Canon | iR2870 Series | Specifications | Canon iR2870 Series Specifications

Canon iR2870 Series Specifications
CRP-C0036-01
Certification Report
Buheita Fujiwara, Chairman
Information-Technology Promotion Agency, Japan
Target of Evaluation
Application date/ID
Certification No.
Sponsor
Name of TOE
Version of TOE
PP Conformance
Conformed Claim
TOE Developer
Evaluation Facility
September 30, 2005 (ITC-5070)
C0036
Canon Inc.
Canon iR4570/iR3570/iR2870/iR2270 Series
iR Security Kit-B2 (Japanese version)
iR Security Kit-B2 (International version)
Version 2.03
None
EAL3
Canon Inc.
Electronic
Commerce
Security
Technology
Laboratory Inc. Evaluation Center
This is to report that the evaluation result for the above TOE is certified as
follows.
January 18, 2006
Haruki Tabuchi, Technical Manager
Information Security Certification Office
IT Security Center
Information-Technology Promotion Agency, Japan
Evaluation Criteria, etc.: This TOE is evaluated in accordance with the following
criteria prescribed in the “General Requirements for IT
Security Evaluation Facility”.
- Common Criteria for Information Technology Security Evaluation Version 2.1
(ISO/IEC 15408:1999)
- Common Methodology for Information Technology Security Evaluation
Version 1.0
- CCIMB Interpretations (as of 01 December 2003)
Evaluation Result: Pass
“Canon iR4570/iR3570/iR2870/iR2270 Series iR Security Kit-B2 Version 2.03
(Japanese version) iR Security Kit-B2 Version 2.03 (International version)” has
been evaluated in accordance with the provision of the “IT Security Certification
Procedure” by Information-Technology Promotion Agency, Japan, and has met
the specified assurance requirements.
CRP-C0036-01
Notice:
This document is the English translation version of the Certification Report
published by the Certification Body of Japan Information Technology Security
Evaluation and Certification Scheme.
CRP-C0036-01
Table of Contents
1. Executive Summary ........................................................................................... 1
1.1 Introduction ................................................................................................. 1
1.2 Evaluated Product ........................................................................................ 1
1.2.1 Name of Product ........................................................................................... 1
1.2.2 Product Overview.......................................................................................... 1
1.2.3 Scope of TOE and Overview of Operation ...................................................... 2
1.2.4 TOE Functionality ........................................................................................ 4
1.3 Conduct of Evaluation .................................................................................. 5
1.4 Certification ................................................................................................. 6
1.5 Overview of Report ....................................................................................... 6
1.5.1 PP Conformance ............................................................................................ 6
1.5.2 EAL .............................................................................................................. 6
1.5.3 SOF .............................................................................................................. 6
1.5.4 Security Functions ........................................................................................ 7
1.5.5 Threat........................................................................................................... 8
1.5.6 Organisational Security Policy ...................................................................... 9
1.5.7 Configuration Requirements ......................................................................... 9
1.5.8 Assumptions for Operational Environment.................................................. 10
1.5.9 Documents Attached to Product .................................................................. 10
2. Conduct and Results of Evaluation by Evaluation Facility............................... 12
2.1 Evaluation Methods.................................................................................... 12
2.2 Overview of Evaluation Conducted ............................................................. 12
2.3 Product Testing .......................................................................................... 12
2.3.1 Developer Testing ....................................................................................... 12
2.3.2 Evaluator Testing ....................................................................................... 14
2.4 Evaluation Result....................................................................................... 15
3. Conduct of Certification................................................................................... 16
4. Conclusion ....................................................................................................... 17
4.1 Certification Result .................................................................................... 17
4.2 Recommendations ....................................................................................... 17
5. Glossary .......................................................................................................... 18
6. Bibliography .................................................................................................... 20
CRP-C0036-01
1. Executive Summary
1.1 Introduction
This Certification Report describes the content of certification result in relation to IT
Security Evaluation of “Canon iR4570/iR3570/iR2870/iR2270 Series iR Security Kit-B2
Version 2.03 (Japanese version) iR Security Kit-B2 Version 2.03 (International
version)” (hereinafter referred to as “the TOE”) conducted by Electronic Commerce
Security Technology Laboratory Inc. Evaluation Center (hereinafter referred to as
“Evaluation Facility”), and it reports to the sponsor, Canon Inc..
