Home
        - TÜViT TÜV Informationstechnik GmbH
         Contents
1.                 Device Management Update Device Firmware       Device Firmware                 R      R             R      R            R      R              w     W          parameters 1  Device Firmware    R      R             R      R             R      R                                parameters 2  Device Firmware functions    RW   RW  dm  RW   RW  Tee  RW   RW  Hede ad vi Seo  Maintenance Restart  Restart function                         E      E      E      E      E      E      E      E              Maintenance Communication Server Calls Service Test Call       Service Test Call    function       Log                       R      R             R      R             RW     RW               Maintenance Communication Server Calls Device Check Req Call       Device Check Req Call    functions       E      E             E      E             E      E                                   Message  R      R             R      R             R      R                  pc              Maintenance Restore       Restore parameters  R    R   DE  R    R   D  R    R   mE        E i       Maintenance Log Log setup       Maintenance Log    parameters          Maintenance Log    collection level       Maintenance Log System Log       Maintenance System Log EE      DE      RE DE  R    R    R    R    R   mE       Maintenance  um  R      R             R      R             R      R    qe         0         Communication Log       Maintenance Memory       Maintenance Memory    parameters       Mainten
2.         Page 17 of 59       3 2 Assumptions    In this section  the assumptions concerning the environment of the TOE are identified and described     A PHYSICAL It is assumed that the TOE is physically protected     RC Gate with its TOE is set in a place of safety such as business office  Therefore the TOE  containing the assets is indirectly protected  because an accessible user with evil intent cannot    access RC Gate respectively modify the TOE unobserved     A DEVICE It is assumed that image I O devices are trusted     Image I O devices are genuine products  Illegal applications are not installed on image I O    devices  In addition  firmware on image I O devices is not tampered     A NETWORK Itis assumed that the network is properly managed by responsible person   The network  which RC Gate and image I O devices belong to  is properly managed by    responsible persons  Furthermore  the network is protected from outer attack via Internet by    establishing a firewall and running virus protection programs     A CE It is assumed that Customer Engineer is trusted   The customer engineer  CE  is well trained and can be trusted  He She belongs to Ricoh or a  Ricoh   s affiliate company and reads the maintenance documentation thoroughly  responds  appropriately to RC Gate  He She does not change the configuration of RC Gate  does not  carry out the RC Gate and does not install programs into RC Gate without permission of user    administrator  Furthermore  the customer enginee
3.       53       Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     Page 5 of 59       List of Figures    Figure 1 Network environment of RC Gate Type BNI        iese sesse see se se se Ge Ge Re Ge ee ek ee AR ee GR nennen nre 8  Figure 2 Network environment of RC Gate Type BMI                   eese ener enne 9  Figure 3  RC Gate   nd the TOE  4  onere RE gebe ed E RO at 13    List of Tables    Table 1  Product name and code of RC Gate    ese se see Ge ee Re Se GR Ge Ge Ge Ge E ee ek ee GR Ge RR Ge ee 8  Table 2  Specific terms related to the RC Gate    ee se see see ek Ge ee Re RA Ge RR Ge Re Ge Re eke GRA Ge ek ee ee 14  Table 3  Assets that the TOE intends to protect       sorrnennrrvrnnorerevrnnenerennnevaenernrrsrnnererennnsranesnsenennersreneseresnesseene 16  Table 4  Setting items and allowed operations       iese sesse se se ek Ge Re GR ee GR Ge Ge Re GR Re GR Ge AR Ge Re GR ee nennen 24  Table 5  Information passed between RC Gate and CS                   sss eene 28  Table 6  Cryptographic operations  algorithms  and key sizes      srerervnrnannernrrvrnnvverennnerarnernrenernersrenereresvenseene 29  Table 7  Events recorded to audit log                      se ee ed Re ee ee Ge ee ee ee ee ee nennen nennen nennen 32  Table 8  TOE security assurance requirements  EAL3       ees esse esse esse esse esse ee ee ee ee ee ede eed Gee see se ee se ee ee 33  Table 9  Information included in the audit records    iese see se ee SR Se GR Ge Se RR Ge Re Ge Re e
4.     necessary  Furthermore  the Administrator has to keep his her password secret     OE CS CS shall ensure that the identification information is maintained correctly     CS is the only and unique server for RC Gate  so CS shall be trusted and the identification  information for HTTPS method and SMTP method shall be maintained correctly  The CS has    to check the time and date regularly among others and correct these  if necessary        Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     Page 23 of 59       5 IT Security Requirements    5 1 TOE Security Functional Requirements    In this section  the functional requirements of the TOE to achieve the security objectives identified in section 4 1  are described  The parts against which the assignment and selection operations defined in  CC  are performed are  identified with  bold letters and brackets      FDP ACC 1 Subset access control  Hierarchical to  No other components     FDP ACC 1 1 The TSF shall enforce the  assignment  RC Gate Operator Access Control Policy  on  assignment   Subject  operator  Administrator  Registrant or CE  or CS   Object  setting item   Operation    R    can see setting items existence  can view its current value     W   can see setting items existence  can change its value  but cannot necessarily view the  current and under change value of the item as only     characters are shown if not in  combination with  RW      A     can add  create  new setting items  can delete setting 
5.    FTP_ITC 1 1 The TSF shall provide a communication channel between itself and a remote trusted IT product that is  logically distinct from other communication channels and provides assured identification of its end    points and protection of the channel data from modification or disclosure   FTP_ITC 1 2 The TSF shall permit  selection  the TSF  to initiate communication via the trusted channel     FTP_ITC 1 3 The TSF shall initiate communication via the trusted channel for  assignment  exporting and  importing information listed in Table 5 between RC Gate and CS via HTTPS communication  method      Dependencies     No dependencies    Table 5  Information passed between RC Gate and CS       Operation Information    export from RC Gate to CS alert of image I O device  alert of RC Gate                   Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     Page 29 of 59          status of image I O device  notice of image I O device registration    notice of RC Gate registration       import from CS to RC Gate firmware of image I O devices    certificates of image I O device             request of setting modification of RC Gate       FCS COP 1 Cryptographic operation  Hierarchical to  No other components     FCS COP 1 1 The TSF shall perform  assignment  operations listed in Table 6  in accordance with a specified  cryptographic algorithm  assignment  listed in Table 6  and cryptographic key sizes  assignment   listed in Table 6  that meet the following   assi
6.   Device Check Req Call functions    Device Check Req Call functions       CS Check Req Call Message    Restore parameters    Message    Last backup date time   Last restoration date time   Restoration result     Error code       Restore function    Restore  function        Maintenance Restore Notify     Maintenance Restore Notify function    Notify  function        Maintenance Log Log setup    Maintenance Log parameters    Communication log max capacity     Log max capacity       Maintenance Log collection level    Log collection level          Maintenance Log System Log    Maintenance System Log    System Log             Maintenance Communication Log       Communication Log          Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved        Page 59 of 59          Maintenance Memory Maintenance Memory parameters Used RAM area   Free RAM area   Used storage area     Free storage area       Maintenance Service Call Maintenance Service Call parameters  Current SC status      1 SC code    Detail code   Date time     Center communication                               Maintenance Service Call parameters Service depot   2 Service depot connection  Maintenance System Status Maintenance System Status    Current system status      parameters Date time   Reason  Security Password CurrentUser CurrentUser  Password password  Security Permissions Permit access by service Permit access by service  Permit updating of Firmware from Permit updating of Firmware  Communication Serv
7.   Remote Communication Gate Type BN1  Remote Communication Gate Type BM1  Image I O device developer   s Guidance  Version 1 00  2005 03 25       Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     Page 39 of 59       7 PP Claims    There are no Protection Profiles claimed to which this ST is conformant        Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     Page 40 of 59       8 Rationale    8 1 Security Objectives Rationale    In this section  it is demonstrated that the security objectives identified in section 4 are suitable and covering all    aspects of the security environment described in section 3     Table 10 shows that each security objective covers at least one threat  OSP or assumption  and that each threat and    assumption is covered by at least one security objective     Table 10  Correspondence between security needs and security objectives    O COM  AUDIT    O CS ID  O TRUST NET  O AC AUDIT  O SYS AUDIT  OE TIME  OE PHYSIAL  OE DEVICE  OE NETWORK  OE ADMIN  OE CS          O OPE I amp A  x   O A RIGHTS  OE CE    T WEB       T CS COMM  T CS MAIL    x lt   x lt    x lt     gt x lt    O CIPHER       T FAKE_CS X       OSP AUDIT X X X X       A PHYSICAL X       A DEVICE X       A NETWORK X       A CE X       A ADMIN X          A CS 2                                                    T WEB is countered by O OPE_I amp A  O CIPHER and O A_RIGHTS  because it is ensured user access is user  access rights are limited via web interfa
8.   is normally used  Administrator can prohibit CE from accessing    TOE using Administrator setting menu     Authority of the administrator  the registrant and the CE is divided in this ST definitely  These authority    separations depend on a user selection in login by RC Gate monitor     2 3 Importance of security for RC Gate    It becomes important to protect all information at the office  Image I O devices like copier  facsimile or printer  almost have many information  These data such as copy counter  toner remaining amount and accident  information are available for accounting and maintenance  Especially counter data are used for accounting  so we  have to prevent many threats such as illegal counter alternation  non authorized CS  RC Gate is responsible for  prevention of these thinkable damages  Software module is executed on RC Gate exclusive hardware  The software  is written into suitable media as SD memory card  Main function of this software is recognition of Image I O    devices and sending correct data toward CS using SSL  Secure Socket Layer  or S MIME technology     Image I O device downtime is dramatically reduced through remote maintenance  RC Gate is ready for receiving  SC  stand for    Service Call     call for maintenance service  initiated from Image I O devices manufactured by Ricoh   and call CS immediately  Specifically  remote maintenance cuts downtime by sending such calls automatically to  CE  Remote counter monitoring means the user no longer ha
9.  2 2 3  Operation ADO IGS 1 1 1 1 1 1 1  ADV_FSP 1 1 1 2 3 3 4  ADV_HLD 1 2 2 3 4 5  ADV IMP 1 2 3 3  Development ADV IMT 1 2 3  ADV LLD 1 1 2 2  ADV RCR 1 1 1 1 2 2 3  ADV SPM 1 3 3 3  Guidance AGD ADM 1 1 1 1 1 1 1  Documents AGD USR 1 1 1 1 1 1 1  ALC DVS 1 1 1 2 2   Life Cycle ALG FLR  Support ALG LCD 1 2 2 3  ALC TAT 1 2 3 3  ATE COV 1 2 2 2 3 3  Tests ATE DPT 1 1 2 2 3  ATE FUN 1 1 1 1 2 2  ATE IND 1 2 2 2 2 2 3  AVA CCA 1 2 2  Vulnerability AVA MSU 1 2 2 3 3  Assessment AVA SOF 1 1 1 1 1 1  AVA VLA 1 1 2 3 4 4                                     Table 2  Evaluation assurance level summary    Evaluation assurance level 1  EAL1    functionally tested       EAL1 is applicable where some confidence in correct operation is required  but the threats  to security are not viewed as serious  It will be of value where independent assurance is  required to support the contention that due care has been exercised with respect to the  protection of personal or similar information     EAL1 provides an evaluation of the TOE as made available to the customer  including  independent testing against a specification  and an examination of the guidance  documentation provided  It is intended that an EAL1 evaluation could be successfully  conducted without assistance from the developer of the TOE  and for minimal outlay  An  evaluation at this level should provide evidence that the TOE functions in a manner  consistent with its documentation  and that it provides useful protection against i
10.  2005 09 26          2 Certification Body     CERTUVIT    CERTUVIT  the Certification Body of TUV Informationstechnik GmbH      member of TUV  NORD Group     was established in 1998 and offers a variety of services in the context of  security evaluation and validation     CERTUVIT was accredited in September 1999 for certification of IT security products  according to ITSEC and Common Criteria by Deutsche Akkreditierungsstelle fur  Informations  und Telekommunikationstechnik  Dekitz  now Deutsche Akkreditierungsstelle  Technik e V   DATech   Frankfurt Main under DAR registration no  DAT ZE 014 99 01 and  performs its projects under a quality management system certified against ISO 9001 by  Germanischer Lloyd  Hamburg     CERT  VIT is accredited by Bundesamt f  r Sicherheit in der Informationstechnik to issue the   German IT Security Certificate  which is recognised by BSI as equivalent to the  German IT  Security Certificate    of BSI     3 Specifications of the Certification Procedure    The certification body conducts the certification procedure according to the criteria laid  down in the following     e DIN EN 4501 1  e TUVIT Certification Scheme  e TUVIT Certification Conditions    e Regulations on the  German IT Security Certificate  issued by the BSI and accepted in  the contract of BSI and T  VIT as of November 20  2002     e Common Criteria for Information Technology Security Evaluation  CC  part 1 3  version  2 2  January 2004     e Common Methodology for Information
11.  ACM  CM automation ACM_AUT  Configuration management CM capabilities ACM_CAP  CM scope ACM_SCP  Class ADO  Delivery ADO_DEL  Delivery and operation Installation  generation and start up ADO_IGS  Class ADV  Functional specification ADV_FSP  Development High level design ADV_HLD  Implementation representation ADV_IMP  TSF internals ADV_INT  Low level design ADV_LLD  Representation correspondence ADV_RCR  Security policy modeling ADV_SPM  Class AGD  Administrator guidance AGD_ADM  Guidance documents User guidance AGD_USR  Class ALC  Development security ALC DVS  Life cycle support Flaw remediation ALC FLR  Life cycle definition ALC LCD  Tools and techniques ALC TAT  Class ATE  Coverage ATE COV  Tests Depth ATE DPT  Functional tests ATE FUN  Independent testing ATE IND  Class AVA  Covert channel analysis AVA CCA  Vulnerability assessment Misuse AVA MSU  Strength of TOE security functions AVA SOF  Vulnerability analysis AVA VLA       Table 1  Assurance family breakdown and mapping    Evaluation assurance levels  chapter 6      The Evaluation Assurance Levels  EALs  provide an increasing scale that balances the  level of assurance obtained with the cost and feasibility of acquiring that degree of  assurance  The CC approach identifies the separate concepts of assurance in a TOE at the  end of the evaluation  and of maintenance of that assurance during the operational use of  the TOE     It is important to note that not all families and components from Part 3 are included in the  E
12.  Basic                         R      R      R      R      R      R      RW     RW          parameters 5  Auth key version EE mE Er Er Sone NI  R    R   mE arne Ee Sats                                              Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved        Page 25 of 59                                                                                                          Setting items Allowed operations for each operator and access method  Administrator Registrant CE CS  direct dialup direct dialup direct dialup direct dialup  SMTP SMTP SMTP SMTP  HTTPS   HTTPS HTTPS   HTTPS HTTPS   HTTPS HTTPS   HTTPS   RC Gate Settings Network  Maintenance Port IP    R      R      R      RW     RW     RW     RW     RW     RW     RW     RW          address  Other Maintenance Port    R      R      R      R      R      R      R      R      R      R      R           parameters  LAN Port MAC address  R      R      R      R      R      R      R      R      R      R      R           Other LAN Port    RW     RW     RW     RW     RW     RW     RW     RW     RW     RW     RW          parameters  Ethernet speed  RW   RW   RW   RW   RW   RW   RW   RW   RW  cem p  se  DNS server parameters  RW   RW   RW   RW   RW   RW    W    W    W  EST a at  RC Gate Settings E mail  E mail parameters 1    RW   RW   RW     RW   RW   RW     RW   RW   RW     RW  SRW  Se  Communication Server  E mail address  RC Gate admin   s E mail    R      R      RW     R      R      RW                  
13.  LangemarckstraBe 20  D 45121 Essen  Germany B 16    TUVIT      Part C       Excerpts from the Criteria    The excerpts from the criteria are dealing with    conformance results  assurance categorization  evaluation assurance levels  strength of security function    vulnerability analysis    T  ViT GmbH w Certification body w LangemarckstraBe 20  D 45121 Essen  Germany C 1                Certification file  TUVIT DSZ CC 9240 2005 T  UViT  Certification report  Software Module of RC Gate  version 3 18 U i   2005 09 26  CC Part 1     Conformance results       The conformance result indicates the source of the collection of requirements that is met by  a TOE or PP that passes its evaluation  This conformance result is presented with respect  to Part 2  functional requirements   Part 3  assurance requirements  and  if applicable  to a  pre defined set of requirements  e g   EAL  Protection Profile      The conformance result consists of one of the following     Part 2 conformant   A PP or TOE is Part 2 conformant if the functional  requirements are based only upon functional components in Part 2     Part 2 extended   A PP or TOE is Part 2 extended if the functional requirements  include functional components not in Part 2     plus one of the following     Part 3 conformant   A PP or TOE is Part 3 conformant if the assurance  requirements are based only upon assurance components in Part 3     Part 3 extended   A PP or TOE is Part 3 extended if the assurance requirements  include a
14.  RW     RW     RW          address  E mail parameters 2  RW     RW     RW                          RW     RW     RW                         SMTP   POP server   server parameters 1  RW   RW   RW   RW   RW   RW        W    W        W  oi Sos FE  server parameters 2    RW     RW   RW   RW     RW   RW     RW     RW   RW      SEER EES  password   W      W      w      W      W      W      W      w      w                             RC Gate Settings Communication Method       Communication method ad  R               R    R    R    R    R    R   XE       Internet connection method        ker Ev EE oo oe SEED  R    R        R    R   EE       Other communication                            method parameters id E E DERE iud Ei E TE Ea TE Eu Dod  RC Gate Settings Net Connection Settings Connection Details   Internet connection method    R              R   PA nus  R    R         R    R   EE  Proxy password   W  See oS   W  uem dese   W    W         W    W  E  Proxy server parameters  RW      a   RW  See SP  RW   RW  se EE    sce  RC Gate Settings Net Connection Settings Dial up   Dial up internet connection   method PES ue apu d   o n ur Hu ar  MM mes Vall  Access point parameter 1 EMI  R   mE       RW  c TUS  RW  eneren m  RW  Rone  Access point text ad ad Eis      SSeS SEER FEE  RW  xm           Rec  Dialing Line parameters TOC  R              RW  TENE ad  RW             RW  SEER                                                    Copyright  c  2004  2005 Ricoh Company Ltd   all rights re
