user account accurately describes the network product.

    Expected Format of Evidence
    • Documentation provided by the vendor: lists "A" and "B"

    • Description of executed tests and commands

    • Relevant output (e.g. screenshot or terminal log)

    PDFs 56dc908f0c008fb8cec1a65889965c15

    4.2.4.1.2.1 Authenticated Privilege Escalation only

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_OS_PRIVILEGE
    Threat Reference
    Requirement Name

    There shall not be a privilege escalation method in interactive sessions (CLI or GUI) which allows a user to gain administrator/root privileges from another user account without re-authentication.

    Requirement Reference
    Requirement Description

    There shall not be a privilege escalation method in interactive sessions (CLI or GUI) which allows a user to gain administrator/root privileges from another user account without re-authentication.. Implementation example: Disable insecure privilege escalation methods so that users are required to (re-)login directly into the account with the required permissions.

    Test Purpose

    To ensure that privileged operating system functions shall not be used without successful authentication and authorization, and that violations of this requirement are documented and strictly limited in number and functionality.

    Pre-Conditions
    1. The manufacturer shall provide documentation of the operating system(s) used in the network product.

    2. The manufacturer shall supply a list "A" of operating system functions which a system user can use to explicitly gain higher privileges, and how these functions are configured. Unix® example: sudo command and its configuration file /etc/sudoers.

    3. The manufacturer shall supply a list "B" of operating system commands, GUI functions, and files which will execute specifically limited tasks automatically with higher privileges, even when used by a low-privileged user. List "B" shall also contain:

    4. configuration of these commands and GUI functions;

    5. owner and permission settings of files;

    6. justification for having the command, GUI function or file on the network product\ Unix® example: root-owned files with SUID and SGID permissions.

    NOTE: Linux® capabilities can provide a subset of root user privileges to a process rather than granting total root access. Some capabilities can be used for privilege escalation

    Execution Steps

    The accredited evaluator's test lab is required to execute the following steps:

    1. The tester logs into the network product and verifies that list "A" is accurate, based on his expert knowledge of the operating system(s) used in the network product, and operating system documentation.

    2. The tester verifies that entries in the list "A" require successful authentication for all users without exception, on basis of the user name and at least one authentication attribute.

    3. The tester logs into the network product and verifies that list "B" is accurate, based on his expert knowledge of the operating system(s) used in the network product, and operating system documentation. Unix® example: To list files with SUID and SGID permissions, the following commands can be used:

    SUID: find / -perm -4000 -type f -exec ls {} ; > suid_files.txt

    SGID: find / -perm -2000 -type f -exec ls {} ; > sgid_files.txt

    Capabilities: getcap -r / 2>/dev/null

    1. The tester verifies that file entries in the list "B" do not have write permissions for anyone else than the owner.

    2. The tester verifies that entries in the list "B" only allow execution of specifically limited tasks which are needed on this network product, based on his expert knowledge of the operating system(s) used in the network product, and operating system documentation.

    3. The tester logs into the network product and tests for every entry in the list "B" that it does not provide a means to execute arbitrary functions with administrator/root privileges, e.g. via a shell escape.

    Expected Results
    1. The network product does not allow a user to gain administrator/root privileges from another user account without re-authentication.

    2. If a network product provides functions and files which execute specifically limited tasks automatically with higher privileges, it ensures that these limits cannot be bypassed.

    3. The system documentation about means for a user to gain administrator/root privileges from another user account accurately describes the network product.

    Expected Format of Evidence

    A test report provided by the accredited evaluator's test lab which will consist of the following information:

    • Documentation provided by the vendor: lists "A" and "B"

    • Description of executed tests and commands

    • Relevant output (e.g. screenshot or terminal log)

    • Test result (passed or not passed)

    PDFs 0401629a7295c9b01378020d91682726

    4.2.4.2.2 System account identification

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_UNIQUE_SYSTEM_ACCOUNT_IDENTIFICATION
    Threat Reference

    TR 33.926 [4], clause 5.3.3, Spoofing identity

    Requirement Name

    System account identification

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    Each system account in UNIX® shall have a unique UID.

    Test Purpose

    To verify that UNIX® account UIDs are assigned uniquely.

    Pre-Conditions

    UNIX® is used on the Network Product.

    Execution Steps
    1. Create several UNIX® accounts.

    2. Check UIDs of created accounts and of existing system accounts and, in particular, the root account.

    Expected Results

    The UIDs are all different and, in particular, only the root account has UID = 0.

    Expected Format of Evidence
    • Log of execution

    • Screenshots

    PDFs 8e1feb3382ba6a4a2d3c3d0d78435814

    4.2.4.2.2 System account identification

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_UNIQUE_SYSTEM_ACCOUNT_IDENTIFICATION
    Threat Reference
    Requirement Name

    System account identification

    Requirement Reference
    Requirement Description

    Each system account in UNIX® shall have a unique UID.

    Security Objective references: tba.

    Test Purpose

    To verify that UNIX® account UIDs are assigned uniquely.

    Pre-Conditions

    UNIX® is used on the MME.

    Execution Steps
    1. Create several UNIX® accounts.

    2. Check UIDs of created accounts and of existing system accounts and, in particular, the root account.

    Expected Results

    The UIDs are all different and, in particular, only the root account has UID = 0.

    Expected Format of Evidence
    PDFs 74eb713300bfd0d5414d748e6e462ca6

    4.2.5.1 HTTPS

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name HTTPS
    Threat Reference

    TR 33.926 [4], clause 5.3.6.8, Insecure Default Configuration

    Requirement Name

    HTTPS

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    The communication between Web client and Web server shall be protected using TLS. The TLS profile defined in Annex E of TS 33.310 [9] shall be followed with the following modifications:

    Cipher suites with NULL encryption shall not be supported

    Test Purpose

    Verify the above requirement.

    Procedure and execution steps, expected results, expected format of evidence:

    These are the same as for the test case in clause 4.2.3.2.4, except that, for execution step 2, it is tested that NULL encryption is not supported.

    Pre-Conditions
    Execution Steps
    Expected Results
    Expected Format of Evidence
    PDFs 76c2e41815d5944f6dbbe17a3f32358f

    4.2.5.1 HTTPS

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name HTTPS
    Threat Reference
    Requirement Name

    HTTPS

    Requirement Reference
    Requirement Description

    The communication between Web client and Web server shall be protected using TLS. The TLS profile defined in Annex E of TS 33.310 shall be followed with the following modifications:

    Cipher suites with NULL encryption shall not be supported

    Security Objective references: tba.

    Test Purpose

    Verify the above requirement.

    Procedure and execution steps, expected results, expected format of evidence:

    These are the same as for the test case in clause 4.2.3.2.4, except that, for execution step 2, it is tested that NULL encryption is not supported.

    Pre-Conditions
    Execution Steps
    Expected Results
    Expected Format of Evidence
    PDFs c2755690bcb3a317298b76f015220496

    4.2.5.2.1 Webserver logging

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_WEBSERVER_LOGGING
    Threat Reference

    TR 33.926 [4], clause 5.3.4.4, Log Tampering

    Requirement Name

    Webserver logging

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    Access to the webserver shall be logged. The web server log shall contain the following information:

    • Access timestamp

    • Source (IP address)

    • (Optional) Account (if known)

    • (Optional) Attempted login name (if the associated account does not exist)

    • Relevant fields in http request. The URL should be included whenever possible.

    • Status code of web server response

    Test Purpose

    Verify that all accesses to the webserver are logged with the required information.

    Pre-Conditions

    Network Product documentation which contains information on log file location and procedure to access it.

    Tester has the necessary privileges to access the log files.

    Execution Steps
    1. The tester tries to login to the webserver using the correct and incorrect login credentials.

    2. The tester verifies whether the login attempts were logged correctly with all of the required information.

    Expected Results

    All webserver events are logged with all of the required information.

    Expected Format of Evidence

    Log file showing the captured information.

    PDFs 90a4db969786c0f0b1f3a6384b5c8524

    4.2.5.2.1 Webserver logging

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_WEBSERVER_LOGGING
    Threat Reference
    Requirement Name

    Webserver logging

    Requirement Reference
    Requirement Description

    Access to the webserver shall be logged. The web server log shall contain the following information:

    • Access timestamp

    • Source (IP address)

    • (Optional) Account (if known)

    • (Optional) Attempted login name (if the associated account does not exist)

    • Relevant fields in http request. The URL should be included whenever possible.

    • Status code of web server response

    Security Objective references: tba.

    Test Purpose

    Verify that all accesses to the webserver are logged with the required information.

    Pre-Conditions

    Network Product documentation which contains information on log file location and procedure to access it.

    Tester has the necessary privileges to access the log files.

    Execution Steps

    Execute the following steps:

    1. The tester tries to login to the webserver using the correct and incorrect login credentials.

    2. The tester verifies whether the login attempts were logged correctly with all of the required information.

    Expected Results

    All webserver events are logged with all of the required information.

    Expected Format of Evidence

    Testing report contains copies of the log file showing the captured information.

    PDFs 2712e2f068dd094c5a7d87bf1e540073

    4.2.5.3 HTTP User sessions

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_HTTP_USER_SESSIONS
    Threat Reference

    TR 33.926 [4], clause 5.3.4.7, User Session Tampering

    Requirement Name

    User sessions

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    To protect user sessions the Network Product shall support the following session ID and session cookie requirements:

    1. The session ID shall uniquely identify the user and distinguish the session from all other active sessions.

    2. The session ID shall be unpredictable.

    3. The session ID shall not contain sensitive information in clear text (e.g. account number, social security, etc.).

    4. In addition to the Session Idle Timeout (see clause 4.2.3.5.2 Protecting sessions -- Inactivity timeout), the Network Product shall automatically terminate sessions after a configurable maximum lifetime This maximum lifetime defines the maximum session span. When the maximum lifetime expires, the session shall be closed, the session ID shall be deleted and the user shall be forced to (re)authenticate in the web application and to establish a new session. The default value for this maximum lifetime shall be set to 8 hours.

    5. Session IDs shall be regenerated for each new session (e.g. each time a user logs in).

    6. The session ID shall not be reused or renewed in subsequent sessions.

    7. The Network Product shall not use persistent cookies to manage sessions but only session cookies. This means that neither the "expire" nor the "max-age" attribute shall be set in the cookies.

    8. Where session cookies are used the attribute 'HttpOnly' shall be set to true.

    9. Where session cookies are used the 'domain' attribute shall be set to ensure that the cookie can only be sent to the specified domain.

    10. Where session cookies are used the 'path' attribute shall be set to ensure that the cookie can only be sent to the specified directory or sub-directory.

    11. The Network Product shall not accept session identifiers from GET/POST variables.

    12. The Network Product shall be configured to only accept server generated session ID's.

    Test Purpose

    Verify that the above 12 session ID and session cookie requirements have been met.

    Pre-Conditions
    • The Network Product uses a session ID that is communicated between the client and Network Product to establish and maintain a session.

    • Documentation describing how a session is maintained and where the session ID is stored / and how this is communicated and after how long sessions expire.

    • The documentation should describe the algorithm used to generate the session IDs.

    • The session ID does not contain sensitive information.

    Execution Steps
    1. The tester logs in repeatedly with different user IDs and with the same user ID in a row and collects the session IDs according to the documentation and the user IDs associated with them. The tester verifies that:

    a. The session IDs are different between sessions of the same and different users;

    b. The session IDs seems random based on his/her own experience. The tester may use tests like the bitstream test or the count-the-1s-tests from the diehard test suite. The tester documents how randomness was verified;

    c. The session IDs are always different between sessions, also when the user ID is the same.

    NOTE: The repeated times is left to the vendor and test lab to decide.

    1. The tester verifies that when session cookies are used

    a. neither the "expire" or the "max-age" is set;

    b. the 'HttpOnly' is set to true;

    c. the 'domain' attribute is set to the correct domain;

    d. the 'path' attribute is set to the correct directory or sub-directory.

    1. The tester verifies that it is impossible to:

    a. access a session by retrieving the session ID and communicating the session ID through a POST or GET variable.

    b. generate a session ID on the client by attempting to login with a custom generated session ID.

    c. keep a session alive for longer than the configured maximum lifetime (by default 8 hours).

    1. The tester verifies that the default maximum lifetime is set to 8 hours.
    Expected Results
    1. A list of session IDs and user IDs that are different between sessions even when the tester has logged in with the same user and that are unpredictable as is confirmed by the entropy calculation.

    2. A confirmation from the tester that the correct variables are indeed set.

    3. A denied access to the tester when attempting the two login steps of step 3 and an expired session in step 3c.

    Expected Format of Evidence

    A confirmation that the tester has confirmed that (by providing e.g. network traffic request/response etc):

    1. Session IDs follow the rules 1-3, 5, 6.

    2. A session times out after 8 hours or sooner according to the documentation.

    3. The correct cookie settings are used.

    4. The network product does not accept custom-generated session IDs and that session IDs over GET or POST are ignored.

    PDFs ae5906639240e4ce7e024c9a535a5ac8

    4.2.5.3 HTTP User sessions

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name
    Threat Reference
    Requirement Name

    User sessions

    Requirement Reference
    Requirement Description

    To protect user sessions the Network Product shall support the following session ID and session cookie requirements:

    1. The session ID shall uniquely identify the user and distinguish the session from all other active sessions.

    2. The session ID shall be unpredictable.

    3. The session ID shall not contain sensitive information in clear text (e.g. account number, social security, etc.).

    4. In addition to the Session Idle Timeout (see clause 4.2.3.5.2 Protecting sessions -- Inactivity timeout), the Network Product shall automatically terminate sessions after a configurable maximum lifetime This maximum lifetime defines the maximum session span. When the maximum lifetime expires, the session shall be closed, the session ID shall be deleted and the user shall be forced to (re)authenticate in the web application and to establish a new session. The default value for this maximum lifetime shall be set to 8 hours.

    5. Session ID's shall be regenerated for each new session (e.g. each time a user logs in).

    6. The session ID shall not be reused or renewed in subsequent sessions.

    7. The Network Product shall not use persistent cookies to manage sessions but only session cookies. This means that neither the "expire" nor the "max-age" attribute shall be set in the cookies.

    8. Where session cookies are used the attribute 'HttpOnly' shall be set to true.

    9. Where session cookies are used the 'domain' attribute shall be set to ensure that the cookie can only be sent to the specified domain.

    10. Where session cookies are used the 'path' attribute shall be set to ensure that the cookie can only be sent to the specified directory or sub-directory.

    11. The Network Product shall not accept session identifiers from GET/POST variables.

    12. The Network Product shall be configured to only accept server generated session ID's.

    Security Objective references: tba.

    Test Purpose

    Verify that the above 12 session ID and session cookie requirements have been met.

    Pre-Conditions
    • The Network Product uses a session ID that is communicated between the client and Network Product to establish and maintain a session.

    • Documentation describing how a session is maintained and where the session ID is stored / and how this is communicated and after how long sessions expire.

    • The documentation should describe the algorithm used to generate the session IDs.

    • The session ID does not contain sensitive information.

    Execution Steps
    1. The tester logs in repeatedly with different user IDs and a number of times with the same user ID in a row and collects the session IDs according to the documentation and the user IDs associated with them. The tester verifies that:

    a. The session IDs are different between sessions of the same and different users;

    b. The session IDs seems random based on his/her own experience. The tester may use tests like the bitstream test or the count-the-1s-tests from the diehard test suite. The tester documents how randomness was verified;

    c. The session IDs are always different between sessions, also when the user ID is the same.

    NOTE: The repeated times is left to the vendor and test lab to decide.

    1. The tester verifies that when session cookies are used

    a. neither the "expire" or the "max-age" is set;

    b. the 'HttpOnly' is set to true;

    c. the 'domain' attribute is set to the correct domain;

    d. the 'path' attribute is set to the correct directory or sub-directory.

    1. The tester verifies that it is impossible to:

    a. access a session by retrieving the session ID and communicating the session ID through a POST or GET variable.

    b. generate a session ID on the client by attempting to login with a custom generated session ID.

    c. keep a session alive for longer than the configured maximum lifetime (by default 8 hours).

    1. The tester verifies that the default maximum lifetime is set to 8 hours.
    Expected Results
    1. A list of session IDs and user IDs that are different between sessions even when the tester has logged in with the same user and that are unpredictable as is confirmed by the entropy calculation.

    2. A confirmation from the tester that the correct variables are indeed set.

    3. A denied access to the tester when attempting the two login steps of step 3 and an expired session in step 3c.

    Expected Format of Evidence

    A confirmation that the tester has confirmed that:

    1. Session IDs follow the rules 1-3, 5, 6.

    2. A session times out after 8 hours or sooner according to the documentation.

    3. The correct cookie settings are used.

    4. The network product does not accept customly generated session IDs and that session IDs over GET or POST are ignored.

    PDFs 15b3783c5e6b41d7f5912eeb65150d31

    4.2.6.2.1 Packet filtering

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_PACKET_FILTERING
    Threat Reference

    TR 33.926 [4], clause 5.7.3, Denial of service

    Requirement Name

    Packet filtering

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    The Network Product shall provide a mechanism to filter incoming IP packets on any IP interface (see RFC 3871 for further information).

    In particular the Network Product shall provide a mechanism:

    1. To filter incoming IP packets on any IP interface at Network Layer .and Transport Layer of the stack ISO/OSI.

    2. To allow specified actions to be taken when a filter rule matches. In particular at least the following actions should be supported:

    3. Discard/Drop: the matching message is discarded, no subsequent rules are applied and no answer is sent back.

    4. Accept: the matching message is accepted.

    5. Account: the matching message is accounted for i.e. a counter for the rule is incremented. This action can be combined with the previous ones. This feature is useful to monitor traffic before its blocking.

    6. To enable/disable for each rule the logging for Dropped packets, i.e. details on messages matching the rule for troubleshooting.

    7. To filter on the basis of the value(s) of any portion of the protocol header.

    8. To reset the accounting.

    9. The Network Product shall provide a mechanism to disable/enable each defined rule.

    Test Purpose

    Verify that the system provides functionality for incoming packet filtering

    Pre-Conditions
    • The Network Product has packet filtering enabled.

    • The Network Product supports ICMP echo reply.

    • The Network Product has 2 different logical or physical Ethernet ports and each port is connected to a host.

    Execution Steps
    1. The tester configures the Network Product to only allow ICMP traffic from host 1.

    2. The tester initiates ping traffic from host 1.

    3. The tester initiates ping traffic from host 2.

    Expected Results

    Host 1 will receive a 'ping' answer back, but host 2 will not.

    Expected Format of Evidence

    Test execution log.

    PDFs 957e6953f4c161923f7692bcdf1709b2

    4.2.6.2.1 Packet filtering

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_PACKET_FILTERING
    Threat Reference
    Requirement Name

    Packet filtering

    Requirement Reference
    Requirement Description

    The Network Product shall provide a mechanism to filter incoming IP packets on any IP interface (see RFC 3871 for further information).

    In particular the Network Product shall provide a mechanism:

    1. To filter incoming IP packets on any IP interface at Network Layer .and Transport Layer of the stack ISO/OSI.

    2. To allow specified actions to be taken when a filter rule matches. In particular at least the following actions should be supported:

    3. Discard/Drop: the matching message is discarded, no subsequent rules are applied and no answer is sent back.

    4. Accept: the matching message is accepted.

    5. Account: the matching message is accounted for i.e. a counter for the rule is incremented. This action can be combined with the previous ones. This feature is useful to monitor traffic before its blocking.

    6. To enable/disable for each rule the logging for Dropped packets, i.e. details on messages matching the rule for troubleshooting.

    7. To filter on the basis of the value(s) of any portion of the protocol header.

    8. To reset the accounting.

    9. The Network Product shall provide a mechanism to disable/enable each defined rule.

    Security Objective references: PROTECTED COMMUNICATIONS, HARDENING.

    Test Purpose

    Verify that the system provides functionality for incoming packet filtering

    Pre-Conditions
    • The Network Product has packet filtering enabled.

    • The Network Product supports ICMP echo reply.

    • The Network Product has 2 different logical or physical Ethernet ports and each port is connected to a host.

    Execution Steps
    1. The tester configures the Network Product to only allow ICMP traffic from host 1.

    2. The tester initiates ping traffic from host 1.

    3. The tester initiates ping traffic from host 2.

    Expected Results

    Host 1 will receive a 'ping' answer back, but host 2 will not.

    Expected Format of Evidence

    NA

    PDFs c383ac166b58ea92e86dd8f0671b901b

    4.2.6.2.3 GTP-C Filtering

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_GTP-C_FILTERING
    Threat Reference

    TR 33.926 [4], clause 5.3.7, Denial of service

    The test case described here apply only when GTP-C filtering is provided on the Network Product itself.

    Requirement Name

    GTP-C Filtering

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    The following capability is conditionally required:

    • For each message of a GTP-C-based protocol, it shall be possible to check whether the sender of this message is authorized to send a message pertaining to this protocol.

    NOTE 1: The check could be performed e.g. against an allow list or disallow list of permitted message type / sender identity combinations.

    • At least the following actions should be supported when the check is satisfied:

    • Discard: the matching message is discarded.

    • Accept: the matching message is accepted.

    • Account: the matching message is accounted for, i.e. a counter for the rule is incremented. This action can be combined with the previous ones. This feature is useful to monitor traffic before its blocking.

    This requirement is conditional in the following sense: It is required that at least one of the following two statements holds:

    • The Network Product supports the capability described above and this is stated in the product documentation.

    • The Network Product's product documentation states that the capability is not supported and that the Network Product needs to be deployed together with a separate entity which provides the capability described above.

    NOTE 2: Such a separate entity could e.g. be a GTP Firewall.

    NOTE 3: Test cases for this separate entity are not provided in the present document, but are believed to be similar to them.

    NOTE 4: The test cases are only applicable to all network product classes utilizing GTP-C based protocol.

    Test Purpose

    To verify that the network product provides filtering functionalities for incoming GTP-C messages. In particular this test case verifies that:

    1. The network product provides filtering of incoming GTP-C messages on any interface.

    2. It is possible to block all GTP-C messages on those network product interfaces where they are unwanted.

    3. It is possible to specify defined actions for each rule.

    Pre-Conditions
    • The network product has at least two physical interfaces, named if1 and if2.

    • The tester has the privileges to configure GTP-C filtering on the network product.

    • The vendor declares that the GTP-C filtering is supported.

    • The vendor includes a guideline to configure the GTP-C filtering in the documentation accompanying the network product.

    • A network traffic generator or a pcap file containing the GTP-C messages is available.

    • A network traffic analyser on the network product (e.g. tcpdump) is available.

    Execution Steps
    1. The tester log in the network product.

    2. The tester configures the network product with the following rules:

    a. Accept only GTP-C EchoRequest messages on if1.

    b. Discard all GTP-C messages on if2.

    c. For each rule above the accounting is also enabled.

    1. The tester turns on the network traffic analyser on if2.

    2. The tester sends on if2 EchoRequest messages replaying a pcap file or using a network generator.

    a. Using the network analyser the tester verifies that the network product correctly receives the EchoRequest messages on if2.

    b. Using the accounting, the tester verifies that the messages are discarded and that any response is sent back by the network product.

    1. The tester sends to if1 EchoRequest messages replaying a pcap file or using a network generator.

    a. Using the network analyser, the tester verifies that the messages are correctly received by the network product.

    b. The tester verifies that the GTP-C EchoRequest messages are not discarded because EchoResponse messages are sent back by the network product.

    1. The tester verifies that the matching messages are correctly accounted for both rules.

    2. The tester sends to if1 GTP-C messages different from EchoRequest replaying a pcap file or using a network generator.

    a. Using the network analyser, the tester verifies that the messages are correctly received by the network product.

    b. Using the accounting, the tester verifies that the messages are discarded and that any response is sent back by the network product.

    1. The tester deletes the previous rules and configures a new rule, i.e. to accept only GTP-C EchoRequest on if1 coming from a certain IP Address named IP1.