The reader of the Certification Report is advised to read the corresponding ST and
manuals (please refer to “1.5.9 Documents Attached to Product” for further details)
attached to the TOE together with this report. The assumed environment,
corresponding security objectives, security functional and assurance requirements
needed for its implementation and their summary specifications are specifically
described in ST. The operational conditions and functional specifications are also
described in the document attached to the TOE.
Note that the Certification Report presents the certification result based on assurance
requirements conformed to the TOE, and does not certify individual IT product itself.
Note:
In this Certification Report, IT Security Evaluation Criteria and IT
Security Evaluation Method prescribed by IT Security Evaluation and
Certification Scheme are named CC and CEM, respectively.
1.2 Evaluated Product
1.2.1 Name of Product
The target product by this Certificate is as follows:
Name of Product: Canon iR4570/iR3570/iR2870/iR2270 Series
iR Security Kit-B2 (Japanese version)
iR Security Kit-B2 (International version)
Version:
2.03
Developer:
Canon Inc.
1.2.2 Product Overview
This product is a software program to be installed for use on the Canon
iR4570/iR3570/iR2870/iR2270-series multifunction products (hereafter referred to
collectively as the “multifunction product”).
The multifunction product is an office machine with the combined functionality of Copy,
Send (Universal Send), Fax Reception, Mail Box, Print, Remote UI (a Web browser
interface for operating the multifunction product) and many others. The use of the
Copy, Universal Send, Fax Reception (fax/I-fax reception) or Print function involves
creation of temporary image data on the HDD of the multifunction product. Likewise,
the use of the Mail Box function (for document storage) or the Fax Reception function
(for “in-memory reception” or forwarding of faxes/I-faxes) involves the process of
saving image data to an inbox on the multifunction product. Furthermore, when the
Remote UI function is used, image data is exchanged over the network between the
Web browser on the user ’s PC and the multifunction product.
1
CRP-C0036-01
By installing this product, security enhancements can be added to the multifunction
product, helping users counter the threat of unauthorized disclosure of their
temporary image data created on the HDD and image data stored in the inboxes and
image data that is transmitted over the Remote UI communication path.
1.2.3 Scope of TOE and Overview of Operation
Figure 1-1 depicts a typical operating environment of the multifunction product with
the TOE installed.
Multifunction
Product
Paper
document
Co
P r py
in t
S
Fax transmission
Telephone line
Send (faxes)
Paper
document
x
py nbo
C o s er I
U
in nd
ave S e
Send (I-faxes / e-mails)
I-fax transmission
Memory
Reception
Inbox
Confidential
Fax Inbox
User Inbox
Mail Server
HDD
bs
J o v e)
g
i n t sa
Pr t/
xi n
rin k fa
UI
te
(p
Ne
CompanySenLAN
d
tw
or
( to
Re
mo
Firewall
PC
Internet
as
har
ed
fo l
de r
)
File Server
Web browser
Figure 1-1: A typical operating environment of the multifunction product with the TOE installed
The scope of the TOE includes the whole of the software program that is installed on
the multifunction product to control its entire functionality, the Web browser contents
of the Remote UI, and the MEAP authentication application that comes standard with
the multifunction product. The assets to be protected are the temporary image data
that will be created on the HDD of the multifunction product, the image data will be
stored in the inboxes on the multifunction product, and image data that is transmitted
over the Remote UI communication path.
The multifunction product control software is executed on the controller hardware of
the multifunction product, and the Web browser contents of the Remote UI are
executed on each user ’s desktop via a Web browser. The hardware components of the
multifunction product, including the controller and the HDD are outside the scope of
the TOE. Also outside the scope of the TOE are the hardware components of a user ’s
PC and its installed operating system, Web browser, printer drivers, fax drivers and
image viewer plug-ins.
Figure 1-2 illustrates the TOE boundary.
2
CRP-C0036-01
Control Software
(software: TOE)
Remote UI Contents
(software: TOE)
Pre-installed MEAP App
(software: TOE)
Optional MEAP App
(software: outside
TOE)
Controller (hardware: outside TOE)
Scan Engine/ADF
(hardware: outside TOE)
Printer Engine
(hardware: outside TOE)
Control Panel
(hardware: outside TOE)
Note: The cross-hatched portion indicates the scope of the TOE.