15.  Secure Digital memory card  which is a highly  sophisticated memory device about the size of a postage stamp and  it is used for providing the TOE or other applications for the image  I O device             Page 15 of 59          Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     Page 16 of 59       3 TOE Security Environment    3 1 Subjects and Assets    Subjects in context with the defined TOE       Operator  especially the Administrator  the Registrant and the Customer engineer  which    is also abbr  as CE     Communication server  also abbr  as CS       Attacker  also called unauthorized person  unauthorized operator  outer evil person      Furthermore  the attacker can also be a mimicked faked communication server     which is also called Fake CS  none authorized CS or pseudo CS     The assets that the TOE intends to protect are as follows     Table 3  Assets that the TOE intends to protect       TOE  In particular  IT security is focused on          user     Asset    data confidentiality Integrity availability       TOE Certificates for RC Gate       TOE Passwords for each operator x       TOE Audit logs                             access information  communication information  system X X  information   User Setting information for RC Gate X X  User Collected information of image I O devices X  User Firmware to update image I O device X  User Certificates for image I O device X          Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved
16.  TOE was evaluated against the claims of the Security Target   attached in part D  by  the    evaluation body of T  V Informationstechnik GmbH     TUViT   The evaluation was  completed on September 16  2005  TUViT s evaluation body is recognised by BSI     12 Assurance Package   The TOE security assurance requirements are based entirely on the assurance components  and classes defined in Part 3 of the Common Criteria  see part C of this report or  CC  Part  3 for details   The TOE meets the assurance requirements of assurance level EAL 3   Evaluation Assurance Level 3      1 3 Strength of Functions   The TOE s strength of functions is rated    basic     SOF basic   The strength of functions  rating does not include cryptographic algorithms for encryption and decryption  For more  details see also chapter 9 of this report     1 4 Functionality   The TOE   s security requirements have exclusively been taken from CC part 2  i e  the set is  CC part 2 conformant   CC   Chapter 9 lists the security functional requirements in detail   They are met by suitable IT security functions realized by the TOE     SF OPE I amp A  TSF identifies and authenticates operator  Administrator  Registrant  and CE  prior to the operation listed below  When authentication is  succeeded  TSF assigns a role  Administrator  Registrant and CE   to the operator     While the operator is entering password  the asterisks are shown  instead of password characters     If the wrong password is entered three con
17.  Technology Security Evaluation  CEM  part 1   version 0 6  January 1997     e Common Methodology for Information Technology Security Evaluation  CEM  part 2   version 2 2  January 2004     e Application Notes and Interpretations of the Scheme  AIS   published by BSI           in the following termed shortly TUViT    in the following termed shortly BSI    T  ViT GmbH w Certification body w LangemarckstraBe 20  D 45121 Essen  Germany A 3                Certification file  TUVIT DSZ CC 9240 2005 T  UViT  Certification report  Software Module of RC Gate  version 3 18 U i   2005 09 26    4 Recognition Agreements    In order to avoid multiple certification of the same product by different certification bodies a  mutual recognition of IT security certificates     as far as such certificates are based on  ITSEC or CC   under certain conditions was agreed  ceRTUVIT certificates are German IT  Security Certificates recognized by BSI     the national German certification body in  international agreements     to be equivalent to its own certificates but they are not part of  these international agreements     4 1 CC  Certificates   An arrangement  Common Criteria Arrangement  on the mutual recognition of certificates  based on the CC evaluation assurance levels up to and including EAL4 was signed  between the national participants of Australia and New Zealand  Austria  Canada  Czech  Republic  Finland  France  Germany  Greece  Hungary  India  Israel  Italy  Japan  The  Netherlands  Norw
18.  The evaluation performed in accordance to EAL3 has shown that the TOE security  functional requirements are correctly realised by the TOE security functions  Thus  in  realising these functional requirements  it is assured that the TOE will meet the security  objectives claimed in the ST     The evaluation has shown that the TOE will fulfil the claimed strength of function SOF basic  for the probabilistic and permutational mechanisms  account name password based  authentication   implemented in security function SF OPE I amp A     The sponsor must advise the certification authority about any modification of the TOE or its  guidance documentation  The certification authority will then check whether the certification  results are still valid and  if necessary  initiate all further steps concerning a re evaluation   The results of the evaluation are only applicable to  Software Module of RC Gate version  3 18     The validity can be extended to new versions and releases of the product  provided  the sponsor applies for re certification of the modified product  in accordance with the  procedural requirements  and the evaluation does not reveal any security deficiencies     10 Evaluation stipulations  comments and  recommendations    With reference to a potential vulnerability found during penetration testing the following hint  important to the end user   customer was provided by the developer on the web site for RC  Gate as supplement to Service Manual and Operating Instruction
19.  Type BM1  Version 1 0  2005 08 15  ADV_RCR 1 Correspondence Analysis for  Remote Communication Gate Type BNI   Remote Communication Gate Type BM1  Version 1 0  2005 08 15  AGD  AGD_ADM 1 Remote Communication Gate Type BN1  Remote  Guidance documents AGD_USR 1 Communication Gate Type BMI          Setup Guide  Operating Instructions  Version 1 0  2005 08 15  Service Manual for Remote Communication  Gate Type BN1  Remote Communication  Gate Type BM1          Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved        Page 50 of 59             Assurance Class    Assurance  Component          Assurance Measure    Version 1 0  2005 08 15    Remote Communication Gate Type  BNI BMI  Machine Code  A768 A769   SERVICE MANUAL  Version 1 0 revised  2005 05 24    Remote Communication Gate Type BNI   Remote Communication Gate Type BM1  Safety Information and Setup Guide  Version A768 8603A  A768 8605A   2005 06 22    Remote Communication Gate Type BNI   Remote Communication Gate Type BM1  Operating Instructions  Version A768 8604A A768 8606A   2005 07 01    Remote Communication Gate Type BNI   Remote Communication Gate Type BM1  CS developer   s Guidance  Version 1 00  2005 03 25    Remote Communication Gate Type BNI   Remote Communication Gate Type BM1  Image I O device developer   s Guidance  Version 1 00  2005 03 25    Remote Communication Gate Type BN1 BM1   Machine Code  A768 A769  SERVICE  MANUAL  Version 1 0 revised  2005 05 24   Remote Communication Gate Type BN1  Remo
20.  authenticates CS before communicates with CS by  HTTPS  When the identification and authentication is succeeded  it is allowed  to export or import information to from CS  If the identification and  authentication is failed  it is denied to export nor import information between  CS  For authentication of CS  TSF uses the HTTPS mutual authentication  mechanism        FIA AFL 1 SF OPE I amp A     If the wrong password is entered three consecutive times  TSF reject  identification and authentication for one minutes        FIA ATD 1 SF OPE I amp A     TSF identifies and authenticates operator  Administrator  Registrant and CE   prior to the operation listed below  When authentication is succeeded  TSF  assigns a role  Administrator  Registrant and CE  to the operator  If the  authentication is failed  the operator cannot perform following operations       read audit logs    read and modify setting information      modify password          FIA SOS 1 SF OPE I amp A    The operator can change his own password  The length of new password  should be at least 8 and at most 13 characters  If the length new password is  not in the range  the new password is rejected                 Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     Page 47 of 59          FIA UAU 1 SF OPE I amp A     FIA UID 1 TSF identifies and authenticates operator  Administrator  Registrant and CE   prior to the operation listed below  When authentication is succeeded  TSF  assigns a role  Administr
21.  bypassed  deactivated  or corrupted  it may still be  possible to defeat them by direct attack  A level or a specific metric may be claimed  for the strength of each of these functions  Strength of function analysis is  performed to determine whether such functions meet or exceed the claim  For  example  strength of function analysis of a password mechanism can demonstrate  that the password function meets the strength claim by showing that the password  space is sufficiently large      Three levels exist  SOF basic  SOF medium  and SOF high     T  ViT GmbH w Certification body w LangemarckstraBe 20  D 45121 Essen  Germany C 7                Certification file  TUVIT DSZ CC 9240 2005 T  UViT  Certification report  Software Module of RC Gate  version 3 18 U i   2005 09 26    Vulnerability analysis  AVA_VLA   AVA_VLA Vulnerability analysis       Vulnerability analysis consists of the identification of flaws potentially introduced in the  different refinement steps of the development  It results in the definition of penetration tests  through the collection of the necessary information concerning   1  the completeness of the  TSF  does the TSF counter all the postulated threats   and  2  the dependencies between  all security functions  These potential vulnerabilities are assessed through penetration  testing to determine whether they could  in practice  be exploitable to compromise the  security of the TOE        Application notes       A vulnerability analysis is performed by
22.  consumer needs     Security Function   A part or parts of the TOE that have to be relied upon for enforcing a  closely related subset of the rules from the TSP     Security Target   A set of security requirements and specifications to be used as the basis  for evaluation of an identified TOE     Semiformal   Expressed in a restricted syntax language with defined semantics     Strength of Function   A qualification of a TOE security function expressing the minimum  efforts assumed necessary to defeat its expected security behaviour by directly attacking its  underlying security mechanisms     SOF basic   A level of the TOE strength of function where analysis shows that the function  provides adequate protection against casual breach of TOE security by attackers  possessing a low attack potential     SOF medium   A level of the TOE strength of function where analysis shows that the  function provides adequate protection against straightforward or intentional breach of TOE  security by attackers possessing a moderate attack potential     T  ViT GmbH w Certification body w LangemarckstraBe 20  D 45121 Essen  Germany B 15                Certification file  TUVIT DSZ CC 9240 2005 T  UViT  Certification report  Software Module of RC Gate  version 3 18 U i j 2005 09 26    SOF high   A level of the TOE strength of function where analysis shows that the function  provides adequate protection against deliberately planned or organised breach of TOE  security by attackers possessing a hi
23.  for various services will be sent to CS from RC Gate   2  Access Point   The nearest access point of the area RC Gate is used  is pre installed   3  Image I O Devices managed via IP network    RC Gate can manage image I O devices and laser printers  which support MIB information or Ricoh   s remote    service    4  PC for Administration  Administrating RC Gate via PC Web browser  called    RC Gate Monitor       5  This Equipment  Remote Communication Gate Type BM1   Various pieces of information of the image I O devices managed by RC Gate are sent to CS   There is one communication method between RC Gate and CS     1  HTTPS method exchanges messages between CS as the HTTPS server and RC Gate as the HTTPS client     Firmware download and mail system cannot used in this type because of data transfer speed   6  The Image I O Devices managed via serial communication bus  TIA EIA 485     Image I O devices manufactured by Ricoh can also be managed  by directly connecting them to RC Gate with the    serial modular cable  A maximum of five image I O devices can be connected to one RC Gate     In this system security functionality of RC Gate consists of six functions as follows     1  RC Gate identifies and authenticates the different operators  administrator  registrant or CE      Communication between RC Gate and RC Gate Monitor is based on the https protocol   RC Gate controls operations performed by the operator    RC Gate identifies and authenticates CS before communicates with 
24.  items existence    can view its current value     can see setting items existence  can change its value  but cannot necessarily view the current and under change value of the item as only     lt  characters are shown if not in combination with  RW      can add  create  new setting items    can delete setting items  can execute a function    can not see setting items existence    can not view or change or the value of the setting item                                              Setting items Allowed operations for each operator and access method  Administrator Registrant CE CS  direct dialup direct dialup direct dialup direct dialup  SMTP SMTP SMTP SMTP  HTTPS   HTTPS HTTPS   HTTPS HTTPS   HTTPS HTTPS   HTTPS   RC Gate Settings Basic  RC Gate Setting Basic    R      R      R      R      R      R      R      R      R      R      R           parameters 1  RC Gate Setting Basic    R      R      R      R      R      R      R      R      R                         parameters 2  RC Gate Setting Basic    R      R             R      R             R      R             RW     RW          parameters 3  RC Gate Setting Basic    R      R             R      R             R      R                 d         parameters 4  Language                                            R      R      R      RW     RW          Time zone    RW     RW   RW   RW     RW   RW     RW     RW   RW   RW     RW  SES  Date   Time  RW     RW   RW     RW     RW     RW   RW     RW     RW     RW   RW  Sam  RC Gate Setting
25.  log exceeds 64 Kbytes  the oldest record is  overwritten with new record                 8 3 2 Rationale for strength of function claims    As shown in section 6 2  there are four security functions  SF OPE I amp A  SF CS_I amp A  SF CS_HTTPS and  SF CS SMIME  that have the probabilistic or permutational mechanism  Only the function SF OPE I amp A has the  strength SOF Basic  Other functions  SF CS I amp A  SF CS HTTPS  and SF CS SMIME  are excluded from the  SOF rating  On the other hand  as claimed in section 5 2  the minimum strength of TOE security functions is  SOF Basic  RC Gate manages data which are assets of only low financial value  Therefore  SOF Basic can be    considered appropriate for the assets  It is obvious that those claims are consistent     8 3 3 Rationale for combination of security functions    As shown in section 8 3 1  the 6 security functions defined in section 6 1 cover all the security functional  requirements  And as shown in section 8 2 4  those requirements mutually support each other  In addition  there is  no security weakness due to the combination of security functions  since those functions are independent each other   because it is obvious that there are no overlapping parts of them   That is  all the security functions work together    so as to satisfy the security functional requirements     8 3 4 Rationale for assurance measures    Table 14 shows that the corresponding assurance measures are provided for each assurance requirement due 
26.  low financial value  Therefore  SOF Basic can be considered    appropriate for the minimum strength of function level for the TOE     8 2 3 Rationale for assurance requirements    An attacker may disclose the information data  which is sent received between RC Gate and CS via Internet or  telephone line directly  The attacker may be an evil person wandering around Internet or monitoring line in secret   For providing this countermeasure  the TOE identifies and authenticates operator  SF OPE I amp A  and  communication apparatus  SF CS_I amp A   In addition  user data is encrypted by HTTPS  SF CS_HTTPS  and  SMIME  SF CS_SMIME      Summarized the following security functions are realised by probabilistic or permutational mechanisms        SF OPE I amp A        Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     Page 44 of 59       s SF CS I amp A   s SF CS_HTTPS and     SF CS_SMIME     Three of those      SF CS I amp A      SF CS HTTPS and     SF CS_SMIME     are realised only by cryptographic mechanisms whereas the strength of function of SF OPE_I amp A will be     SOF Basic     Furthermore  the higher attack potential is required for such attacks as bypassing or tampering the  TSF itself  and it is out of scope of this evaluation  RC Gate manages only data from the image devices  no direct    financial assets  i e  analysis of obvious vulnerabilities  AVA_VLA 1  is enough for general needs     On the other hand  it is needed to keep the secret concerning th
27.  security functional requirements    for the environment     TOE Summary Specification Rationale    Rationale for TOE security functions    In this section  it is demonstrated that the security functions defined in section 6 1 realize the security functional    requirements specified in section 5 1     Table 12 shows that each security function for the TOE covers at least one TOE security functional requirement     and that each TOE security functional requirement is covered by at least one security function for the TOE        Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     Page 45 of 59       Table 12  Correspondence between functional requirements and security functions       SF OPE I amp A  SF CS_I amp A  SF CS_HTTPS  SF CS_SMIME  SF AUDIT       FDP_ACC 1  FDP_ACF 1  FTP_ITC 1 X X  FCS_COP 1 X X X  FIA AFL 1  FIA ATD 1  FIA SOS 1  FIA UAU 1  FIA UAU 7  FIA UID 1  FMT MTD 1  FMT SMF 1  FMT SMR 1  FAU  GEN   FAU GEN 2  FAU SAR 1 a   FAU SAR l b   FAU STG 2       x lt      4   SF OPE AC                               POPE PG PE   PANNEN xx                   PV PG   PV PN                               The following Table 13 shows the corresponding part of description of the security function  which derives from          section 6 1   Table 13  Corresponding description of security functions  Requirement Description of security functions  FDP ACC 1 SF OPE AC   FDP ACF 1 TSF controls operations performed by the operator based on the operator   s    identifica
28.  the developer in order to ascertain the presence of  security vulnerabilities  and should consider at least the contents of all the TOE deliverables  including the ST for the targeted evaluation assurance level  The developer is required to  document the disposition of identified vulnerabilities to allow the evaluator to make use of  that information if it is found useful as a support for the evaluator s independent vulnerability  analysis     The intent of the developer analysis is to confirm that no identified security vulnerabilities  can be exploited in the intended environment for the TOE and that the TOE is resistant to  obvious penetration attacks     Obvious vulnerabilities are considered to be those that are open to exploitation that requires  a minimum of understanding of the TOE  skill  technical sophistication  and resources   These might be suggested by the TSF interface description  Obvious vulnerabilities include  those in the public domain  details of which should be known to a developer or available  from an evaluation authority     Performing a search for vulnerabilities in a systematic way requires that the developer  identify those vulnerabilities in a structured and repeatable way  as opposed to identifying  them in an ad hoc fashion  The associated evidence that the search for vulnerabilities was  systematic should include identification of all TOE documentation upon which the search for  flaws was based     Independent vulnerability analysis goes beyon
