TD0494: Removal of Mandatory SSH Ciphersuite for HCD
Publication Date
2020.02.20
Protection Profiles
PP_HCD_V1.0
Other References
FCS_SSH_EXT.1.7
Issue Description
FCS_SSH_EXT.1.7 still has diffie-hellman-group14-sha1 as a mandatory key exchange method; however, sha1 is phasing out fast and newer implementations of SSH only support SHA-256 or stronger hashing algorithms. Resolution
FCS_SSH_EXT.1.7 is modified as follows: FCS_SSH_EXT.1.7 The TSF shall ensure that [selection: diffie-hellman-group14-sha1, diffie-hellman-group15-sha512, ecdh-sha2-nistp256] and [selection: diffie-hellman-group14-sha256, diffie-hellman-group16-sha512, ecdh-sha2-nistp384, ecdh-sha2-nistp521, no other methods] are the only allowed key exchange methods used for the SSH protocol. Application Note: The ST must select at least one supported key exchange algorithm in the first selection. The algorithms in the second selection are optional; if none are supported, the ST author must select "no other methods". Assurance Activity: The evaluator shall check the guidance documentation to ensure that it contains instructions to the administrator on how to ensure that only the allowed key exchange algorithms are used in SSH connections with the TOE. Test: The evaluator shall also perform the following test:
Justification
See issue description. |