Figure 1-2: TOE boundary on the multifunction product
The security functions of the TOE are; HDD Data Encryption, HDD Data Complete
Erase, Inbox User Identification and Authentication, Inbox Management, System
Manager Identification and Authentication, System Manager Management, and secure
communication (Remote UI).
The following provides an operational overview of these TOE security functions.
Copy, Send (Universal Send), Fax Reception, Print
When a regular user operates the multifunction product to perform the Copy, Send
(Universal Send), Fax Reception (for receiving faxes/I-faxes) or Print function,
temporary image data is created and encrypted on the HDD of the multifunction
product. Encrypted temporary image data is decrypted when read out by a user
operation, and it is erased from the HDD by being overwritten with meaningless data
at the completion of the operation. Encryption, decryption and overwrite erase of
temporary image data are performed silently in the background, without bothering the
TOE user. (Related security functions: HDD Data Encryption , HDD Data Complete
Erase )
Mail Box, Fax Reception
When a regular user operates the multifunction product to perform the Mail Box
function (for saving scanned documents or documents printed from the PC) or Fax
Reception function (for “in-memory reception” or forwarding of faxes/I-faxes),
encrypted image data is created in the appropriate inbox on the multifunction product,
and it can be accessed from the Inbox Selection Screen by selecting its containing inbox.
This inbox-stored image data is decrypted when it needs to be read out by a user
operation, and if it is selected for deletion, it is erased from the inbox by being
overwritten with meaningless data at the completion of the operation. Encryption,
decryption and overwrite erase of inbox-stored image data are all done silently in the
background, without bothering the TOE user. (Related security functions: HDD Data
Encryption , HDD Data Complete Erase )
Inbox Password-based Document Management
A regular user can set a password on any desired inbox by operating the Control Panel
of the multi function product or the Remote UI. When such a password-protected inbox
is selected in the Inbox Selection Screen, the accessing user is required to provide the
password for that inbox. If successfully authorized, the user is granted access and
allowed to use any image data stored in the inbox.
Image data stored in the inbox can be previewed using the Remote UI, and image data
transmissions exchanged between the user ’s Web browser and the multifunction
product over the Remote UI communication path are protected by SSL.
(Related security functions: Inbox Management, Inbox User Identification and
Authentication, Secure Communication (Remote UI) )
Inbox Password Management
A regular user who is authenticated as an authorized user of an inbox can modify or
3
CRP-C0036-01
clear the password for that inbox. The user assigned as the System Manager can log in
to the System Management Mode by entering the System Manager ID and the System
Password on the Control Panel of the multifunction product. While in the System
Management mode, the System Manager can not only modify or clear any inbox’s
password, but also can modify the System Manager ID and the System Password
themselves. (Related security functions: Inbox User Identification and Authentication ,
Inbox Management , System Manager Identification and Authentication , System
Manager Management )
1.2.4 TOE Functionality
This section describes the functionality of the TOE.
(1) Security Functions
The TOE has the following security functions.
HDD Data Encryption
A function to encrypt image data (temporary or inbox-stored image data) upon saving
to the HDD.
HDD Data Complete Erase
A function to clear image data (temporary or inbox-stored image data) on the HDD by
overwriting its disk space with meaningless data.
Inbox User Identification and Authentication
A function to identify and authenticate an authorized inbox user by means of inbox
password verification, before allowing any image data to be read out from the accessed
inbox.
Inbox Management
A function to set a password on an inbox.
System Manager Identification and Authentication
A function to identify and authenticate an owner of the System Manager ID and the
System Password as the System Manager, before allowing access to the System
Management mode.
System Manager Management
A function to define a System Manager ID and a System
activate/deactivate the Secure Communication (Remote UI) function.
Password
and
Secure Communication (Remote UI)
A function to secure communications between the Remote UI and a user ’s Web browser
using SSL.
(2) Control of the Multifunction Product’s Functionality
The TOE controls the following functions of the multifunction product.
Copy
A function to duplicate hard-copy documents by scanning and printing.
The Copy function involves the process of creating temporary image data on the HDD
of the multifunction product.