29.  view the current and under   change value of the item as only     characters are shown if not in  combination with  RW     A     can add  create  new setting items  can delete setting items      E  Can execute a function           can not see setting items existence  can not view or change or the value of the setting item       on setting items  objects   as defined in table 4 in  ST     Security policy is described more detailed in the ST which is attached as part D of this  certification report     4  Assumptions and Clarification of Scope    4 1 Usage Assumptions  It is assumed that the local network is properly managed and that RC Gate is physically  protected  Administrator  Registrant and Customer engineer  CE  are trustworthy     4 2 Environmental Assumptions  The specific conditions listed below are assumed to exist in the TOE environment  These  assumptions include essential environmental constraints on the use of the TOE     T  ViT GmbH w Certification body w LangemarckstraBe 20  D 45121 Essen  Germany B 8          Certification file  TUVIT DSZ CC 9240 2005 T  UViT  Certification report  Software Module of RC Gate  version 3 18 U i   2005 09 26          A PHYSICAL The TOE is physically protected  A DEVICE Laser printers and multifunctional printers are trusted  A NETWORK Network is properly managed by responsible persons  A CE Customer Engineer  CE  is trusted  A ADMIN Administrator and Registrant are trusted    A CS Communication Server is properly managed by resp
30.  which includes copier  printer  facsimile  and  multi functional device     UNIX compatible OS  is freeware and high portability  RC Gate is  working on  RC Gate OS  based on MontaVista Linux supplied by  MontaVista Software  Inc     Management Information Base  Network machinery managed with  SNMP is information to show in order to tell RC Gate about a state  of oneself outside  There is MIB2 prescribed with MIB1 and RFC  1213 prescribed as RFC 1156  and RC Gate shall treat MIB2 and  MIBI     Master key is a symmetric key  used by Certificate Manager    to  encrypt decrypt information     There are three kinds of operators  Administrator  Registrant and  CE     Public Key Infrastructure  which is a digital key technology used for  secure communication     Private key is used to encrypt decrypt information association with  public key     Public key is using to identify communication apparatus              2 Certificate Manager is part of an OpenSSL library and used from CS Management Module     Page 14 of 59          Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved        Term    Definition          RC Gate    RC Gate monitor    Registrant    SD memory card    Remote Communication Gate is the communication box between  image I O devices and the Communication Server     WEB interface of RC Gate  operator has access to RC Gate using  this interface     Registrant is the trusted person who is authorised to set up  operations of the RC Gate     SD memory card is
31. 05 08 15                         Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     Page 52 of 59       8 4 PP Claims Rationale    There are no Protection Profiles claimed to which this ST is conformant        Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     9 Annex    9 1 Source    Page 53 of 59       ISO IEC 15408  Information technology     Security techniques     Evaluation criteria for IT security   ISO IEC 15408 1 1999 E   Part 1  Introduction and general model   ISO IEC 15408 2 1999 E   Part 2  Security functional requirements   ISO IEC 15408 3 1999 E   Part 3  Security assurance requirements     9 2 Abbreviation    CC   CE   CS   DBMS   Image I O device  LAN   MIB   OS   PP   SC   SD memory card  SF   ST   TIA EIA   TOE   TSF    Common Criteria   Customer Engineer   Communication Server   Data Base Management System   Copier  Printer  Facsimile  and Multi functional Printer  Local Area Network   Management Information Base   Operating System   Protection Profile   Service Call   Secure Digital memory card   Security Function   Security Target   The US Telecommunications Industries Association and Electronics Industries Association  Target of Evaluation    TOE Security Function    9 3 Grouping Setting Items    RC Gate has many setting items and the setting items contain items not related to security functions  The setting    items shown in Table 4 are summarized for simplification  Each setting items shown in Table 4 are grouped fr
32. 1 Acronyms  13 2 Glossary    Bibliography    T  ViT GmbH w Certification body w LangemarckstraBe 20  D 45121 Essen  Germany    TUVIT       O 0 O oooO DA N NOOO OAA B RC CO    ml   h mk ak ak ol  Pe A O 3  amp             m    an A         Oo    B 2                Certification file  TUVIT DSZ CC 9240 2005 T  UViT  Certification report  Software Module of RC Gate  version 3 18 U i   2005 09 26    1 Executive Summary    1 1 Target of Evaluation and Evaluation Background  The TOE is the    Software module of RC Gate V3 18    implemented in the product Remote  Communication Gate Type BN1 and Remote Communication Gate Type BM1     The product RC Gate acts as a relay unit  which collects operational data like alerts  status  or counter information from networked laser printers or multifunctional printers  MFPs    Collected data is sent to a trusted management server via Internet or telephone line  Dial up  PPP connection   The trusted management server is called  Communication Server  CS     During transmission the information is HTTPS or S MIME secured  Once received  the data  is processed and used to generate meter billing  printer supply orders and fleet utilization  reports  Furthermore RC Gate supports the firmware update of networked laser printers and  multifunctional printers  MFPs      RC Gate identifies and authenticates different operators  administrator  registrant or CE   It  controls operations performed by the operator and identifies and authenticates CS before  com
33. ALs  This is not to say that these do not provide meaningful and desirable assurances     T  ViT GmbH w Certification body w LangemarckstraBe 20  D 45121 Essen  Germany C 3                   Certification file  TUVIT DSZ CC 9240 2005 T  UViT  Certification report  Software Module of RC Gate  version 3 18 U i j 2005 09 26    Instead  it is expected that these families and components will be considered for  augmentation of an EAL in those PPs and STs for which they provide utility        Evaluation assurance level  EAL  overview       Table 2 represents a summary of the EALs  The columns represent a hierarchically  ordered set of EALs  while the rows represent assurance families  Each number in the  resulting matrix identifies a specific assurance component where applicable     As outlined in the next section  seven hierarchically ordered evaluation assurance levels are  defined in the CC for the rating of a TOE s assurance  They are hierarchically ordered  inasmuch as each EAL represents more assurance than all lower EALs  The increase in  assurance from EAL to EAL is accomplished by substitution of a hierarchically higher  assurance component from the same assurance family  i e  increasing rigour  scope  and or  depth  and from the addition of assurance components from other assurance families  i e   adding new requirements      These EALs consist of an appropriate combination of assurance components as described  in chapter 2 of CC Part 3  More precisely  each EAL includes n
34. CS by HTTPS method   RC Gate shall export and import encrypted information when HTTPS method is selected     RC Gate shall export encrypted E mail information to CS when SMTP method is selected     DN  Se AMY    RC Gate records three types of audit log  access log  communication log and system log     2 2 Persons concerned    The followings are concerned persons of TOE  The person concerned is separated by authority to show in the    following  Every each authority is separated     1  Administrator  RC Gate administrator can access for various setting information of RC Gate  He She is a manager of a  customer managing RC Gate to be concrete  He She can access RC Gate through RC Gate monitor  and setting    of proxy is possible        Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     Page 11 of 59       2  Registrant    RC Gate registrant has authority to register RC Gate on CS  Registration Wizard is available on the RC Gate    monitor   Application Note     Registrant authority is opened up to above administrator  However  in case of user   s request CE  Customer    Engineer  to put up next is entrusted to this authority     3  CE    CE  Customer Engineer  can access information of RC Gate via RC Gate monitor to maintain it  or to  investigate it in an obstacle  He She is a trusted person authorized by RICOH or affiliate companies  He She    shall receive education of RC Gate and read  Service Manual  thoroughly     CE port  the outside LAN port of RC Gate
35. Furthermore  the customer engineer   CE  can change the administrator and registrant password if he knows their current password  The length of new  password should be at least 8 and at most 13 characters  If the length new password is not in the range  the new  password is rejected    Prior to identification and authentication it is possible to read RC Gate version and Licenses and to select language    and operator list via RC Gate monitor     SF OPE AC    TSF controls operations performed by the operator based on the operator s identification information and method to  communicate with CS  When direct HTTPS method  dialup HTTPS method  or SMTP method is used to    communicate with CS  operators can access to the information based on Table 4     SF CS I amp A    TSF identifies and authenticates CS before communicates with CS by HTTPS  When the identification and  authentication is succeeded  it is allowed to export or import information to from CS  If the identification and    authentication is failed  it is denied to export nor import information between CS     For authentication of CS  TSF uses the HTTPS mutual authentication mechanism     SF CS HTTPS   TSF can export and import information listed in Table 5 to from CS by using HTTPS protocol    TSF authenticates CS before export or import information  When CS is successfully authenticated  TSF encrypts  the information to export  and decrypts the imported information  Furthermore  CS is able to perform the allowed    ope
36. Internet or telephone line  directly  The attacker may be an evil person wandering around Internet or monitoring line in    secret     Leakage of  or tampering with information at Internet  when mail method is used     An attacker may disclose and or modify information in mails  relevant assets as defined in  chapter 3 1 before   which is sent from RC Gate toward CS via Internet  The attacker may be    an evil person wandering around Internet     A fake CS may be built in Internet or telephone network when RC Gate communicates  with CS     An attacker may build a fake CS  non authorized CS   In addition  he she may get the  information data  relevant assets as defined in chapter 3 1 before   which is sent received  between RC Gate and the fake CS via Internet or telephone line  The attacker may be an evil    person wandering around Internet or telephone network     3 4 Organisational Security Policies    In this section  the organisational security policies concerning the TOE are identified and described     OSP AUDIT    TOE shall write create logs for audit or maintenance     There are the following three types of log information       access information  Login authentication      communicating information  Sending information to CS and image I O device   Receiving information from CS and image I O device      system information  Start up of the TOE  Shutdown of the TOE     Process information     These defined types of log information should contain date and time of each ev
37. Ltd     Date  2005 08 15    Version 1 0    T  ViT GmbH w Certification body w LangemarckstraBe 20  D 45121 Essen  Germany    Page 1 of 59    Security Target for  Remote Communication Gate Type BN1  Remote Communication Gate    Type BMI    Author  Hiroshi KAKII  Atsushi SATOH  Tomoaki ENOKIDA  Masahiro ITOH  Chitose  MIURA  Haruyuki HIRABAYASHI  Jun SATOH  Ricoh Company  Ltd    Date  2005 08 15   Version  1 0       Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     Document Revision History    Page 2 of 59          Version    Date    Author    Description          1 0       2005 08 15       Hiroshi KAKI   Atsushi SATOH     Tomoaki  ENOKIDA     Masohiro ITOH   Chitose MIURA     Haruyuki  HIRABAYSHI     Jun SATOH       Adjusted version s  and date s  of all reference s              Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     Page 3 of 59       Table of Contents    Do    STIntroduchonsuartssasuskea arr stk seende a SiS 6  1 1 ST TlemtificatiO Rees     6  1 2 ST  OVET VIEW MER N n Ge be 6  1 3 ISO IEC 15408 Conformance Claim                       e se ee See Ee Se EG Be etes GEE tuse Se suse Be EG Gee Ge ee Se ee ee 7   2   AE EE EE RE EE optet deb qeu ea 8  2 1 Product Ty p  sees seks sei sedasie esse ie DE eg ee N ee bee ee Re RA     de Re ge Ne ee ede ede 8  2 2 Persons  coneerred       EE OE OO EE EE EE ED GE 10  2 3 Importance of security for RC Gate     essesevesnseensesnsenseensenneensennsensvennvsnnvsnnesnnesnnennnenneennsenseense
38. T environment    iese sesse se se ee Gee ek Ge ee GR ee Se Ge Re Gee Re ek ee ee 21   5   IT Security Hi OGE OE EE OR EE EE EE eI 23  5 1 TOE Security Functional Requirements       esevvnrenvvnnverenevenernnennennennennenevenennnennenevnnennennnenennenesenevenensen 23  5 2 Minimum Strength of Function Claim       sesecevesvenvennverevevenernnennennennennennvenevneennennnnnennenesenevnnennennnnennee 33  5 3 TOE Security Assurance Requirements     esreeneererevenernvennennennennennnnnennenneenennnennennnnnennennvenevnnensennnnennee 33  5 4 Security Requirements for the Environment      seseverevvvensensvnvennennvnnennenneenevnnennenennnennennvenevnnennennsnnennee 34   6  AAI EO DY Ee IE OU OE OE EE N IE RE RE ee cbe pesos eee ceie 35  6 1 TOE Security Functions       4   reete ss og se do sg sk ge ee Ge do dog ske ehe ge sod do ge be de See gs ees Ge goe 35  6 2 Strength of Function Claims                      4 ee ee Ge EG EG BEG eese Se seta seta Ee GE Ge Ge Ge EG EG Bee Bee ee Se sssi 36  6 3 Assurance Measures     sessesnvereerensennnnnennennvenennrenennnennenennneenenenenenneennenennnennenesnnsenenerenennnnnnenennnennennneneenee 36   7  JPPClaims2x AE EE RE MEE ELE Nada i DE EE DA ete 39   Se LE ES AE N EE ER AE inen IEE 40  8 1 Security Objectives Rationale        sesse sesse soe see Bee Bee Se Ee ee ee EE Ee Ge Ge Ge EG EG Bee Bee Se ee sete Ge a 40  8 2 Security Requirements Rationale                      4  sae soe EG Bee EG eese enne Be seta seta Ee Ge ss Ge Ge EG EG 
39. TUVIT      CERTIFICATION REPORT    Certification file     Product   system     Product manufacturer     Customer     Evaluation facility     Evaluation report     Result     Evaluation stipulations     Certifier     Certification stipulations     Essen  2005 09 26    Dr  Christoph Sutter    TUVIT DSZ CC 9240 2005    Remote Communication Unit   Software Module of Remote Communication Gate  Type BN1  amp  BM1  Version 3 18   summarized as   Software Module of RC Gate  version 3 18    Ricoh Company  Ltd   1 3 6 Nakamagome  Ohta ku  Tokyo  143 8555 Japan    see above    TUViT  evaluation body for IT security    Version 1 1 as of 2005 09 16  Document number  20653678 TUVIT  023 02  Author  Harald Wacker    EAL3    none    Joachim Faulhaber    none    Joachim Faulhaber    T  ViT GmbH w Certification body w LangemarckstraBe 20  D 45121 Essen  Germany    Certification file  TUVIT DSZ CC 9240 2005  Certification report  Software Module of RC Gate  version 3 18       Contents   Part A  Certificate and Background of the Certification  Part B  Certification Results   Part C  Excerpts from the Criteria   Part D  Security Target       TUVIT 2005 09 26    T  ViT GmbH w Certification body w LangemarckstraBe 20  D 45121 Essen  Germany II    TUVIT      Part A       Certificate and Background of the Certification    Part A presents a copy of the issued certificate and summarizes  e information about the certification body   e the certification procedure  and    e the performance of evaluation a
40. TuVvir  Certification report  Software Module of RC Gate  version 3 18 U i j 2005 09 26    This work was concluded on September 26  2005  The confirmation of the evaluation  assurance level  EAL  only applies on the condition that    e all stipulations regarding generation  configuration and operation  as given in part B of  this report  are observed     e the productis operated     where indicated     in the environment described     This certification report applies only to the version of the product indicated here  The validity  of the certificate can be extended to cover new versions and releases of the product   provided the applicant applies for re certification of the modified product  in accordance with  the procedural requirements  and provided the evaluation does not reveal any security  deficiencies     With regard to the meaning of the evaluation assurance levels  EAL  and the strength of  function  SOF   please refer to part C of this report     6 Publication    The following Certification Results consist of pages B 1 to B 16  The product Software  Module of RC Gate  version 3 18 will be included in the BSI list of certified products which is  published at regular intervals  e  g  in the Internet at http   www bsi bund de  and the TVIT  certification lists  http   www certuvit de            Further copies of this certification report may be ordered from the sponsor of the product   The certification report may also be obtained in electronic form at the internet a
41. U i   2005 09 26  e Certificates for image VO device    The threats as defined in the security target are     T WEB  Assets in RC Gate may be read  modified or destroyed by  employees or external attackers     T CS COMM  Leackage of  or tampering at Internet or telephone line  when RC  Gate communicates CS directly     T CS MAIL  Leackage of  or tampering with information at Internet  when mail  method is used     T FAKE_CS  A fake CS may be built in Internet or telephone network when RC  Gate communications with CS     The TOE complies with the following organisational security policy  OSP      OSP AUDIT  TOE shall write create logs for audit or maintenance     A more detailed description of the threats and OSPs  which were assumed for the  evaluation are specified in the ST which is attached as part D of this certification report     1 6 Special Configuration Requirements  The TOE is delivered as one fixed configuration and no further generation takes place after  delivery to the customer     1 7 Assumptions about the Operating Environment  The assumptions about the environment of use of the TOE and about the intended usage of  the TOE cover physical and personnel aspects     It is assumed that RC Gate is placed in a physical secure place  Multifuntional printers and  laser printers are genuine products  The network is properly managed and the CE is well  trained  Furthermore CE  administrator  registrant and the communication server can be  trusted     Further assumptions 