    2. The tester sends GTP-C EchoRequest messages with source IP Address set to IP1:

    a. Using the network analyser, the tester verifies that the messages are correctly received by the network product.

    b. The tester verifies that the GTP-C EchoRequest messages are not discarded and EchoResponse messages are sent back by the network product.

    1. The tester sends GTP-C EchoRequest messages with source IP Address set to IP2 different from IP1 using a network traffic generator or replaying a pcap file.

    a. Using the network analyser the tester verifies that the messages are correctly received by the network product.

    b. The tester verifies that the GTP-C EchoRequest messages are discarded and that no EchoResponse messages are sent back.

    Expected Results
    • For steps 4, 5, 6 and 7 the tester receives GTP-C EchoResponse messages from if1 only.

    • For steps 4, 5, 6 and 7 the messages matching the rules are correctly accounted.

    • For steps 8, 9, 10 the tester receives GTP-C EchoResponse messages only for the authorized source IP address.

    Expected Format of Evidence
    • The used tool(s) name and version information

    • Settings and configurations used

    • Pcap trace

    • Screenshot

    PDFs ae606a22d785811e0255699b3e8e4911

    4.2.6.2.3 GTP-C Filtering

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_GTP-C_FILTERING
    Threat Reference
    Requirement Name

    GTP-C Filtering

    Requirement Reference
    Requirement Description

    The following capability is conditionally required:

    • For each message of a GTP-C-based protocol, it shall be possible to check whether the sender of this message is authorized to send a message pertaining to this protocol.

    NOTE 1: The check could be performed e.g. against a whitelist or blacklist of permitted message type / sender identity combinations.

    • At least the following actions should be supported when the check is satisfied:

    • Discard: the matching message is discarded.

    • Accept: the matching message is accepted.

    • Account: the matching message is accounted for, i.e. a counter for the rule is incremented. This action can be combined with the previous ones. This feature is useful to monitor traffic before its blocking.

    This requirement is conditional in the following sense: It is required that at least one of the following two statements holds:

    • The Network Product supports the capability described above and this is stated in the product documentation.

    • The Network Product's product documentation states that the capability is not supported and that the Network Product needs to be deployed together with a separate entity which provides the capability described above.

    NOTE 2: Such a separate entity could e.g. be a GTP Firewall.

    NOTE 3: Test cases for this separate entity are not provided in the present document, but are believed to be similar to them.

    NOTE 4: The test cases are only applicable to all network product classes utilizing GTP-C based protocol.

    Security Objective references: tba.

    The test case described here apply only when GTP-C filtering is provided on the Network Product itself.

    Test Purpose

    To verify that the network product provides filtering functionalities for incoming GTP-C messages. In particular this test case verifies that:

    1. The network product provides filtering of incoming GTP-C messages on any interface.

    2. It is possible to block all GTP-C messages on those network product interfaces where they are unwanted.

    3. It is possible to specify defined actions for each rule.

    Pre-Conditions
    • The network product has at least two physical interfaces, named if1 and if2.

    • The tester has the privileges to configure GTP-C filtering on the network product.

    • The manufacturer declares that the GTP-C filtering is supported.

    • The manufacturer includes a guideline to configure the GTP-C filtering in the documentation accompanying the network product.

    • A network traffic generator or a pcap file containing the GTP-C messages is available.

    • A network traffic analyser on the network product (e.g. tcpdump) is available.

    Execution Steps
    1. The tester log in the network product.

    2. The tester configures the network product with the following rules:

    a. Accept only GTP-C EchoRequest messages on if1.

    b. Discard all GTP-C messages on if2.

    c. For each rule above the accounting is also enabled.

    1. The tester turns on the network traffic analyser on if2.

    2. The tester sends on if2 EchoRequest messages replying a pcap file or using a network generator.

    a. Using the network analyser the tester verifies that the network product correctly receives the EchoRequest messages on if2.

    b. Using the accounting, the tester verifies that the messages are discarded and that any response is sent back by the network product.

    1. The tester sends to if1 EchoRequest messages replying a pcap file or using a network generator.

    a. Using the network analyser, the tester verifies that the messages are correctly received by the network product.

    b. The tester verifies that the GTP-C EchoRequest messages are not discarded because EchoResponse messages are sent back by the network product.

    1. The tester verifies that the matching messages are correctly accounted for both rules.

    2. The tester sends to if1 GTP-C messages different from EchoRequest replying a pcap file or using a network generator.

    a. Using the network analyser, the tester verifies that the messages are correctly received by the network product.

    b. Using the accounting, the tester verifies that the messages are discarded and that any response is sent back by the network product.

    1. The tester deletes the previous rules and configures a new rule, i.e. to accept only GTP-C EchoRequest on if1 coming from a certain IP Address named IP1.

    2. The tester sends GTP-C EchoRequest messages with source IP Address set to IP1:

    a. Using the network analyser, the tester verifies that the messages are correctly received by the network product.

    b. The tester verifies that the GTP-C EchoRequest messages are not discarded and EchoResponse messages are sent back by the network product.

    1. The tester sends GTP-C EchoRequest messages with source IP Address set to IP2 different from IP1 using a network traffic generator or replying a pcap file.

    a. Using the network analyser the tester verifies that the messages are correctly received by the network product.

    b. The tester verifies that the GTP-C EchoRequest messages are discarded and that no EchoResponse messages are sent back.

    Expected Results
    • For steps 4, 5, 6 and 7 the tester receives GTP-C EchoResponse messages from if1 only.

    • For steps 4, 5, 6 and 7 the messages matching the rules are correctly accounted.

    • For steps 8, 9, 10 the tester receives GTP-C EchoResponse messages only for the authorized source IP address.

    Expected Format of Evidence

    A testing report provided by the testing agency which will consist of the following information:

    • The used tool(s) name and version information

    • Settings and configurations used

    • Pcap trace

    • Screenshot

    Test result (Passed or not)

    PDFs 52b2da4ba599a64b6b2e9252c4dcc7b8

    4.2.6.2.4 GTP-U Filtering

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_GTP-U_FILTERING
    Threat Reference

    TR 33.926 [4] clause 5.3.7, Denial of service

    The test case described here apply only when GTP-U filtering is provided on the Network Product itself.

    Requirement Name

    GTP-U Filtering

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    The following capability is conditionally required:

    • For each message of a GTP-U-based protocol, it shall be possible to check whether the sender of this message is authorized to send a message pertaining to this protocol.

    NOTE 1: The check could be performed e.g. against an allow list or disallow list of permitted message type / sender identity combinations.

    • At least the following actions should be supported when the check is satisfied:

    • Discard: the matching message is discarded.

    • Accept: the matching message is accepted.

    • Account: the matching message is accounted for, i.e. a counter for the rule is incremented. This action can be combined with the previous ones. This feature is useful to monitor traffic before its blocking.

    This requirement is conditional in the following sense: It is required that at least one of the following two statements holds:

    • The Network Product supports the capability described above and this is stated in the product documentation.

    • The Network Product's product documentation states that the capability is not supported and that the Network Product needs to be deployed together with a separate entity which provides the capability described above.

    NOTE 2: Such a separate entity could e.g. be a GTP Firewall.

    NOTE 3: Test cases for this separate entity are not provided in the present document, but are believed to be similar to them.

    NOTE 4: The test cases are only applicable to all network product classes utilizing GTP-U based protocol.

    Test Purpose

    To verify that the network product provides filtering functionalities for incoming GTP-U messages. In particular this test case verifies that:

    1. The network product provides filtering of incoming GTP-U messages on any interface.

    2. It is possible to block all GTP-U messages on those network product interfaces where they are unwanted.

    3. It is possible to specify defined actions for each rule.

    Pre-Conditions
    • The network product has at least one physical interface named if1 and may have another physical interface named if2.

    • The tester has the privileges to configure GTP-U filtering on the network product.

    • The vendor declares that the GTP-U filtering is supported.

    • The vendor includes a guideline to configure the GTP-U filtering in the documentation accompanying the network product.

    • A network traffic generator or a pcap file containing the GTP-U messages is available.

    • A network traffic analyser on the network product (e.g. tcpdump) is available.

    NOTE: If the network product has only one physical interface named if1, execution steps on if2 are not needed.

    Execution Steps
    1. The tester log in the network product.

    2. The tester configures the network product with the following rules:

    a. Accept only GTP-U EchoRequest messages on if1.

    b. Discard all GTP-U messages on if2.

    c. For each rule above the accounting is also enabled.

    1. The tester turns on the network traffic analyser on if2.

    2. The tester sends on if2 EchoRequest messages replaying a pcap file or using a network generator.

    a. Using the network analyser, the tester verifies that the network product correctly receives the EchoRequest messages on if2.

    b. Using the accounting, the tester verifies that the messages are discarded and that any response is sent back by the network product.

    1. The tester sends to if1 EchoRequest messages replaying a pcap file or using a network generator.

    a. Using the network analyser, the tester verifies that the messages are correctly received by the network product.

    b. The tester verifies that the GTP-U EchoRequest messages are not discarded because EchoResponse messages are sent back by the network product.

    1. The tester verifies that the matching messages are correctly accounted for both rules.

    2. The tester sends to if1 GTP-U messages different from EchoRequest replaying a pcap file or using a network generator.

    a. Using the network analyser, the tester verifies that the messages are correctly received by the network product.

    b. Using the accounting, the tester verifies that the messages are discarded and that any response is sent back by the network product.

    1. The tester deletes the previous rules and configures a new rule, i.e. to accept only GTP-U EchoRequest on if1 coming from a certain IP Address named IP1.

    2. The tester sends GTP-U EchoRequest messages with source IP Address set to IP1:

    a. Using the network analyser, the tester verifies that the messages are correctly received by the network product.

    b. The tester verifies that the GTP-U EchoRequest messages are not discarded and EchoResponse messages are sent back by the network product.

    1. The tester sends GTP-U EchoRequest messages with source IP Address set to IP2 different from IP1 using a network traffic generator or replaying a pcap file.

    a. Using the network analyser the tester verifies that the messages are correctly received by the network product.

    b. The tester verifies that the GTP-U EchoRequest messages are discarded and that no EchoResponse messages are sent back.

    Expected Results
    • For steps 4, 5, 6 and 7 the tester receives GTP-U EchoResponse messages from if1 only.

    • For steps 4, 5, 6 and 7 the messages matching the rules are correctly accounted.

    • For steps 8, 9, 10 the tester receives GTP-U EchoResponse messages only for the authorized source IP address.

    Expected Format of Evidence
    • The used tool(s) name and version information

    • Settings and configurations used

    • Pcap trace

    • Screenshot

    PDFs 8bf5f5071ac877230e941871fc0b7aec

    4.2.6.2.4 GTP-U Filtering

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_GTP-U_FILTERING
    Threat Reference
    Requirement Name

    GTP-U Filtering

    Requirement Reference
    Requirement Description

    The following capability is conditionally required:

    • For each message of a GTP-U-based protocol, it shall be possible to check whether the sender of this message is authorized to send a message pertaining to this protocol.

    NOTE 1: The check could be performed e.g. against a whitelist or blacklist of permitted message type / sender identity combinations.

    • At least the following actions should be supported when the check is satisfied:

    • Discard: the matching message is discarded.

    • Accept: the matching message is accepted.

    • Account: the matching message is accounted for, i.e. a counter for the rule is incremented. This action can be combined with the previous ones. This feature is useful to monitor traffic before its blocking.

    This requirement is conditional in the following sense: It is required that at least one of the following two statements holds:

    • The Network Product supports the capability described above and this is stated in the product documentation.

    • The Network Product's product documentation states that the capability is not supported and that the Network Product needs to be deployed together with a separate entity which provides the capability described above.

    NOTE 2: Such a separate entity could e.g. be a GTP Firewall.

    NOTE 3: Test cases for this separate entity are not provided in the present document, but are believed to be similar to them.

    NOTE 4: The test cases are only applicable to all network product classes utilizing GTP-U based protocol.

    Security Objective references: tba.

    The test case described here apply only when GTP-U filtering is provided on the Network Product itself.

    Test Purpose

    To verify that the network product provides filtering functionalities for incoming GTP-U messages. In particular this test case verifies that:

    1. The network product provides filtering of incoming GTP-U messages on any interface.

    2. It is possible to block all GTP-U messages on those network product interfaces where they are unwanted.

    3. It is possible to specify defined actions for each rule.

    Pre-Conditions
    • The network product has at leastone physical interface named if1 and may have another physical interface named if2 .

    • The tester has the privileges to configure GTP-U filtering on the network product.

    • The manufacturer declares that the GTP-U filtering is supported.

    • The manufacturer includes a guideline to configure the GTP-U filtering in the documentation accompanying the network product.

    • A network traffic generator or a pcap file containing the GTP-U messages is available.

    • A network traffic analyser on the network product (e.g. tcpdump) is available.

    NOTE: If the network product has only one physical interface named if1, execution steps on if2 are not needed.

    Execution Steps
    1. The tester log in the network product.

    2. The tester configures the network product with the following rules:

    a. Accept only GTP-U EchoRequest messages on if1.

    b. Discard all GTP-U messages on if2.

    c. For each rule above the accounting is also enabled.

    1. The tester turns on the network traffic analyser on if2.

    2. The tester sends on if2 EchoRequest messages replying a pcap file or using a network generator.

    a. Using the network analyser the tester verifies that the network product correctly receives the EchoRequest messages on if2.

    b. Using the accounting, the tester verifies that the messages are discarded and that any response is sent back by the network product.

    1. The tester sends to if1 EchoRequest messages replying a pcap file or using a network generator.

    a. Using the network analyser, the tester verifies that the messages are correctly received by the network product.

    b. The tester verifies that the GTP-U EchoRequest messages are not discarded because EchoResponse messages are sent back by the network product.

    1. The tester verifies that the matching messages are correctly accounted for both rules.

    2. The tester sends to if1 GTP-U messages different from EchoRequest replying a pcap file or using a network generator.

    a. Using the network analyser, the tester verifies that the messages are correctly received by the network product.

    b. Using the accounting, the tester verifies that the messages are discarded and that any response is sent back by the network product.

    1. The tester deletes the previous rules and configures a new rule, i.e. to accept only GTP-U EchoRequest on if1 coming from a certain IP Address named IP1.

    2. The tester sends GTP-U EchoRequest messages with source IP Address set to IP1:

    a. Using the network analyser, the tester verifies that the messages are correctly received by the network product.

    b. The tester verifies that the GTP-U EchoRequest messages are not discarded and EchoResponse messages are sent back by the network product.

    1. The tester sends GTP-U EchoRequest messages with source IP Address set to IP2 different from IP1 using a network traffic generator or replying a pcap file.

    a. Using the network analyser the tester verifies that the messages are correctly received by the network product.

    b. The tester verifies that the GTP-U EchoRequest messages are discarded and that no EchoResponse messages are sent back.

    Expected Results
    • For steps 4, 5, 6 and 7 the tester receives GTP-U EchoResponse messages from if1 only.

    • For steps 4, 5, 6 and 7 the messages matching the rules are correctly accounted.

    • For steps 8, 9, 10 the tester receives GTP-U EchoResponse messages only for the authorized source IP address.

    Expected Format of Evidence

    A testing report provided by the testing agency which will consist of the following information:

    • The used tool(s) name and version information

    • Settings and configurations used

    • Pcap trace

    • Screenshot

    Test result (Passed or not)

    PDFs 27191524c7ec431b54a21ca4b43f4466

    4.3.2.1 No unnecessary or insecure services / protocols

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_NO_UNNECESSARY_SERVICE
    Threat Reference

    TR 33.926 [4], clause 5.3.7.3, Insecure Network Services

    Requirement Name

    No unnecessary or insecure services / protocols

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    The network product shall only run protocol handlers and services which are needed for its operation, and which do not have any known security vulnerabilities. In particular, by default the following services shall be initially configured to be disabled on the network product by the vendor except if services are needed during deployment. In that case those services shall be disabled according to vendor's instructions after deployment is done. Disabled protocols can still be enabled for other reasons by the network operators, e.g. remote diagnostics.

    • FTP

    • TFTP

    • Telnet

    • rlogin, RCP, RSH

    • HTTP

    • SNMPv1 and v2

    • SSHv1

    • TCP/UDP Small Servers (Echo, Chargen, Discard and Daytime)

    • Finger

    • BOOTP server

    • Discovery protocols (CDP, LLDP)

    • IP Identification Service (Identd)

    • PAD

    • MOP

    NOTE 1: As an alternative to disabling the HTTP service, it is also possible for this service to remain active for reasons of user friendliness. In this case, however, queries to the web service are not answered directly on this port but from a redirected to HTTPS service.

    Note 2: Full documentation of required protocols and services of the network product and their purpose needs to be provided by the vendor as prerequisite for the test case.

    Test Purpose

    To ensure that on all network interfaces, there are no unsecure services or protocols that might be running.

    Pre-Conditions

    A list of all required network protocols and services containing at least the following information shall be included in the documentation accompanying the Network Product:

    • protocol handlers and services needed for the operation of network product;

    • their open ports and associated services;

    • and a description of their purposes.

    The tool used shall be capable to detect and identify the protocol handlers and running services in the system.

    Execution Steps
    1. Verification of the compliance to the prerequisites:

    a. Verification that the list of available network services and protocol handlers is available in the documentation of the Network Product.

    b. Validation that all entries in the list are necessary for the operation of the Network Product class.

    1. Identification of the network services and protocol handlers by means of tools or any other testing means.

    2. Validation that there are no entries in the list of available network services and handlers apart from the ones that have been mentioned for the operation of the Network Product in the attached documentation.

    3. The tester shall reboot the network product and re-execute execution steps 2 and 3 without further configuration.

    Expected Results

    The report will contain:

    • The names and version of the tool(s) used.

    • Information of all the protocol handlers and services running in the network product.

    Result will show:

    • There are no unnecessary services running in the network product except for the ones which are necessary for its operation.

    • Any undocumented services running on the network product should be highlighted and brought out in the report.

    • The network product behaves the same after reboot as before.

    Expected Format of Evidence
    • The used tool(s) name and version information;

    • Settings and configurations, and commands used (if applicable);

    • The output pertaining to the test case performed and

    • The test results i.e. services existing or not existing in the Network Product.

    PDFs c6d419054df3daf22a43466d03920d50

    4.3.2.1 No unnecessary or insecure services / protocols

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_NO_UNNECESSARY_SERVICE
    Threat Reference
    Requirement Name

    No unnecessary or insecure services / protocols

    Requirement Reference
    Requirement Description

    The network product shall only run protocol handlers and services which are needed for its operation, and which do not have any known security vulnerabilities. In particular, by default the following services shall be initially configured to be disabled on the network product by the vendor except if services are needed during deployment. In that case those services shall be disabled according to vendor's instructions after deployment is done. Disabled protocols may still need to be enabled for other reasons by the operators, e.g. remote diagnostics.

    • FTP

    • TFTP

    • Telnet

    • rlogin, RCP, RSH

    • HTTP

    • SNMPv1 and v2

    • SSHv1

    • TCP/UDP Small Servers (Echo, Chargen, Discard and Daytime)

    • Finger

    • BOOTP server

    • Discovery protocols (CDP, LLDP)

    • IP Identification Service (Identd)

    • PAD

    • MOP

    NOTE 1: As an alternative to disabling the HTTP service, it is also possible for this service to remain active for reasons of user friendliness. In this case, however, queries to the web service may not be answered directly on this port but from a redirected to HTTPS service.

    Note 2: Full documentation of required protocols and services of the network product and their purpose needs to be provided by the vendor as prerequisite for the test case.

    TBA

    Test Purpose

    To ensure that on all network interfaces, there are no unsecure services or protocols that might be running.

    Pre-Conditions

    A list of all required network protocols and services containing at least the following information shall be included in the documentation accompanying the Network Product:

    • protocol handlers and services needed for the operation of network product;

    • their open ports and associated services;

    • and a description of their purposes.

    The tool used shall be capable to detect and identify the protocol handlers and running services in the system.

    Execution Steps

    The accredited evaluator's test lab is required to execute the following steps:

    1. Verification of the compliance to the prerequisites:

    a. Verification that the list of available network services and protocol handlers is available in the documentation of the Network Product.

    b. Validation that all entries in the list are meaningful and reasonably necessary for the operation of the Network Product class.

    1. Identification of the network services and protocol handlers by means of capable tools or any other suitable testing means.

    2. Validation that there are no entries in the list of network services and handlers apart from the ones that have been mentioned and deemed necessary for the operation of the Network Product in the attached documentation.

    3. The tester shall reboot the network product and re-execute execution steps 2 and 3 without further configuration.

    Expected Results

    The report will contain:

    • The names and version of the tool(s) used.

    • Information of all the protocol handlers and services running in the network product.

    Result will show:

    • There are no unnecessary services running in the network product except for the ones which are deemed necessary for its operation.

    • Any undocumented services running on the network product should be highlighted and brought out in the report.

    • The network product behaves the same after reboot as before.

    Expected Format of Evidence

    A report provided by the testing agency which will consist of the following information:

    • The used tool(s) name and version information

    • Settings and configurations used

    • The output pertaining to the test case performed and

    • The test results i.e. services existing or not existing in the MME

    PDFs 0fbf2b7b30fcd038e35c8bee71a35dc8

    4.3.2.2 Restricted reachability of services

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_RESTRICTED_REACHABILITY_OF_SERVICES
    Threat Reference

    TR 33.926 [4], clause 5.3.7.3, Insecure Network Services

    Requirement Name

    Restricted reachability of services

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    The network product shall restrict the reachability of services so that they can only be reached on interfaces where their usage is required. On interfaces where services are active, the reachability should be limited to legitimate communication peers. This limitation shall be realized on the network product itself (without measures (e.g. firewall) at network side) according to the requirement detailed in clause 4.2.6.2.1 Packet Filtering.

    Example: Administrative services (e.g. SSH, HTTPS, RDP) shall be restricted to interfaces in the management network to support separation of management traffic from user traffic.

    Test Purpose

    To verify that it is possible to bind the services only to the interfaces from which they are expected to be reachable.

    Note: The test case developed for the requirement " 4.2.6.2.1 Packet Filtering" implicitly verifies that the network product permits to limit the reachability of the services only to legitimate communication peers,

    Pre-Conditions
    • The vendor shall declare, in the documentation accompanying the network product if the network product supports the capability to restrict services reachability to only the nodes authorized to access them. In this case, the vendor shall detail how this capability can be configured.

    • A list of all required network protocols and services containing at least the following information shall be included in the documentation accompanying the Network Product:

    • protocol handlers and services needed for the operation of network product;

    • their open ports and associated services;

    • the configuration options;

    • and a description of their purposes.

    • The network product is configured such that the required network protocols and services (as described in the network product documentation) are setup and each service is bound to an IP address of a specific network interface (e.g. IP1 which is the ip address of if1). Configuration may occur automatically during the initialization phase of the network product or manually as defined in the network product administration documentation.

    • The network product shall have at least two interfaces enabled, if1 and if2 respectively configured with IP Address IP1 and IP2.

    • The tester has administrative privileges.

    • A tester machine equipped with a network port scanner tool is available.

    Execution Steps

    For every available interface if_n:

    1. The tester runs a network port scanner (e.g. nmap) or uses local network interface information on if_n and verifies that the configured services (according to the vendor documentation) are open/reachable.

    2. The tester runs a network port scanner (e.g. nmap) or uses local network interface information on all other available interfaces (except if_n) and verifies that the services configured for if_n are not open/reachable.

    NOTE: It might not be possible for certain transport layer protocols (like UDP) to unambiguously detect whether a port is open or not by means of external port scanning. Also, external port scanning can be ineffective, if there are security measures present, e.g. like rate limiting. Local port discovery (e.g. with netstat, ss) in collaboration with collection of local route information (e.g. with ip route) could be applied in those cases.

    Expected Results

    Services can be enabled on per-interface basis.

    Expected Format of Evidence
    • The network product configuration showing the mapping between interfaces and configured service.

    • Pcap files.

    • Screenshot.

    • Software name and version of the used port scanner, log of the executed commands.

    • Network port scanner results (e.g. files containing this results).