Universal Send (document transfer)
4
CRP-C0036-01
A function to send scanned documents or documents stored in a User Inbox or the
Memory Reception Inbox as faxes or TIFF or PDF format files to an outside e-mail
address or a shared folder on an external PC.
This function also allows network faxing from a user ’s desktop through the use of a fax
driver.
The Universal Send function involves the process of creating temporary image data on
the HDD of the multifunction product.
Fax Reception
A function to automatically print or forward received faxes/I-faxes.
The Fax/I-Fax Reception function involves the process of creating temporary image
data on the HDD of the multifunction product.
Faxes/I-faxes received in memory and stored in the Memory Reception Inbox can be
extracted at a later time for printing or outbound transfer. Received fax forwarding
settings can be customized to automatically forward received faxes/I-faxes to an
external destination or a specific Confidential Fax Inbox before they are stored in the
Memory Reception Inbox. Documents received in a Confidential Fax Inbox are
available for later printing only.
User Inbox
A function to store documents scanned or received from an external PC as image data
in a specified User Inbox. User Inbox-stored image data can be merged with other
documents or overlaid with a form image before printing.
Print
A function to print documents received from an external PC by using the multifunction
product as a network printer. The Print function involves the process of creating
temporary image data on the HDD of the multifunction product.
Remote UI
The multifunction product can be operated directly via its Control Panel, as well as
remotely via the Remote UI software. The Remote UI software allows remote access to
the multifunction product from the Windows desktop via a Web browser and a network
connection, enabling the user to view device status information, manipulate jobs,
perform inbox management operations, configure various settings, and so on. The Web
server functionality is already embedded in the multifunction product, so that users
are not required to have any other software than a Web browser.
1.3 Conduct of Evaluation
Based on the IT Security Evaluation/Certification Program operated by the
Certification Body, TOE functionality and its assurance requirements are being
evaluated by evaluation facility in accordance with those publicized documents such as
“Guidance for IT Security Certification Application, etc.”[2], “General Requirements
for IT Security Evaluation Facility”[3] and “General Requirements for Sponsors and
Registrants of IT Security Certification”[4].
Scope of the evaluation is as follow.
- Security design of the TOE shall be adequate;
- Security functions of the TOE shall be satisfied with security functional
requirements described in the security design;
- This TOE shall be developed in accordance with the basic security design;
- Above mentioned three items shall be evaluated in accordance with the CC Part 3
5
CRP-C0036-01
and CEM.
More specific, the evaluation facility examined “Canon iR4570/iR3570/iR2870/iR2270
Series iR Security Kit-B2 V2 Security Target Version 1.03” as the basis design of
security functions for the TOE (hereinafter referred to as “the ST”)[1], the evaluation
deliverables in relation to development of the TOE and the development,
manufacturing and shipping sites of the TOE. The evaluation facility evaluated if the
TOE is satisfied both Annex C of CC Part 1 (either of [5], [8], [11] or [14]) and
Functional Requirements of CC Part 2 (either of [6], [9], [12] or [15]) and also
evaluated if the development, manufacturing and shipping environments for the TOE
is also satisfied with Assurance Requirements of CC Part 3 (either of [7], [10], [13] or
[16]) as its rationale. Such evaluation procedure and its result are presented in “Canon
iR4570/iR3570/iR2870/iR2270 Series iR Security Kit-B2 (Japanese version) iR Security
Kit-B2 (International version) Evaluation Technical Report” (hereinafter referred to as
“the Evaluation Technical Report”)[22]. Further, evaluation methodology should
comply with the CEM Part 2 (either of [17], [18] or [19]). In addition, the each part of
CC and CEM shall include contents of interpretations (either of [20] or [21]).
1.4 Certification
The Certification Body verifies the Evaluation Technical Report and Observation
Report prepared by the evaluation facility and evaluation evidence materials, and
confirmed that the TOE evaluation is conducted in accordance with the prescribed
procedure. Certification review is also prepared for those concerns found in the
certification process. Evaluation is completed with the Evaluation Technical Report
dated September, 2005 submitted by the evaluation facility and those problems
pointed out by the Certification Body are fully resolved and confirmed that the TOE
evaluation is appropriately conducted in accordance with CC and CEM. The
Certification Body prepared this Certification Report based on the Evaluation
Technical Report submitted by the evaluation facility and concluded fully certification
activities.