42. also schedules the    communication timing to CS or image I O device according to the setting information for RC Gate     DBMS provides data management function and interfaces of SD memory       SD memory stores collected information  settings or firmware and certificates for devices  Image I O device    information is stored in SD memory through DBMS           SMTP Communication Module sends mail information to external SMTP server        Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     Page 13 of 59          Web Management Module performs operator identification and authentication  This module also provides Web  interface          Flash memory is used for storing certificates  These certificates are read by Web Management Module when  RC Gate starts up      CS Management module performs CS identification  authentication and data exchange  Cryptographic function  is included in this module  Certificates are read via Web Management Module      Log Management Module provides log management function  Each module such as CS  Web and Device  Management Module send the logging event to Log Management Module  This module reads system time  from OS to create audit event  Log files are saved in SD memory      Device Management Module manages image I O devices  includes copier  printer  facsimile  and    multi functional device   Main function of this module is collecting information of Image I O devices     Communication Management Module    RC Gate    Flash Memor
43. ance Service Call       Maintenance Service Call   R      R      R      R      R      R      R      R      R      R      R           parameters 1                                                    Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     Page 28 of 59                                                                                  Setting items Allowed operations for each operator and access method  Administrator Registrant CE CS  direct dialup direct dialup direct dialup direct dialup  SMTP SMTP SMTP SMTP  HTTPS   HTTPS HTTPS   HTTPS HTTPS   HTTPS HTTPS   HTTPS   Maintenance Service Call    R      R             R      R             R      R             R     Re         parameters 2  Maintenance System Status  Maintenance System    R      R             R      R             R      R             R      R           Status parameters  Security Password  CurrentUser   gt  gt       see pe ga        W    W    W  m uuu x  Password   W      W      W      W      W      W      W      W      w                        Security Permissions  Permit access by service  RW   RW   RW          Sage aoe soos desc secs Soc Sars  Permit updating of  Firmware from  RW   RW  M RUE      Er                de               Communication Server  Security Access Log  Access Log  R      R      R      R      R      R      R      R      R                                                                       FTP_ITC 1 Inter TSF trusted channel  Hierarchical to  No other components  
44. ations could not be installed without being noticed by those responsible  therefore the image I O    device is held genuine status     A NETWORK is covered by OE NETWORK  because it is ensured that the office network is working well and    LAN circumstance is protected by firewall     A CE is covered by OE CE  because it is ensure that reliable CE comes to carry out the maintenance of RC Gate  since the user commissions the proper dealer to repair  They are responsible for the TOE confirms that CE is an    authentic person of Ricoh or a proper distributor and make efforts to keep up it correctly     A ADMIN is covered by OE ADMIN  because it is ensure that user administrator carries out the settings of RC    Gate since he she reads user   s documentations properly     A CS is covered by OE CS  because it is ensured that CS is unique and trusted  CS is protected from outer evil    person        Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     Page 42 of 59       8 2 Security Requirements Rationale    8 2 1 Rationale for functional requirements    In this section  it is demonstrated that the security functional requirements specified in section 5 achieve the    security objectives identified n section 4     Table 11 shows that TOE security functional requirement covers security objective for the TOE  and security    functional requirement for the IT environment covers security objective for the IT environment     Table 11  Correspondence between security obj
45. ator  Registrant and CE  to the operator  If the  authentication is failed  the operator cannot perform following operations       read audit logs    read and modify setting information      modify password       FIA_UAU 7 SF OPE_I amp A   While the operator is entering password  the asterisks are shown instead of  password characters        FMT_MTD 1 SF OPE_I amp A    The operator can change his own password  The length of new password  should be at least 8 and at most 13 characters  If the length new password is  not in the range  the new password is rejected        FMT SMF 1 SF OPE I amp A    The operator can change his own password  The length of new password  should be at least 8 and at most 13 characters  If the length new password is  not in the range  the new password is rejected        FMT SMR 1 SF OPE I amp A    TSF identifies and authenticates operator  Administrator  Registrant and CE   prior to the operation listed below  When authentication is succeeded  TSF  assigns a role  Administrator  Registrant and CE  to the operator  If the  authentication is failed  the operator cannot perform following operations       read audit logs    read and modify setting information      modify password    SF CS I amp A    TSF identifies and authenticates CS before communicates with CS by  HTTPS  When the identification and authentication is succeeded  it is allowed  to export or import information to from CS  If the identification and  authentication is failed  it is denied to 
46. ay  Republic of Singapore  Spain  Sweden  Turkey  United Kingdom and  the United States     4 2 ITSEC CC   Certificates   The SOGIS Agreement on the mutual recognition of certificates based on ITSEC was  signed by the national bodies of Finland  France  Germany  Greece  Italy  The Netherlands   Norway  Portugal  Spain  Sweden  Switzerland and the United Kingdom  The arrangement  on the mutual recognition of IT security certificates based on the CC was extended by these  participants up to and including the evaluation assurance level EAL7     5 Performance of Evaluation and Certification    The certification body monitors each individual evaluation to ensure uniform procedures   interpretations of the criteria  and ratings  The product Software Module of RC Gate  version  3 18 has undergone the certification procedure at TUViT certification body  It was an initial  certification     The evaluation of the product Software Module of RC Gate  version 3 18 was conducted by  the evaluation body for IT security of T  ViT and concluded on September 16  2005  The  TUVIT evaluation facility is recognised by BSI     The sponsor as well as the developer is Ricoh Company  Ltd  Distributor of the product is  Ricoh Company  Ltd     The certification was concluded with  e the comparability check and    e the preparation of this certification report     T  ViT GmbH w Certification body w LangemarckstraBe 20  D 45121 Essen  Germany A 4                Certification file  TUVIT DSZ CC 9240 2005 
47. ce  O OPE_I amp A is performed for operators by login ID and password  process  Access rights  as defined in Table 4 are ensured by O A_RIGHTS  Furthermore  data transmission is  encoded by O CIPHER  O CIPHER serves as prevention against network monitoring and therefore no one can    analyse the password respectively no one can analyse the authentication data to get unauthorized access rights     T CS_COMM is countered by O TRUST_NET  O CIPHER  because it is ensured that TOE communicates CS  using O TRUST NET  Communication data between TOE and CS is encrypted by O CIPHER        Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved        Page 41 of 59       T CS MAIL is countered by O CIPHER  because it is ensured that Mail information toward CS is encrypted by  O CIPHER  Encrypted mail information is decrypted by the private key of CS     T FAKE CS is countered by O CS ID  because it is ensured that TOE identifies and authenticates CS using a  unique ID by O CS_ID     OSP AUDIT is countered by O AC AUDIT  O COM_AUDIT  O SYS_AUDIT and OE TIME  because it is  ensured that access evidence is logged with occurred time by O AC_AUDIT  O COM_AUDIT  O SYS_AUDIT  and OE TIME     A PHYSICAL is covered by OE PHYSICAL  because it is ensured that storage media and the information stored in    are protected from an attacker  outer evil person      A DEVICE is covered by OE DEVICE  because it is ensured that image I O devices are set up in an orderly manner   and illegal applic
48. cess rights to  the administrator  registrant  customer engineer or communication server  CS  as stated in  ST    Table 4     The TOE must ensure a trusted communication between RC Gate and CS     For the communication between RC Gate and CS  a trusted channel  HTTPS communication     has to be used  focused on the identification and authentication protocol mechanisms      The TOE must ensure that communications are done through encrypted channel     When RC Gate is accessed by an operator via its web user interface or RC Gate is  communicating with CS directly  those data is encrypted decrypted using HTTPS  technology method    When RC Gate sends mail toward CS  the mail is encrypted using SMIME technology     TOE must ensure that access information shall be logged     When RC Gate is accessed via RC Gate monitor  access information must be logged by the  TOE        Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     Page 20 of 59       The logged access information can only be read out  not modified  by the administrator   registrant or CE  as stated specified in  ST   Table 4   Therefore  illegal access can be detected  by way of analysing this log     O COM AUDIT TOE must ensure that communicating information shall be logged     When RC Gate communicates with CS or with image I O devices  all specified communication  information   s has to be logged    The logged communication information   s can only be read out  not modified  by the  administrator  regi
49. d the vulnerabilities identified by the  developer  The main intent of the evaluator analysis is to determine that the TOE is  resistant to penetration attacks performed by an attacker possessing a low  for  AVA_VLA 2   moderate  for AVA_VLA 3  or high  for AVA_VLA 4  attack potential  To  accomplish this intent  the evaluator first assesses the exploitability of all identified  vulnerabilities  This is accomplished by conducting penetration testing  The evaluator  should assume the role of an attacker with a low  for AVA_VLA 2   moderate  for    T  ViT GmbH w Certification body w LangemarckstraBe 20  D 45121 Essen  Germany C 8                Certification file  TUVIT DSZ CC 9240 2005 TuVif  Certification report  Software Module of RC Gate  version 3 18 U I 2005 09 26    AVA VLA 3  or high  for AVA VLA 4  attack potential when attempting to penetrate the  TOE  Any exploitation of vulnerabilities by such an attacker should be considered by the  evaluator to be    obvious penetration attacks     with respect to the AVA VLA   2C elements   in the context of the components AVA VLA 2 through AVA VLA 4      T  ViT GmbH w Certification body w LangemarckstraBe 20  D 45121 Essen  Germany C 9    TUVIT      Part D       Security Target    Attached is the Security Target for    Remote Communication Gate Type  BN1  Remote Communication Gate Type BM1       Author  Hiroshi KAKII  Atsushi SATOH  Tomoaki ENOKIDA  Masahiro  ITOH  Chitose MIURA  Haruyuki HIRABAYASHI  Jun SATOH   Ricoh Company  
50. ddress of  CERTUVIT as stated above     T  ViT GmbH w Certification body w LangemarckstraBe 20  D 45121 Essen  Germany A 5    TUVIT      Part B  Certification Result       The following results represent a summary of  e the security target of the sponsor for the target of evaluation   e the relevant evaluation results from the evaluation facility  and    e complementary notes and stipulations of the certification body     TUVIT GmbH w Certification body w LangemarckstraBe 20  D 45121 Essen  Germany B 1    Certification file  TUVIT DSZ CC 9240 2005  Certification report  Software Module of RC Gate  version 3 18       2005 09 26       Contents of the Certification Result    1    O ao N O UI    11  12  13    14    Executive Summary   1 1 Target of Evaluation and Evaluation Background   1 2 Assurance Package   1 3 Strength of Functions   1 4 Functionality   1 5 Summary of Threats and Organisational Security Policies  OSPs   1 6 Special Configuration Requirements   1 7 Assumptions about the Operating Environment   1 8 Independence of the Certifier   1 9 Disclaimers    Identification of the TOE  Security Policy    Assumptions and Clarification of Scope  4 1 Usage Assumptions   4 2 Environmental Assumptions   4 3 Clarification of Scope    Architectural Information   Documentation   IT Product Testing   Evaluated Configuration   Results of the Evaluation   Evaluation stipulations  comments and recommendations  Certification stipulations and notes   Security Target    Definitions  13 
51. dentified  threats        T  ViT GmbH w Certification body w LangemarckstraBe 20  D 45121 Essen  Germany C 5                Certification file  TUVIT DSZ CC 9240 2005 TuVvir  Certification report  Software Module of RC Gate  version 3 18 U i   2005 09 26  Evaluation assurance level 2  EAL2    structurally tested       EAL2 requires the co operation of the developer in terms of the delivery of design  information and test results  but should not demand more effort on the part of the developer  than is consistent with good commercial practice  As such it should not require a  substantially increased investment of cost or time     EAL2 is therefore applicable in those circumstances where developers or users require a  low to moderate level of independently assured security in the absence of ready availability  of the complete development record  Such a situation may arise when securing legacy  systems  or where access to the developer may be limited        Evaluation assurance level 3  EAL3    methodically tested and checked       EAL3 permits a conscientious developer to gain maximum assurance from positive security  engineering at the design stage without substantial alteration of existing sound development  practices     EAL3 is applicable in those circumstances where developers or users require a moderate  level of independently assured security  and require a thorough investigation of the TOE  and its development without substantial re engineering        Evaluation assuranc
52. e events   a  Start up and shutdown of the audit functions     b  All auditable events for the  selection  not specified  level of audit  and  c   assignment  The events listed in Table 7         Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     Page 32 of 59       FAU GEN 1 2 The TSF shall record within each audit record at least the following information   a  Date and time of the event  type of event  subject identity  and the outcome  success or failure  of  the event  and  b  For each audit event type  based on the auditable event definitions of the functional components  included in the PP ST   assignment  no other audit relevant information     Dependencies     FPT STM 1 Reliable time stamps    Table 7  Events recorded to audit log             Type of audit log Event  Access log Login authentication  Communication log Sending information to CS and image I O device    Receiving information from CS and image I O device       System log Start up of the TOE  Shutdown of the TOE    Information of each function  e g  PPP Dial up   CGI Web   SMTP E Mail   DBMS Database                       FAU GEN 2 User identity association  Hierarchical to  No other components     FAU GEN 2 1 The TSF shall be able to associate each auditable event  refinement  of access log  with the identity of    the user that caused the event   Dependencies   FAU GEN 1 Audit data generation  FIA UID 1 Timing of identification    FAU SAR 1 a  Audit review  Hierarchical to  No other comp
53. e level 4  EAL4    methodically designed  tested  and  reviewed       EAL4 permits a developer to gain maximum assurance from positive security engineering  based on good commercial development practices which  though rigorous  do not require  substantial specialist knowledge  skills  and other resources  EAL4 is the highest level at  which it is likely to be economically feasible to retrofit to an existing product line     EAL4 is therefore applicable in those circumstances where developers or users require a  moderate to high level of independently assured security in conventional commodity TOEs  and are prepared to incur additional security specific engineering costs        Evaluation assurance level 5  EAL5    semiformally designed and tested       EAL5 permits a developer to gain maximum assurance from security engineering based  upon rigorous commercial development practices supported by moderate application of  specialist security engineering techniques  Such a TOE will probably be designed and  developed with the intent of achieving EAL5 assurance  It is likely that the additional costs  attributable to the EAL5 requirements  relative to rigorous development without the  application of specialised techniques  will not be large     T  ViT GmbH w Certification body w LangemarckstraBe 20  D 45121 Essen  Germany C 6          Certification file  TUVIT DSZ CC 9240 2005 TuVif  Certification report  Software Module of RC Gate  version 3 18 U i   2005 09 26          EAL5 is th
54. e relevant information in an effort to make an attack  harder  and Ricoh considers that it is meaningful to get confidence of security also from the development    environment  i e  development security  ALC_DVS 1      For the reason stated above  EAL3 is selected as the proper estimation assurance level for this TOE     8 2 4 Mutual support of security requirements    8 3    8 3 1    The set of security functional requirements that are selected in this ST covers all the TOE security objectives as  demonstrated in section 8 2 1    In this ST  the component FMT MSA 3 is required as the dependencies of FDP ACF 1  but FMT_MSA 3 is not  included in the TOE security functional requirements  The access right to the setting information is fixed  and the  security attributes are not changed  So  it is not necessary to change initial values of security attribute  and the  requirement FMT MSA 3 is not required    In this ST  the components FCS CKM 1  FCS CKM 4  and FMT MSA 2 are required as the dependencies of  FCS COP 1  but those requirements are not included in the TOE security functional requirements  The  cryptographic key is installed during production of RC Gate and is not replaced until the end of the life cycle   Therefore  the requirements FCS_CKM 1  FCS CKM 4  and FMT  MSA 2 are not required    In this ST  the component FPT  STM 1 is required as the dependencies of FAU GEN 1  but FPT SMT 1 is not  included in the TOE security functional requirements  FPT SMT 1 is included in
55. ectives and functional requirements                                    Elzsazsasszzzzzziz          8       3 5 3 5                            amp   O OPE_I amp A X XX XXX X  O CS ID X  O A RIGHTS XX XIX  O TRUST_NET X   X  O CIPHER X  O AC AUDIT X X X X  O COM  AUDIT X X X  O SYS AUDIT X XIX  OE TIME X                                                                      O OPE_I amp A is achieved by FIA_AFL 1  FIA ATD 1  FIA SOS 1  FIA_UAU 1  FIA_UAU 7  FIA UID 1 and  FMT SMR 1  because those requirements ensure that only authorized operator can access TOE data  i e     unauthorized person cannot access TOE     O CS ID is achieved by FTP ITC 1  because that requirement ensures that RC Gate identifies and authenticates CS     i e  RC Gate never connects pseudo CS     O A_RIGHTS is achieved first by FDP_ACC 1 and FDP_ACF 1  because these two requirements ensure that RC    Gate gives the defined specified access rights  as stated in Table 4  to the operator or CS  as correctly identified and       Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     Page 43 of 59       authenticated before  Additionally  O A RIGHTS is achieved by FMT_MTD 1  restriction to modify the password   and by FMT SMF 1  capability to modify operator s password      O TRUST NET is achieved by FTP ITC 1 and FCS COP 1  because those requirements ensure that CS is  identified and authenticated  when establishing a trusted channel  and the information  as stated in Table 5  respectively the rel