    PDFs ddeb4103df65cb1679e1951410c861ee

    4.3.2.2 Restricted reachability of services

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name
    TC_RESTRICTED_ REACHABILITY _OF_SERVICES
    Threat Reference
    Requirement Name

    The network product shall restrict the reachability of services

    Requirement Reference
    Requirement Description

    The network product shall restrict the reachability of services so that they can only be reached on interfaces where their usage is required. On interfaces were services are active, the reachability should be limited to legitimate communication peers. This limitation shall be realized on the network product itself (without measures (e.g. firewall) at network side) according to the requirement detailed in clause 4.2.6.2.1 Packet Filtering.

    Example: Administrative services (e.g. SSH, HTTPS, RDP) shall be restricted to interfaces in the management network to support separation of management traffic from user traffic.

    Test Purpose

    To verify that it is possible to bind the services only to the interfaces from which they are expected to be reachable.

    Note: The test case developed for the requirement " 4.2.6.2.1 Packet Filtering" implicitly verifies that the network product permits to limit the reachability of the services only to legitimate communication peers,

    Pre-Conditions
    • The vendor shall declare, in the documentation accompanying the network product if the network product supports the capability to restrict services reachability to only the nodes authorized to access them. In this case, the vendor shall detail how this capability can be configured.

    • A list of all required network protocols and services containing at least the following information shall be included in the documentation accompanying the Network Product:

    • protocol handlers and services needed for the operation of network product;

    • their open ports and associated services;

    • the configuration options;

    • and a description of their purposes.

    • The network product is configured such that the required network protocols and services (as described in the network product documentation) are setup and each service is bound to an IP address of a specific network interface (e.g. IP1 which is the ip address of if1). Configuration may occur automatically during the initialization phase of the network product or manually as defined in the network product administration documentation.

    • The network product shall have at least two interfaces enabled, if1 and if2 respectively configured with IP Address IP1 and IP2.

    • The tester has administrative privileges.

    • A tester machine equipped with a network port scanner tool is available.

    Execution Steps

    For every available interface if_n:

    1. The tester runs a network port scanner (e.g. nmap) or uses local network interface information on if_n and verifies that the configured services (according to the vendor documentation) are open/reachable.

    2. The tester runs a network port scanner (e.g. nmap) or uses local network interface information on all other available interfaces (except if_n) and verifies that the services configured for if_n are not open/reachable.

    NOTE: It might not be possible for certain transport layer protocols (like UDP) to unambiguously detect whether a port is open or not by means of external port scanning. Also, external port scanning can be ineffective, if there are security measures present, e.g. like rate limiting. Local port discovery (e.g. with netstat, ss) in collaboration with collection of local route information (e.g. with ip route) could be applied in those cases.

    Expected Results

    Services can be enabled on per-interface basis.

    Expected Format of Evidence

    A testing report provided by the testing agency which will consist of the following information:

    • The network product configuration showing the mapping between interfaces and configured service.

    • Pcap files.

    • Screenshot.

    • Software name and version of the used port scanner, log of the executed commands.

    • Network port scanner results (e.g. files containing this results).

    • Test result (Passed or not).

    PDFs 01f6fa246eaae4d363dace2ce775eb28

    4.3.2.3 No unused software

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_NO_UNUSED_SOFTWARE
    Threat Reference

    TR 33.926 [4], clause 5.3.6.13, Unnecessary Applications

    Requirement Name

    No unused software

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    Unused software components or parts of software which are not needed for operation or functionality of the network product shall not be installed or shall be deleted after installation. This includes also parts of a software, installed as examples but typically not be used (e.g. default web pages, example databases, test data).

    Test Purpose

    To ensure that there is no unused software or associated components that might be installed in the network product which are not required for its operation or functionality.

    Pre-Conditions

    A list of all available software and libraries and associated components containing at least the following information shall be included in the documentation accompanying the Network Product:

    • name of the software / library;

    • version of the software / library installed;

    • list of dependencies and versions;

    • any add-ons and functions;

    • any special hardware/debugging ports;

    • software support type;

    • licensing information;

    • brief description of their purpose.

    Execution Steps
    1. The tester verifies that the list of software is available in the documentation of the Network Product and is compliant to the prerequisites, e.g. completeness of the information.

    2. The tester identifies the software / libraries or components which are installed in the system using any command line tools or any means of determination.

    NOTE 1: The identification of software could be done by, e.g. consulting the package manager of the OS/distribution (e.g. apt, dpkg, rpm, pacman, flatpack, snap...) and package managers of available runtimes (e.g. pip (Python), npm (JavaScript), composer (PHP)...), scanning for executables (global or focused on PATH variable of all available users), scanning for script files related to the available interpreters or listing images and their dependencies when virtualization or containerization is used.

    1. The tester validates that there are no entries in the list of software / libraries installed in the system apart from the ones that have been mentioned and deemed necessary for the operation of the network product in the attached documentation.

    2. The tester checks for default configuration or example files mentioned in the software documentation or evident in the file system for the software installed on the system.

    Expected Results

    The report will contain the names and version of the tool(s) used for finding out what software /libraries is installed in the system. The detailed report will contain the name and version information of all the software / libraries installed in the system generated by the tool.

    The list of all available software / libraries which has been deemed necessary for the operation of the network product by the vendor shall also be included as the test result. Any software / library not in the list of allowed software / libraries will be highlighted and brought out as a part of the report.

    There should be no unnecessary software / library installed in the network product except for the ones which are deemed necessary for its operation.

    There should be no more default example files for the installed software on the system.

    Expected Format of Evidence
    • The used tool(s) name and version information,

    • Settings and configurations used

    • the output pertaining to the test case performed and,

    • the test results i.e. list of allowed and disallowed software

    PDFs c4c3b545441a75975b087eb3ce20b5bb

    4.3.2.3 No unused software

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_NO_UNUSED_SOFTWARE
    Threat Reference
    Requirement Name

    Unused software shall not be installed or shall be uninstalled

    Requirement Reference
    Requirement Description

    Unused software components or parts of software which are not needed for operation or functionality of the network product shall not be installed or shall be deleted after installation. This includes also parts of a software, which will be installed as examples but typically not be used (e.g. default web pages, example databases, test data).

    Test Purpose

    To ensure that there is no unused software or associated components that might be installed in the network product which are not required for its operation or functionality.

    Pre-Conditions

    A list of all available software and libraries and associated components containing at least the following information shall be included in the documentation accompanying the Network Product:

    • name of the software / library;

    • version of the software / library installed;

    • list of dependencies and versions;

    • any add-ons and functions;

    • any special hardware/debugging ports;

    • software support type;

    • licensing information;

    • brief description of their purpose.

    Execution Steps

    The accredited evaluator's test lab is required to execute the following steps:

    1. Verification of the compliance to the prerequisites:

    a. Verification that the list of software / libraries and components is available in the documentation of the Network Product.

    b. Validation that all entries in the list of software / libraries and components are meaningful and reasonably necessary for the operation of the Network Product class.

    1. Identification of the software / libraries or components which are installed in the system using any suitable command line tools or any other suitable means of determination.

    2. Validation that there are no entries in the list of software / libraries installed in the system apart from the ones that have been mentioned and deemed necessary for the operation of the network product in the attached documentation.

    3. Based on his/her experience, the tester will check for known default example files for software installed on the system.

    NOTE 1: The identification of software could be done by, e.g. consulting the package manager of the OS/distribution (e.g. apt, dpkg, rpm, pacman, flatpack, snap...) and package managers of available runtimes (e.g. pip (Python), npm (JavaScript), composer (PHP)...), scanning for executables (global or focused on PATH variable of all available users), scanning for script files related to the available interpreters or listing images and their dependencies when virtualization or containerization is used.

    1. The tester validates that there are no entries in the list of software / libraries installed in the system apart from the ones that have been mentioned and deemed necessary for the operation of the network product in the attached documentation.

    2. The tester checks for default configuration or example files mentioned in the software documentation or evident in the file system for the software installed on the system.

    Expected Results

    The report will contain the names and version of the tool(s) used for finding out what software /libraries is installed in the system. The detailed report will contain the name and version information of all the software / libraries installed in the system generated by the tool.

    The list of all available software / libraries which has been deemed necessary for the operation of the network product by the vendor shall also be included as the test result. Any software / library not in the list of allowed software / libraries will be highlighted and brought out as a part of the report.

    There should be no unnecessary software / library installed in the network product except for the ones which are deemed necessary for its operation.

    There should be no more default example files for the installed software on the system.

    Expected Format of Evidence

    A testing report provided by the testing agency which will consist of the following information:

    • The used tool(s) name and version information,

    • Settings and configurations used

    • the output pertaining to the test case performed and,

    • the test results i.e. list of allowed and disallowed software

    PDFs a1dca0eb03ef4da6c160a5515f6b9034

    4.3.2.4 No unused functions

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_NO_UNUSED_FUNCTIONS
    Threat Reference

    TR 33.926 [4], clause 5.3.6.13, Unnecessary Applications

    Requirement Name

    No unused functions.

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    During installation of software and hardware often functions are activated that are not required for operation or function of the system. If unused functions of software cannot be deleted or deinstalled individually as required in clause "4.3.2.3 No unused software" of the present document, such functions shall be deactivated in the configuration of the network product permanently. Also, hardware functions which are not required for operation or function of the system (e.g. unused interfaces) shall be permanently deactivated. Permanently means that they shall not be reactivated again after network product reboot.

    NOTE 1: A function within the scope of this test case is a hardware, software or operating system functionality present in the network product under test. It is therefore distinct from the 3GPP defined network function, which the network product provides in accordance with the design objectives from TS 23.501 [18] and TS 33.501 [10]. Examples of functions in the sense of this test are modules used in webservers, debugging functionality or software and hardware interfaces for network communication like Bluetooth ®.

    Test Purpose

    To ensure that all active hardware functions or software functions are explicitly required for operation or functionality of the network product.

    Pre-Conditions

    NOTE 2: If the network product under test is pure software, the hardware aspects of this test case do not apply.

    A list of all available software or hardware and associated components containing at least the following information shall be included in the documentation accompanying the Network Product:

    • name of the software or hardware;

    • version of the software or hardware installed;

    • list of dependencies and versions;

    • any add-ons and functions;

    • any special hardware/debugging ports;

    • software or hardware support type;

    • licensing information;

    • requirement during functioning of system;

    • brief description of their purpose.

    Execution Steps
    1. The tester verifies that the list of hardware functions and software functions is available in the documentation of the Network Product.

    2. The tester identifies the hardware functions and software functions which are installed in the system or might have been disabled using any command line tools or any means of determination.

    NOTE 3: The identification of software could be done by, e.g. consulting the package manager of the OS/distribution (e.g. apt, dpkg, rpm, pacman, flatpack, snap...) and package managers of available runtimes (e.g. pip (Python), npm (JavaScript), composer (PHP)...), scanning for executables (global or focused on PATH variable of all available users), scanning for script files related to the available interpreters or listing images and their dependencies when virtualization or containerization is used.

    NOTE 4: The identification of hardware could be done by, e.g. consulting any type of device manager or hardware information tool (e.g. hwinfo, inxi, lshw, lspci, lscpu, lsusb...).

    1. The tester validates that there are no entries in the list of hardware functions and software functions installed in the system apart from the ones that have been mentioned and deemed necessary for the operation of the network product in the attached documentation.
    Expected Results

    The report will contain the names and version of the tool(s) used for finding out what software functions or hardware functions are installed in the system. The detailed report will contain the name and version information of all the software components or hardware components installed in the system generated by the test tool.

    The list of all available software functions and hardware functions which has been deemed necessary for the operation of the network product by the vendor shall also be included as the test result. Any software functions or hardware function not in the list of allowed software functions or hardware functions will be highlighted and brought out as a part of the report.

    There should be no unused function that is not deactivated in the network product except for the ones which are deemed necessary for its operation.

    Expected Format of Evidence
    • The used tool(s) name and version information

    • Settings and configurations used

    • The list of software functions and hardware functions

    • the test results i.e. allowed list of functions

    PDFs ecebfa9fa7bee62b1a0b1b5e18b2b501

    4.3.2.4 No unused functions

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_NO_UNUSED_FUNCTIONS
    Threat Reference
    Requirement Name

    Unused functions of the network products' software and hardware shall be deactivated.

    Requirement Reference
    Requirement Description

    During installation of software and hardware often functions will be activated that are not required for operation or function of the system. If unused functions of software cannot be deleted or deinstalled individually as required in clause "5.3.2.3 No unused software" of the present document, such functions shall be deactivated in the configuration of the network product permanently.

    Also hardware functions which are not required for operation or function of the system (e.g. unused interfaces) shall be permanently deactivated. Permanently means that they shall not be reactivated again after network product reboot.

    Example: A debugging function in software which can be used for troubleshooting shall not be activated during normal operation of the network product.

    Test Purpose

    To ensure that there is no unused hardware or software functions that are not deactivated in the network product which are not required for its operation or functionality.

    Pre-Conditions

    A list of all available software and associated components containing at least the following information shall be included in the documentation accompanying the Network Product:

    • name of the software;

    • version of the software installed;

    • list of dependencies and versions;

    • any add-ons and functions;

    • any special hardware/debugging ports;

    • software support type;

    • licensing information;

    • requirement during functioning of system;

    • brief description of their purpose.

    Execution Steps

    The accredited evaluator's test lab is required to execute the following steps:

    1. Identification of the hardware and software functions which are installed in the system or might have been disabled using any suitable command line tools or any other suitable means of determination.

    2. Validate that there are no entries in the list of hardware and software functions installed in the system apart from the ones that have been mentioned and deemed necessary for the operation of the network product in the attached documentation.

    NOTE 3: The identification of software could be done by, e.g. consulting the package manager of the OS/distribution (e.g. apt, dpkg, rpm, pacman, flatpack, snap...) and package managers of available runtimes (e.g. pip (Python), npm (JavaScript), composer (PHP)...), scanning for executables (global or focused on PATH variable of all available users), scanning for script files related to the available interpreters or listing images and their dependencies when virtualization or containerization is used.

    NOTE 4: The identification of hardware could be done by, e.g. consulting any type of device manager or hardware information tool (e.g. hwinfo, inxi, lshw, lspci, lscpu, lsusb...).

    1. The tester validates that there are no entries in the list of hardware functions and software functions installed in the system apart from the ones that have been mentioned and deemed necessary for the operation of the network product in the attached documentation.
    Expected Results

    The report will contain the names and version of the tool(s) used for finding out what software and associated function is installed in the system. The detailed report will contain the name and version information of all the software and components installed in the system generated by the test tool.

    The list of all available software which has been deemed necessary for the operation of the network product by the vendor shall also be included as the test result. Any software not in the list of allowed software will be highlighted and brought out as a part of the report.

    There should be no unused function that is not deactivated in the network product except for the ones which are deemed necessary for its operation.

    Expected Format of Evidence

    A testing report provided by the testing agency which will consist of the following information:

    • The used tool(s) name and version information

    • Settings and configurations used

    • The list of software and associated functions

    • the test results i.e. allowed list of functions

    PDFs 473789e2a4397b436175d0d01c2b487c

    4.3.2.5 No unsupported components

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_NO_UNSUPPORTED_COMPONENTS
    Threat Reference

    TR 33.926 [4], clause 5.3.6.13, Unnecessary Applications

    Requirement Name

    No unsupported components.

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    The network product shall not contain software and hardware components that are no longer supported by their vendor, manufacturer or developer, such as components that have reached end-of-life or end-of-support. Excluded are components that have a special support contract. This contract shall guarantee the correction of vulnerabilities over components' lifetime.

    Test Purpose

    To ensure that all software and hardware components running in the network product are still supported and have not reached either their end-of-life or end-of-support.

    Pre-Conditions

    NOTE 1: If the network product under test is pure software, the hardware aspects of this test case do not apply.

    A list of all available software and associated components containing at least the following information shall be included in the documentation accompanying the Network Product:

    • name of the software or hardware component;

    • version of the software installed;

    • list of dependencies and versions;

    • any add-ons and functions;

    • any special hardware/debugging ports;

    • software support type;

    • licensing information;

    • requirement during functioning of system;

    • brief description of their purpose.

    Execution Steps
    1. The tester identifies the hardware and software components available in the network product, version information and the kind of support available for the software provided by the vendor, the manufacturer, the developer or other contractual partner of the network operator using any tool or any means of determination.

    NOTE 2: The identification of software could be done by, e.g. consulting the package manager of the OS/distribution (e.g. apt, dpkg, rpm, pacman, flatpack, snap...) and package managers of available runtimes (e.g. pip (Python), npm (JavaScript), composer (PHP)...), scanning for executables (global or focused on PATH variable of all available users), scanning for script files related to the available interpreters or listing images and their dependencies when virtualization or containerization is used.

    NOTE 3: The identification of hardware could be done by, e.g. consulting any type of device manager or hardware information tool (e.g. hwinfo, inxi, lshw, lspci, lscpu, lsusb...).

    1. The tester validates that there are no entries in the list of hardware and software installed in the system which are not supported as given by the vendor of network product in the attached documentation.
    Expected Results

    The report will contain the names and versions of the tool(s) used for finding out what software and hardware components are installed in the system. The detailed report will contain the name and version of the software and hardware used in the system, and the period of support for each of these components.

    The list of all available software and hardware components and their associated support information which has been deemed necessary for the operation of the network product by the vendor shall also be included as the test result. Any software or component which is not supported any longer by the vendor will be highlighted and brought out as a part of the report.

    There should be no software installed in the network product which is unsupported as of the day of testing.

    Expected Format of Evidence
    • The used tool(s) name and version information

    • Software and hardware components used in the network product

    • the test results i.e. support information of each listing

    PDFs dab142b80a78a2ea32ba00d277894fef

    4.3.2.5 No unsupported components

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_NO_UNSUPPORTED_COMPONENTS
    Threat Reference
    Requirement Name

    The network product shall not contain software and hardware components that are no longer supported by their vendor, producer or developer.

    Requirement Reference
    Requirement Description

    The network product shall not contain software and hardware components that are no longer supported by their vendor, producer or developer, such as components that have reached end-of-life or end-of-support. Excluded are components that have a special support contract. This contract shall guarantee the correction of vulnerabilities over components' lifetime.

    Test Purpose

    To ensure that there is no unsupported software that is running in the network product which is not supported anymore and has reached its end-of-life or end-of-support.

    Pre-Conditions

    NOTE 1: If the network product under test is pure software, the hardware aspects of this test case do not apply.

    A list of all available software and associated components containing at least the following information shall be included in the documentation accompanying the Network Product:

    • name of the software;

    • version of the software installed;

    • list of dependencies and versions;

    • any add-ons and functions;

    • any special hardware/debugging ports;

    • software support type;

    • licensing information;

    • requirement during functioning of system;

    • brief description of their purpose.

    Execution Steps

    The accredited evaluator's test lab is required to execute the following steps:

    1. Identification of the hardware and software components, version information and the kind of support available for the software provided by the vendor, the producer, the developer or other contractual partner of the operator using any tool or any other suitable means of determination.

    2. Validate that there are no entries in the list of hardware and software installed in the system which are not supported as given by the vendor of network product in the attached documentation.

    NOTE 2: The identification of software could be done by, e.g. consulting the package manager of the OS/distribution (e.g. apt, dpkg, rpm, pacman, flatpack, snap...) and package managers of available runtimes (e.g. pip (Python), npm (JavaScript), composer (PHP)...), scanning for executables (global or focused on PATH variable of all available users), scanning for script files related to the available interpreters or listing images and their dependencies when virtualization or containerization is used.

    NOTE 3: The identification of hardware could be done by, e.g. consulting any type of device manager or hardware information tool (e.g. hwinfo, inxi, lshw, lspci, lscpu, lsusb...).

    1. The tester validates that there are no entries in the list of hardware and software installed in the system which are not supported as given by the vendor of network product in the attached documentation.
    Expected Results

    The report will contain the names and versions of the tool(s) used for finding out what software and hardware components are installed in the system. The detailed report will contain the name and version of the software and hardware used in the system, and the period of support for each of these components.

    The list of all available software and hardware components and their associated support information which has been deemed necessary for the operation of the network product by the vendor shall also be included as the test result. Any software or component which is not supported any longer by the vendor will be highlighted and brought out as a part of the report.

    There should be no software installed in the network product which is unsupported as of the day of testing.

    Expected Format of Evidence

    A testing report provided by the testing agency which will consist of the following information:

    • The used tool(s) name and version information

    • Software and hardware components used in the network product

    • the test results i.e. support information of each listing

    PDFs b93056864db14301111ac688dd9f3b42

    4.3.2.6 Remote login restrictions for privileged users

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_REMOTE_LOGIN_RESTRICTIONS_PRIVILEGED_USERS
    Threat Reference

    TR 33.926 [4], clause 5.3.8.1, Misuse by authorized users

    Requirement Name

    Remote login restrictions for privileged users

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    Direct login as root or equivalent highest privileged user shall be limited to the system console only. Root user will not be allowed to login to the system remotely.

    Test Purpose

    Verify that root or equivalent highest privileged user will not be allowed to login to the system remotely.

    Pre-Conditions

    A document that describes the interfaces to the network product and how the tester can login to them remotely.

    Execution Steps
    1. The tester tries to remotely login to the network product using the credentials of the root or equivalent highest privileged user via the interfaces as described in the documentation.

    2. The tester tries to login to the network product using the credentials of the root or equivalent highest privileged user from the physical console of the system.

    Expected Results

    The tester is not able to login to the system remotely using the root or equivalent highest privileged user credentials.

    The tester is able to login to the system from the physical console using the root or equivalent highest privileged user credentials.

    Expected Format of Evidence

    Evidence containing the operational results as, e.g. screenshots, log files, packet captures, error messages.

    PDFs 337115d11c26abc83acd09a689bb639a

    4.3.2.6 Remote login restrictions for privileged users

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_REMOTE_LOGIN_RESTRICTIONS_PRIVILEGED_USERS
    Threat Reference
    Requirement Name

    Remote login restrictions for privileged users

    Requirement Reference
    Requirement Description

    Direct login as root or equivalent highest privileged user shall be limited to the system console only. Root user will not be allowed to login to the system remotely.

    Test Purpose

    Verify that root or equivalent highest privileged user will not be allowed to login to the system remotely.

    Pre-Conditions

    A document that describes the interfaces to the network product and how the tester can login to them remotely.

    Execution Steps

    Execute the following steps:

    1. The tester tries to remotely login to the network product using the credentials of the root or equivalent highest privileged user via the interfaces as described in the documentation.

    2. The tester tries to login to the network product using the credentials of the root or equivalent highest privileged user from the physical console of the system.

    Expected Results

    The tester is not able to login to the system remotely using the root credentials.

    The tester is able to login to the system from the physical console using the root credentials.

    Expected Format of Evidence

    A Pass/Fail result.

    PDFs 4c9c6037d08a17211b22682daaa3a26b

    4.3.2.7 Filesystem Authorization privileges

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_FILESYSTEM_AUTHORIZATION_PRIVILEGES
    Threat Reference

    TR 33.926 [4], clause 5.3.8.3, Folder Write Permission Abuse

    Requirement Name

    Filesystem Authorization privileges.

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    The system shall enforce file system permissions for users such that it only permits a users to modify files, data, directories or file systems for which they have been authorized. These file system authorizations on the network product shall be configured according to the vendor documentation.

    EXAMPLE: On Unix® systems a 'sticky' bit may be set on all directories where all users have write permissions. This ensures that only the file's owner, the directory's owner, or root user can rename or delete the file. Without the sticky bit being set, any user that has write and execute permissions for the directory can rename or delete files within the directory, regardless of the file's owner.

    Test Purpose

    Verify that users are only permitted to modify files, data, directories or file systems for which they have been authorized according to the vendor documentation.

    Pre-Conditions

    A document describing how access control is configured for the filesystems in the network product shall be provided by the vendor.

    Execution Steps
    1. The tester checks that OS-level permissions are configured correctly according to the vendor documentation for users that are authorized to modify files, data, directories or file systems on the system.

    2. The tester logs into the network product under test with a valid user account (not the system administrator, e.g. root user on UNIX®).