1.5 Overview of Report
1.5.1 PP Conformance
There is no PP to be conformed.
1.5.2 EAL
Evaluation Assurance Level of TOE defined by this ST is EAL3 conformance.
1.5.3 SOF
This ST claims “SOF-basic” as its minimum strength of function.
This claim is appropriate, because the TOE is a software program for use on the
multifunction product that is a general commercial product intended for use in an
office environment.
6
CRP-C0036-01
1.5.4 Security Functions
Security functions of the TOE are as follow.
HDD Data Encryption
The TOE generates 168-bit Triple DES cryptographic keys using the Canon iR
cryptographic key generation algorithm. Whenever writing image data to the HDD, the
TOE uses a FIPS PUB 46-3-compliant 168-bit Triple DES algorithm for encryption of
the image data. Whenever reading out image data from the HDD, the TOE uses a FIPS
PUB 46-3-compliant 168-bit Triple DES algorithm for decryption of the image data.
The TOE destroys cryptographic keys using the Canon iR cryptographic key
destruction method.
HDD Data Complete Erase
When a document is deleted from an inbox, the TOE clears the corresponding image
data from the HDD. When the Copy, Print, Fax Reception or Universal Send function is
executed, the TOE creates temporary image data on the HDD and clears it at the
completion of the function. When performing a complete image data erase, the TOE
overwrites the corresponding disk space with meaningless data so as to clear the image
data. The TOE clears any residual temporary image data left on the HDD at the
request of the System Manager or at startup time (i.e. when the multifunction product
is powered on). This is accomplished by overwriting the corresponding disk space with
meaningless data.
Inbox User Identification and Authentication
The TOE requires any user attempting to access a password-protected inbox to provide
the password for the inbox before allowing access (unless the user is trying to add
image data there). If the inbox is not protected with a password, then the TOE does not
require input of a password. The TOE identifies and authenticates the user as an
authorized user of the inbox and displays the Inbox Operation Screen, only after
verifying that the user-given password is the correct inbox password. Once authorized,
the user, if accessing from the Control Panel, is maintained by the TOE as an
authorized inbox user until the user returns to the Inbox Selection Screen from the
Inbox Operation Screen. In contrast, if the user is accessing from the Remote UI, the
TOE maintains the user as an authorized inbox user until some operation is attempted
on a different inbox or the Web browser is closed. If an incorrect inbox password is
entered through the Control Panel or the Remote UI, the TOE imposes a 1-second wait
time before redisplaying the Password Entry Screen.
Inbox Management
The TOE restricts the right to modify and clear (remove) an inbox password only to
authorized inbox users and the System Manager. The TOE gives the System Manager
the ability to modify and clear any inbox’s password using the Control Panel. The TOE
gives authorized inbox users the ability to modify and clear their inbox passwords
using the Control Panel or the Remote UI. The TOE limits the inbox password to a
7-digit number. If a password-protected inbox is re-registered with no password
defined, the TOE removes the current password from the inbox.
System Manager Identification and Authentication
The TOE requires any user attempting to perform System Manager actions using the
TOE to provide the correct System Manager ID and System Password in order to be
identified and authenticated as the System Manager. At this time, if the Department
ID Management function is active on the multifunction product, the System Manager
Identification and Authentication function is invoked before allowing the user to
operate the multifunction product via the Control Panel or the Remote UI. If the
7
CRP-C0036-01
Department ID Management function is not active, the function is invoked when the
System Settings Screen is displayed on the Control Panel or in the Remote UI window.
The TOE identifies and authenticates the user as the System Manager only after
verifying that the user-given ID and password are the correct System Manager ID and
System Password. If an incorrect System Manager ID or System Password is entered
from the Control Panel or via the Remote UI, the TOE imposes a 1-second wait time
before redisplaying the Password Entry Screen. Once authorized, the user, if accessing
from the Control Panel, is maintained by the TOE as the System Manager with
permissions to configure system management settings, manipulate any inbox and
execute inbox management functions, until the System Management mode is canceled
with the ID key on the Control Panel. If the user is accessing from the Remote UI, the
TOE maintains the user the System Manager until the Web browser is closed.
System Manager Management
The TOE assigns the following privileges to the System Manager only:
・ The System Manager can modify the System Manager ID and System Password,
and can also delete (unset) the System Manager ID. The System Password is
limited to a 7-digit number by the TOE. The TOE limits the System Password to a
7-digit number.