56. ecurity function evaluation  AVA VLA 1 Developer vulnerability analysis                5 4 Security Requirements for the Environment    In this section  the functional requirements of the environment to achieve the security objectives identified in  section 4 2 are described  The parts against which the assignment  selection  and refinement operations are    performed are identified with  bold letters and brackets      FPT_STM 1 Reliable time stamps   Hierarchical to  No other components    FPT STM 1 1 The  refinement  IT environment  shall be able to provide reliable time stamps for its own use   Dependencies     No dependencies       Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     Page 35 of 59       6 TOE Summary Specification    6 1 TOE Security Functions    SF OPE I amp A    TSF identifies and authenticates operator  Administrator  Registrant and CE  prior to the operation listed below   When authentication is succeeded  TSF assigns a role  Administrator  Registrant and CE  to the operator  If the    authentication is failed  the operator cannot perform following operations      read audit logs     read and modify setting information     modify password   While the operator is entering password  the asterisks are shown instead of password characters     If the wrong password is entered three consecutive times  TSF reject identification and authentication for one  minutes    The operator  Administrator  Registrant and CE  can change his own password  
57. ee ee Ee a 42   8 2 1 Rationale for functional requirements    ee GR Re ER RA RA GRA GRA Gee Ge ee ee Ge ee ee Re 42       Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     Page 4 of 59       8 22 Rationale for minimum strength of function level    sesse se se ee Ge ee Re Re GR ee RA Ge Re Ge Re eke ee 43  8 23 Rationale for assurance requirements        sesse see se ee ee ee eke GR Ge Re Ge ee GR ee GRA Ge Re Ge Re Re Gee Re ke ee 43  8 24 Mutual support of security requirements                esse see se ee Gee Se eene Ge Re Ge ee eke ge RA Ge ee Ge ee 44  8 3 TOE Summary Specification Rationale       sesossvvnsevnsveneesveenvevnversvensesseesnnvsnnesnnennsenneenneenseensenseensennsene 44  8 3 1 Rationale for TOE security functions    eerte eene nennen ener tnen rre trennen 44  8 3 2 Rationale for strength of function claims                    se se ek Ge Re Re GR enne enne enne nennen enne 48  8 3 3 Rationale for combination of security functions                  essere eene enne 48  8 3 4 Rationale for assurance measures       srrrrnrvrrannrrnrrnennernrrnennrevrenereresnernaenennsevrenersravnesvssnennsevreneenssvsesnee 48  8 4 PP  Claims ETD ELE ER ER EE Eae e Po aae Ere PERSE SER Ue Po Pe eU Re a eR REPE Te ead 52  PME IL aent ere M 53  9 1 SOUFCE                                               53  9 2 UP N  EE N kesir is sei ebai res eriu ESEESE RESEN ANSES PEE ESENE SVAS KESESER EPEE KESE iisS 53  9 3 LOO TANISDUPBIUI                                   
58. ent   Furthermore  the access information and communicating information should be steady checked  by administrator  registrant  and CE  Additionally  the system information should be checked  by CE and or CS        Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     Page 19 of 59       4 Security Objectives    4 1 Security Objectives for the TOE    In this section  the security objectives of the TOE that cover the aspects of the threats and OSP in section 3 3 are    described     O OPE_I amp A    O CS ID    O A RIGHTS    O TRUST NET    O CIPHER    O AC AUDIT    The TOE must identify and authenticate the operator     When someone accesses the TOE via Web Interface  the TOE must unambiguously identify one  of the following operators  administrator  registrant and or customer engineer  via secured  password login  After successfully operator identification and authentication  the TOE will give    the specified allowed access rights to the operator     The TOE must ensure that RC Gate shall communicate with the correct CS     The TOE will ensure that CS shall be strictly correct one  RC Gate compares a unique ID of    CS to the information of electrical certification  Therefore  no other server can access the TOE     The TOE must control access to the assets by appropriate access rights     After successfully operator identification and authentication  O OPE I amp A or O CS ID   the  TOE will give the specified allowed access rights to respectively control the ac
59. er from Communication Server  Security Access Log Access Log Log  Security Format RC Gate Format function Format  function                    Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     
60. ered to the user and marked with the developer s  identifiers                 TOE  Software module of RC Gate V3 18  Produet Remote Communication Gate Type BN1   TOE platform    Code Europe  A76827  Code North America A76817          Remote Communication Gate Type BM1       Code Europe  A76927       Code North America  A76917             Operating system of    the TOE platform  RC Gate OS V1 11  based on MontaVista Linux           The evaluated TOE version can be uniquely identified by comparison of the information  presented on RC Gate Login page  browser GUl browser window  with validation    T  ViT GmbH w Certification body w LangemarckstraBe 20  D 45121 Essen  Germany B 7                   Certification file  TUVIT DSZ CC 9240 2005 T  UViT  Certification report  Software Module of RC Gate  version 3 18 U i j 2005 09 26    information   s provided by the developer on the web site for RC Gate  e g     firmware  3 19 1 11      The first figure denotes the version of the TOE and the second figure denotes the version of  the underlying operating system     3 Security Policy    The security policy is described in section 5 1  ST  as  Role Based Access Control SFP     and deals with the following subjects     e Operator  Administrator  Registrant or CE   e Communication Server  CS     who can perform the following operations     R    can see setting items existence can view its current value        W   can see setting items existence  can change its value  but cannot necessarily
61. erefore applicable in those circumstances where developers or users require a  high level of independently assured security in a planned development and require a  rigorous development approach without incurring unreasonable costs attributable to  specialist security engineering techniques        Evaluation assurance level 6  EAL6    semiformally verified design and tested       EAL6 permits developers to gain high assurance from application of security engineering  techniques to a rigorous development environment in order to produce a premium TOE for  protecting high value assets against significant risks     EAL6 is therefore applicable to the development of security TOEs for application in high risk  situations where the value of the protected assets justifies the additional costs      Evaluation assurance level 7  EAL7    formally verified design and tested     EAL7 is applicable to the development of security TOEs for application in extremely  high risk situations and or where the high value of the assets justifies the higher  costs  Practical application of EAL7 is currently limited to TOEs with tightly focused  security functionality that is amenable to extensive formal analysis      Strength of TOE security functions  AVA SOF   AVA SOF Strength of TOE security functions     Strength of function analysis addresses TOE security functions that are realised by  a probabilistic or permutational mechanism  e g  a password or hash function   Even  if such functions cannot be
62. etrieve  device information    Interval time to retrieve device  counter information    Interval time to re  retrieve device  counter information    Number of times to re retrieve    device counter information          Devices to repeat search  HTTP and  SNMP        Devices to repeat search  HTTP  and SNMP           Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved        Page 57 of 59          Other Network Connection settings    Interval time to refresh device  connection  HTTP     Interval time to refresh device  connection  SNMP     Interval time to detect device  warning  SNMP     Interval time to start repeat search  function for devices  HTTP and  SNMP     Interval time to start repeat search  devices  HTTP and SNMP     Time lapse before devices are  considered temporarily suspended   HTTP and SNMP     Time lapse before devices are  considered suspended  HTTP and  SNMP        RS 485 Connection parameters    Interval time to refresh device  connection  RS 485     Time lapse before devices are  considered temporarily suspended   RS 485     Time lapse before devices are  considered suspended  RS 485    Time lapse before devices are  considered disconnected  RS 485        Device Management Connection  Details    Device retry parameters    Interval times to retry HTTP   SNMP RS 485 connections   Numbers of times to retry HTTP   SNMP RS 485 connections          Device Management Registered    Device List    M R Device List parameters I    IP address   Device l
63. evant defined assets in chapter 3 1  between RC Gate and CS is protected  i e  it is hard to    analyse the information     O CIPHER is achieved by FCS COP 1  because this requirement ensures that communication data are encrypted by  HTTPS or S MIME     O AC AUDIT is achieved by FAU GEN 1  FAU GEN 2  FAU SAR 1 a  and FAU STG 2 because those  requirements ensure that the access log is recorded  is associated with operator identity  is reviewed by operators     and is guaranteed in term of availability     O COM_AUDIT is achieved by FAU GEN 1  FAU  SAR 1 a  and FAU STG 2 because those requirements ensure    that the communication log is recorded  is reviewed by operators  and is guaranteed in term of availability     O SYS_AUDIT is achieved by FAU GEN 1  FAU SAR 1 b  and FAU STG 2 because those requirements ensure    that the system log is recorded  is reviewed by CE  and is guaranteed in term of availability     OE TIME is achieved by FPT_STM 1 because this requirement ensures that correct time stamp is provided for  TOE     8 2 2 Rationale for minimum strength of function level    To achieve O OPE_I amp A  identification and authentication  I amp A  is needed for operators to access the TOE  Since  the RC Gate is used in the relatively secure environment as described in OE PHYSICAL  the TOE is just intended  to protect the assets and to be protected itself against low potential attackers  Additionally RC Gate manages only  data from the image devices  which are assets of only
64. export nor import information between  CS    For authentication of CS  TSF uses the HTTPS mutual authentication  mechanism     FAU GEN 1 SF AUDIT     TSF records 3 types of audit log  access log  communication log and system  log  The events listed in Table 7 are recorded to each audit log  and the  information listed in Table 9 are included in the records           FAU GEN 2 SF AUDIT    TSF records 3 types of audit log  access log  communication log and system  log  The events listed in Table 7 are recorded to each audit log  and the  information listed in Table 9 are included in the records                 Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     Page 48 of 59          FAU SAR 1 a  SF AUDIT    The operator successfully authenticated by SF OPE I amp A is allowed to read  access log and communication log  Only CE successfully authenticated by  SF OPE_I amp A is allowed to read system log  They cannot modify those audit  logs     FAU_SAR 1 b  SF AUDIT     The operator successfully authenticated by SF OPE_I amp A is allowed to read  access log and communication log  Only CE successfully authenticated by  SF OPE_I amp A is allowed to read system log  They cannot modify those audit  logs     FAU_STG 2 SF AUDIT     TSF records 3 types of audit log  access log  communication log and system  log  The events listed in Table 7 are recorded to each audit log  and the  information listed in Table 9 are included in the records           When size of each audit
65. gh attack potential     Subject   An entity within the TSC that causes operations to be performed     Target of Evaluation   An IT product or system and its associated administrator and user  guidance documentation that is the subject of an evaluation     TOE Security Functions   A set consisting of all hardware  software  and firmware of the  TOE that must be relied upon for the correct enforcement of the TSP     TOE Security Policy   A set of rules that regulate how assets are managed  protected and  distributed within a TOE     TSF Scope of Control   The set of interactions that can occur with or within a TOE and are  subject to the rules of the TSP     14 Bibliography   AIS  Application Notes and Interpretations of the Scheme  AIS   published by BSI      CC  Common Criteria for Information Technology Security Evaluation  Version 2 2   January 2004   Part 1  Introduction and general model  Part 2  Security functional requirements  Part 3  Security assurance requirements     CEM  Common Methodology for Information Technology Security Evaluation   Part 1  Introduction and general model  version 0 6  revision 11 01 1997   Part 2  Evaluation Methodology  Version 2 2  January 2004     ETR  Evaluation Technical Report  version 1 1  2005 09 16  T  V Informationstechnik  GmbH  document number  20653678 TUViT 023 02     ST  Security Target for    Remote Communication Gate Type BN1  Remote  Communication Gate Type BM1     Version 1 0  2005 08 15    T  ViT GmbH w Certification body w
66. gnment  SSL V3 1 and S MIME specification      Dependencies  under consideration of final interpretation  FI220      FDP_ITC 1 Import of user data without security attributes or  FDP_ITC 2 Import of user data with security attributes  or  FCS_CKM 1 Cryptographic key generation    FCS_CKM 4 Cryptographic key destruction  FMT MSA 2 Secure security attributes    Table 6  Cryptographic operations  algorithms  and key sizes                         Operation Algorithm Key size  Authentication and key exchange  HTTPS  RSA 512 bits  SHA 1 N A  Encryption and decryption  HTTPS  DES 56 bits  Encryption  S MIME  RSA 512 bits  DES 56 bits  Signature  S MIME  RSA 512 bits  SHA 1 N A                   Concerning Encryption and Signature for S MIME  RFC2311  S MIME Version2 Message Specification  is  supported     FIA_AFL 1 Authentication failure handling  Hierarchical to  No other components     FIA_AFL 1 1 The TSF shall detect when  selection   assignment  three   unsuccessful authentication attempts  occur related to  assignment  consecutive presentations of a wrong password via RC Gate    monitor      FIA_AFL 1 2 When the defined number of unsuccessful authentication attempts has been met or surpassed  the TSF    shall  assignment  refuse to access via RC Gate monitor for one minute         Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     Page 30 of 59       Dependencies     FIA UAU 1 Timing of authentication    FIA ATD 1 User attribute definition  Hierarchical to  N
67. ification file  TUVIT DSZ CC 9240 2005 TuVvir  Certification report  Software Module of RC Gate  version 3 18 U i j 2005 09 26    e Safety Information  amp  Setup Guide  either European  North America or Asia version   2005   06 22    e Remote Communication Gate Type BN1 BM1 Operating Instructions  either European   North America or Asia version   2005 07 01   available via Internet  URL given in above  mentioned document     e Remote Communication Gate Type BN1 BM1  Machine Code  A768 A769  Service  Manual  2005 05 24   provided to customer engineer only     7 IT Product Testing    The developer s strategy was to test the TOE against the specification of all security  enforcing functions detailed in the functional specifications and in the high level design   Furthermore the developer s test cases were conducted with the goal to confirm that the  TOE meets the security functional requirements     The test cases reported  approx  80 different test cases test steps   e completely cover the security functions  altogether  6      e correspond to the external interfaces  altogether  10  of the TOE defined in the  functional specification     e correspond also to the defined subsystems  altogether  7  as defined in the high level  design and    e completely cover the 4 modules  chapt  5   the TOE consists of     The developer specified  conducted and documented suitable functional tests for the  security functions  The test results obtained for all of the performed tests turned ou
68. im    The TOE is conformant to ISO IEC 15408 2 1999 E    The TOE is conformant to ISO IEC 15408 3 1999 E   assurance level EAL3     There are no PPs claimed to which this ST is conformant        Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     Page 8 of 59       2 TOE Description    2 1 Product Type    The product type of RC Gate  listed in Table 1  is a communication box manufactured by Ricoh  All of those  product names are described in 1 1 ST Identification and detailed explanation about the products is described later     Application software is installed in a trusted factory and assembled in another trusted factory     Table 1  Product name and code of RC Gate                         Product name Destination  Europe North America  Remote Communication Gate Type BN1 A76827 A76817  Remote Communication Gate Type BM1 A76927 A76917       When the office network is connected to the Internet  RC Gate uses this network to send and receive data from CS     Typical network environment is as follows        Figure 1 Network environment of RC Gate Type BN1         RS 485 stands for TIA EIA 485     1  Communication Server  CS     Information for various services will be sent to CS from RC Gate        Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     Page 9 of 59       2  Proxy Server and Firewall  Security system for the network environment should be established   3  Image I O Devices managed via IP network    RC Gate can manage image I O device
69. items       E  can execute a function          can not see setting items existence  can not view or change or the value of the setting item    Dependencies     FDP  ACF 1 Security attribute based access control    FDP ACF 1 Security attribute based access control  Hierarchical to  No other components     FDP ACF 1 1 The TSF shall enforce the  assignment  RC Gate Operator Access Control Policy  to objects based    on the following   assignment   subjects  operator or CS  Objects  setting items respectively assets as defined in chapter 3 1  Subject attributes    operator ID and CS ID    Communication method  direct HTTPS  dialup HTTPS  SMTP   Object attributes  list of allowed operations     FDP ACF 1 2 The TSF shall enforce the following rules to determine if an operation among controlled subjects and  controlled objects is allowed   assignment     The operation is allowed according to the rules given in Table 4          Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     FDP ACF 1 3    FDP ACF 1 4    Dependencies     Page 24 of 59       The TSF shall explicitly authorize access of subjects to objects based on the following additional rules      assignment  none      The TSF shall explicitly deny access of subjects to objects based on the  assignment  no additional    rules      FDP ACC 1 Subset access control    FMT MSA 3 Static attribute initialization     R         W      A            7        Table 4  Setting items and allowed operations    can see setting
70. ke GRA Ge ee ee 36  Table 10  Correspondence between security needs and security objectives                  esee 40  Table 11  Correspondence between security objectives and functional requirements                         sess 42  Table 12  Correspondence between functional requirements and security functions       eise ese see see ek ee ee 45  Table 13  Corresponding description of security functions        ssrenernernrvvnnnvrvrennnerarnesvrevernernsenennervrevereresnesveene 45  Table 14  Correspondence between assurance requirements and assurance measures                   eeeeeee 49  Table 15  Relations between grouped items and detailed item                          eee 54       Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     Page 6 of 59       1 ST Introduction    1 1 ST Identification    Title  Security Target for  Remote Communication Gate Type BN1  Remote Communication Gate Type BM1    Version  1 0  Date  2005 08 15  Author  Hiroshi KAKII  Atsushi SATOH  Tomoaki ENOKIDA  Masahiro ITOH  Chitose MIURA     Haruyuki HIRABAYASHI  Jun SATOH  Ricoh Company  Ltd   Product  Remote Communication Gate Type BN1  Remote Communication Gate Type BM 1    Note  Hereafter these products are called with a generic name    RC Gate        TOE  Software module of RC Gate V3 18   CC used  ISO IEC 15408 1999 E   Furthermore all relevant final interpretations until creation of this documentation were also  considered    Keywords  Remote service  copier  printer  network  