    3. The tester tries to modify at least one file and directory for which the user has the necessary privileges.

    4. The tester tries to modify at least one file and directory for which the user doesn't have the necessary privileges.

    Expected Results

    The OS-level access permissions are set correctly for the users according to the vendor documentation.

    The chosen user can only modify files, data, directories or file systems for which they have the necessary privileges to do so.

    Expected Format of Evidence

    Screenshot or part of the configuration file/console output showing the OS-level permissions are set correctly.

    Screenshot or terminal output of file and directory modification attempts.

    PDFs e1b5b9597d1e43bd1a2745b10ffe9f1d

    4.3.2.7 Filesystem Authorization privileges

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_FILESYSTEM_AUTHORIZATION_PRIVILEGES
    Threat Reference
    Requirement Name

    Filesystem Authorization privileges.

    Requirement Reference
    Requirement Description

    The system shall be designed to ensure that only users that are authorized to modify files, data, directories or file systems have the necessary privileges to do so.

    EXAMPLE: On unix® systems a 'sticky' bit may be set on all directories where all users have write permissions. This ensures that only the file's owner, the directory's owner, or root user can rename or delete the file. Without the sticky bit being set, any user that has write and execute permissions for the directory can rename or delete files within the directory, regardless of the file's owner.

    Test Purpose

    Verify that only users that are authorized to modify files, data, directories or file systems have the necessary privileges to do so.

    Pre-Conditions

    A document describing how access control is configured for the filesystems in the network product shall be provided by the vendor.

    Execution Steps

    Execute the following steps:

    1. The tester checks that OS-level permissions are configured correctly for users that are authorized to modify files, data, directories or file systems on the system.

    2. The tester tries to modify the files and directories for which the user has the necessary privileges.

    3. The tester tries to modify the files and directories for which the user doesn't have the necessary privileges.

    Expected Results

    The OS-level access permissions are set correctly for the users.

    The users can only modify files, data, directories or file systems for which he has the necessary privileges to do so.

    Expected Format of Evidence

    Screenshot containing the configuration file showing the OS-level permissions are set correctly.

    PDFs de65fd58285f1c5bc7687c927d1a86bf

    4.3.3.1.1 IP-Source address spoofing mitigation

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_IP_SPOOFING_MITIGATION
    Threat Reference

    TR 33.926 [4], clause 5.3.3.5, IP Spoofing

    The test for this requirement can be carried out using a suitable tool or manually by performing the steps described below. If a tool is used then the tester needs to provide evidence, e.g. by referring to the documentation of the tool, that the tool actually provides functionality equivalent to the steps described below.

    Requirement Name

    IP-Source address spoofing mitigation

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    Systems shall not process IP packets if their source address is not reachable via the incoming interface. Implementation example: Use of "Reverse Path Filter" (RPF) provides this function.

    Test Purpose

    To verify that the network product provides anti-spoofing function that is, before a packet is processed, the network product checks whether the source IP of the received packet is reachable through the interface it comes in.

    To verify that if the received packet source address is not routable through the interface on which it comes, then the network product drops this packet.

    Pre-Conditions
    • A node N1 is available with:

    • Two interfaces named respectively if1-n1 connected to the network product and if2-n1 to which the tester connects a tester machine

    • routing capabilities

    • if2-n1 has a static IP address (e.g. 192.168.3.1 belonging to the subnet 192.168.3.0/24)

    • A node N2 is available with:

    • Two interfaces named respectively if1-n2 connected to the network product and if2-n2 to which the tester connects a tester machine

    • Routing capabilities. In particular N2 has a default route to if1-np subnet via if2-np (e.g. 192.168.2.1)

    • if2-n2 has a static IP address . This ip is the same as if2-n1 (e.g. 192.168.3.1 belonging to the subnet 192.168.3.0/24)

    • The network product has at least 2 enabled interfaces said if1-np and if2-np:

    • The interface if1-np is connected to interface if1-n1 of the node N1 on the subnet, e.g., 192.168.1.0/24.

    • The interface if2-np is connected to interface if1-n2 of the node N2 on the subnet, e.g., 192.168.2.0/24.

    • The network product is configured with a static route for the subnet where if2-n1 is connected to (e.g. 192.168.3.0/24), so this subnet can be reached via if1-n1 through if1-np.

    {width="5.73.19444.444445in" height="2.41.27777.777778in"}

    Figure 1: Configurations for the network product, N1 and N2

    • The vendor shall declare, in the documentation accompanying the network product, the supported anti-spoofing mechanism (e.g. RPF or similar function) and if it is enabled for all interfaces (e.g. net.ipv4.conf.all.rp_filter = 1 and net.ipv4.conf.default.rp_filter = 1 in the linux sysctl.conf file) or per interface bases.

    • The vendor shall declare if the dropped packets can be logged and how to enable this logging

    • The tester has administrator privileges

    • A tester machine is available and configured with:

    • A static IP address belonging to the subnet where if2-n1 and if2-n2 are connected to (e.g. 192.168.3.2/24)

    • A default gateway set to if2-n1 and if2-n2 IP Address (e.g. 192.168.3.1)

    • A network traffic analyser (e.g. tcpdump) on the network product is available

    Execution Steps
    1. The tester starts to send ping messages to if1-np interface of the network product.

    2. The tester verifies, through the network traffic analyser, that the ping correctly reaches the if1-np interface and that responses are sent back.

    3. The tester disconnects the tester machine from if2-n1 interface of the node N1 and reconnects it to the interface if2-n2 of the node N2:

    4. The testers uses the same network configuration of the tester machine.

    5. The tester sends ping messages to if1-np interface of the network product.

    6. The tester verifies, through the network traffic analyser, that the pings reach the if1-np interface of the network product, but they are dropped and no response is sent back since the source of the received packet is not reachable through the interface it came in.

    7. The tester sends ping messages to if2-np interface of the network product.

    8. The tester verifies, through the network traffic analyser, that the pings reach the if2-np interface of the network product, but they are dropped and no response is sent back since there is a default route via if2-np.

    9. If the dropped packets are logged, the testers verifies that these packets are recorded.

    Expected Results

    The network product supports an anti-spoofing mechanism (e.g. the RPF function) and it accepts a packet only if it reaches the network product on the expected interface (i.e. this packet has a source IP address belonging to the same network as the interface where it came in or if it is routable through the interface on which it came in), otherwise it discards the packet.

    Expected Format of Evidence
    • The user settings and configurations

    • Pcap files

    • Log file if available

    PDFs 137523751bfa654793ceff606e529d9c

    4.3.3.1.1 IP-Source address spoofing mitigation

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_IP_SPOOFING_MITIGATION
    Threat Reference
    Requirement Name

    IP-Source address spoofing mitigation

    Requirement Reference
    Requirement Description

    Systems shall not process IP packets if their source address is not reachable via the incoming interface. Implementation example: Use of "Reverse Path Filter" (RPF) provides this function.

    The test for this requirement can be carried out using a suitable tool or manually by performing the steps described below. If a tool is used then the tester needs to provide evidence, e.g. by referring to the documentation of the tool, that the tool actually provides functionality equivalent to the steps described below.

    Test Purpose

    To verify that the network product provides anti-spoofing function that is, before a packet is processed, the network product checks whether the source IP of the received packet is reachable through the interface it comes in.

    To verify that if the received packet source address is not routable through the interface on which it comes, then the network product drops this packet.

    Pre-Conditions
    • A node N1 is available with:

    • Two interfaces named respectively if1-n1 connected to the network product and if2-n1 to which the tester connects a tester machine

    • routing capabilities

    • if2-n1 has a static IP address (e.g. 192.168.3.1 belonging to the subnet 192.168.3.0/24)

    • A node N2 is available with:

    • Two interfaces named respectively if1-n2 connected to the network product and if2-n2 to which the tester connects a tester machine

    • Routing capabilities. In particular N2 has a default route to if1-np subnet via if2-np (e.g. 192.168.2.1)

    • if2-n2 has a static IP address . This ip is the same as if2-n1 (e.g. 192.168.3.1 belonging to the subnet 192.168.3.0/24)

    • The network product has at least 2 enabled interfaces said if1-np and if2-np:

    • The interface if1-np is connected to interface if1-n1 of the node N1 on the subnet, e.g., 192.168.1.0/24.

    • The interface if2-np is connected to interface if1-n2 of the node N2 on the subnet, e.g., 192.168.2.0/24.

    • The network product is configured with a static route for the subnet where if2-n1 is connected to (e.g. 192.168.3.0/24), so this subnet can be reached via if1-n1 through if1-np.

    {width="5.73.19444.444445in" height="2.41.27777.777778in"}

    Figure 1: Configurations for the network product, N1 and N2

    • The vendor shall declare, in the documentation accompanying the network product, the supported anti-spoofing mechanism (e.g. RPF or similar function) and if it is enabled for all interfaces (e.g. net.ipv4.conf.all.rp_filter = 1 and net.ipv4.conf.default.rp_filter = 1 in the linux sysctl.conf file) or per interface bases.

    • The vendor shall declare if the dropped packets can be logged and how to enable this logging

    • The tester has administrator privileges

    • A tester machine is available and configured with:

    • A static IP address belonging to the subnet where if2-n1 and if2-n2 are connected to (e.g. 192.168.3.2/24)

    • A default gateway set to if2-n1 and if2-n2 IP Address (e.g. 192.168.3.1)

    • A network traffic analyser (e.g. tcpdump) on the network product is available

    Execution Steps
    1. The tester starts to send ping messages to if1-np interface of the network product.

    2. The tester verifies, through the network traffic analyser, that the ping reaches correctly the if1-np interface and that responses are sent back.

    3. The tester disconnects the tester machine from if2-n1 interface of the node N1 and reconnects it to the interface if2-n2 of the node N2:

    4. The testers uses the same network configuration of the tester machine.

    5. The tester sends ping messages to if1-np interface of the network product.

    6. The tester verifies, through the network traffic analyser, that the pings reach the if1-np interface of the network product, but they are dropped and no response is sent back since the source of the received packet is not reachable through the interface it came in.

    7. The tester sends ping messages to if2-np interface of the network product.

    8. The tester verifies, through the network traffic analyser, that the pings reach the if2-np interface of the network product, but they are dropped and no response is sent back since there is a default route via if2-np.

    9. If the dropped packets are logged, the testers verifies that these packets are recorded.

    Expected Results

    The network product supports an anti-spoofing mechanism (e.g. the RPF function) and it accepts a packet only if it reaches the network product on the expected interface (i.e. this packet has a source ip address belonging to the same network as the interface where it came in or if it is routable through the interface on which it came in), otherwise it discards the packet.

    Expected Format of Evidence

    A testing report provided by the testing agency which will consist of the following information:

    • The user settings and configurations

    • Pcap files

    • Log file if available

    • Test result (Passed or not)

    PDFs 7669713e2eada1fd595b3a0269473526

    4.3.3.1.2 Minimized kernel network functions

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_PROXY_ARP_DISABLING
    Threat Reference

    TR 33.926 [4], clause 5.3.6.11, Unnecessary Services

    Requirement Name

    Minimized kernel network functions.

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    Kernel based network functions not needed for the operation of the network element shall be deactivated.

    In particular the following ones shall be disabled by default:

    Note: Void

    • Proxy ARP (to prevent resource exhaustion attack and man-in-the-middle attacks.

    • Directed broadcast (to prevent Smurf, Denial of Service attack and others like it.

    • IPv4 Multicast handling. In particular all packets with IP source or destination address belonging to the multicast IP ranges (224.0.0.0 through 239.255.255.255) shall be discarded by default and multicast route caching and forwarding shall be disabled to prevent smurf and fraggle attacks. A configuration option shall be available to enable the IPv4 multicast handling if required.

    • Gratuitous ARP messages (to prevent ARP Cache Poisoning attacks [ef]). A Gratuitous ARP request can be used mainly to inform the neighbours about the change in the MAC for the specified IP and consequently to update their ARP tables or to update the switches with the new MAC address or to defend link-local IP addresses in the Zeroconf protocol. By default, the network product shall not send Unsolicited ARP and any incoming Gratuitous ARP requests shall be discarded.

    Note: The above text does not preclude that Gratuitous ARP can be enabled in certain deployment scenarios.

    Answering routine for broadcast ICMP packets. In particular all ICMP ECHO and TIMESTAMP requests sent to network product via broadcast/multicast shall not be answered by default.

    Test Purpose

    Verify that the Proxy ARP feature is disabled by default on the network product. In particular this test case verifies that the network product does not respond to ARP requests intended for another host.

    Pre-Conditions
    • The network product shall have at least 2 different physical or logical Ethernet interface IF1 and IF2. E.g.

    • Host 1 is connected to IF1 on subnet A (for example 172.16.10.0/16).

    • Host 2 is connected to IF2 on subnet B (for example 172.16.20.0/24).

    • Network traffic analyser on the network product (e.g. TCPDUMP) or an external traffic analyser directly connected to the network product is available.

    Execution Steps
    1. If the feature is available in a configuration file, verify that it is disabled by default.

    2. Broadcast an ARP request from Host 1 on Subnet A to discover the MAC of Host 2 on subnet B. Since the ARP request is a broadcast, it reaches all nodes in the Subnet A, which include the IF1 interface of the network product, but it does not reach Host 2.

    3. Verify that the network product correctly receives this packet but that it does not send an ARP reply to Host 1 with its own MAC address.

    Expected Results

    No Arp Reply is received by Host 1.

    Expected Format of Evidence

    Pcap trace, snapshot of ARP Cache of Host 1

    PDFs 72014f55384207ddb35572d8c293e249

    4.3.3.1.2 Minimized kernel network functions

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_PROXY_ARP_DISABLING
    Threat Reference
    Requirement Name

    Minimized kernel network functions.

    Requirement Reference
    Requirement Description

    Kernel based network functions not needed for the operation of the network element shall be deactivated.

    In particular the following ones shall be disabled by default:

    Note: Void

    • Proxy ARP (to prevent resource exhaustion attack and man-in-the-middle attacks.

    • Directed broadcast (to prevent Smurf, Denial of Service attack and others like it.

    • IPv4 Multicast handling. In particular all packets with IP source or destination address belonging to the multicast IP ranges (224.0.0.0 through 239.255.255.255) shall be discarded by default and multicast route caching and forwarding shall be disabled to prevent smurf and fraggle attacks. A configuration option shall be available to enable the IPv4 multicast handling if required.

    • Gratuitous ARP messages (to prevent ARP Cache Poisoning attacks [ef]). A Gratuitous ARP request can be used mainly to inform the neighbours about the change in the MAC for the specified IP and consequently to update their ARP tables or to update the switches with the new MAC address or to defend link-local IP addresses in the Zeroconf protocol. By default, the network product shall not send Unsolicited ARP and any incoming Gratuitous ARP requests shall be discarded.

    Note: The above text does not preclude that Gratuitous ARP can be enabled in certain deployment scenarios.

    Answering routine for broadcast ICMP packets. In particular all ICMP ECHO and TIMESTAMP requests sent to network product via broadcast/multicast shall not be answered by default.

    Test Purpose

    Verify that the Proxy ARP feature is disabled by default on the network product. In particular this test case verifies that the network product does not respond to ARP requests intended for another host.

    Pre-Conditions
    • The network product shall have at least 2 different physical or logical Ethernet interface IF1 and IF2. E.g.

    • Host 1 is connected to IF1 on subnet A (for example 172.16.10.0/16).

    • Host 2 is connected to IF2 on subnet B (for example 172.16.20.0/24).

    • Network traffic analyser on the network product (e.g. TCPDUMP) or an external traffic analyser directly connected to the network product is available.

    Execution Steps
    1. If the feature is available in a configuration file, verify that it is disabled by default.

    2. Broadcast an ARP request from Host 1 on Subnet A to discover the MAC of Host 2 on subnet B. Since the ARP request is a broadcast, it reaches all nodes in the Subnet A, which include the IF1 interface of the network product, but it does not reach Host 2.

    3. Verify that the network product correctly receives this packet but that it does not send an ARP reply to Host 1 with its own MAC address.

    Expected Results

    No Arp Reply is received by Host 1.

    Expected Format of Evidence

    Pcap trace, snapshot of ARP Cache of Host 1

    PDFs 5376c42c4aa60c229899953510ef661b

    4.3.3.1.2(2) Minimized kernel network functions

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_DIRECTED_BROAD_DISABLING
    Threat Reference

    TR 33.926 [4], clause 5.3.6.11, Unnecessary Services

    Requirement Name

    Minimized kernel network functions.

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    Kernel based network functions not needed for the operation of the network element shall be deactivated.

    In particular the following ones shall be disabled by default:

    Note: Void

    • Proxy ARP (to prevent resource exhaustion attack and man-in-the-middle attacks.

    • Directed broadcast (to prevent Smurf, Denial of Service attack and others like it.

    • IPv4 Multicast handling. In particular all packets with IP source or destination address belonging to the multicast IP ranges (224.0.0.0 through 239.255.255.255) shall be discarded by default and multicast route caching and forwarding shall be disabled to prevent smurf and fraggle attacks. A configuration option shall be available to enable the IPv4 multicast handling if required.

    • Gratuitous ARP messages (to prevent ARP Cache Poisoning attacks [ef]). A Gratuitous ARP request can be used mainly to inform the neighbours about the change in the MAC for the specified IP and consequently to update their ARP tables or to update the switches with the new MAC address or to defend link-local IP addresses in the Zeroconf protocol. By default, the network product shall not send Unsolicited ARP and any incoming Gratuitous ARP requests shall be discarded.

    Note: The above text does not preclude that Gratuitous ARP can be enabled in certain deployment scenarios.

    Answering routine for broadcast ICMP packets. In particular all ICMP ECHO and TIMESTAMP requests sent to network product via broadcast/multicast shall not be answered by default.

    Test Purpose

    Verify that the Directed broadcast is disabled by default on the network product. In particular this test case verifies that a packet received by a network product whose destination address is a valid broadcast address is dropped.

    Pre-Conditions
    • The network product has at least 2 different physical or logical Ethernet interface IF1 and IF2.

    • Host 1 is connected to IF1 on Subnet A and Host 2 is connected to IF2 on Subnet B.

    • Network traffic analyser on the network product (e.g. TCPDUMP) or an external traffic analyser directly connected to the network product is available.

    Execution Steps
    1. If the feature is available in a configuration file, verify that it is disabled by default.

    2. Send an IP packet from Host 1 whose IP destination address is a valid broadcast address belonging to the subnet B.

    3. Verify that the Host 2 on Subnet B does not receive the packet because it will be dropped by the network product, rather than being broadcasted.

    Expected Results

    The packet is not broadcasted by the network product and Host 2 cannot receive it.

    Expected Format of Evidence

    Pcap trace showing that packet from host 1only incomes to the network product.

    PDFs 952343f1c3cd7f3fe3eaac4ece71979e

    4.3.3.1.2(2) Minimized kernel network functions

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_DIRECTED_BROAD_DISABLING
    Threat Reference
    Requirement Name

    Minimized kernel network functions.

    Requirement Reference
    Requirement Description

    Kernel based network functions not needed for the operation of the network element shall be deactivated.

    In particular the following ones shall be disabled by default:

    Note: Void

    • Proxy ARP (to prevent resource exhaustion attack and man-in-the-middle attacks.

    • Directed broadcast (to prevent Smurf, Denial of Service attack and others like it.

    • IPv4 Multicast handling. In particular all packets with IP source or destination address belonging to the multicast IP ranges (224.0.0.0 through 239.255.255.255) shall be discarded by default and multicast route caching and forwarding shall be disabled to prevent smurf and fraggle attacks. A configuration option shall be available to enable the IPv4 multicast handling if required.

    • Gratuitous ARP messages (to prevent ARP Cache Poisoning attacks [ef]). A Gratuitous ARP request can be used mainly to inform the neighbours about the change in the MAC for the specified IP and consequently to update their ARP tables or to update the switches with the new MAC address or to defend link-local IP addresses in the Zeroconf protocol. By default, the network product shall not send Unsolicited ARP and any incoming Gratuitous ARP requests shall be discarded.

    Note: The above text does not preclude that Gratuitous ARP can be enabled in certain deployment scenarios.

    Answering routine for broadcast ICMP packets. In particular all ICMP ECHO and TIMESTAMP requests sent to network product via broadcast/multicast shall not be answered by default.

    Test Purpose

    Verify that the Directed broadcast is disabled by default on the network product. In particular this test case verifies that a packet received by a network product whose destination address is a valid broadcast address is dropped.

    Pre-Conditions
    • The network product has at least 2 different physical or logical Ethernet interface IF1 and IF2.

    • Host 1 is connected to IF1 on Subnet A and Host 2 is connected to IF2 on Subnet B.

    • Network traffic analyser on the network product (e.g. TCPDUMP) or an external traffic analyser directly connected to the network product is available.

    Execution Steps
    1. If the feature is available in a configuration file, verify that it is disabled by default.

    2. Send an IP packet from Host 1 whose IP destination address is a valid broadcast address belonging to the subnet B.

    3. Verify that the Host 2 on Subnet B does not receive the packet because it will be dropped by the network product, rather than being broadcasted.

    Expected Results

    The packet is not broadcasted by the network product and Host 2 cannot receive it.

    Expected Format of Evidence

    Pcap trace showing that packet from host 1only incomes to the network product.

    PDFs 44279d61213b79c545dace891cc7e252

    4.3.3.1.2(3) Minimized kernel network functions

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_ IP_MULTICAST_HANDLING
    Threat Reference

    TR 33.926 [4], clause 5.3.6.11, Unnecessary Services

    Requirement Name

    Minimized kernel network functions.

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    Kernel based network functions not needed for the operation of the network element shall be deactivated.

    In particular the following ones shall be disabled by default:

    Note: Void

    • Proxy ARP (to prevent resource exhaustion attack and man-in-the-middle attacks.

    • Directed broadcast (to prevent Smurf, Denial of Service attack and others like it.

    • IPv4 Multicast handling. In particular all packets with IP source or destination address belonging to the multicast IP ranges (224.0.0.0 through 239.255.255.255) shall be discarded by default and multicast route caching and forwarding shall be disabled to prevent smurf and fraggle attacks. A configuration option shall be available to enable the IPv4 multicast handling if required.

    • Gratuitous ARP messages (to prevent ARP Cache Poisoning attacks [ef]). A Gratuitous ARP request can be used mainly to inform the neighbours about the change in the MAC for the specified IP and consequently to update their ARP tables or to update the switches with the new MAC address or to defend link-local IP addresses in the Zeroconf protocol. By default, the network product shall not send Unsolicited ARP and any incoming Gratuitous ARP requests shall be discarded.

    Note: The above text does not preclude that Gratuitous ARP can be enabled in certain deployment scenarios.

    Answering routine for broadcast ICMP packets. In particular all ICMP ECHO and TIMESTAMP requests sent to network product via broadcast/multicast shall not be answered by default.

    Test Purpose

    Verify that IP Multicast is disabled by default on the network product. In particular this test case verifies that packets with IP source or destination address belonging to the multicast IP ranges (224.0.0.0 through 239.255.255.255) are not handled by the network product.

    Pre-Conditions
    • Network traffic analyser on the network product or an external traffic analyser directly connected to the network product is available.

    • Network product

    Capability:

    NOT applicable in certain deployment scenarios where multicast needs to be enabled.

    Execution Steps
    1. If the feature is available in a configuration file, verify that it is disabled by default.

    2. Verify that none of the network product's interfaces is running Multicast (e.g. typing command ip maddr or ifconfig on any Unix® based platform)

    Expected Results

    No interface is running multicast protocols

    Expected Format of Evidence

    Screenshot containing command output.

    PDFs ddc8cb8decce8bc010e996f8fc91737e

    4.3.3.1.2(3) Minimized kernel network functions

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_ IP_MULTICAST_HANDLING
    Threat Reference
    Requirement Name

    Minimized kernel network functions.

    Requirement Reference
    Requirement Description

    Kernel based network functions not needed for the operation of the network element shall be deactivated.

    In particular the following ones shall be disabled by default:

    Note: Void

    • Proxy ARP (to prevent resource exhaustion attack and man-in-the-middle attacks.