・ The System Manager can activate or deactivate the Secure Communication
(Remote UI) function.
Secure Communication (Remote UI)
The TOE uses SSL for secure communications between the Remote UI and a user ’s Web
browser in order to protect the transmitted data from unauthorized modification and
disclosure.
1.5.5 Threat
This TOE assumes such threats presented in Table 1-1 and provides functions for
countermeasure to them.
8
CRP-C0036-01
Table 1-1 Assumed Threats
Threat
A malicious individual may attempt to disclose
temporary image data or inbox-stored image data
on the HDD of the multifunction product by
removing the HDD from the multifunction product
and directly accessing the HDD using disk editor
tools, etc.
T.UNAUTH:
An unauthorized inbox user (except the System
Operation Attempts Manager) may attempt to disclose inbox-stored
by
Unauthorized image data by operating the Control Panel or the
Users
Remote UI.
T.NETWORK_TAP:
A malicious individual may attempt to disclose
Eavesdropping
of passwords and image data by intercepting data
Data En Route
transmissions over the Remote UI communication
path.
Identifier
T.HDD_ACCESS:
Direct Access to HDD
Data
1.5.6 Organisational Security Policy
There are no organizational security policies required for using the TOE.
1.5.7 Configuration Requirements
The TOE comprises the software product to be provided by Canon Inc. for installation
on the multifunction product and the Web browser contents of the Remote UI.
The operating environment of the TOE is indicated below.
Table 1-2: Multifunction products supporting this TOE and necessary options (Japanese models)
Model Name
Canon iR4570
Canon iR4570F
Canon iR3570
Canon iR3570F
Canon iR2870
Canon iR2870F
Canon iR2270
Canon iR2270F
Necessary Options
Expansion Bus-B1,USB Application Interface Board-D1,
additional memory (512MB or more in total, including
onboard memory)
Table 1-3: Multifunction products supporting this TOE and necessary options (Int’l models)
Model Name
Canon iR4570
Canon iR3570
Canon iR2870
Canon iR2270
Necessary Options
Expansion Bus-B1, USB Application Interface Board-D1
In order to operate the multifunction product using the Remote UI, the following
software programs need to be installed on the user ’s computer.
9
CRP-C0036-01
Web browser
Any of the Web browsers shown in the following table can be used.
Table 1-4: Web browsers that can run the Remote UI
OS
Windows
Macintosh
Web Browser
Microsoft Internet Explorer
Netscape Communicator
Microsoft Internet Explorer
Required SP
5.01 SP2 or later
4.6 or later
5.0 or later
Netscape Communicator 5.x and Netscape 6.x are not in the scope of evaluation.
Image viewer plug-in (required for document previewing from the Remote UI)
Canon JBIG Image Viewer Plug-in software (bundled with the multifunction product)
1.5.8 Assumptions for Operational Environment
Assumptions required in environment using this TOE presents in the Table 1-5.
The effective performance of the TOE security functions are not assured unless these
preconditions are satisfied.
Table 1-5: Assumptions in Use of the TOE
Identifier
Assumptions
A.ADMIN:
The System Manager shall be trusted not to abuse
Trusted
System his privileges.
Manager
A.PWD_MANAGE:
Every inbox password and the System Password
Password
shall be kept secret from and difficult to be
Management
guessed by other users.
A.PWD_SET:
Every inbox containing image data that requires
Password Protection
protection shall be password-protected using the
Control Panel or the Remote UI.
The System Manager ID and the System Password
shall already be set.
The multifunction product running the TOE, upon
A.NETWORK:
Connection of the connection to a network, shall be connected to the
internal network that is inaccessible directly from
Multifunction
outside networks such as the Internet.
Product
1.5.9 Documents Attached to Product
Documents attached to the TOE are listed below.