71. l parameters 2       Communication Server E mail    address    RC Gate admin   s E mail address    Number of times to resend    E mail     Resend E mail interval time             Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     Page 55 of 59          SMTP server parameters I    SMTP server address   SMTP server port   SMTP user name       SMTP server parameters 2    SMTP AUTH flag     SMTP AUTH  method    authentication       SMTP password    SMTP password       POP server parameters 1    POP server address   POP server port     POP user name       POP server parameters 2    POP before SMTP flag     Wait time after authentication       POP password    POP password       RC Gate Settings Communication  Method    Communication method    Communication method       Internet connection method    Internet connection method       Other communication method    parameters    Communication server address   Interval time to Sleep shift   Interval time to Sleep return  detection     Interval time to retry HTTP  connection   Number of times to retry HTTP  connection   HTTP    transmitting delay     connection demand    HTTP connection timeout   HTTP transmitting timeout   HTTP receiving timeout     Interval time to retry HTTP    GET POST   Number of times to retry HTTP  GET POST       RC Gate Settings Net Connection    Settings Connection Details    Internet connection method    Internet connection method       Proxy password    Proxy password       Proxy server parame
72. low  assignment  everybody to read the RC Gate version and Licenses and to  select language and operator list via RC Gate monitor  on behalf of the user to be performed before    the user is identified     FIA UID 1 2 The TSF shall require each user to be successfully identified before allowing any other TSF mediated    actions on behalf of that user   Dependencies     No dependencies    FMT MTD 1 Management of TSF data  Hierarchical to  No other components     FMT MTD 1 1 The TSF shall restrict the ability to  selection  modify  the  assignment  passwords  to  assignment   Administrator  Registrant and CE      Dependencies   FMT SMF 1 Specification of Management Functions  FMT_SMR 1 Security roles    Notes  Each operator has his her own password     FMT SMF 1 Specification of Management Functions  Hierarchical to  No other components     FMT SMF 1 1 The TSF shall be capable of performing the following security management functions   assignment     function to modify operator s password    Dependencies     No Dependencies    FMT SMR 1 Security roles   Hierarchical to  No other components    FMT_SMR 1 1 The TSF shall maintain the roles  assignment  operator  Administrator  Registrant and CE   CS    FMT SMR 1 2 The TSF shall be able to associate users with roles    Dependencies     FIA_UID 1 Timing of identification    FAU GEN 1 Audit data generation   Hierarchical to  No other components    FAU GEN 1 1 The TSF shall be able to generate an audit record of the following auditabl
73. main board and modem board  Modem board has the interfaces for telephone line  The hardware  specification of RC Gate Type BN1 and BMI is shown as follows        CPU  Correspond to TX4925XB 200     ROM  4MB     RAM  64MB     SD memory card  32MB     NIC  1OBASE T 100Base TX      Front Indication  Green LED indicates power supply  Orange LED indicates communication status and Red    LED indicates system status      LAN Indication  Orange LED indicates communication speed e g  100 10Mbps and Green LED indicates link  status    Software part of RC Gate Type BNI and BM1 consists of application software and its Operation System  OS      Between Type BN1 and BMI  there is no difference in software component  TOE is the application software  module of RC Gate  OS is out of TOE     2 5 Logical boundary of the TOE    RC Gate consists of hardware and software parts  The software part consists of OS  DBMS  Communication  Management Module  Device Management Module  Log Management Module  Web Management Module  CS  Management Module and SMTP Communication Module  The OS is embedded Linux operating system  Hereafter     RC Gate OS      OS  DBMS  Communication Management Module and SMTP Communication Module are out of  the TOE  Optional wireless LAN card can be attached to RC Gate  but the wireless option is out of the TOE  SD    memory card sockets and Flash Memory are embedded on the main hardware board       Communication Management Module is the main controller of communication  which 
74. munication takes place     RC Gate exports and imports encrypted information when HTTPS method is selected and  exports encrypted E mail information to CS when SMTP method is selected     Additionally RC Gate records three types of audit log  access log  communication log and  system log     RC Gate consists of the main board with CPU  flash memory  LAN Ethernet circuit  RS485  and the interface of power supply  RC Gate type BM1 differs from BN1 by an additional  modem board  which provides an interface to the telephone line  Optional wireless LAN  card can be attached to RC Gate  but the wireless option is out of scope of the TOE    The software part of the RC Gate consists of     e embedded Linux operating system  RC Gate OS V1 11  based on MontaVista Linux       out of scope of the TOE    e Data Base Management System  DBMS      out of scope of the TOE   e Communication Management Module     out of scope of the TOE   e SMTP Communication Module     out of scope of the TOE   e as well as the software parts of the TOE  o Device Management Module   o Log Management Module   o Web Management Module  and  o CS Management Module    T  ViT GmbH w Certification body w LangemarckstraBe 20  D 45121 Essen  Germany B 3                Certification file  TUVIT DSZ CC 9240 2005 TuVif  Certification report  Software Module of RC Gate  version 3 18 U i j 2005 09 26    The sponsor  vendor and distributor is    Ricoh Company  Ltd   1 3 6 Nakamagome  Ohta ku   Tokyo  143 8555 Japan       The
75. nd certification     T  ViT GmbH w Certification body w LangemarckstraBe 20  D 45121 Essen  Germany    A 1            Certification file  TUVIT DSZ CC 9240 2005 TUViT j     Certification report  Software Module of RC Gate  version 3 18 u i 2005 09 26    i               1 The Certificate          The Certification Body of TOV Informationstechnik GmbH  hereby certifies that for Ricoh s remote communication unit the    Software Module  Version 3 18 of    Remote Communication Gate Type BN1 and  Remote Communication Gate Type BM1    of  Ricoh Company  Ltd   Tokyo  Japan    has been evaluated at an anccdithd and   an cenfapzoz4 mal  ier fAslitv us 3 chm Gammon  Mednocelcoy for MH Secety braan HEM Pat 1 Verset 9 5 and CSIR Pat   Werstor 7 0 to   ounkam as te bis Camna Gaia for IT Secunty Evaluation  CC  Version 2 1 SOMES 15398 1990   and indudi 3 final intaprelations for conpliance wich Common Capo  Versier 2 2 and Common  Methacocgy Par    Verman 2 2  wilh ite    Aloe ng resa ts       SCCURI  Y  URCT ONALITY  Product specific Security Target  Common Criteria part 2 conformant    ASSURANCE PACKAGE  Common Criteria part 3 canformant  EAL 3    his catincst gt  app es cnl bu the  specilic asion and releese c  tre p due  n is evaluabed contiquration  and   vonjuneio  wih ths ovrplate setificatis1 report The som T Sisters and stipulations in the  verlifissl Lat epul mest be erperled  The evaluclien kes bees Gursusled in ecoordarce wilt Uie  pravis ans of ihe cenMestia  scheme of TUY Infe
76. nseensennenee 11  2 4 Physical boundary of the TOE    esse esse esse ese ee Ge EG EG Bee esee Se ee Ee EG sete seta EE Ge EE Ge Ge EG EG EG Bee Be Ge Ge 12  2 5 Logical boundary of the TOE    sesse sesse ese se ese ee Be EG Be EE SEE eene testes Be EE tastes suse Be EG Be sensns Be EG Se Ge Ge ee 12  2 6 Definition of Specific Terms                    se ese se ee Be Be EG Be EE SEE EG Be EG Be EE tastes suse ta sene Be EG See ee GE Ee sone ee 14   3      TOE  Security  Environment its DE ee EE Ge ED ar bee ee ee Ee eese ge ae ee Bee Rg ee Ee Weed 16  3 1 Subjects And Assets    ss sesse Se ok od ge pa to AE ge N RS eed oe Sk ese Seba Ke Ge gee SEES ede dk ee 16  32 ASSUIMPDEHORS  os sos eo ee E dog ed oe Ges eko ges eo os ed N Geo ge See gek og Gee              es ge de 17  3 3 Threats ie de De id Ge ee Be Ee GE ee Ge ke Ge ek S T M ee DE ee oe 17  3 4 Organisational Security Policies      vererevnvenrensvnrvnnennnnnenrennvenernnennennnnnennennrenevnnennenennnennennnenennennsenevenennee 18   4 Security ObJectives    oie Oe Ge ee Re Ee e ed aent 19  4 1 Security Objectives for the TOE      sesesevevennenvennenrennvenevnneneenernnennenennnennenneenevenennennnnnennennsenevnnensennsenennee 19  4 2 Security Objectives for the Environment      sesesvenvennverenevenernvennennennennennrenennnennenennnennennnnnennenesenenenensen 21   4 2 1 Security objectives for the IT environment    see see se ee RR RA GRA Re Gee ee ee Re Re ee nennen enne 21  4 2 2 Security objectives for the non I
77. nstallation  Generation and Start up   MFP Multifunctional Printer   OSP Organisational Security Policy   PP Protection Profile   SAR Security Assurance Requirement   SF Security Function   SFP Security Function Policy   SFR Security Functional Requirement   SIF Sub interface    T  ViT GmbH w Certification body w LangemarckstraBe 20  D 45121 Essen  Germany B 14                Certification file  TUVIT DSZ CC 9240 2005 T  UViT  Certification report  Software Module of RC Gate  version 3 18 U i   2005 09 26    SOF Strength of Function  SS Sub system   SSL Secure Sockets Layer  ST Security Target   TOE Target Of Evaluation  TSC TSF Scope of Control  TSF TOE Security Functions  TSFI TOE Security Function Interfaces  TSP TOE Security Policy  USR User Guidance   VLA Vulnerability Analysis    13 2 Glossary  Augmentation   The addition of one or more assurance component s  from Part3 to an  EAL or assurance package     Extension   The addition to an ST or PP of functional requirements not contained in Part 2  and or assurance requirements not contained in Part 3 of the CC     Formal   Expressed in a restricted syntax language with defined semantics based on well   established mathematical concepts     Informal   Expressed in natural language     Object   An entity within the TSC that contains or receives information and upon which  subjects perform operations     Protection Profile   An implementation independent set of security requirements for a  category of TOEs that meet specific
78. o more than one component  of each assurance family and all assurance dependencies of every component are  addressed     While the EALs are defined in the CC  it is possible to represent other combinations of  assurance  Specifically  the notion of    augmentation    allows the addition of assurance  components  from assurance families not already included in the EAL  or the substitution of  assurance components  with another hierarchically higher assurance component in the  same assurance family  to an EAL  Of the assurance constructs defined in the CC  only  EALs may be augmented  The notion of an    EAL minus a constituent assurance  component    is not recognised by the CC as a valid claim  Augmentation carries with it the  obligation on the part of the claimant to justify the utility and added value of the added  assurance component to the EAL  An EAL may also be extended with explicitly stated  assurance requirements        T  ViT GmbH w Certification body w LangemarckstraBe 20  D 45121 Essen  Germany C 4                Certification file  TUVIT DSZ CC 9240 2005 T  UViT  Certification report  Software Module of RC Gate  version 3 18 U i   2005 09 26                                                                                        Assurance Assurance ane components by  Class Family Evaluation Assurance Level  EAL1   EAL2   EAL3   EAL4   EAL5   EAL6   EAL7   Configuration AEM AUT 1 i 2 2  Management ACM_CAP 1 2 3 4 4 5 5  ACM_SCP 1 2 3 3 3  Delivery and ADO DEL 1 1 2
79. o other components     FIA_ATD 1 1 The TSF shall maintain the following list of security attributes belonging to individual users      assignment  operator identity  Administrator  Registrant and CE     Dependencies     No dependencies    FIA_SOS 1 Verification of secrets  Hierarchical to  No other components     FIA_SOS 1 1 The TSF shall provide a mechanism to verify that secrets meet  assignment  the following  the    password has to be at least 8 and at most 13 characters long    Dependencies     No dependencies    FIA_UAU 1 Timing of authentication  Hierarchical to  No other components     FIA_UAU 1 1 The TSF shall allow  assignment  everybody to read the RC Gate version and Licenses and to  select language and operator list via RC Gate monitor  on behalf of the user to be performed before    the user is authenticated     FIA UAU 1 2 The TSF shall require each user to be successfully authenticated before allowing any other    TSF mediated actions on behalf of that user   Dependencies   FIA_UID 1 Timing of identification    FIA_UAU 7 Protected authentication feedback   Hierarchical to  No other components    FIA UAU 7 1 The TSF shall provide only  assignment  asterisks  to the user while the authentication is in progress   Dependencies     FIA_UAU 1 Timing of authentication    FIA_UID 1 Timing of identification    Hierarchical to  No other components        Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     Page 31 of 59       FIA UID 1 1 The TSF shall al
80. ocation     Supply ordering person   s E mail    address       Device name    Device name       SNMP community name    SNMP community name       M R Device List parameters 2    Machine ID    Model name    MAC address    Connection Type    Meter Reading Date  Time    Device ID  RS 485      Status          Method to assign IP address       Method to assign IP address          Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved        Page 58 of 59          Machine    address    administrators E mail    M R Device List parameters 3    Machine administrator s E mail  address   Service depot    Service depot contact    Supply order from    Supply order phone No        Device Management Notify    Device Management Notify    parameters    SC CC   MC     Alarm     Supply       Device Management Update    Device Firmware    Maintenance Restart RC Gate    Device Firmware parameters 1    Schedule   Period   URL for firmware download     Message       Device Firmware functions    Update button   Previous Update Details button       Object devices list    Object devices list       Device Firmware parameters 2    Maintenance Restart function    Device ID   Update Status   Update date time   Update Result    Restart  function        Maintenance Communication    Server Calls Service Test Call    Service Test Call function    Service Test Call  function        CS Test Call Log    Log       Maintenance Communication    Server Calls Device Check    Req Call    Maintenance Restore  
81. of the assurance  components are also assessed with PASS  Therefore  the TOE as defined in the security  target is considered to be Part 3 conformant     The security target  chapter 5 claims  that the TOE will fulfil the following TOE security  functional requirements  which were exclusively taken from  CC  part 2        Component ID    Componenttitle                FAU_GEN 1 Audit data generation  FAU_GEN 2 User identity association  FAU_SAR 1  a    Audit review  FAU_SAR 1  b    Audit review                                     FAU_STG 2 Guarantees of audit data availability   FCS COP 1 Cryptographic operations   FDP_ACC 1 Subset access control   FDP_ACF 1 Security attribute based access control   FDP_ITC 1 Import of user data without security  attributes   FIA_AFL 1 Authentication failure handling   FIA_ATD 1 User attribute definition   FIA_SOS 1 Verification of secrets   FIA_UAU 1 Timing of authentication          T  ViT GmbH w Certification body w LangemarckstraBe 20  D 45121 Essen  Germany                   Certification file  TUVIT DSZ CC 9240 2005 TuVvir  Certification report  Software Module of RC Gate  version 3 18 U i j 2005 09 26    Component ID Component title                   FIA_UAU 7 Protected authentication feedback   FIA_UID 1 Timing of identification   FMT MTD 1 Management of TST data   FMT SMF 1 Specification of Management  Functions       FMT SMR 1 Security roles       FPT STM 1 Reliable time stamps                FTP ITC 1 Inter TSF trusted channel      
82. office  security    1 2 ST Overview    This Security Target  ST  describes the security specification of software module of the Remote Communication  Gate  RC Gate   RC Gate is used mainly in business office and acts as a relay unit to which the user s image I O  devices  e g  Copiers  Multi Functional Printers  are connected  RC Gate collects data on mentioned devices  connected to it through the LAN or directly  Collected data are received by a trusted management server via  Internet or telephone line  Dial up PPP connection   The trusted management server is called  Communication    Server  CS    The TOE is the Software module of RC Gate and works as following security features       Prevention of unauthorized disclosure and modification of the information on the inner memory of RC Gate       Prevention of unauthorised disclosure and modification of the information via internet  intranet and or    telephone line       Prevention of receiving sending information from to a non authorized CS    There are three broad features of this system       an overview of the involved components systems is shown by the following figure 1        1 System means here the configuration of elements in the network with RC Gate as a central element        Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     Page 7 of 59       1  Reduced Image I O device Downtime    Image I O device downtime is dramatically reduced through remote maintenance  Specifically  remote  maintenance cut
83. om    several corresponding detailed items  Table 15 shows the relations between grouped items and corresponding    detailed items        Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     Table 15  Relations between grouped items and detailed item    Page 54 of 59          Category    Grouped item    Detailed item       RC Gate Settings Basic    RC Gate Setting Basic parameters  1    RC Gate ID   Model name   Application version     OS version       RC Gate Setting Basic parameters  2    RC Gate location   Application last updated   OS last updated    Service depot     Service depot contact       Language    Language       Time zone    Time zone       RC Gate Setting Basic parameters  3    Log max capacity     Log collection level       Auth key version    Auth key version             RC Gate Settings Date Time Date   Time Date   Time  RC Gate Settings Network Maintenance Port IP address IP address  Other Maintenance Port parameters MAC address   Subnet Mask       LAN Port MAC address    Other LAN Port parameters    DNS server parameters    MAC address    DHCP    IP address    Subnet mask    Default gateway address     Ethernet speed    Main DNS server   Sub DNS server          RC Gate Settings E mail    Send Test E mail    Send Test E mail  function        E mail parameters 1    RC Gate E mail address    sender      RC Gate E mail address    receiver      for     for          Communication Server E mail    address  RC Gate admin   s E mail address    E mai
84. on secure usage are detailed in the ST which is attached as part D of  this certification report     1 8 Independence of the Certifier   Within the last two years  the certifier did not render any consulting  or other services for the  company ordering the certification and there was no relationship between them which might  have an influence on his assessment     T  ViT GmbH w Certification body w LangemarckstraBe 20  D 45121 Essen  Germany B 6                Certification file  TUVIT DSZ CC 9240 2005 T  UViT  Certification report  Software Module of RC Gate  version 3 18 U i j 2005 09 26    The certifier did not participate at any time in test procedures for the product which forms  the basis of the certification     1 9 Disclaimers   The certification results only apply to the version of the product indicated in the certificate  and on the condition that all the stipulations are kept with regard to generation   configuration and operation as detailed in this certification report  This certificate is not an  endorsement of the IT product by the TUV Informationstechnik GmbH or any other  organisation that recognises or gives effect to this certificate  and no warranty of the IT  product by TUV Informationstechnik GmbH or any other organisation that recognises or  gives effect to this certificate  is either expressed or implied     2 Identification of the TOE    Beside guidance documentation  see chapter 6  the RC Gate box with preinstalled  operating system and TOE are deliv