    • Directed broadcast (to prevent Smurf, Denial of Service attack and others like it.

    • IPv4 Multicast handling. In particular all packets with IP source or destination address belonging to the multicast IP ranges (224.0.0.0 through 239.255.255.255) shall be discarded by default and multicast route caching and forwarding shall be disabled to prevent smurf and fraggle attacks. A configuration option shall be available to enable the IPv4 multicast handling if required.

    • Gratuitous ARP messages (to prevent ARP Cache Poisoning attacks [ef]). A Gratuitous ARP request can be used mainly to inform the neighbours about the change in the MAC for the specified IP and consequently to update their ARP tables or to update the switches with the new MAC address or to defend link-local IP addresses in the Zeroconf protocol. By default, the network product shall not send Unsolicited ARP and any incoming Gratuitous ARP requests shall be discarded.

    Note: The above text does not preclude that Gratuitous ARP can be enabled in certain deployment scenarios.

    Answering routine for broadcast ICMP packets. In particular all ICMP ECHO and TIMESTAMP requests sent to network product via broadcast/multicast shall not be answered by default.

    Test Purpose

    Verify that IP Multicast is disabled by default on the network product. In particular this test case verifies that packets with IP source or destination address belonging to the multicast IP ranges (224.0.0.0 through 239.255.255.255) are not handled by the network product.

    Pre-Conditions
    • Network traffic analyser on the network product or an external traffic analyser directly connected to the network product is available.

    • Network product

    Capability:

    NOT applicable in certain deployment scenarios where multicast needs to be enabled.

    Execution Steps
    1. If the feature is available in a configuration file, verify that it is disabled by default.

    2. Verify that none of the network product's interfaces is running Multicast (e.g. typing command ip maddr or ifconfig on any Unix® based platform)

    Expected Results

    No interface is running multicast protocols

    Expected Format of Evidence

    Screenshot containing command output.

    PDFs d2b374821a6defb0b6b837f30a22920d

    4.3.3.1.2(4) Minimized kernel network functions

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_GRATUITOUS_ARP_DISABLING
    Threat Reference

    TR 33.926 [4], clause 5.3.6.11, Unnecessary Services

    Requirement Name

    Minimized kernel network functions.

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    Kernel based network functions not needed for the operation of the network element shall be deactivated.

    In particular the following ones shall be disabled by default:

    Note: Void

    • Proxy ARP (to prevent resource exhaustion attack and man-in-the-middle attacks.

    • Directed broadcast (to prevent Smurf, Denial of Service attack and others like it.

    • IPv4 Multicast handling. In particular all packets with IP source or destination address belonging to the multicast IP ranges (224.0.0.0 through 239.255.255.255) shall be discarded by default and multicast route caching and forwarding shall be disabled to prevent smurf and fraggle attacks. A configuration option shall be available to enable the IPv4 multicast handling if required.

    • Gratuitous ARP messages (to prevent ARP Cache Poisoning attacks [ef]). A Gratuitous ARP request can be used mainly to inform the neighbours about the change in the MAC for the specified IP and consequently to update their ARP tables or to update the switches with the new MAC address or to defend link-local IP addresses in the Zeroconf protocol. By default, the network product shall not send Unsolicited ARP and any incoming Gratuitous ARP requests shall be discarded.

    Note: The above text does not preclude that Gratuitous ARP can be enabled in certain deployment scenarios.

    Answering routine for broadcast ICMP packets. In particular all ICMP ECHO and TIMESTAMP requests sent to network product via broadcast/multicast shall not be answered by default.

    Test Purpose

    Verify that the Gratuitous ARP feature is disabled by default on the network product. In particular this test case verifies that the network product cannot send gratuitous ARP requests and that the network product discards incoming Gratuitous ARP requests.

    Pre-Conditions
    • Network traffic analyser on the network product (e.g. TCPDUMP) or an external traffic analyser directly connected to the network product is available.

    • Host 1 is connected to the network product

    • The network product ARP Cache already contains an entry for Host 1

    • The network product documentation does not state any reason why gratuitous ARP may be deliberately enabled in order to satisfy certain deployment scenarios. If the network product documentation does, however, state that the usage of gratuitous ARP is enabled in certain deployment scenarios, then this test case is not applicable (refer to the > > NOTE in the requirement).

    Execution Steps
    1. If the feature is available in a configuration file, verify that it is disabled by default.

    2. Send a Gratuitous ARP request from Host 1, i.e. an ARP request where the source and destination IP are both set to an IP address different from the one already cached in the network product ARP Cache for Host 1 and the destination MAC is the broadcast address ff:ff:ff:ff:ff:ff.

    3. Verify that the network product correctly receives this packet but discards it and that the ARP Cache is not updated.

    4. Send a Gratuitous ARP request i.e. an ARP reply where the source and destination IP are both set to an IP address different from the one already cached in the network product ARP Cache for Host 1 and the destination MAC is the broadcast address ff:ff:ff:ff:ff:ff.

    5. Verify that the network product correctly receives this packet but discards it and that the ARP Cache is not updated.

    Expected Results

    The network product ARP Cache is not updated.

    Expected Format of Evidence

    Snapshot of the network product ARP Cache

    PDFs 7ef8449a5687405b7096d4e2a9d3d4cb

    4.3.3.1.2(4) Minimized kernel network functions

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_GRATUITOUS_ARP_DISABLING
    Threat Reference
    Requirement Name

    Minimized kernel network functions.

    Requirement Reference
    Requirement Description

    Kernel based network functions not needed for the operation of the network element shall be deactivated.

    In particular the following ones shall be disabled by default:

    Note: Void

    • Proxy ARP (to prevent resource exhaustion attack and man-in-the-middle attacks.

    • Directed broadcast (to prevent Smurf, Denial of Service attack and others like it.

    • IPv4 Multicast handling. In particular all packets with IP source or destination address belonging to the multicast IP ranges (224.0.0.0 through 239.255.255.255) shall be discarded by default and multicast route caching and forwarding shall be disabled to prevent smurf and fraggle attacks. A configuration option shall be available to enable the IPv4 multicast handling if required.

    • Gratuitous ARP messages (to prevent ARP Cache Poisoning attacks [ef]). A Gratuitous ARP request can be used mainly to inform the neighbours about the change in the MAC for the specified IP and consequently to update their ARP tables or to update the switches with the new MAC address or to defend link-local IP addresses in the Zeroconf protocol. By default, the network product shall not send Unsolicited ARP and any incoming Gratuitous ARP requests shall be discarded.

    Note: The above text does not preclude that Gratuitous ARP can be enabled in certain deployment scenarios.

    Answering routine for broadcast ICMP packets. In particular all ICMP ECHO and TIMESTAMP requests sent to network product via broadcast/multicast shall not be answered by default.

    Test Purpose

    Verify that the Gratuitous ARP feature is disabled by default on the network product. In particular this test case verifies that the network product cannot send gratuitous ARP requests and that the network product discards incoming Gratuitous ARP requests.

    Pre-Conditions
    • Network traffic analyser on the network product (e.g. TCPDUMP) or an external traffic analyser directly connected to the network product is available.

    • Host 1 is connected to the network product

    • The network product ARP Cache already contains an entry for Host 1

    • The network product documentation does not state any reason why gratuitous ARP may be deliberately enabled in order to satisfy certain deployment scenarios. If the network product documentation does, however, state that the usage of gratuitous ARP is enabled in certain deployment scenarios, then this test case is not applicable (refer to the > > NOTE in the requirement).

    Execution Steps
    1. If the feature is available in a configuration file, verify that it is disabled by default.

    2. Send a Gratuitous ARP request from Host 1, i.e. an ARP request where the source and destination IP are both set to an IP address different from the one already cached in the network product ARP Cache for Host 1 and the destination MAC is the broadcast address ff:ff:ff:ff:ff:ff.

    3. Verify that the network product correctly receives this packet but discards it and that the ARP Cache is not updated.

    4. Send a Gratuitous ARP request i.e. an ARP [reply]{.underline} where the source and destination IP are both set to an IP address different from the one already cached in the network product ARP Cache for Host 1 and the destination MAC is the broadcast address ff:ff:ff:ff:ff:ff.

    5. Verify that the network product correctly receives this packet but discards it and that the ARP Cache is not updated.

    Expected Results

    The network product ARP Cache is not updated.

    Expected Format of Evidence

    Snapshot of the network product ARP Cache

    PDFs c7c7504303fd9e369e2b882cc5d52749

    4.3.3.1.2(5) Minimized kernel network functions

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_BROADCAST_ICMP_HANDLING
    Threat Reference

    TR 33.926 [4], clause 5.3.6.11, Unnecessary Services

    Requirement Name

    Minimized kernel network functions.

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    Kernel based network functions not needed for the operation of the network element shall be deactivated.

    In particular the following ones shall be disabled by default:

    Note: Void

    • Proxy ARP (to prevent resource exhaustion attack and man-in-the-middle attacks.

    • Directed broadcast (to prevent Smurf, Denial of Service attack and others like it.

    • IPv4 Multicast handling. In particular all packets with IP source or destination address belonging to the multicast IP ranges (224.0.0.0 through 239.255.255.255) shall be discarded by default and multicast route caching and forwarding shall be disabled to prevent smurf and fraggle attacks. A configuration option shall be available to enable the IPv4 multicast handling if required.

    • Gratuitous ARP messages (to prevent ARP Cache Poisoning attacks [ef]). A Gratuitous ARP request can be used mainly to inform the neighbours about the change in the MAC for the specified IP and consequently to update their ARP tables or to update the switches with the new MAC address or to defend link-local IP addresses in the Zeroconf protocol. By default, the network product shall not send Unsolicited ARP and any incoming Gratuitous ARP requests shall be discarded.

    Note: The above text does not preclude that Gratuitous ARP can be enabled in certain deployment scenarios.

    Answering routine for broadcast ICMP packets. In particular all ICMP ECHO and TIMESTAMP requests sent to network product via broadcast/multicast shall not be answered by default.

    Test Purpose

    Verify that responses to ICMP broadcast packets are disabled by default on the network product. In particular this test case verifies that all ICMP ECHO and TIMESTAMP requests sent to the network product via broadcast/multicast are not answered.

    Pre-Conditions
    • The network product has at least one physical or logical Ethernet interface IF1 connected to a host, Host 1.

    • Network traffic analyser on the network product (e.g. TCPDUMP) or an external traffic analyser directly connected to the network product is available.

    Execution Steps
    1. If the feature is available in a configuration file, verify that it is disabled by default.

    2. Send an ICMP ECHO message from Host 1 to ping a broadcast address (such as 255.255.255.255, or 192.168.1.255 on a 192.168.1.0/24 subnet)

    3. Verify that the network product doesn't respond to the ping.

    4. Send an ICMP timestamp request (ICMP type 13) from host 1 to a broadcast address (such as 255.255.255.255, or 192.168.1.255 on a 192.168.1.0/24 subnet).

    5. Verify that the network product doesn't respond to the timestamp request.

    Expected Results

    The network product doesn't respond to any ICMP packet with a broadcast address.

    Expected Format of Evidence

    Pcap trace showing that the ICMP ECHO/ ICMP timestamp packets are received by the network product but no responses are generated by the network product.

    PDFs fc74dbd71c8bdf99324639da89e29c20

    4.3.3.1.2(5) Minimized kernel network functions

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_BROADCAST_ICMP_HANDLING
    Threat Reference
    Requirement Name

    Minimized kernel network functions.

    Requirement Reference
    Requirement Description

    Kernel based network functions not needed for the operation of the network element shall be deactivated.

    In particular the following ones shall be disabled by default:

    Note: Void

    • Proxy ARP (to prevent resource exhaustion attack and man-in-the-middle attacks.

    • Directed broadcast (to prevent Smurf, Denial of Service attack and others like it.

    • IPv4 Multicast handling. In particular all packets with IP source or destination address belonging to the multicast IP ranges (224.0.0.0 through 239.255.255.255) shall be discarded by default and multicast route caching and forwarding shall be disabled to prevent smurf and fraggle attacks. A configuration option shall be available to enable the IPv4 multicast handling if required.

    • Gratuitous ARP messages (to prevent ARP Cache Poisoning attacks [ef]). A Gratuitous ARP request can be used mainly to inform the neighbours about the change in the MAC for the specified IP and consequently to update their ARP tables or to update the switches with the new MAC address or to defend link-local IP addresses in the Zeroconf protocol. By default, the network product shall not send Unsolicited ARP and any incoming Gratuitous ARP requests shall be discarded.

    Note: The above text does not preclude that Gratuitous ARP can be enabled in certain deployment scenarios.

    Answering routine for broadcast ICMP packets. In particular all ICMP ECHO and TIMESTAMP requests sent to network product via broadcast/multicast shall not be answered by default.

    Test Purpose

    Verify that responses to ICMP broadcast packets are disabled by default on the network product . In particular this test case verifies that all ICMP ECHO and TIMESTAMP requests sent to the network product via broadcast/multicast are not answered.

    Pre-Conditions
    • The network product has at least one physical or logical Ethernet interface IF1 connected to a host, Host 1.

    • Network traffic analyser on the network product (e.g. TCPDUMP) or an external traffic analyser directly connected to the network product is available.

    Execution Steps
    1. If the feature is available in a configuration file, verify that it is disabled by default. .

    2. Send an ICMP ECHO message from Host 1 to ping a broadcast address (such as 255.255.255.255, or 192.168.1.255 on a 192.168.1.0/24 subnet)

    3. Verify that the network product doesn't respond to the ping.

    4. Send an ICMP timestamp request (ICMP type 13) from host 1 to a broadcast address (such as 255.255.255.255, or 192.168.1.255 on a 192.168.1.0/24 subnet).

    5. Verify that the network product doesn't respond to the timestamp request.

    Expected Results

    The network product doesn't respond to any ICMP packet with a broadcast address.

    Expected Format of Evidence

    Pcap trace showing that the ICMP ECHO/ ICMP timestamp packets are received by the network product but no responses are generated by the network product.

    PDFs c64800308fbbd1818473f78fc50f10ff

    4.3.3.1.3 No automatic launch from removable media

    Home General19.2.0
    33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_NO_AUTO_LAUNCH_FROM_REMOVABLE_MEDIA
    Threat Reference

    TR 33.926 [4], clause 5.3.4.3, External Device Boot

    Requirement Name

    No automatic launch from removable media

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    The network product shall not automatically launch any application when removable media device such as CD-, DVD-, USB-Sticks or USB-Storage drive is connected. If the operating system supports an automatic launch, it shall be deactivated unless it is required to support availability requirements.

    Test Purpose

    To verify that the network product does not launch any applications automatically when a removable media device is connected. Any such feature should be deactivated.

    Pre-Conditions

    If the network product is provisioned with the necessary physical ports/drives (CD/DVD drive, USB port, etc.) then the test case applies.

    Execution Steps
    1. The tester log in the network product.

    2. For all available physical ports which are externally accessible:

    a. The tester prepares a removable media device (e.g. CD, DVD, USB-Sticks and/or USB-Storage drives) that contain any kind of autostart file suitable for this port type.

    b. The tester inserts the prepared media device into the network product under test.

    1. The tester verifies that the media device is not automatically mounted and there is no automatic application launch triggered by its insertion.
    Expected Results

    The network product does not launch any applications to open the contents in the removable media device.

    In Linux® machines, the removable media device is not automatically mounted in the filesystem.

    Expected Format of Evidence

    Evidence can be presented in the form of logs/screenshot/screen-capture on how the network product responds when any removable media device is attached to it (e.g. the output log of the UNIX® mount command before and after insertion of the removable media device).

    PDFs 7b92eb7e57f3b9a4e987997b306d262d

    4.3.3.1.3
    No automatic launch of removable media

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20  
    Test Name
    TC_NO_AUTO_LAUNCH_OF_REMOVABLE_MEDIA
    Threat Reference
    Requirement Name

    No automatic launch of removable media

    Requirement Reference
    Requirement Description

    The network product shall not automatically launch any application when removable media device such as CD-, DVD-, USB-Sticks or USB-Storage drive is connected. If the operating system supports an automatic launch, it shall be deactivated unless it is required to support availability requirements.

    Test Purpose

    To verify that the network product does not launch any applications automatically when a removable media device is connected. Any such feature should be deactivated.

    Pre-Conditions

    If the network product is provisioned with the necessary physical ports/drives (CD/DVD drive, USB port, etc.) then the test case applies.

    Execution Steps
    1. The tester log in the network product.

    2. For all available physical ports which are externally accessible:

    a. The tester prepares a removable media device (e.g. CD, DVD, USB-Sticks and/or USB-Storage drives) that contain any kind of autostart file suitable for this port type.

    b. The tester inserts the prepared media device into the network product under test.

    1. The tester verifies that the media device is not automatically mounted and there is no automatic application launch triggered by its insertion.
    Expected Results

    The network product does not launch any applications to open the contents in the removable media device.

    In Linux® machines, the removable media device is not automatically mounted in the filesystem.

    Expected Format of Evidence

    Evidence can be presented in the form of logs/screenshot/screen-capture on how the network product responds when any removable media device is attached to it (e.g. the output log of the UNIX® mount command before and after insertion of the removable media device).

    PDFs af7d0797f4ae9a52e7c37935448349ca

    4.3.3.1.4 SYN Flood Prevention

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_SYN_FLOOD_PREVENTION
    Threat Reference

    TR 33.926 [4], clause 5.3.7.2, Implementation Flaw

    Requirement Name

    SYN Flood Prevention

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    The network product shall support a mechanism to prevent SYN Flood attacks (e.g. implement the TCP SYN Cookie technique in the TCP stack by setting net.ipv4.tcp_syncookies = 1 in the linux sysctl.conf file). This feature shall be enabled by default.

    Test Purpose

    Verify that the Network Product supports a Syn Flood Prevention technique.

    Pre-Conditions
    • Vendor documentation describing the SYN flood attack prevention mechanism or setting and where to check for them.

    • The Network Product is listening on a TCP port on one of its interfaces.

    • A network traffic analyser on the network product (e.g. TCPDUMP) or an external traffic analyser directly connected to the network product is available.

    • A host is connected to the Network Product interface and it is equipped with a tool able to reproduce a SYN Flood attack (e.g. nmap or hping)

    Execution Steps
    1. The tester verifies the prevention mechanism or setting described in the vendor documentation.

    2. The tester configures the tool to send a large quantity huge amount of TCP SYN packets against the Network Product (e.g. hping3 -i -S -p -d -c < Network Product IP>)

    NOTE: To calculate the large quantity number of packets the tester checks in the product documentation the link speed supported by the DUT in bytes (L). The tester chooses a size packet for the attack in bytes (S). Based on L and S, the tester calculates the amount of packets per second (P) to use with this formula:\ P = L / S

    1. The tester verifies that the Network Product is still functioning as expected, its services are still accessible and responsive to typical service function requests, and the memory or CPU usage does not exceed acceptable thresholds. Additionally, the tester confirms there are no crashes or deadlocks.

    a. While the SYN Flood attack is ongoing.

    b. After the SYN Flood attack was executed.

    Expected Results

    The Network Product does not become inoperative.

    Expected Format of Evidence
    • Executed commands or script used for the SYN flood attack.

    • The number of SYN packets sent per second.

    • Part of the configuration (plaintext or screenshot) showing the prevention mechanism or setting.

    PDFs af74dfe73c1857d85a50c731b29686d0

    4.3.3.1.4 SYN Flood Prevention

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_SYN_FLOOD_PREVENTION
    Threat Reference
    Requirement Name

    Syn Flood Prevention

    Requirement Reference
    Requirement Description

    The network product shall support a mechanism to prevent Syn Flood attacks (e.g. implement the TCP Syn Cookie technique in the TCP stack by setting net.ipv4.tcp_syncookies = 1 in the linux sysctl.conf file). This feature shall be enabled by default.

    Test Purpose

    Verify that the Network Product supports a Syn Flood Prevention technique.

    Pre-Conditions
    • Vendor documentation describing the SYN flood attack prevention mechanism or setting and where to check for them.

    • The Network Product is listening on a TCP port one of its interfaces.

    • A network traffic analyser on the network product (e.g. TCPDUMP) or an external traffic analyser directly connected to the network product is available.

    • A host is connected to the Network Product interface and it is equipped with a tool able to reproduce a Syn Flood attack (e.g. nmap or hping)

    Execution Steps
    1. The tester verifies the prevention mechanism or setting described in the vendor documentation.

    2. The tester configures the tool to send a huge amount of TCP Syn packets against the Network Product (e.g. hping3 -i -S -p -c < Network Product IP>)

    3. The tester verifies that the Network Product is still up and running normally, its services are still available and reachable, the service is able to respond to typical service function requests, the memory or CPU usage is not exhausted, there is no crash or deadlock.

    a. While the SYN Flood attack is ongoing.

    b. After the SYN Flood attack was executed.

    Expected Results

    The Network Product does not become inoperative.

    Expected Format of Evidence
    • Executed commands or script used for the SYN flood attack.

    • Part of the configuration (plaintext or screenshot) showing the prevention mechanism or setting.

    • A Pass/Fail result provided by the tester.

    PDFs 2c00981b22599f7738914d829df606ed

    4.3.3.1.5 Protection from buffer overflows

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_PROTECTION_FROM_BUFFER_OVERFLOW
    Threat Reference

    TR 33.926 [4], clause 5.3.7.2, Implementation Flaw

    Note: Void

    Requirement Name

    Protection mechanisms against buffer overflows

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    The system shall support mechanisms for buffer overflow protection. Documentation which describes these buffer overflow mechanisms and also how to check that they have been enabled and/or implemented shall be provided.

    Test Purpose

    To ensure that the system supports mechanisms that protect against buffer overflow.

    Pre-Conditions
    1. A document which provides a detailed technical description of the system's buffer overflow protection mechanisms.

    2. If a standard buffer overflow mechanism from a 3rd party vendor is used then a reference to the standard feature in the 3rd party vendors documentation should be provided.

    3. Test results from a test execution phase of buffer overflow protection mechanism testing.

    Execution Steps
    1. The tester verifies that there is:

    a. A technical description of the buffer overflow protection mechanisms that have been implemented on the system.

    b. Details of whether the buffer overflow protection mechanisms are implemented by default or if additional actions (e.g. scripts or commands manually executed) are required.

    c. If manually executed actions are required then detailed instructions should be included in the technical description.

    1. The tester verifies that the test results:

    a. Describe test procedures used to verify the buffer overflow protection mechanisms,

    b. Contain data which demonstrates/indicates that the buffer overflow protection mechanisms described in the technical description document have been implemented.

    c. Contains details of the test set-up for the testing of the buffer overflow protection mechanisms. Where simulators and/or scripts are used to artificially create the conditions to trigger the buffer overflow protection mechanism then details of these should also be included.

    Expected Results
    1. A technical description of the buffer overflow protection mechanisms that have been implemented on the system.

    2. Details of whether the buffer overflow protection mechanisms are implemented by default or if additional actions (e.g. scripts or commands manually executed) are required.

    3. If manually executed actions are required then detailed instructions should be included in the technical description.

    4. The test results should:

    5. Describe test procedures used to verify the buffer overflow protection mechanisms,

    6. Contain data which demonstrates/indicates that the buffer overflow protection mechanisms described in the technical description document have been implemented.

    7. Contain details of the test set-up for the testing of the buffer overflow protection mechanisms. Where simulators and/or scripts are used to artificially create the conditions to trigger the buffer overflow protection mechanism then details of these should also be included.

    Expected Format of Evidence

    Documentation showing each of the points in the results sections.

    PDFs 2fc5a68d9be1eac5115f9fcfe8cbd9d3

    4.3.3.1.5 Protection from buffer overflows

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_PROTECTION_FROM_BUFFER_OVERFLOW
    Threat Reference
    Requirement Name

    Protection mechanisms against buffer overflows

    Requirement Reference
    Requirement Description

    The system shall support mechanisms for buffer overflow protection. Documentation which describes these buffer overflow mechanisms and also how to check that they have been enabled and/or implemented shall be provided.

    Note: Void

    NOTE: Void

    Test Purpose

    To ensure that the system supports mechanisms that protect against buffer overflow.

    Pre-Conditions
    1. A document which provides a detailed technical description of the system's buffer overflow protection mechanisms.

    If a standard buffer overflow mechanism from a 3rd party vendor is used then a reference to the standard feature in the 3rd party vendors documentation should be provided.

    1. Test results from a test execution phase of buffer overflow protection mechanism testing.
    Execution Steps

    The accredited evaluator's test lab is required to execute the following steps:

    1. The tester verifies that there is:

    a. A technical description of the buffer overflow protection mechanisms that have been implemented on the system.

    b. Details of whether the buffer overflow protection mechanisms are implemented by default or if additional actions (e.g. scripts or commands manually executed) are required.

    c. If manually executed actions are required then detailed instructions should be included in the technical description.

    1. The tester verifies that the test results:

    a. Describe test procedures used to verify the buffer overflow protection mechanisms,

    b. Contain data which demonstrates/indicates that the buffer overflow protection mechanisms described in the technical description document have been implemented.

    c. Contains details of the test set-up for the testing of the buffer overflow protection mechanisms. Where simulators and/or scripts are used to artificially create the conditions to trigger the buffer overflow protection mechanism then details of these should also be included.

    Expected Results
    1. A technical description of the buffer overflow protection mechanisms that have been implemented on the system.

    2. Details of whether the buffer overflow protection mechanisms are implemented by default or if additional actions (e.g. scripts or commands manually executed) are required.

    3. If manually executed actions are required then detailed instructions should be included in the technical description.

    4. The test results should:

    5. Describe test procedures used to verify the buffer overflow protection mechanisms,

    6. Contain data which demonstrates/indicates that the buffer overflow protection mechanisms described in the technical description document have been implemented.

    7. Contain details of the test set-up for the testing of the buffer overflow protection mechanisms. Where simulators and/or scripts are used to artificially create the conditions to trigger the buffer overflow protection mechanism then details of these should also be included.

    Expected Format of Evidence

    Documentation showing each of the points in the results sections.

    PDFs 6cc632ad126ebb617f727f9f0f107d3c

    4.3.3.1.6 External file system mount restrictions

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_EXTERNAL_FILE_SYSTEM_MOUNT_RESTRICTIONS
    Threat Reference

    TR 33.926 [4], clause 5.3.8.2, Over-Privileged Processes/Services

    Requirement Name

    External file system mount restrictions

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    If a user is allowed to mount external file systems (attached locally or via the network), OS-level restrictions shall be set properly in order to prevent privilege escalation or extended access permissions due to the contents of the mounted file systems.

    Implementation example: In Linux® systems, administrators shall set the options nodev and nosuid in the /etc/fstab for all filesystems, which also have the "user" option.

    NOTE: This requirement does not apply when the docker is used to mount file system.

    Test Purpose

    Verify that OS-level restrictions are set properly for users that are allowed to mount external file systems (attached locally or via the network). This is to prevent privilege escalation or extended access permissions due to the contents of the mounted file systems.

    Pre-Conditions

    Tester has admin access to check and configure the external filesystem mount permissions in the OS.

    Tester has username and password of a user in the network product that has external filesystem mount privileges.

    Execution Steps
    1. The tester shall verify that OS-level restrictions are set properly in order to prevent privilege escalation due to the contents of the mounted file systems (e.g. In Linux® systems, administrators shall set the options nodev and nosuid in the /etc/fstab for all filesystems, which also have the "user" option). The tester checks that OS-level parameters are configured correctly on the system.

    2. The tester mounts an external filesystem prepared by the tester with files exploiting privilege escalation methods (e.g. with writable SUID/GUID files).

    3. The tester tries to gain privileged access to system by using a suitable privilege escalation method using the contents of the mounted file system and then confirms that privilege escalation doesn't happen.

    Expected Results

    The OS-level restrictions are set properly in order to prevent privilege escalation or extended access permissions due to the contents of the mounted file systems.

    Any privilege escalation method used by the tester should be blocked.

    Expected Format of Evidence

    Screenshot containing the configuration file showing that OS-level restrictions are set properly for users that are allowed to mount external file systems.

    PDFs c48e7236d989a3932020f450f7c5b955

    4.3.3.1.6 External file system mount restrictions

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_EXTERNAL_FILE_SYSTEM_MOUNT_RESTRICTIONS
    Threat Reference
    Requirement Name

    External file system mount restrictions

    Requirement Reference
    Requirement Description

    If normal users are allowed to mount external file systems (attached locally or via the network), OS-level restrictions shall be set properly in order to prevent privilege escalation or extended access permissions due to the contents of the mounted file systems.

    Implementation example: In Linux® systems, administrators shall set the options nodev and nosuid in the /etc/fstab for all filesystems, which also have the "user" option.

    NOTE: This requirement does not apply when the docker is used to mount file system.

    Test Purpose

    Verify that OS-level restrictions are set properly for users that are allowed to mount external file systems (attached locally or via the network). This is to prevent privilege escalation or extended access permissions due to the contents of the mounted file systems.

    Pre-Conditions

    Tester has admin access to check and configure the external filesystem mount permissions in the OS.

    Tester has username and password of a user in the network product that has external filesystem mount privileges.

    Execution Steps

    Execute the following steps:

    1. The tester shall verify that OS-level restrictions are set properly in order to prevent privilege escalation due to the contents of the mounted file systems (e.g. In Linux® systems, administrators shall set the options nodev and nosuid in the /etc/fstab for all filesystems, which also have the "user" option). The tester checks that OS-level parameters are configured correctly on the system.

    2. The tester mounts an external filesystem prepared by the tester with files exploiting privilege escalation methods (e.g. with writable SUID/GUID files).

    3. The tester tries to gain privileged access to system by using a suitable privilege escalation method using the contents of the mounted file system and then confirms that privilege escalation doesn't happen.

    Expected Results

    The OS-level restrictions are set properly in order to prevent privilege escalation or extended access permissions due to the contents of the mounted file systems.

    Any privilege escalation method used by the tester should be blocked.

    Expected Format of Evidence

    Screenshot containing the configuration file showing that OS-level restrictions are set properly for users that are allowed to mount external file systems.

    PDFs 08dc61ce6c08441350a2e66167c834e2

    4.3.4.10 No directory listings

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_NO_DIRECTORY_LISTINGS
    Threat Reference

    TR 33.926 [4], clause 5.3.6.9, File/Directory Read Permissions Misuse

    Requirement Name

    No directory listings / Directory Browsing.

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    Directory listings (indexing) / "Directory browsing" shall be deactivated.

    Test Purpose

    To verify that Directory listings / Directory browsing has been deactivated in all Web server components.

    Procedure and execution steps

    Pre-Conditions
    • The tester has administrative privileges

    • A tester machine is available.

    • The tester should have configured a script, or an automatic assessment tool adapted in line with the Requirement Description..

    Execution Steps

    -1. The tester checksthe web server configuration for Directory listings (indexing) / "Directory browsing" to be deactivated in all Web server components.

    1. The tester attempts directory listings on all endpoints (domains, subdomains and directories) offered by the web server.

    NOTE 1: Whether directory listings have been deactivated could be done by checking the web server configuration file specifically the parameters related to directory listing. The directory listing could be turned off in the web server configuration file, and there is no activation capability.

    NOTE 2: Directory listings could be obtained by entering a valid URL (e.g., /var/www/test_1) that does not contain any index file.

    Expected Results
    • Directory listing / Directory browsing has been deactivated in all Web server components configurations.

    • The tester is unable to perform Directory listing / Directory browsing on all endpoints (domains, subdomains and directories) offered by the web server.

    Expected Format of Evidence
    • Log files and screen shots of test executions

    • Text excerpt of the web server configuration showing that directory listing is disabled

    PDFs ee93691d6208707cab567b04660dd9bf

    4.3.4.10 No directory listings

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_NO_DIRECTORY_LISTINGS
    Threat Reference
    Requirement Name

    No directory listings / Directory Browsing.

    Requirement Reference
    Requirement Description

    Directory listings (indexing) / "Directory browsing" shall be deactivated.

    Test Purpose

    To verify that Directory listings / Directory browsing has been deactivated in all Web server components.

    Procedure and execution steps

    Pre-Conditions
    • The tester has administrative privileges

    • A tester machine is available.

    • Recommended: an automatic assessment tool has been configured / script adapted in line with the Requirement Description.

    Execution Steps
    • Check that Directory listings (indexing) / "Directory browsing" has been deactivated in all Web server components.
    Expected Results
    • Evidence that Directory listing / Directory browsing has been deactivated in all Web server components.
    Expected Format of Evidence

    A testing report provided by the testing agency which will consist of the following information:

    • Log files and screen shots of test executions

    • Test result (Passed or not)

    PDFs cbe969e439879d604aee276f9c8d7991

    4.3.4.11 Web server information in HTTP headers

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_NO_WEB_SERVER_HEADER_INFORMATION
    Threat Reference

    TR 33.926 [4], clause 5.3.6.5, System Fingerprinting

    Requirement Name

    Web server information in HTTP headers.

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    The HTTP header shall not include information on the version of the web server and the modules/add-ons used.

    Test Purpose

    To verify that HTTP headers do not include information on the version of the web server and the modules/add-ons used.

    Procedure and execution steps

    Pre-Conditions
    • The tester has administrative privileges.

    • A tester machine is available.

    • The tester should have configured a script, or an automatic assessment tool adapted in line with the Requirement Description.

    Execution Steps

    The tester checks that HTTP headers do not include information on the version of the web server and the modules/add-ons used.

    NOTE 1: The header information could be checked by examining a captured http packet or by observing the response to a manual request (e.g. curl --I ). Header fields to look for could be, but are not limited to, 'Server', 'X-Powered-By', 'Via' or custom header fields. Furthermore, unwanted web server information could be part of the response body (e.g. in HTML comments or meta tags) or a server banner.

    NOTE 2: The settings responsible for limiting the header information could be checked from the web server configuration file (e.g. Apache configuration has a 'ServerTokens' directive, which could be set to 'Prod'; nginx configuration has a 'server_tokens' directive, which could be set to 'off').

    Expected Results

    Evidence that HTTP headers do not include information on the version of the web server and the modules/add-ons used.

    Expected Format of Evidence

    Log files and screen shots of test executions.

    PDFs 3d78506121568c84725e8d109625e8fd

    4.3.4.11 Web server information in HTTP headers

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_NO_WEB_SERVER_HEADER_INFORMATION
    Threat Reference
    Requirement Name

    Information about the web server in HTTP headers shall be minimized.

    Requirement Reference
    Requirement Description

    The HTTP header shall not include information on the version of the web server and the modules/add-ons used.

    Test Purpose

    To verify that HTTP headers do not include information on the version of the web server and the modules/add-ons used.

    Procedure and execution steps

    Pre-Conditions
    • The tester has administrative privileges

    • A tester machine is available.

    • Recommended: an automatic assessment tool has been configured / script adapted in line with the Requirement Description.

    Execution Steps
    1. Check that HTTP headers do not include information on the version of the web server and the modules/add-ons used.
    Expected Results
    • Evidence that HTTP headers do not include information on the version of the web server and the modules/add-ons used.
    Expected Format of Evidence

    A testing report provided by the testing agency which will consist of the following information:

    • Log files and screen shots of test executions

    • Test result (Passed or not)

    PDFs fba9acd013247a6d9e0c19094bb2d0d9

    4.3.4.12 Web server information in error pages

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_NO_WEB_SERVER_ERROR_PAGES_INFORMATION
    Threat Reference

    TR 33.926 [4], 5.3.6.5, System Fingerprinting

    Requirement Name

    Web server information in error pages.

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    User-defined error pages shall not include version information about the web server and the modules/add-ons used. Error messages shall not include internal information such as internal server names, error codes, etc. Default error pages of the web server shall be replaced by error pages defined by the vendor.

    Test Purpose

    To verify that error pages and error messages do not include information about the web server.

    Procedure and execution steps

    Pre-Conditions
    • The tester has needed administrative privileges.

    • A tester machine is available.

    • The vendor provides documentation on user-defined error pages (e.g. location, content, where configured) and messages.

    • The vendor provides a list of potential parameters/commands to trigger events resulting in an http status code 3xx, 4xx, 5xx.

    • The tester should have configured a script, or an automatic assessment tool adapted in line with the Requirement Description.

    Execution Steps
    1. The tester verifies that the web server configuration does replace default error pages with error pages defined by the vendor.

    2. The tester verifies that the vendor defined error pages do not contain information about the web server.

    3. The tester triggers and captures at least one occurrence of the following HTTP status code classes:

    a. Redirection error response (300.399)

    b. Client error response (400.499)

    c. Server error response (500.599)

    NOTE 1: Possible error pages that could be displayed are: 3xx: redirection, 4xx: client errors, 5xx: server errors.

    NOTE 2: The 3xx error pages could be triggered by permanent or temporary move of content to other URL and the page is found because redirected.

    NOTE 3: The 4xx error page could be triggered by trying to access a URL pointing to a non-existent or restricted resource.

    NOTE 4: The 5xx error page could be triggered by requesting a HTTP method the web server does not support or disabled (e.g. CONNECT, PUT, PATCH).

    Expected Results

    Generated error pages and error messages do not include information about the web server.

    Expected Format of Evidence

    Log files and screen shots of test executions

    PDFs 9a2230cbb207f06cc0c0399a3061d695

    4.3.4.12 Web server information in error pages

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_NO_WEB_SERVER_ERROR_PAGES_INFORMATION
    Threat Reference
    Requirement Name

    Web server information in error pages shall be deleted.

    Requirement Reference
    Requirement Description

    User-defined error pages shall not include version information about the web server and the modules/add-ons used. Error messages shall not include internal information such as internal server names, error codes, etc. Default error pages of the web server shall be replaced by error pages defined by the vendor.

    Test Purpose

    To verify that error pages and error messages do not include information about the web server.

    Procedure and execution steps

    Pre-Conditions
    • The tester has needed administrative privileges.

    • A tester machine is available.

    • Recommended: an automatic assessment tool has been configured / script adapted in line with the Requirement Description.

    Execution Steps
    • Check that generated error pages and error messages do not include information about the web server.
    Expected Results
    • Evidence that generated error pages and error messages do not include information about the web server.
    Expected Format of Evidence

    A testing report provided by the testing agency which will consist of the following information:

    Log files and screen shots of test executions

  • Test result (Passed or not)

  • PDFs 1c80dcbd7291194803507148dd3b2fdd

    4.3.4.13 Minimized file type mappings

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_NO_WEB_SERVER_FILE_TYPE MAPPINGS
    Threat Reference

    TR 33.926 [4], clause 5.3.6.13, Unnecessary Applications

    Requirement Name

    Minimized file type mappings Requirement Reference: In accordance with industry best practice

    Requirement Reference
    Requirement Description

    File type- or script-mappings that are not required shall be deleted, e.g. php, phtml, js, sh, csh, bin, exe, pl, vbe, vbs.

    Test Purpose

    To verify that file type- or script-mappings that are not required have been deleted.

    Procedure and execution steps

    Pre-Conditions
    • The tester has needed administrative privileges.

    • A tester machine is available.

    • The tester should have configured a script, or an automatic assessment tool adapted in line with the Requirement Description.

    Execution Steps

    The tester checks that all file type- or script-mappings that are not required have been deleted.

    Expected Results

    Evidence that all file type- or script-mappings, that are not required, have been deleted.

    Expected Format of Evidence

    Log files and screen shots of test executions.

    PDFs 5ab57547a25718cc6e575e0ca80e700c

    4.3.4.13 Minimized file type mappings

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_NO_WEB_SERVER_FILE_TYPE MAPPINGS
    Threat Reference
    Requirement Name

    File type- or script-mappings that are not required shall be deleted.

    Requirement Reference
    Requirement Description

    File type- or script-mappings that are not required shall be deleted, e.g. php, phtml, js, sh, csh, bin, exe, pl, vbe, vbs.

    Test Purpose

    To verify that file type- or script-mappings that are not required have been deleted.

    Procedure and execution steps

    Pre-Conditions
    • The tester has needed administrative privileges.

    • A tester machine is available.

    • Recommended: an automatic assessment tool has been configured / script adapted in line with the Requirement Description.

    Execution Steps
    • Check that all file type- or script-mappings that are not required have been deleted.
    Expected Results
    • Evidence that all file type- or script-mappings, that are not required, have been deleted.
    Expected Format of Evidence

    A testing report provided by the testing agency which will consist of the following information:

    • Log files and screen shots of test executions

    • Test result (Passed or not)

    PDFs 67a9ab7208f6e2521c0bb204022da79f

    4.3.4.14 Restricted file access

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_RESTRICTED_FILE_ACCESS
    Threat Reference

    TR 33.926 [4], clause 5.3.6.9, File/Directory Read Permissions Misuse

    Requirement Name

    Restricted file access.

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    Restrictive access rights shall be assigned to all files which are directly or indirectly (e.g. via links or in virtual directories) in the web server's document directory. In particular, the web server shall not be able to access files which are not meant to be delivered.

    Test Purpose

    To test whether the restrictive access rights are assigned to all files which are directly or indirectly in the web server's document directory and to verify whether path traversal is made improbable.

    Pre-Conditions

    The web server is configured according to the manual

    Execution Steps
    1. The tester verifies that access rights on the servable content (meaning directories and files) is set to the following:

    a. The files are owned by the user that runs the web server;

    b. The files are not writable to others, except the web server's account;

    1. The tester verifies that the user running the web server is an unprivileged account;

    2. For Operating Systems that have chrooted environments, the tester verifies that the web server runs inside a jail or chrooted environment. If the chrooted environment is not used, the web server or system functionality can be used to restrict access to file directories.

    Expected Results
    • Name of user running the web server with the privileges of the account;

    • Access rights of files and directories that the web server serves;

    • Configuration that shows that the web server is in a chrooted environment, or restricted by accessing to file directories.

    Expected Format of Evidence

    A part of the configuration file / screenshot of the configuration showing that the web server, the file access rights and the account running the web server is properly configured.

    PDFs a81e0feae877f523c25e5220efa89e58

    4.3.4.14 Restricted file access

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_RESTRICTED_FILE_ACCESS
    Threat Reference
    Requirement Name

    The web server shall only deliver files which are meant to be delivered.

    Requirement Reference
    Requirement Description

    Restrictive access rights shall be assigned to all files which are directly or indirectly (e.g. via links or in virtual directories) in the web server's document directory. In particular, the web server shall not be able to access files which are not meant to be delivered.

    Test Purpose

    To test whether the restrictive access rights are assigned to all files which are directly or indirectly in the web server's document directory and to verify whether path traversal is made improbable.

    Pre-Conditions
    1. The web server is configured according to the manual
    Execution Steps

    Execute the following steps:

    1. The tester verifies that access rights on the servable content (meaning directories and files) is set to the following:

    a. The files are owned by the user that runs the web server;

    b. The files are not writable to others, except the web server's account;

    1. The tester verifies that the user running the web server is an unprivileged account;

    2. For Operating Systems that have chrooted environments, the tester verifies that the web server runs inside a jail or chrooted environment.

    Expected Results
    • Name of user running the web server with the privileges of the account;

    • Access rights of files and directories that the web server serves;

    • Configuration that shows that the web server is in a chrooted environment.

    Expected Format of Evidence

    A part of the configuration file / screenshot of the configuration showing that the web server, the file access rights and the account running the web server is properly configured.

    PDFs fb72c4eaf6faea02b46286cc7b3129e2

    4.3.4.2 No system privileges for web server

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_NO_SYSTEM_PRIVILEGES_WEB_SERVER
    Threat Reference

    TR 33.926 [4], clause 5.3.8, Elevation of privilege

    Requirement Name

    No system privileges for web server.

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    No web server processes shall run with system privileges. This is best achieved if the web server runs under an account that has minimum privileges. If a process is started by a user with system privileges, execution shall be transferred to a different user without system privileges after the start.

    Test Purpose

    Verify that the Web server is not run under system privileges.

    Pre-Conditions
    • The tester has needed administrative privileges.

    • A tester machine is available.

    • Recommended: an automatic assessment tool has been configured /script adapted in line with the Requirement Description.

    Execution Steps
    1. The tester checks that no web server processes run with system privileges. The tester checks that this is the case even for processes that may have been started by a user with system privileges.

    a. The tester starts the web server process as web server user and checks process privileges.

    b. If possible, the tester starts the web server process with system privileges and check if process privileges get dropped.

    1. The tester checks in relevant system settings and web server configurations that a web server user is configured with minimal privileges needed to run the web server and the web server is executable by that user.
    Expected Results
    • There are no findings of web server processes that run with system privileges.

    • System settings are set to ensure that no processes will run with system privileges.

    Expected Format of Evidence
    • Log files / command line output and screen shots of test executions

    • Part of web server and/or system configuration (plain text or screenshot) showing the configured user for the web server process

    PDFs e2fcb96d78aeae95dd1746125e0db0ee

    4.3.4.2 No system privileges for web server

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_NO_SYSTEM_PRIVILEGES_WEB_SERVER
    Threat Reference
    Requirement Name

    No system privileges for web server.

    Requirement Reference
    Requirement Description

    No web server processes shall run with system privileges. This is best achieved if the web server runs under an account that has minimum privileges. If a process is started by a user with system privileges, execution shall be transferred to a different user without system privileges after the start.

    Test Purpose

    Verify that the Web server is not run under system privileges.

    Pre-Conditions
    • The tester has needed administrative privileges.

    • A tester machine is available.

    • Recommended: an automatic assessment tool has been configured /script adapted in line with the Requirement Description.

    Execution Steps
    1. Check that no web server processes runs with system privileges. Check that this is the case even for processes that may have been started by a user with system privileges.

    2. Check that relevant system settings and configurations are correct to ensure fulfilment of the requirement.

    a. The tester starts the web server process as web server user and checks process privileges.

    b. If possible, the tester starts the web server process with system privileges and check if process privileges get dropped.

    1. The tester checks in relevant system settings and web server configurations that a web server user is configured with minimal privileges needed to run the web server and the web server is executable by that user.
    Expected Results
    • There are no findings of processes that run with system privileges.

    • System settings have been found correctly set to ensure that no processes will run with system privileges.

    Expected Format of Evidence

    A testing report provided by the testing agency which will consist of the following information:

    • Log files and screen shots of test executions

    • Test result (Passed or not)

    PDFs 842e99890444205f4dd9f492e4115ee9

    4.3.4.3 No unused HTTP methods

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_NO_UNUSED_HTTP_METHODS
    Threat Reference

    TR 33.926 [4] clause 5.3.6.11, Unnecessary Services

    Requirement Name

    No unused HTTP methods

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    HTTP methods that are not required shall be deactivated. Standard requests to web servers use GET, HEAD, and POST. If other methods are required, e.g, PUT, DELETE, PATCH, they shall not introduce security leaks such as TRACK or TRACE.

    Test Purpose

    Verify that the Web server has deactivated all HTTP methods that are not required.

    Procedure and execution steps

    Pre-Conditions
    • The tester has needed administrative privileges.

    • A tester machine is available.

    • Recommended: an automatic assessment tool has been configured / script adapted in line with the Requirement Description.

    Execution Steps

    Check that relevant system settings and configurations are in place to ensure fulfilment of the requirement.

    Expected Results

    System settings and configurations have been found and in normal operation, for all Web components of the system, to ensure that unneeded HTTP methods are deactivated.

    Expected Format of Evidence

    Log files and screen shots of test executions

    PDFs ad6f7b7843365a4448898ec056a809cc

    4.3.4.3 No unused HTTP methods

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_NO_UNUSED_HTTP_METHODS
    Threat Reference
    Requirement Name

    Unused HTTP methods shall be deactivated.

    Requirement Reference
    Requirement Description

    HTTP methods that are not required shall be deactivated. Standard requests to web servers use GET, HEAD, and POST. If other methods are required, e.g, PUT, DELETE, PATCH, they shall not introduce security leaks such as TRACK or TRACE.