85. onents     FAU SAR 1 a  1 The TSF shall provide  assignment  Administrator  Registrant and CE  with the capability to read     assignment  communication and access log  from the audit records        FAU SAR 1 a  2 The TSF shall provide the audit records in a manner suitable for the user to interpret the information   Dependencies     FAU GEN 1 Audit data generation    FAU SAR 1 b  Audit review    Hierarchical to  No other components        Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     Page 33 of 59       FAU SAR 1 b  1 The TSF shall provide  assignment  CE  CS  with the capability to read  assignment  system log     from the audit records   FAU SAR 1 b  2 The TSF shall provide the audit records in a manner suitable for the user to interpret the information   Dependencies     FAU GEN 1 Audit data generation    FAU STG 2 Guarantees of audit data availability   Hierarchical to  FAU STG 1   FAU STG 2 1 The TSF shall protect the stored audit records from unauthorized deletion    FAU STG 2 2 The TSF shall be able to  selection  prevent  modifications to the audit records        FAU STG 2 3 The TSF shall ensure that  assignment  64k bytes latest  audit records will be maintained when the    following conditions occur   selection  audit storage exhaustion    Dependencies     FAU GEN 1 Audit data generation    5 2 Minimum Strength of Function Claim    The minimum strength level claimed for the TOE is SOF Basic     5 3 TOE Security Assurance Requirements    The a
86. onsible company  and persons     4 3 Clarification of Scope   Access to RC Gate via the web interface is not necessarily located within the customer end  user network  It is up to the customer to prevent such access from the internet and to have  administration locally     5 Architectural Information    The TOE consists of the following modules     e CS Management Module   e Device Management Module   e Log Management Module   e Web Management Module  CS Management module performs CS identification and data exchange  Cryptographic  function is included in this module  Certificates are read via Web Management Module     Device Management Module manages laser printers and multifunctional printers  Main  function of this module is collecting information of these devices     Log Management Module provides log management function  Each module such as CS   Web and Device Management Module send the logging event to Log Management Module   This module reads system time from OS to create audit event  Log files are saved in SD  memory     The Web Management Module provides the Web interface and performs operator  identification and authentication  Flash memory is used for storing certificates  these  certificates are read by Web Management Module when RC Gate starts up      6 Documentation    The following documentation is provided with the product by the developer to the consumer     T  ViT GmbH w Certification body w LangemarckstraBe 20  D 45121 Essen  Germany B 9                Cert
87. overage ACM SCP 1 PASS  Delivery and operation CC Class ADO PASS  Delivery procedures ADO DEL 1 PASS  Installation  generation  and start up procedures ADO IGS 1 PASS  Development CC Class ADV PASS  Informal functional specification ADV FSP 1 PASS  Security enforcing high level design ADV HLD 2 PASS  Informal correspondence demonstration ADV RCR 1 PASS  Guidance documents CC Class AGD PASS                  n a    not applicable    T  ViT GmbH w Certification body w LangemarckstraBe 20  D 45121 Essen  Germany B 11       Certification file  TUVIT DSZ CC 9240 2005  Certification report  Software Module of RC Gate  version 3 18          TUVIT  2005 09 26                                                    Administrator guidance AGD_ADM 1 PASS  User guidance AGD_USR 1 PASS  Life cycle support CC Class ALC PASS  Identification of security measures ALC_DVS 1 PASS  Tests CC Class ATE PASS  Analysis of coverage ATE_COV 2 PASS  Testing  high level design ATE_DPT 1 PASS  Functional testing ATE_FUN 1 PASS  Independent testing     sample ATE_IND 2 PASS  Vulnerability assessment CC Class AVA PASS  Examination of guidance AVA_MSU 1 PASS  Strength of TOE security function evaluation AVA_SOF 1 PASS  Developer vulnerability analysis AVA VLA 1 PASS       No Protection Profile  PP  compliance claims were made in the ST  Thus  the component  ASE_PPC 1 is not applicable  All other assurance components were assessed with the  verdict PASS  This includes that all evaluator action elements being part 
88. r will keep his her password secret     A ADMIN It is assumed that both Administrator and Registrant are trusted     The user administrator and registrant can be trusted  Administrator and registrant may be same  person  He She reads the user   s documentations  Set up Guide and Operating Instructions   thoroughly  responds appropriately to RC Gate  He She can set and change the configuration of    RC Gate  Furthermore  the administrator and or registrant will keep his her password secret     A CS It is assumed that Communication Server is properly managed by responsible company    and persons     The communication server is trusted  Responsible persons shall manage CS properly     3 3 Threats    In this section  the threats that will be countered by the TOE or its environment are identified and described        Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     Page 18 of 59       T WEB    T CS COMM    T CS MAIL    T FAKE CS    Assets in RC Gate may be read  modified or destroyed by employees or external attackers     The assets inside RC Gate as defined could be attacked through web interface by an employee    and or an attacker  especially by attack attempts from intranet and or internet     Leakage of  or tampering with information at Internet or telephone line  when RC Gate  communicates CS directly     An attacker may disclose and or modify the data  relevant assets as defined in chapter 3 1  before   which are sent received between RC Gate and CS via 
89. rations as specified stated in  ST   Table 4 after a successful authentication  If the authentication is failed  the    information are not exported nor imported        Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     Page 36 of 59       SF CS SMIME    TSF can export information listed in Table 4 and Table 5 to CS by E Mail  When TSF export information to CS by  using E Mail  TSF encrypts E Mail message by S MIME  TSF encrypts the message by the public key of CS to    prevent other than CS to read the message     SF AUDIT    TSF records 3 types of audit log  access log  communication log and system log  The events listed in Table 7 are    recorded to each audit log  and the information listed in Table 9 are included in the records   When size of each audit log exceeds 64 Kbytes  the oldest record is overwritten with new record     The operator successfully authenticated by SF OPE I amp A is allowed to read access log and communication log     Only CE successfully authenticated by SF OPE I amp A is allowed to read system log  They cannot modify those audit                logs   Table 9  Information included in the audit records  Type of audit log Content   Access log date and time  terminal IP address  operator name  result of login   Communication log date and time  IP address of CS or image I O device  send or receive   content of sent received information   System log audit level  date and time  function name PPP Dial up   CGI Web   SMTP E Mail   DBMS Da
90. rmatcnstechnk ST7 4 and the 6516 Lzlors of the  evaluation    zsilky Ir tee svelLatlon technica reat are eansieerr  v tth the evidence adduced    he sezurty verge  against   heh tie product ras cesen avaluated  13 pan c  he cerbticaten report  Ihe  rating ol the etre gt  ot 2nyptozraph 2 m echar sms suitzble tor enay ier ant decryctior 18 excuder    am  the recogr tion bv Bol  A copy c  t e cert  este are otis certificat on reontis avs lable trom he araduet  Manutacturer or am Neve tinsecior boc y     This catificata ie nel an e doreariant of tie I7 procust by TUY  for alionetezhrk Grib  or by any xha     orgarisation ihat  30071 see ar giv   effec  to tiis Jarticats  a73 no warranty 9   the T product by TU  Informaticnetechni   SOsH er zy 37y 37a orgarisatia1 that recogniess or gives stas E   this cert ficate is  elther expressed or Implied     Certit cate Regist stior Ne  Essen  2005 09 26 sin  Dr  Grusclrertz    Up I  bS2 CC 82410 2005 Cui lilicslior Budy       TUY In zmiattonebechni   GrEF     member of TUS  KJR  Z HY201 A 100   H 4139201 GE    sroup   Laigematkarets 20   4511 Essen  GETTY  O keut    Of eav certvt ce           AGENT 08 1H  amp rurry Larmia Sunder DAR redgsetaha is ra 101    En ACIE by  Ecutzche    kkrrdtieunasste le Technik c v  DAT sch           T  ViT GmbH w Certification body w LangemarckstraBe 20  D 45121 Essen  Germany A 2          Certification file  TUVIT DSZ CC 9240 2005 T  UViT  Certification report  Software Module of RC Gate  version 3 18 U i  
91. rted information  Furthermore  CS is  able to perform the allowed operations as specified stated in  ST    table 4 after a successful authentication     TSF can export information listed in  ST   Table 5 to CS by E Mail   When TSF export information to CS by using E Mail  TSF encrypts  E Mail message by S MIME  TSF encrypts the message by the  public key of CS to prevent other than CS to read the message     TSF records 3 types of audit log  access log  communication log  and system log  The events listed in Table 7  ST  are recorded to  each audit log  and the information listed in  ST   Table 9 are  included in the records     When size of each audit log exceeds 64 Kbytes  the oldest record is  overwritten with new record     The operator successfully authenticated by SF OPE_I amp A is allowed  to read access log and communication log  Only CE successfully  authenticated by SF OPE_I8 amp A is allowed to read system log  They  cannot modify those audit logs     1 5 Summary of Threats and Organisational Security Policies  OSPs   The assets the TOE intends to protect are   e Certificates for RC Gate   e Passwords for each operator    e Audit logs    e Setting information for RC Gate  e Collected information of image VO devices  e Firmware to update image VO device    T  ViT GmbH w Certification body w LangemarckstraBe 20  D 45121 Essen  Germany B 5                Certification file  TUVIT DSZ CC 9240 2005 T  UViT  Certification report  Software Module of RC Gate  version 3 18 
92. ry parameters                   mE       R    R   mE  RW   RW        Device Management Registered Device List  M R Device List   RW     RW            RW     RW            RW     RW            RW     RW          parameters 1  Device name  R    R   LE    RW   RW  rim    RW   RW  aoe    RW   RW  So  SNMP community name  R   Re SES    RW   RW  ziii TRE  R   DE    RW   RW  Aem  M R Device List   R      R             R      R             R      R             R     R           parameters 2  M R Device List   R      R             R      R             R      R             RW      RW          parameters 3  Method to assign IP                        RW     RW            RW     RW            RW     RW          address  Machine administrator   s  i  RW     RW            RW     RW             w      w            RW     RW          E mail address  M R Device List   R      R             R      R             RW     RW            RW     RW          parameters 4                                                 Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     Page 27 of 59             Setting items Allowed operations for each operator and access method  Administrator Registrant CE CS  direct dialup direct dialup direct dialup direct dialup  SMTP SMTP SMTP SMTP  HTTPS   HTTPS HTTPS   HTTPS HTTPS   HTTPS HTTPS   HTTPS       Device Management Notify       Device  Management Notify                                R    R            RW   RW          parameters                        
93. s     e       RC Gate must be always connected to a UPS  uninterruptible power supply  system  to prevent the log files from getting lost by a power cut  One week s logs are  lost at worst case scenario           T  ViT GmbH w Certification body w LangemarckstraBe 20  D 45121 Essen  Germany B 13                Certification file  TUVIT DSZ CC 9240 2005 T  UViT  Certification report  Software Module of RC Gate  version 3 18 U i j 2005 09 26    e       Before power down deactivation of RC Gate  please log on as registrant and  perform a restart procedure by clicking  Restart  button on RC Gate monitor to save  latest logs  After a short time  the yellow and green LEDs come to remain lit  then  you can shut off the power supply           11 Certification stipulations and notes    The hints given to the end user   customer  referenced in chap  10  shall be taken into  account in operating RC Gate     12 Security Target    The security target for  Software Module of RC Gate version 3 18  as of 2005 08 15   version 1 0 is included in part D of this certification report     13 Definitions    13 1 Acronyms    ADM Administrator Guidance   CC Common Criteria for Information Technology Security Evaluation   referenced to as  CC     CE Customer Engineer   CEM Common Methodology for Information Technology Security Evaluation   referenced to as  CEM     CM Configuration Management   EAL Evaluation Assurance Level   FSP Functional Specification   HLD High level Design   IF Interface   IGS I
94. s and laser printers  which support MIB information or Ricoh   s remote    service   4  PC for Administration  Communication between RC Gate and RC Gate Monitor is based on the https protocol     Note  The so called RC Gate Monitor is a web based access  which is not necessarily located within the    customer end user network  protected intranet      Nn      This Equipment  Remote Communication Gate Type BN1   Various pieces of information of the image I O devices managed by RC Gate are sent to CS   There are two communication methods between RC Gate and CS   1  HTTPS method exchanges messages between CS as the HTTPS server and RC Gate as the HTTPS client   2  SMTP method sends messages from RC Gate toward CS via SMTP server   6  The Image I O Devices managed via serial communication bus  TIA EIA 485     Image I O devices manufactured by Ricoh can also be managed  by directly connecting them to RC Gate with the    serial modular cable  A maximum of five image I O devices can be connected to one RC Gate     If the office network environment cannot access the Internet directly  RC Gate can communicate with CS using a  modem type  Type BM1   Here  this is called  Dial up   For the Dial up  facsimile line or telephone line prepared  for RC Gate can be used        Figure 2 Network environment of RC Gate Type BM1          Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     Page 10 of 59         RS 485 stands for TIA EIA 485     1  Communication Server   Information
95. s downtime by sending service calls automatically to Ricoh   s service technician  In addition  to  further cut on time and expense  many upgrades  firmware  etc   can be performed remotely too   services only  made possible through connection to the Internet  This means customers end users can operate without worrying  about incomplete jobs or being tied to maintenance or repairs  companies are freed from time consuming duties and    additional downtime expense     2  Automated Counter Checking    Remote counter monitoring means the user no longer has to manually report counter figures  This system offers  an improvement in the form of remote  automated counter checking  This system allows billing to be better timed   User workload is reduced and so too  the previously inevitable  billing mistakes  red tape routine  and associated    complications     3 Ordering Supplies  toner  etc      Remote system notifies remaining amount of supplies like toner to CS   image I O device downtime is reduced   and the user no longer has to worry about re order telephone calls  forgotten stock  supply control and so on  now    that monitoring and dispatch is fully user independent     Therefore  RC Gate becomes a significant device in this system  as the information between the user image I O  devices and CS shall be stringently correct  For example  wrongheaded image I O device information shall bring    some wrongheaded accounting or service for users     1 3 ISO IEC 15408 Conformance Cla
96. s to manually report counter figure  This mode  supports identification of the machine maintained and gets correct counters of that machine  This system  system  overview is shown by figure 1 and 2  offers an improvement in the form of remote  automated counter checking   This system allows billing to be better timed  User workload is reduced and so too  the previously inevitable   billing mistakes  red tape routine  and associated complications  Remote system provides toner remaining amount  data to our service company   image I O device downtime is reduced  as the user no longer has to worry about  re order telephone calls  forgotten stock  supply control and so on  now that monitoring and dispatch is fully    user independent        Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     Page 12 of 59       RC Gate becomes a significant device in this system  as the information between the user image I O devices and the  server shall be stringently correct  For example  a wrongheaded image I O device information shall bring some    wrongheaded accounting or service for our customers     2 4 Physical boundary of the TOE    RC Gate acts as an intermediary between the image I O device and CS  e g  intermediation network communication  appliance  It is used mostly in general LAN constructed office  Common hardware part of RC Gate is main board  on which CPU  Flash memory  LAN Ethernet circuit  RS485 and the interface of power supply  RC Gate type BM1  consists of 
97. secutive times  TSF  reject identification and authentication for one minute     The operator  Administrator  Registrant and CE  can change his  own password  The length of new password should be at least 8  and at most 13 characters  If the length of the new password is not  in the range  the new password is rejected     SF OPE_AC  TSF controls operations performed by the operator based on the  operator s identification information and method to communicate  with CS  When direct HTTPS method  dialup HTTPS method  or       3 hereinafter called ST    T  ViT GmbH w Certification body w LangemarckstraBe 20  D 45121 Essen  Germany B 4                Certification file  TUVIT DSZ CC 9240 2005 TUVir  Certification report  Software Module of RC Gate  version 3 18 U i j 2005 09 26    SF CS_I amp A     SF CS_HTTPS     SF CS_SMIME     SF AUDIT     SMTP method is used to communicate with CS  operators can  access to the information based on  ST   Table 4     TSF identifies and authenticates CS before communicates with CS  by HTTPS  When the identification and authentication is  succeeded  it is allowed to export or import information to from CS     For authentication of CS  TSF uses the HTTPS mutual  authentication mechanism     TSF can export and import information listed in  ST   Table 5  to from CS by using HTTPS protocol     TSF authenticates CS before export or import information  When  CS is successfully authenticated  TSF encrypts the information to  export  and decrypts the impo