    TBA

    Test Purpose

    Verify that the Web server has deactivated all HTTP methods that are not required.

    Procedure and execution steps

    Pre-Conditions
    • The tester has needed administrative privileges.

    • A tester machine is available.

    • Recommended: an automatic assessment tool has been configured / script adapted in line with the Requirement Description.

    Execution Steps
    • Check that relevant system settings and configurations are correct to ensure fulfilment of the requirement.
    Expected Results
    • System settings and configurations have been found adequately set, in all Web components of the system, to ensure that unneeded HTTP methods are deactivated.
    Expected Format of Evidence

    A testing report provided by the testing agency which will consist of the following information:

    Log files and screen shots of test executions

  • Test result (Passed or not)

  • PDFs 0111c6c8e06911ff035c97df80150d59

    4.3.4.4 No unused add-ons

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_NO_UNUSED_ADD-ONS
    Threat Reference

    TR 33.926 [4], clause 5.3.6.11, Unnecessary Services

    Requirement Name

    No unused add-ons

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    All optional add-ons and components of the web server shall be deactivated if they are not required. In particular, CGI or other scripting components, Server Side Includes (SSI), and WebDAV shall be deactivated if they are not required.

    Test Purpose

    To verify that the Web server has deactivated unneeded add-ons and unneeded scripting components.

    Procedure and execution steps

    Pre-Conditions
    • The vendor has supplied a list of add-ons or scripting tools for Web server components needed for system operation, and that therefore need to be exempted from the test investigation.

    • The tester has administrative privileges.

    • A tester machine is available.

    • Recommended: an automatic assessment tool has been configured / script adapted in line with the Requirement Description.

    Execution Steps
    1. Check that the web server is only running and listening on known ports (e.g. tcp port 80 and/or 443). Check that CGI or other scripting components, Server Side Includes (SSI), and WebDAV are deactivated if they are not required. See also guidance under 4.3.4.12.

    2. Check that nothing else has been installed than the web server.

    3. Check that relevant system settings and configurations are correct to ensure fulfilment of the requirement.

    Expected Results

    System settings and configurations have been found, for all Web components of the system, to ensure that all unneeded add-ons or script components are deactivated.

    Expected Format of Evidence

    Log files and screen shots of test executions.

    PDFs 27ecffd70dbbb1b7f6048b1a26812272

    4.3.4.4 No unused add-ons

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_NO_UNUSED_ADD-ONS
    Threat Reference
    Requirement Name

    Any add-ons and components that are not required shall be deactivated.

    Requirement Reference
    Requirement Description

    All optional add-ons and components of the web server shall be deactivated if they are not required. In particular, CGI or other scripting components, Server Side Includes (SSI), and WebDAV shall be deactivated if they are not required.

    Test Purpose

    To verify that the Web server has deactivated unneeded add-ons and unneeded scripting components.

    Procedure and execution steps

    Pre-Conditions
    • The vendor has supplied a list of add-ons or scripting tools for Web server components needed for system operation, and that therefore need to be exempted from the test investigation.

    • The tester has administrative privileges.

    • A tester machine is available.

    • Recommended: an automatic assessment tool has been configured / script adapted in line with the Requirement Description.

    Execution Steps
    1. Check that the web server is only running and listening on known ports (e.g. tcp port 80 and/or 443). Check that CGI or other scripting components, Server Side Includes (SSI), and WebDAV are deactivated if they are not required. See also guidance under 4.3.4.12.

    2. Check that nothing else has been installed than the web server.

    3. Check that relevant system settings and configurations are correct to ensure fulfilment of the requirement.

    Expected Results
    • System settings and configurations have been found adequately set, in all Web components of the system, to ensure that all unneeded add-ons or script components are deactivated.
    Expected Format of Evidence

    A testing report provided by the testing agency which will consist of the following information:

    Log files and screen shots of test executions.

  • Test result (Passed or not).

  • PDFs 325df3bb588c93a45171028ab26ec227

    4.3.4.5 No compiler

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_NO_COMPILER_FOR_CGI
    Threat Reference

    TR 33.926 [4], clause 5.3.6, Information disclosure

    Requirement Name

    No compiler, interpreter, or shell via CGI or other server-side scripting.

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    If CGI (Common Gateway Interface) or other scripting technology is used, the CGI directory - or other corresponding scripting directory - shall not include compilers or interpreters (e.g. PERL® interpreter, PHP interpreter/compiler, Tcl interpreter/compiler or operating system shells).

    Test Purpose

    To verify that there are no compilers, interpreters or shell accessible via CGI or other scripting components.

    Procedure and execution steps

    Pre-Conditions
    • The tester has administrative privileges

    • A tester machine is available.

    • Recommended: an automatic assessment tool has been configured /script adapted in line with the Requirement Description.

    Execution Steps
    1. Consult the web server configuration to identify all directories used for CGI or other scripting components.

    2. Check that there are no compilers or interpreters (e.g., PERL® interpreter, PHP interpreter/compiler, Tcl interpreter/compiler or operating system shells) in the directory/directories used for CGI or for other scripting tools (including PERL®, PHP, and others).

    Expected Results

    There are no compilers, interpreters or shells in directories accessible via CGI or other scripting components.

    Expected Format of Evidence
    • Log files and screen shots of test executions.

    • Part of web server configuration (plaintext or screenshot) showing all directories accessible by the CGI/scripting components.

    • List of files (with types and permissions, if available) inside the directories accessible by the CGI/scripting components.

    PDFs 3fcdaf5c0c5c498f4a105913252c69cd

    4.3.4.5 No compiler

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_NO_COMPILER_FOR_CGI
    Threat Reference
    Requirement Name

    No compiler, interpreter, or shell via CGI or other server-side scripting.

    Requirement Reference
    Requirement Description

    If CGI (Common Gateway Interface) or other scripting technology is used, the CGI directory - or other corresponding scripting directory - shall not include compilers or interpreters (e.g. PERL® interpreter, PHP interpreter/compiler, Tcl interpreter/compiler or operating system shells).

    Test Purpose

    To verify that there are no compilers, interpreters or shell accessible via CGI or other scripting components.

    Procedure and execution steps

    Pre-Conditions
    • The tester has administrative privileges

    • A tester machine is available.

    • Recommended: an automatic assessment tool has been configured /script adapted in line with the Requirement Description.

    Execution Steps
    1. Consult the web server configuration to identify all directories used for CGI or other scripting components.

    2. Check that there are no compilers or interpreters (e.g., PERL® interpreter, PHP interpreter/compiler, Tcl interpreter/compiler or operating system shells) in the directory/directories used for CGI or for other scripting tools (including PERL®, PHP, and others).

    Expected Results

    There are no compilers, interpreters or shells in directories accessible via CGI or other scripting components.

    Expected Format of Evidence

    A testing report provided by the testing agency which will consist of the following information:

    • Log files and screen shots of test executions.

    • Part of web server configuration (plaintext or screenshot) showing all directories accessible by the CGI/scripting components.

    • List of files (with types and permissions, if available) inside the directories accessible by the CGI/scripting components.

    • Test result (Passed or not).

    PDFs 4d645c9da90e0f39f6797550ea584efd

    4.3.4.6 No CGI or other scripting for uploads

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_NO_CGI_OR_SCRIPTING_FOR_UPLOADS
    Threat Reference

    TR 33.926 [4], clause 5.3.8.3, Folder Write Permission Abuse

    Requirement Name

    No CGI or other scripting for uploads.

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    If CGI or other scripting technology is used, all directories where the web server has write permissions shall be distinct from all directories containing CGI/script or executable code.

    Test Purpose

    To ensure that directories with write permissions for the web server do not contain executable code such as CGI scripts.

    Pre-Conditions

    If the web server is configured with CGI/Scripting on, this test applies.

    Execution Steps
    1. The tester identifies directories where the web server user has write permissions.

    2. The tester verifies that these writable directories do not contain any executable scripts, CGI programs, or other executable code.

    3. The tester verifies that directories configured for CGI/Scripting do not have write permissions for the web server.

    Expected Results

    Web server user writable directories are different from those containing executable code or the ones configured to be used for CGI/scripting.

    Expected Format of Evidence

    A part of the configuration file / screenshot of the configuration showing that the web server is properly configured and the corresponding file system permissions.

    PDFs 9e33207e7ce106da75eaa46a1713a18b

    4.3.4.6 No CGI or other scripting for uploads

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_NO_CGI_OR_SCRIPTING_FOR_UPLOADS
    Threat Reference
    Requirement Name

    No CGI or other scripting for uploads.

    Requirement Reference
    Requirement Description

    If CGI or other scripting technology is used, the associated CGI/script directory shall not be used for uploads.

    Test Purpose

    To test whether the upload directory is equal to the CGI/Scripting directory.

    Pre-Conditions

    If the web server is configured with CGI/Scripting on, this test applies.

    Execution Steps

    Execute the following steps:

    The tester checks whether the upload directory is configured to be different from the CGI/Scripting directory.

    Expected Results

    The configured upload directory is different from the CGI/Scripting directory.

    Additional evidence might be provided that shows that the web server has no write rights for the CGI/Scripting directory.

    Expected Format of Evidence

    A part of the configuration file / screenshot of the configuration showing that the web server is properly configured.

    PDFs 153065bcd70939597c59c8e7a1f1d6b0

    4.3.4.7 No execution of system commands with SSI

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_NO_EXECUTION_OF_SYSTEM_COMMANDS
    Threat Reference

    TR 33.926 [4], clause 5.3.8, Elevation of privilege

    Requirement Name

    No execution of system commands with SSI.

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    If Server Side Includes (SSI) is active, the execution of system commands shall be deactivated.

    Test Purpose

    To test whether it is possible to use the exec directive and if so, whether it can be used for system commands.

    Pre-Conditions

    If the web server is configured with SSI active, this test applies.

    Execution Steps
    1. The tester checks whether execution of system commands is disabled in the web server configuration.

    2. The tester actually attempts to use the exec directive in an SSI file with and without system commands.

    Expected Results
    • The execution of system commands via SSIs exec directive is disabled in the web server configuration.

    • It is impossible to execute system commands via SSIs exec directive.

    Expected Format of Evidence
    • A part of the configuration file / screenshot of the configuration showing that the web server is properly configured. For example, a configuration file that shows that the IncludesNOEXEC (Apache HTTP Server®) or ssiExecDisable (Microsoft® IIS) is set.

    • Web server log while executing step 2.

    PDFs 157c55bbfe46552c16f0116e156e6dea

    4.3.4.7 No execution of system commands with SSI

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_NO_EXECUTION_OF_SYSTEM_COMMANDS
    Threat Reference
    Requirement Name

    No execution of system commands with SSI.

    Requirement Reference
    Requirement Description

    If Server Side Includes (SSI) is active, the execution of system commands shall be deactivated.

    Test Purpose

    To test whether it is possible to use the exec directive and if so, whether it can be used for system commands.

    Pre-Conditions

    If the web server is configured with SSI active, this test applies.

    Execution Steps

    Execute the following steps:

    1.-The tester checks whether execution of system commands is disabled in the web server configuration.

    1. The tester actually attempts to use the exec directive in an SSI file with and without system commands.
    Expected Results
    • The execution of system commands via SSIs exec directive is disabled in the web server configuration.

    • It is impossible to execute system commands via SSIs exec directive.

    Expected Format of Evidence
    • A part of the configuration file / screenshot of the configuration showing that the web server is properly configured. For example, a configuration file that shows that the IncludesNOEXEC (Apache HTTP Server®) or ssiExecDisable (Microsoft® IIS) is set.

    • Web server log while executing step 2.

    PDFs 18f87fdee8129332b388d4c7c2aa1337

    4.3.4.8 Access rights for web server configuration

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_ACCESS_RIGHTS_WEB_SERVER_FILES
    Threat Reference

    TR 33.926 [4], clause 5.3.8, Elevation of privilege

    Requirement Name

    Access rights for web server configuration files

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    Access rights for web server configuration files shall only be granted to the owner of the web server process or to a user with system privileges. Implementation example: Delete "read" and "write" access rights for "others." Only grant "write" access to the user who configures the web server.

    Test Purpose

    To verify that the access rights for Web server configuration files are correctly set.

    Procedure and execution steps

    Pre-Conditions
    • The tester has administrative privileges

    • A tester machine is available.

    • Recommended: an automatic assessment tool has been configured / script adapted in line with the Requirement Description.

    Execution Steps
    1. The tester identifies the user owning the web server process.

    2. The tester verifies that only the owner of the web server process and users with system privileges have "read" and "write" access rights for all web server configuration files and configuration directories.

    Expected Results

    Access rights for web server configuration files and directories are adequately set.

    Expected Format of Evidence

    Log files and screen shots of test executions

    PDFs 5ac4d454c5c9405806d7b98aa119415e

    4.3.4.8 Access rights for web server configuration

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_ACCESS_RIGHTS_WEB_SERVER_FILES
    Threat Reference
    Requirement Name

    Access rights for web server configuration files shall only be granted to the owner of the web server process or to a user with system privileges.

    Requirement Reference
    Requirement Description

    Access rights for web server configuration files shall only be granted to the owner of the web server process or to a user with system privileges. Implementation example: Delete "read" and "write" access rights for "others." Only grant "write" access to the user who configures the web server.

    Test Purpose

    To verify that the access rights for Web server configuration files are correctly set.

    Procedure and execution steps

    Pre-Conditions
    • The tester has administrative privileges

    • A tester machine is available.

    • Recommended: an automatic assessment tool has been configured / script adapted in line with the Requirement Description.

    Execution Steps
  • Check the access rights settings for Web server system configuration files.

  • Check that relevant system settings and configurations are correct to ensure fulfilment of the requirement.

  • Expected Results
    • Access rights for system configuration files are adequately set.
    Expected Format of Evidence

    A testing report provided by the testing agency which will consist of the following information:

    Log files and screen shots of test executions

  • Test result (Passed or not)

  • PDFs 118a61f978a2200061456e2cf4885d39

    4.3.4.9 No default content

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_NO_DEFAULT_CONTENT
    Threat Reference

    TR 33.926 [4], clause 5.3.6.8, Insecure Default Configuration

    Requirement Name

    No default content.

    Requirement Reference

    In accordance with industry best practice.

    Requirement Description

    Default content (examples, help files, documentation, aliases) that is provided with the standard installation of the web server shall be removed.

    Test Purpose

    To verify that there is no default content on the web server, that is not needed for web server operation, since such default content can be useful for an attacker.

    Procedure and execution steps

    Pre-Conditions
    • The tester has needed administrative privileges.

    • A tester machine is available.

    • The tester should have configured a script, or an automatic assessment tool adapted in line with the Requirement Description.

    NOTE: The term 'default content' is not clearly defined and is therefore different for different web servers (e.g., web server welcome page, default error page, etc.).

    Execution Steps

    The tester checks that all default content (examples, help files, documentation, aliases) that is provided with the standard installation of the web server has been removed.

    Expected Results

    No default content (examples, help files, documentation, aliases, un-needed directories or manuals) has been found to remain on any Web server component.

    Expected Format of Evidence

    Log files and screen shots of test executions.

    PDFs f1f96e79f50555174cb55d15afc4ee5b

    4.3.4.9 No default content

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_NO_DEFAULT_CONTENT
    Threat Reference
    Requirement Name

    Default content shall be removed.

    Requirement Reference
    Requirement Description

    Default content (examples, help files, documentation, aliases) that is provided with the standard installation of the web server shall be removed.

    Test Purpose

    To verify that there is no default content on the web server, that is not needed for web server operation, since such default content can be useful for an attacker.

    Procedure and execution steps

    Pre-Conditions
    • The tester has needed administrative privileges

    • A tester machine is available.

    • Recommended: an automatic assessment tool has been configured / script adapted in line with the Requirement Description.

    NOTE: The term 'default content' is not clearly defined and is therefore different for different web servers (e.g., web server welcome page, default error page, etc.).

    Execution Steps
    1. Check that all default content (examples, help files, documentation, aliases) that is provided with the standard installation of the web server has been removed.
    Expected Results
    • No default content (examples, help files, documentation, aliases, un-needed directories or manuals) has been found to remain on any Web server component.
    Expected Format of Evidence

    A testing report provided by the testing agency which will consist of the following information:

    Log files and screen shots of test executions.

  • Test result (Passed or not).

  • PDFs 17088478088e5fef324dca412532b830

    4.3.5.1 Traffic Separation

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_TRAFFIC_SEPARATION
    Threat Reference

    TR 33.926 [4], clause 5.3.6.15, lack of GNP traffic isolation

    Requirement Name

    Traffic Separation

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    The network product shall support physical or logical separation of traffic belonging to different network domains. For example, O&M traffic and control plane traffic belong to different network domains. See RFC 3871 [3] for further information.

    Test Purpose

    To test whether traffic belonging to different network domains is separated.

    Pre-Conditions

    NOTE: This test applies if the network product is meant to handle traffic from different network domains, e.g. both O&M and control plane traffic.

    The network product has at least two separate (logical) interfaces dedicated to different network domains. The vendor provides this domain related information for the tester. Network products for which the test applies and that fail to meet this precondition fail the test by definition.

    Execution Steps
    1. The tester checks whether the network product refuses traffic intended for one network domain on all interfaces meant for the other network domain, and vice versa.

    2. Step 1 is to be performed for all pairs of different network domains.

    Expected Results
    • The two tests are successful.

    • Traffic should not be passed to a domain from which it did not originate.

    Expected Format of Evidence

    Evidence containing the operational results as, e.g. screenshots, log files, packet captures, error messages.

    PDFs d8320b7311d5fc665732f5101d9dc607

    4.3.5.1 Traffic Separation

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_TRAFFIC_SEPARATION
    Threat Reference
    Requirement Name

    Traffic Separation

    Requirement Reference
    Requirement Description

    The network product shall support physical or logical separation of traffic belonging to different network domains. For example, O&M traffic and control plane traffic belong to different network domains. See RFC 3871 [3] for further information.

    Security Objective references: tba.

    Test Purpose

    To test whether traffic belonging to different network domains is separated.

    Pre-Conditions

    NOTE: This test applies if the network product is meant to handle traffic from different network domains, e.g. both O&M and control plane traffic.

    The network product has at least two separate (logical) interfaces dedicated to different network domains. Network products for which the test applies and that fail to meet this precondition fail the test by definition.

    Execution Steps

    Execute the following steps:

    1. The tester checks whether the network product refuses traffic intended for one network domain on all interfaces meant for the other network domain, and vice versa.

    2. Step 1 is to be performed for all pairs of different network domains.

    Expected Results

    The two tests should be successful.

    Expected Format of Evidence

    A PASS or FAIL.

    PDFs 8b7b9fb744b57ff592c92cad69d07e35

    4.3.6.2 No code execution or inclusion of external resources by JSON parsers

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_JSON_PARSER_CODE_EXEC_INCL
    Threat Reference

    TR 33.926 [4], clause 6.3.2.1, JSON Parser Exploits

    Requirement Name

    No code execution or inclusion of external resources by JSON parsers.

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    Parsers used by Network Functions (NF) shall not execute JavaScript or any other code contained in JSON objects received on Service Based Interfaces (SBI). Further, these parsers shall not include any resources external to the received JSON object itself, such as files from the NF's filesystem or other resources loaded externally.

    Test Purpose

    NFs implementing SBI transfer application data serialized as JSON objects. When receiving such data, an NF parses this JSON representation and creates equivalent internal data structures. Since the contents of the JSON objects shall be considered untrusted, blindly executing code fragments or loading resources from a local path or Uniform Resource Identifier (URI) shall not be possible.

    Pre-Conditions
    • The tester has the privileges to log in the network product and to access to all system resources (e.g. log files)

    • A list of all available network services containing at least the following information shall be included in the documentation accompanying the Network Product:

    • all interfaces providing IP-based protocols;

    • the available transport layer protocols on these interfaces;

    • their open ports and associated services in the form of an OpenAPI3.0 interface specification;

    • The tester has access to a Web Application Security (WAS) test tool that allows the tester to generate HTTP messages exploiting JSON parsers that do not prevent the above-mentioned scenarios of code execution and loading external resources. The test lab is expected to have sufficient expertise to recognize the level of effectiveness of the available tools.

    • A network traffic analyser on the network product (e.g. TCPDUMP) or an external traffic analyser directly connected to the network product and on a tester machine is available.

    Execution Steps
    1. The tester uses ae WAS test tool to generate HTTP requests (as described above in pre-conditions) towards the network product's API endpoints via its Service Based Interfaces.

    2. Using a network traffic analyser on the network product, e.g. TCPDUMP or an external traffic analyser directly connected to the network product, the tester verifies that no external resources get loaded during JSON parsing.

    3. Depending on the actual JavaScript code in the HTTP message, the tester verifies that the network product does not execute any of the contained actions.

    Expected Results
    • The NF does not load any resources external to the JSON object itself.

    • The NF does not execute any JavaScript code contained in JSON objects.

    Expected Format of Evidence
    • The used tool(s) name and version information

    • Settings and configurations used

    • The output log file of the chosen tool that displays the results (passed/failed).

    • Screenshot

    PDFs 2dc9c79c1ebbc6ba3b5e6ef98662b56c

    4.3.6.2 No code execution or inclusion of external resources by JSON parsers

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_JSON_PARSER_CODE_EXEC_INCL
    Threat Reference

    TR 33.926 [4], clause 6.3.2.1, JSON Parser Exploits

    Requirement Name

    No code execution or inclusion of external resources by JSON parsers.

    Requirement Reference
    Requirement Description

    Parsers used by Network Functions (NF) shall not execute JavaScript or any other code contained in JSON objects received on Service Based Interfaces (SBI). Further, these parsers shall not include any resources external to the received JSON object itself, such as files from the NF's filesystem or other resources loaded externally.

    Test Purpose

    NFs implementing SBI transfer application data serialized as JSON objects. When receiving such data, an NF parses this JSON representation and creates equivalent internal data structures. Since the contents of the JSON objects must be considered untrusted, blindly executing code fragments or loading resources from a local path or Uniform Resource Identifier (URI) must not be possible.

    Pre-Conditions
    • The tester has the privileges to log in the network product and to access to the all system resources (e.g. log files)

    • A list of all available network services containing at least the following information shall be included in the documentation accompanying the Network Product:

    • all interfaces providing IP-based protocols;

    • the available transport layer protocols on these interfaces;

    • their open ports and associated services in the form of an OpenAPI3.0 interface specification;

    • The tester should have access to an effective Web Application Security (WAS) test tool that allows to generate HTTP messages exploiting JSON parsers that do not prevent the above-mentioned scenarios of code execution and loading external resources. The accredited test lab is expected to have sufficient expertise to recognize the level of effectiveness of the available tools.

    • A network traffic analyser on the network product (e.g. TCPDUMP) or an external traffic analyser directly connected to the network product and on a tester machine is available.

    Execution Steps
    1. Execution of available WAS test tools against the network product's API endpoints via its Service Based Interfaces.

    2. Using a network traffic analyser on the network product, e.g. TCPDUMP or an external traffic analyser directly connected to the network product, the tester verifies that no external resources get loaded during JSON parsing.

    3. Depending on the actual JavaScript code in the HTTP message, the tester verifies that the network product does not execute any of the contained actions.

    Expected Results
    • The NF does not load any resources external to the JSON object itself.

    • The NF does not execute any JavaScript code contained in JSON objects.

    Expected Format of Evidence

    A testing report provided by the testing agency which will consist of the following information:

    • The used tool(s) name and version information

    • Settings and configurations used

    • The output log file of the chosen tool that displays the results (passed/failed).

    • Screenshot

    • Test result (Passed or not)

    PDFs da9d05a575d39328a7256ee91ec287c5

    4.3.6.3 Unique key values in Information Elements (IEs)

    Home General19.2.0
    33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_UNIQUE_KEY_VALUES
    Threat Reference

    TR 33.926 [4], clause 6.3.2.2, JSON Parser not Robust

    NOTE: This requirement can also be verified as part of Robustness and Protocol fuzzing tests as defined in clause 4.4.4 Robustness and fuzz testing according to referenced requirements.