98. served     Page 26 of 59                                                                                              Setting items Allowed operations for each operator and access method  Administrator Registrant CE CS  direct dialup direct dialup direct dialup direct dialup  SMTP SMTP SMTP SMTP  HTTPS   HTTPS HTTPS   HTTPS HTTPS   HTTPS HTTPS   HTTPS  Modem parameters SaaS      e epu cs      m  RW  Tr ipi  RW  zs  Auto Discovery Auto Discovery Settings  Auto Discovery permit  RW   RW        RW   RW  mE m      mE      Er       Auto Discovery server              J e qe             R      R             RW      RW          address  Max  E mail size      Er  RW             RW            R                 Auto Discovery start  schedule   RW     RW     RW     RW     RW     RW     RW     RW     RW     RW     RW          SNMP community name  Auto Discovery Range  ARW  ARW  ARW  ARW  ARW  ARW  ARW  ARW  ARW  reke aves EE  parameters  Device Management Common management  Information Retrieval     R      R             R      R             R      R             RW     RW          settings  Devices to repeat search   RW     RW                                 RW     RW            RW     RW           HTTP and SNMP   Other Network Connection     R      R                             R      R             RW      RW          settings  RS 485 Connection   R      R                                   R      R             RW     RW          parameters  Device Management Connection Details  Device ret
99. ssurance components for the TOE are shown Table 8  It is the set of components defined by the evaluation    assurance level EAL3 and no other requirements have been augmented     Table 8  TOE security assurance requirements  EAL3                                   Assurance Class Assurance Component   Security Target ASE_DES 1 TOE description  ASE_ENV 1 Security environment  ASE_INT 1 ST introduction  ASE_OBJ 1 Security objectives  ASE_PPC 1 PP claims  ASE_REQ 1 IT security requirements  ASE_SRE 1 Explicitly stated IT security requirements  ASE_TSS 1 TOE summary specification   Configuration Management ACM_CAP 3 Authorisation controls  ACM_SCP 1 TOE CM coverage          Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     Page 34 of 59                                                       Assurance Class Assurance Component  Delivery and operation ADO_DEL 1 Delivery procedures  ADO_IGS 1 Installation  generation  and start up procedures  Development ADV_FSP 1 Informal functional specification  ADV_HLD 2 Security enforcing high level design  ADV_RCR 1 Informal correspondence demonstration  Guidance documents AGD ADM 1 Administrator guidance  AGD USR 1 User guidance  Life cycle support ALC DVS 1 Identification of security measures  Tests ATE COV 2 Analysis of coverage  ATE DPT 1 Testing  high level design  ATE FUN 1 Functional testing  ATE IND 2 Independent testing     sample  Vulnerability assessment AVA MSU 1 Examination of guidance  AVA SOF 1 Strength of TOE s
100. ssurance requirements not in Part 3     Additionally  the conformance result may include a statement made with respect to sets of  defined requirements  in which case it consists of one of the following     Package name Conformant   A PP or TOE is conformant to a pre defined named  functional and or assurance package  e g  EAL  if the requirements  functions or  assurance  include all components in the packages listed as part of the  conformance result     Package name Augmented   A PP or TOE is an augmentation of a predefined  named functional and or assurance package  e g  EAL  if the requirements   functions or assurance  are a proper superset of all components in the packages  listed as part of the conformance result        Finally  the conformance result may also include a statement made with respect to  Protection Profiles  in which case it includes the following     PP Conformant   A TOE meets specific PP s   which are listed as part of the  conformance result     T  ViT GmbH w Certification body w LangemarckstraBe 20  D 45121 Essen  Germany C 2                Certification file  TUVIT DSZ CC 9240 2005 T  UViT  Certification report  Software Module of RC Gate  version 3 18 U i   2005 09 26  CC Part 3     Assurance categorisation    The assurance classes  families  and the abbreviation for each family are shown in Table 1                                                                                               Assurance Class Assurance Family Abbreviated Name  Class
101. strant and CE     Therefore  illegal communication can be detected by way of analysing this log     O SYS_AUDIT TOE must ensure that system information shall be logged     When RC Gate is running  system information must be logged  Therefore  CE can analyse the    information in case of software accident  Audit data are only readable by CE and CS        Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     Page 21 of 59       4 2 Security Objectives for the Environment    In the following    responsible persons    refer to operators     4 2 1 Security objectives for the IT environment    OE TIME    Responsible persons who should watch RC Gate working correctly will keep correct time  for RC Gate     Responsible persons should watch that RC Gate is working correctly and well regarding the    presented used time  Audit logs  which will be created  are using this time     4 2 2 Security objectives for the non IT environment    In this section  the security objectives of the non IT environment that cover the aspects of the assumptions    described in section 3     OE PHYSICAL    OE DEVICE    OE NETWORK    OE CE    The TOE and assets are physically protected     Responsible person should set the RC Gate in stable place as an accessible user with evil intent    cannot access RC Gate physically and confirm that they are working correctly     Responsible persons shall watch the image I O device working correctly     Responsible persons who should watch the image I O de
102. t to be as  expected  No errors or other flaws occurred with regard to the security functionalities and  the TOE subsystems  Consequently  the test results demonstrate that the behaviour of the  security functions is as specified     The evaluator   s independent testing as well as penetration tests were partly performed in  the developer s testing environment and partly at TUVIT GmbH  information security  department  in Essen  The same platforms and tools as for the developer tests were used     The evaluator s objective regarding this aspect was to test the functionality of the TOE as  described in the functional specifications and the high level design  and to verify the  developer s test results  The evaluators sample of developer tests covers all TSF     The results of the specified and conducted independent evaluator tests confirm the TOE  functionality  The TOE security functions were found to behave as specified     Penetration testing has been conducted by repeating 19 developer tests and 39 evaluator  tests  including independent  penetration and confirmation tests of non exploitability of    T  ViT GmbH w Certification body w LangemarckstraBe 20  D 45121 Essen  Germany B 10                Certification file  TUVIT DSZ CC 9240 2005 TuVvir  Certification report  Software Module of RC Gate  version 3 18 U I 2005 09 26    vulnerabilities   The penetration testing conducted confirms that all the obvious  vulnerabilities were considered and that the vulnerabilities iden
103. tabase         error code  description                6 2 Strength of Function Claims    The security functions realised by probabilistic or permutational mechanisms are SF OPE_I amp A  SF CS_I amp A   SF CS_HTTPS and SF CS_SMIME  Three of those  SF CS_I amp A  SF CS HTTPS and SF CS_SMIME  are realised  only by cryptographic mechanisms  So  those three functions are excluded from the SOF rating  Target of  SOF rating is only SF OPE_I amp A  The strength of function level for the function is SOF Basic     6 3 Assurance Measures    The following documents are provided as the assurance measures     Security Target for  Remote Communication Gate Type BN1  Remote Communication Gate Type BM1  Version 1 0  2005 08 15    Security Functional Specification for  Remote Communication Gate Type BN1  Remote Communication Gate Type BM1  Version 1 0  2005 08 15       Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     Page 37 of 59       High level Design for  Remote Communication Gate Type BN1  Remote Communication Gate Type BM 1  Version 1 0  2005 08 15    Correspondence Analysis for  Remote Communication Gate Type BN1  Remote Communication Gate Type BM 1  Version 1 0  2005 08 15    Remote Communication Gate Type BN1  Remote Communication Gate Type BM 1  Setup Guide  Operating Instructions  Version 1 0  2005 08 15    Security Test Documentation for  Remote Communication Gate Type BN1  Remote Communication Gate Type BM 1  Version 1 0  2005 08 15    Strength of Function Anal
104. te  Communication Gate Type BMI  Safety Information and Setup Guide  Version A768 8603A  A768 8605A   2005 06 22   Remote Communication Gate Type BN1  Remote  Communication Gate Type BMI  Operating Instructions  Version A768 8604A A 768 8606A   2005 07 01   Remote Communication Gate Type BN1  Remote  Communication Gate Type BMI  CS developer   s Guidance  Version 1 00  2005 03 25    Remote Communication Gate Type BN1  Remote             Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     Page 51 of 59          Assurance Class Assurance Assurance Measure  Component  Communication Gate Type BM1    Image I O device developer  s Guidance  Version 1 00  2005 03 25    ALC  ALC DVS 1 Development Security Plan for   Life cycle support Remote Communication Gate Type BNI   Remote Communication Gate Type BM1  Version 1 0  2005 08 15             ATE  ATE COV 2 Security Test Documentation for  Tests ATE DPT 1 Remote Communication Gate Type BNI   ATE FUN 1 Remote Communication Gate Type BM1  ATE INT 2 Version 1 0  2005 08 15  AVA  AVA MSU 1 Remote Communication Gate Type BN1  Remote  Vulnerability assessment Communication Gate Type BM 1    Setup Guide  Operating Instructions  Version 1 0  2005 08 15    AVA SOF 1 Strength of Function Analysis for   Remote Communication Gate Type BN1  Remote  Communication Gate Type BM 1   Version 1 0  2005 08 15    AVA VLA  Vulnerability Analysis for  Remote Communication Gate Type BNI     Remote Communication Gate Type BM1  Version 1 0  20
105. ters    Proxy server   Proxy address  Proxy port    Proxy user name          RC Gate Settings Net Connection  Settings Dial up    Dial up internet connection method    Internet connection method          Access point parameters 1       Access point  select    RC Gate phone No      Line connection          Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved        Page 56 of 59          Access point text    Access point  text        Dialing Line Settings    Dialing Line parameters    Pulse Tone dialing line     Outside access No        Modem Settings    Modem parameters    Dial up authentication method   Dial up User name    Dial up Password    Connection timeout    Number of times to re dial   Interval time to re dial   Number of times to retry callback   AT command    Ring count    Timers Tl to T7    IT Pattern     Timer for a fax on hook at  call back       Auto Discovery Auto Discovery  Settings    Auto Discovery    Auto Discovery       Auto Discovery permit    Permit setting of Auto Discovery    from Communication Server       Auto Discovery Settings    Auto Discovery server address    Auto Discovery server address       Max  E mail size    Max  E mail size       Auto Discovery Range parameters    Range   Subnet Mask   Discovery   Range Name     Comment          Device Management Common    management    Information Retrieval settings    Interval time to retrieve device  information    Interval time to re retrieve device  information    Number of times to re r
106. tified are non exploitable by  attackers with low attack potential in the intended operational environment of the TOE  if  taking into consideration all the measures the user is informed about     8 Evaluated Configuration    The TOE is delivered in one fixed configuration and no further generation takes place   Therefore the evaluated configuration is identical to the TOE  which can be identified as  described in chapter 2 of this certification report        firmware 3 18 1 11       9 Results of the Evaluation    The Evaluation Technical Report  ETR  was provided by TUViT s evaluation body according  to the requirements of the Scheme  the Common Criteria  CC   the Methodology  CEM  and  the Application Notes and Interpretations of the Scheme  AIS      The verdicts for the CC  part 3 assurance classes and components  according to EAL3 and  the class ASE for the Security Target Evaluation  are summarised in the following table                                                                       EAL3 assurance classes and components Verdict  Security Target evaluation CC Class ASE PASS  TOE description ASE DES 1 PASS  Security environment ASE ENV 1 PASS  ST introduction ASE INT 1 PASS  Security objectives ASE OBJ 1 PASS  PP claims ASE PPC 1 n a    IT security requirements ASE REQ 1 PASS  Explicitly stated IT security requirements ASE SRE 1 PASS  TOE summary specification ASE TSS 1 PASS  Configuration Management CC Class ACM PASS  Authorisation controls ACM CAP 3 PASS  TOE CM c
107. tion information and method to communicate with CS  When direct  HTTPS method  dialup HTTPS method  or SMTP method is used to  communicate with CS  operators can access to the information based on Table  4                    Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     Page 46 of 59          FTP ITC 1 SF CS I amp A    TSF identifies and authenticates CS before communicates with CS by HTTPS   When the identification and authentication is succeeded  it is allowed to  export or import information to from CS  If the identification and  authentication is failed  it is denied to export nor import information between  CS    SF CS HTTPS    TSF can export and import information listed in Table 5 to from CS by using  HTTPS protocol    TSF authenticates CS before export or import information  When CS is  successfully authenticated  TSF encrypts the information to export  and  decrypts the imported information        FCS COP 1 SF CS HTTPS     TSF can export and import information listed in Table 5 to from CS by using  HTTPS protocol    When CS is successfully authenticated  TSF encrypts the information to  export  and decrypts the imported information     SF CS SMIME    TSF can export information listed in Table 4 and Table 5 to CS by E Mail   When TSF export information to CS by using E Mail  TSF encrypts E Mail  message by S MIME  TSF encrypts the message by the public key of CS to  prevent other than CS to read the message    SF CS I amp A    TSF identifies and
108. to class  ASE and EAL 3  The actual fulfilment of the requirements by these assurance measures is inspected during the    evaluation        Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     Page 49 of 59       Table 14  Correspondence between assurance requirements and assurance measures                               Assurance Class Assurance Assurance Measure  Component  ASE  ASE_DES 1 Security Target for  Security Target evaluation ASE_ENV 1 Remote Communication Gate Type BNI   ASE_INT 1 Remote Communication Gate Type BM1  ASE_OBJ 1 Version 1 0  2005 08 15  ASE_PPC 1  ASE_REQ 1  ASE_SRE 1  ASE_TSS 1  ACM  ACM_CAP 3 Configuration Management Plan for  Configuration management ACM_SCP 1 Remote Communication Gate Type BNI   Remote Communication Gate Type BM1  Version 1 0  2005 08 15  ADO  ADO_DEL 1 Delivery Procedure for  Delivery and operation ADO_IGS 1 Remote Communication Gate Type BNI   Remote Communication Gate Type BM1  Version 1 0  2005 08 15  Production Procedure for  Remote Communication Gate Type BNI   Remote Communication Gate Type BM1  Version 1 0  2005 08 15  Remote Communication Gate Type BN1  Remote  Communication Gate Type BMI  Setup Guide  Operating Instructions  Version 1 0  2005 08 15  ADV  ADV_FSP 1 Security Functional Specification for  Development Remote Communication Gate Type BNI   Remote Communication Gate Type BM1  Version 1 0  2005 08 15  ADV_HLD 2 High level Design for  Remote Communication Gate Type BNI   Remote Communication Gate
109. vice confirm that they are working  correctly  Especially the image I O device that RC Gate manages explicitly should up and run    well     Responsible persons who should watch the office network working correctly will ensure  that office network system is trusted     Responsible persons should watch the office network working correctly and well  When the  TOE is using under circumstance of Internet   Firewall  and virus protecting programs shall be  established     The maintenance of RC Gate shall carry out by CE who is an employee of Ricoh or a  Ricoh   s affiliate company     CE is well trained and well informed about RC Gate  He She reads the maintenance  documentation and user documentation thoroughly  therefore  he she can respond  appropriately to RC Gate  The CE has to check the time and date regularly among others and    correct these  if necessary  Furthermore  the CE has to keep his her password secret        Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     Page 22 of 59       OE ADMIN Those responsible for the TOE shall assign the reliable administrator and registrant  and  train them appropriately     Reliable persons are assigned as Administrator and Registrant of the TOE  Administrator and  Registrant should read the user s document thoroughly  therefore  they can respond  appropriately to RC Gate as an Administrator and Registrant  The Administrator and  Registrant has to check the time and date regularly among others and correct these  if
110. y    d    Device   i i i i  Management Management     Management j   Management  Module Module     Module     Module            B      og      a  o  J   5   4  B   o   n   d  e      D  a  Q      et  oO  B  o  5  E  o  u   e  o  B  B  e  5  E      mp  o  D  Un      lt        n       Figure 3  RC Gate and the TOE       Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     2 6 Definition of Specific Terms    For clear understanding of this ST  the meanings of specific terms are defined as shown in Table 2     Table 2  Specific terms related to the RC Gate       Term    Definition       Administrator    CE    Certificates for RC Gate  Certificates for image  I O device   Firewall   Flash memory    Image I O device    Linux    MIB    Master key    Operator    PKI    Private key    Public key          Administrator is the trusted person who is authorised to perform the  administrative operations of the RC Gate     CE  Customer Engineer  is the person who performs maintenance  operation of the RC Gate  The CEs are employees of Ricoh or its  affiliated company     Public Private key for the RC Gate and the root key for CS and  Image I O device     Public Private key for the image I O device and the root key for RC  Gate     A set of related programs  located at a network gateway server  that  protects the resources of a private network from users from other  networks     Flash memory is non volatile memory  which is a fixed memory  device on board     Image I O device 
111. ysis for  Remote Communication Gate Type BN1  Remote Communication Gate Type BM 1  Version 1 0  2005 08 15    Vulnerability Analysis for  Remote Communication Gate Type BN1  Remote Communication Gate Type BM 1  Version 1 0  2005 08 15    Configuration Management Plan for  Remote Communication Gate Type BN1  Remote Communication Gate Type BM 1  Version 1 0  2005 08 15    Development Security Plan for  Remote Communication Gate Type BN1  Remote Communication Gate Type BM 1  Version 1 0  2005 08 15    Delivery Procedure for  Remote Communication Gate Type BN1  Remote Communication Gate Type BM 1  Version 1 0  2005 08 15    Production Procedure for  Remote Communication Gate Type BN1  Remote Communication Gate Type BM 1  Version 1 0  2005 08 15    Service Manual for Remote Communication Gate Type BN1  Remote Communication Gate Type BM1  Version 1 0  2005 08 15    Remote Communication Gate Type BN1 BM1  Machine Code  A768 A769  SERVICE MANUAL  Version 1 0 revised  2005 05 24    Remote Communication Gate Type BN1  Remote Communication Gate Type BM1  Safety Information and Setup Guide  Version A768 8603A  A768 8605A  2005 06 22    Remote Communication Gate Type BN1  Remote Communication Gate Type BM1  Operating Instructions  Version A768 8604A A768 8606A  2005 07 01       Copyright  c  2004  2005 Ricoh Company Ltd   all rights reserved     Page 38 of 59       Remote Communication Gate Type BN1  Remote Communication Gate Type BM1  CS developer   s Guidance  Version 1 00  2005 03 25  
    
Download Pdf Manuals
 
 
    
Related Search
    
Related Contents
Manuel d`utilisation du contrôleur RGB standard  Multibrackets 7350022732629 projection screen  Reloop Digital Jockey 2 Interface Edition  Droits FFE / DR  G Instruction for Use  Magnat Pro Selection 216  ISC‑PPR1‑W16 Detector PIR da série Profissional  OWL-PCCG-11/12シリーズ 取扱説明書  user`s manual      Copyright © All rights reserved. 
   Failed to retrieve file