    Requirement Name

    Validation of the unique key values in IEs.

    Requirement Reference

    TS 29.501 Principles and Guidelines for Services Definition [13], clause 6.2.

    Requirement Description

    For data structures where values are accessible using names (sometimes referred to as keys), e.g. a JSON object, the name is expected to be unique. The occurrence of the same name (or key) twice within such a structure leads to an error and the rejection of the message.

    Test Purpose

    Verify that the API implementation fulfils the requirements as specified in 29.501 [13], clause 6.2.

    Pre-Conditions

    Test environment with network product under test so that the tester is able to send HTTP requests with keys (valid and duplicate) in message IE payload towards the network product under test. Rest of the network and network products may be simulated.

    Execution Steps
    1. The test equipment sends HTTP requests with duplicate keys in message IE payload to the network product under test.

    2. The test equipment sends valid requests to network product under test

    Expected Results
    1. Network product under tests responses with an error message

    2. Network product under test still responses normally to valid requests

    Expected Format of Evidence
    • The used tool(s) name and version information,

    • Settings and configurations used

    • The output log file of the chosen tool that displays the results (passed/failed).

    • Log/evidence tracing possible crashes

    • Information of any input causing unspecified, undocumented, or unexpected behaviour

    PDFs d9d7f1cef85984ab39b01d38e15f3c8b

    4.3.6.3
    Unique key values in IEs

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20  
    Test Name
    Threat Reference

    TR 33.926 [4], clause 6.3.2.2, JSON Parser not Robust

    NOTE: This requirement can also be verified as part of Robustness and Protocol fuzzing tests as defined in clause 4.4.4 Robustness and fuzz testing according to referenced requirements.

    Requirement Name

    Validation of the unique key values in IEs.

    Requirement Reference

    3GPP TS 29.501 Principles and Guidelines for Services Definition [13], clause 6.2.

    Requirement Description

    "For data structures where values are accessible using names (sometimes referred to as keys), e.g. a JSON object, the name shall be unique. The occurrence of the same name (or key) twice within such a structure shall be an error and the message shall be rejected".

    Test Purpose

    Verify that the API implementation fullfills the requirements as specified in 29.501 [13], clause 6.2.

    Pre-Conditions

    Test environment with network product under test. Rest of the network and network products may be simulated.

    Execution Steps
    1. The test equipment sends requests with duplicate keys in message IE payload to the network product under test.

    2. The test equipment sends valid requests to network product under test

    Expected Results
    1. Network product under tests responses with an error message

    2. Network product under test still responses normally to valid requests

    Expected Format of Evidence
    • A testing report provided by the testing agency which will consist of the following information:

    • The used tool(s) name and version information,

    • Settings and configurations used

    • The output log file of the chosen tool that displays the results (passed/failed).

    • Test result (Passed or not)

    • Log/evidence tracing possible crashes

    • Information of any input causing unspecified, undocumented, or unexpected behaviour

    PDFs 750142222346ffbc2b6dcccc16d2d4ec

    4.3.6.4 The valid format and range of values for IEs

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_IE_VALUE_FORMAT
    Threat Reference

    TR 33.926 [4], clause 6.3.2.2, JSON Parser not Robust

    NOTE 1: This requirement can also be verified as part of Robustness and Protocol fuzzing tests as defined in clause 4.4.4 Robustness and fuzz testing according to referenced requirements.

    Requirement Name

    Validation of the IEs limits.

    Requirement Reference

    TS 29.501 Principles and Guidelines for Services Definition [13], clause 6.2

    Requirement Description

    The valid format and range of values for each IE, when applicable, is defined unambiguously:

    • For each message the number of leaf IEs does not exceed 2048K.

    • The maximum size of the JSON body of any HTTP request does not exceed 16 million octets.

    • The maximum nesting depth of leaves does not exceed 32.

    Test Purpose

    Verify that the API implementation fulfils the requirements as specified in 29.501[13], clause 6.2.

    Pre-Conditions

    Test environment with network product under test so that the tester is able to send HTTP requests with "out of bound IEs" towards the network product under test. Rest of the network may be simulated.

    NOTE 2: IEs having invalid format and/or not in the defined range of values can be considered as out of bound IEs.

    Execution Steps

    The test equipment sends HTTP requests with out of bounds IEs towards the network product under test.

    Expected Results

    Network product under tests responses with an error message.

    Expected Format of Evidence
    • The used tool(s) name and version information,

    • Settings and configurations used.

    • The output log file of the chosen tool that displays the results (passed/failed).

    • Log/evidence tracing possible crashes.

    • Information of any input causing unspecified, undocumented, or unexpected behaviour.

    PDFs 7d73c8b3c2227908ce593fdb63815ed7

    4.3.6.4 The valid format and range of values for IEs

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name
    Threat Reference

    TR 33.926 [4], clause 6.3.2.2, JSON Parser not Robust

    NOTE: This requirement can also be verified as part of Robustness and Protocol fuzzing tests as defined in clause 4.4.4 Robustness and fuzz testing according to referenced requirements.

    Requirement Name

    Validation of the IEs limits.

    Requirement Reference

    3GPP TS 29.501 Principles and Guidelines for Services Definition [13], clause 6.2

    Requirement Description

    "The valid format and range of values for each IE, when applicable, shall be defined unambiguously:

    • For each message the number of leaf IEs shall not exceed 16000.

    • The maximum size of the JSON body of any HTTP request shall not exceed 2 million bytes.

    • The maximum nesting depth of leaves shall not exceed 32."

    Test Purpose

    Verify that the API implementation fullfills the requirements as specified in 29.501[13], clause 6.2.

    Pre-Conditions

    Test environment with network product under test. Rest of the network may be simulated.

    Execution Steps
    1. The test equipment sends requests with out of bounds IEs towards the network product under test.
    Expected Results
    • Network product under tests responses with an error message.
    Expected Format of Evidence

    A testing report provided by the testing agency which will consist of the following information:

    • The used tool(s) name and version information,

    • Settings and configurations used.

    • The output log file of the chosen tool that displays the results (passed/failed).

    • Test result (Passed or not).

    • Log/evidence tracing possible crashes.

    • Information of any input causing unspecified, undocumented, or unexpected behaviour.

    PDFs 832b2f50a5a00d6a2af28464fc2effaf

    4.4.2 Port scanning

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_BVT_PORT_SCANNING
    Threat Reference

    TR 33.926 [4], clause 5.3.6.10, Insecure Network Services

    Requirement Name

    Port scanning

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    It shall be ensured that on all network interfaces, only documented ports on the transport layer respond to requests from outside the system.

    The test for this requirement can be carried out using a suitable tool or manually performed as described below. If a tool is used then the tester needs to provide evidence, e.g. by referring to the documentation of the tool, that the tool actually provides functionality equivalent to the steps described below.

    Test Purpose

    To ensure that on all network interfaces, only documented ports on the transport layer respond to requests from outside the system

    Pre-Conditions

    A list of all available network services containing at least the following information shall be included in the documentation accompanying the Network Product:

    1. all interfaces providing IP-based protocols;

    2. the available transport layer protocols on these interfaces;

    3. their open ports and associated services per transport layer protocol;

    4. and a free-form description of their purposes.

    The port scanning tool that is used shall be configured to scan all the transport layer ports and detect open ports for each network interface as identified in steps 1 to 4. above.

    NOTE 1: It might not be possible for certain transport layer protocols (like UDP) to unambiguously detect whether a port is open or not by means of external port scanning. Also, in some circumstances it might not be efficient to do external port scanning, e.g. if there are security measures to limit the rate a system can be probed. In those cases, the tester determines another means suitable to verify which ports are open.

    NOTE2: An interface providing IP-based protocols in the context of this test case is any interface, which the network product vendor implements with the intent to be accessible by any other network function or entity.

    Execution Steps

    The tester is required to execute the following steps:

    1. Verification of the compliance to the prerequisites:

    a. Verification that the list of available network services is available in the documentation of the Network Product

    b. Validation that all entries in the list in Pre-Conditions are necessary and it is justified in the documentation of the Network Product for the operation of the Network Product class

    1. Execution of the port scanning tool against all the interfaces providing IP-based protocols to identify open ports

    2. Verification that the list of open ports identified by the tool, matches the list of available network services in the documentation of the Network Product

    Expected Results

    The used tool(s) name, their unambiguous version (also for plug-ins if applicable), used settings, and the relevant output containing all the technically relevant information about test results is evidence and shall be part of the testing documentation.

    All discrepancies between the list of identified open ports and the list of available network services in the documentation shall be highlighted in the testing documentation.

    Expected Format of Evidence

    Output of portscan and list of identified discrepancies.

    PDFs 0381e2ee4214c66bd1429bb45b73e50d

    4.4.2
    Port Scanning

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_BVT_PORT_SCANNING
    Threat Reference
    Requirement Name

    Port scaning

    Requirement Reference
    Requirement Description

    It shall be ensured that on all network interfaces, only documented ports on the transport layer respond to requests from outside the system.

    The test for this requirement can be carried out using a suitable tool or manually performed as described below. If a tool is used then the tester needs to provide evidence, e.g. by referring to the documentation of the tool, that the tool actually provides functionality equivalent to the steps described below.

    Test Purpose

    To ensured that on all network interfaces, only documented ports on the transport layer respond to requests from outside the system

    Pre-Conditions

    A list of all available network services containing at least the following information shall be included in the documentation accompanying the Network Product:

    1. all interfaces providing IP-based protocols;

    2. the available transport layer protocols on these interfaces;

    3. their open ports and associated services per transport layer protocol;

    4. and a free-form description of their purposes.

    The port scanning tool that is used shall be capable to detect open ports on the relevant transport layer protocols.

    NOTE: It might not be possible for certain transport layer protocols (like UDP) to unambiguously detect whether a port is open or not by means of external port scanning. Also in some circumstances it might not be efficient to do external port scanning, e.g. if there are security measures to limit the rate a system can be probed. In those cases the accredited evaluator's test laboratory determines another means suitable to verify which ports are open.

    Execution Steps

    The accredited evaluator's test lab is required to execute the following steps:

    1. Verification of the compliance to the prerequisites:

    a. Verification that the list of available network services is available in the documentation of the Network Product

    b. Validation that all entries in the list of services are meaningful and reasonably necessary for the operation of the Network Product class

    1. Identification of the open ports by means of capable port scanning tools or other suitable testing means

    2. Verification that the list of identified open ports matches the list of available network services in the documentation of the Network Product

    Expected Results

    The used tool(s) name, their unambiguous version (also for plug-ins if applicable), used settings, and the relevant output containing all the technically relevant information about test results is evidence and shall be part of the testing documentation.

    All discrepancies between the list of identified open ports and the list of available network services in the documentation shall be highlighted in the testing documentation.

    Expected Format of Evidence

    Output of portscan and list of identified discrepancies.

    PDFs 3952b85591c09047e699b044f783a24c

    4.4.3 Vulnerability scanning

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_BVT_VULNERABILITY_SCANNING
    Threat Reference

    TR 33.926 [4], clause 5.3.6, Information disclosure

    Requirement Name

    Vulnerability scanning

    Requirement Reference

    In accordance with industry best practice

    Requirement Description

    The purpose of vulnerability scanning is to ensure that there are no known vulnerabilities (or that relevant vulnerabilities are identified and remediation plans in place to mitigate them) on the Network Product, both in the OS and in the applications installed, that can be detected by means of automatic testing tools via the Internet Protocol enabled network interfaces.

    Vulnerability scanning tools can report false positives and they shall be investigated and documented in the test report.

    The test for this requirement can be carried out using a vulnerability assessment tool or manually performed as described below. If a tool is used then the tester needs to provide evidence, e.g. by referring to the documentation of the tool, that the tool actually provides functionality equivalent to the steps described below.

    Test Purpose

    The purpose of vulnerability scanning is to ensure that there are no known vulnerabilities (or that relevant vulnerabilities are identified and remediation plans in place to mitigate them) on the Network Product that can be detected by means of automatic testing tools via the Internet Protocol enabled network interfaces.

    Pre-Conditions

    A list of all available network services containing at least the following information shall be included in the documentation accompanying the Network Product:

    • all interfaces providing IP-based protocols;

    • the available transport layer protocols on these interfaces;

    • their open ports and associated services;

    • and a free-form description of their purposes.

    NOTE 1: This list is to be validated as part of the BVT port scanning activity.

    The used vulnerability scanning tool shall be configured to assess each network service to detect known vulnerabilities on common services. The tool should be updated with the latest vulnerability information available at the time of testing.

    Execution Steps
    1. Execution of the suitable vulnerability scanning tool against all interfaces providing IP-based protocols of the Network Product.

    2. Evaluation of the results based on their severity.

    Expected Results

    The used tool(s) name, their unambiguous version (also for plug-ins if applicable), used settings, and the relevant output is evidence and shall be part of the testing documentation.

    The discovered vulnerabilities (including source, example CVE ID), together with a rating of their severity, shall be highlighted in the testing documentation.

    COTS Vulnerability scanners, by their nature, (e.g. depending on how they are configured) can result in false findings/positives. The tool's documentation may even mention to repeat checks to determine a recurring problem. The tester shall make best efforts to determine if there is an issue with NE or the test tool and if necessary, work with the vendor of the network product to come to a consensus on the test result outcome.

    NOTE 2: This testing documentation is input to the vulnerability mitigation process (that could include patching). This is part of the product lifecycle management process developed by GSMA SECAG.

    Expected Format of Evidence

    Output of BVT tool.

    PDFs e7c9e268e98f14a7dccb7404f8948e74

    4.4.3 Vulnerability scanning

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name TC_BVT_VULNERABILITY_SCANNING
    Threat Reference
    Requirement Name

    Vulnerability scanning

    Requirement Reference
    Requirement Description

    The purpose of vulnerability scanning is to ensure that there are no known vulnerabilities (or that relevant vulnerabilities are identified and remediation plans in place to mitigate them) on the Network Product, both in the OS and in the applications installed, that can be detected by means of automatic testing tools via the Internet Protocol enabled network interfaces.

    Vulnerability scanning tools may also report false positives and they shall be investigated and documented in the test report.

    The test for this requirement can be carried out using a suitable tool or manually performed as described below. If a tool is used then the tester needs to provide evidence, e.g. by referring to the documentation of the tool, that the tool actually provides functionality equivalent to the steps described below.

    Test Purpose

    The purpose of vulnerability scanning is to ensure that there are no known vulnerabilities (or that relevant vulnerabilities are identified and remediation plans in place to mitigate them) on the Network Product that can be detected by means of automatic testing tools via the Internet Protocol enabled network interfaces.

    Pre-Conditions

    A list of all available network services containing at least the following information shall be included in the documentation accompanying the Network Product:

    • all interfaces providing IP-based protocols;

    • the available transport layer protocols on these interfaces;

    • their open ports and associated services;

    • and a free-form description of their purposes.

    NOTE 1: This list is to be validated as part of the BVT port scanning activity.

    The used vulnerability scanning tool shall be capable to detect known vulnerabilities on common services. The used vulnerability information shall be reasonably recent at the time of testing.

    Execution Steps

    The accredited evaluator's test lab is required to execute the following steps:

    1. Execution of the suitable vulnerability scanning tool against all interfaces providing IP-based protocols of the Network Product.

    2. Evaluation of the results based on their severity.

    Expected Results

    The used tool(s) name, their unambiguous version (also for plug-ins if applicable), used settings, and the relevant output is evidence and shall be part of the testing documentation.

    The discovered vulnerabilities (including source, example CVE ID), together with a rating of their severity, shall be highlighted in the testing documentation.

    COTS Vulnerability scanners, by their nature, (e.g. depending on how they are configured) may result in false findings/positives. The tool's documentation may even mention that the failing test shall be repeated to check whether it is really a recurring problem or not. The tester shall make best effort to determine if there is an issue with NE or the test tool and if necessary, work with the vendor of the network product to come to a consensus on the test result outcome.

    NOTE 2: This testing documentation is input to the vulnerability mitigation process (that may include patching). This is part of the product lifecycle management process developed by GSMA SECAG.

    Expected Format of Evidence

    Output of BVT tool.

    PDFs 754a116bb0ce8cfda82e45c1e7413301

    4.4.4 Robustness and fuzz testing

    Home General19.2.0
    33117-h00   33117-h10   33117-h20   33117-h30   33117-h40   33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10    33117-j20
    Test Name TC_BVT_ROBUSTNESS_AND_FUZZ_TESTING
    Threat Reference

    TR 33.926 [4], clause 5.3.7, Denial of service

    Requirement Name

    Robustness and fuzz testing

    Requirement Reference

    4.2.6.2.2. -- Interface Robustness

    Requirement Description

    It shall be ensured that externally reachable services are robust enough to detect or dismiss unexpected or malformed input.

    Test Purpose

    To verify that the network product provides externally reachable services which are robust against unexpected or malformed input. The target of this test are the protocol stacks (e.g. diameter stack) rather than the applications (e.g. web app).

    Pre-Conditions
    • The tester has the privileges to log in the network product and to access all system resources (e.g. log files)

    • A list of all available network services containing at least the following information shall be included in the documentation accompanying the Network Product:

    • all interfaces providing IP-based protocols;

    • the available transport layer protocols on these interfaces;

    • their open ports and associated services;

    • and a free-form description of their purposes.

    NOTE: This list is to be validated as part of the BVT port scanning activity.

    • The robustness and fuzzing tools that are selected for this test shall be capable to identify input which causes the Network Product to behave in an unspecified, undocumented, or unexpected manner.

    • Fuzz testing tools are a highly sophisticated technology and adaptation to the individual protocols in question is needed to be effective. Therefore, there is a lack of effective fuzz testing tools available especially for protocols proprietary to the Telco industry. Taking into account note 4 in clause 7.2.4 of TR 33.916 [19], test labs shall acquire fuzz testing tools for those protocols where commercially feasible.

    • It needs to be taken into account that fuzz testing tools might show drastic differences in terms of effectiveness. The tester is expected to recognize faults, misuse, or crashes in the protocol under test to determine the level of effectiveness of the available tools.

    • A network traffic analyser on the network product (e.g. TCPDUMP) or an external traffic analyser directly connected to the network product and on a tester machine is available.

    Execution Steps

    The tester is required to execute the following steps:

    1. Execution of fuzzing tools against the protocols available via interfaces providing IP-based protocols of the Network Product for a coverage of tests sufficient to be effective.

    2. Execution of robustness test tools against the protocols available via interfaces providing IP-based protocols of the Network Product for a coverage of tests sufficient to be effective.

    3. For both step 1 and 2:

    a. Using a network traffic analyser on the network product (e.g. TCPDUMP) or an external traffic analyser directly connected to the network product, the tester verifies that the packets are processed correctly by the network product.

    b. The testers verifies that the network product and any running network service does not crash.

    c. The execution of tests shall run sufficient times.

    Expected Results

    A list of all of the protocols of the network product reachable externally on an IP-based interface, together with an indication whether robustness and fuzz testing tools have been used against them, shall be part of the testing documentation. If no tool can be acquired for a protocol, a free form statement shall be used to explain why not.

    The used tool(s) name, their unambiguous version (also for plug-ins if applicable), used settings, and the relevant output is evidence and shall be part of the testing documentation.

    Any input causing unspecified, undocumented, or unexpected behaviour, and a description of this behaviour shall be highlighted in the testing documentation.

    COTS fuzzing tools, by their nature, may have an acceptable failure rate (e.g. 0.1%) due to different non-deterministic variables in their implementation. At some point the tool's documentation may even mention that the failing test shall be repeated to check whether it is really a recurring problem or not. The tester shall make best effort to determine if there is an issue with NE or the test tool and if necessary, work with the vendor of the network product to come to a consensus on the test result outcome.

    Expected Format of Evidence
    • The used tool(s) name and version information,

    • Settings and configurations used

    • The output log file of the chosen tool that displays the results (passed/failed).

    • Screenshot

    • Log/evidence tracing possible crashes

    • Any input causing unspecified, undocumented, or unexpected behaviour

    PDFs 1ef4e452018e1edd520fa5b46195a2a2

    4.4.4 Robustness and fuzz testing

    Home General17.4.0
    33117-h00   33117-h10   33117-h20   33117-h30    33117-h40 33117-h50   33117-i00   33117-i10   33117-i20   33117-i30   33117-j00   33117-j01   33117-j02   33117-j10   33117-j20  
    Test Name
    TC_BVT_ROBUSTNESS AND FUZZ TESTING
    Threat Reference
    Requirement Name

    Robustness and fuzz testing

    Requirement Reference

    4.2.6.2.2. -- Interface Robustness requirements

    Requirement Description

    It shall be ensured that externally reachable services are reasonably robust when receiving unexpected input

    Test Purpose

    To verify that the network product provides externally reachable services which are robust against unexpected input. The target of this test are the protocol stacks (e.g. diameter stack) rather than the applications (e.g. web app).

    Pre-Conditions
    • The tester has the privileges to log in the network product and to access all system resources (e.g. log files)

    • A list of all available network services containing at least the following information shall be included in the documentation accompanying the Network Product:

    • all interfaces providing IP-based protocols;

    • the available transport layer protocols on these interfaces;

    • their open ports and associated services;

    • and a free-form description of their purposes.

    NOTE: This list is to be validated as part of the BVT port scanning activity.

    • The robustness and fuzzing tools that are selected for this test shall utilize state-of-the-art technology to identify input which causes the Network Product to behave in an unspecified, undocumented, or unexpected manner.

    • Fuzz testing tools are a highly sophisticated technology and adaptation to the individual protocols in question is needed to be effective. Therefore, there is a lack of available effective fuzz testing tools available especially for protocols proprietary to the Telco industry. Taking into account note 4 of TR 33.916's clause 7.2.4, test labs shall acquire fuzz testing tools for those protocols where commercially feasible.

    • It needs to be taken into account that fuzz testing tools might show drastic differences in terms of effectiveness. The accredited test lab is expected to have sufficient expertise to recognize the level of effectiveness of the available tools.

    • A network traffic analyser on the network product (e.g. TCPDUMP) or an external traffic analyser directly connected to the network product and on a tester machine is available.

    Execution Steps

    The accredited evaluator's test lab is required to execute the following steps:

    1. Execution of available effective fuzzing tools against the protocols available via interfaces providing IP-based protocols of the Network Product for an amount of time sufficient to be effective.

    2. Execution of available effective robustness test tools against the protocols available via interfaces providing IP-based protocols of the Network Product for an amount of time sufficient to be effective.

    3. For both step 1 and 2:

    a. Using a network traffic analyser on the network product (e.g. TCPDUMP) or an external traffic analyser directly connected to the network product, the tester verifies that the packets are correctly processed by the network product.

    b. The testers verifies that the network product and any running network service does not crash.

    c. The execution of tests shall run sufficient times.

    Expected Results

    A list of all of the protocols of the network product reachable externally on an IP-based interface, together with an indication whether effective available robustness and fuzz testing tools have been used against them, shall be part of the testing documentation. If no tool can be acquired for a protocol, a free form statement should explain why not.

    The used tool(s) name, their unambiguous version (also for plug-ins if applicable), used settings, and the relevant output is evidence and shall be part of the testing documentation.

    Any input causing unspecified, undocumented, or unexpected behaviour, and a description of this behaviour shall be highlighted in the testing documentation.

    COTS fuzzing tools, by their nature, may have an acceptable failure rate (e.g. 0.1%) due to different non-deterministic variables in their implementation. At some point the tool's documentation may even mention that the failing test shall be repeated to check whether it is really a recurring problem or not. The tester shall make best effort to determine if there is an issue with NE or the test tool and if necessary, work with the vendor of the network product to come to a consensus on the test result outcome.

    Expected Format of Evidence

    A testing report provided by the testing agency which will consist of the following information:

    • The used tool(s) name and version information,

    • Settings and configurations used

    • The output log file of the chosen tool that displays the results (passed/failed).

    • Screenshot

    • Test result (Passed or not)

    • Log/evidence tracing possible crashes

    • Any input causing unspecified, undocumented, or unexpected behaviour

    PDFs 0bf77f56bc41f6ff7eea011b279b2c5a