(1) Documents attached to the Canon iR4570/iR3570/iR2870/iR2270 Series iR Security
Kit-B2 Version 2.03 (Japanese version)
- Canon iR Security Kit-B2 V2 Reference Guide, FA7-9025
- iR4570/iR4570F iR3570/iR3570F iR2870/iR2870F iR2270/iR2270F Reference
Guide, FA7-9029
- iR4570/iR4570F iR3570/iR3570F iR2870/iR2870F iR2270/iR2270F Copying /
Mail Box Guide, FA7-9030
- iR4570/iR4570F iR3570/iR3570F iR2870/iR2870F iR2270/iR2270F Sending
and Facsimile Guide, FA7-9031
- iR4570/iR4570F iR3570/iR3570F iR2870/iR2870F iR2270/iR2270F Remote UI
Guide, FA7-9032
10
CRP-C0036-01
-
iR4570/iR4570F iR3570/iR3570F iR2870/iR2870F iR2270/iR2270F Network
Guide, FA7-9033
iR4570/iR4570F iR3570/iR3570F iR2870/iR2870F iR2270/iR2270F MEAP SMS
Administrator Guide, FA7-9034
iR4570/iR4570F iR3570/iR3570F iR2870/iR2870F iR2270/iR2270F MEAP
Authentication System Setting Guide, FA7-9035
Note: These document titles were translated from the original Japanese titles.
(2) Documents attached to the Canon iR4570/iR3570/iR2870/iR2270 Series iR Security
Kit-B2 Version 2.03 (International version)
- iR Security Kit-B2 V2 Reference Guide, FA7-9036
- 4570/3570/2870/2270 Reference Guide, FA7-9041
- 4570/3570/2870/2270 Copying Guide, FA7-9042
- 4570/3570/2870/2270 Mail Box Guide, FA7-9043
- 4570/3570/2870/2270 Sending and Facsimile Guide, FA7-9044
- 4570/3570/2870/2270 Remote UI Guide, FA7-9045
- 4570/3570/2870/2270 Network Guide, FA7-9046
- MEAP SMS Administrator Guide, FA7-9047
11
CRP-C0036-01
2. Conduct and Results of Evaluation by Evaluation Facility
2.1 Evaluation Methods
Evaluation was conducted by using the evaluation methods prescribed in CEM Part 2
in accordance with the assurance requirements in CC Part 3. Details for evaluation
activities are report in the Evaluation Technical Report. It described the description of
overview of the TOE, and the contents and verdict evaluated by each work unit
prescribed in CEM Part 2.
2.2 Overview of Evaluation Conducted
The history of evaluation conducted was present in the Evaluation Technical Report as
follows.
Evaluation has started on October, 2005 and concluded by completion the Evaluation
Technical Report dated December, 2005. The evaluation facility received a full set of
evaluation deliverables necessary for evaluation provided by developer, and examined
the evidences in relation to a series of evaluation conducted. Additionally, the
evaluation facility directly visited the development and manufacturing sites on
November, 2005 and examined procedural status conducted in relation to each work
unit for configuration management, delivery and operation and lifecycle by
investigating records and staff hearing. Further, the evaluation facility executed
sampling check of conducted testing by developer and evaluator testing by using
developer testing environment at developer site on November, 2005.
2.3 Product Testing
Overview of developer testing evaluated by evaluator and evaluator testing conducted
by evaluator are as follows.
2.3.1 Developer Testing
1) Developer Test Environment
Test configuration performed by the developer is showed in the Table 2-1.
12
CRP-C0036-01
Table 2-1: Developer test configuration
Version
Japanese version: Ver.2.03, International version: Ver.2.03
TOE
TOE
Equipment
Major Specification
iR2270F (Japanese), iR2270 (International)
Multifunction
product
Options
for
multifunction
product
the ・ iR 256MB Expansion RAM·B1
・ USB Application Interface Board-D1
・ Expansion Bus-B1
・ Send Expansion Kit
・ Super G3 FAX Board-R1
・ Web browser
Three Windows-based PCs
PC
HUB
Network cable x 2
Facsimile apparatus
Central
Office
simulator
Software
OS
Communications
software
Printing software
Web browser
Printer driver
100Mbps switching HUB
UTP cable (category 5)
A facsimile to communicate with the multifunction product
A device to connect the multifunction product and the
facsimile with simulated telephone lines
Major Specification
Microsoft Windows 2000 Professional Service Pack 4
Serial terminal software
Printing software for windows
Microsoft Internet Explorer Version 6.0 Service Pack 1
Windows LIPS IV or LIPS LX Printer Driver (Japanese
version)
PCL6 or PCL5e Printer Driver and PS Printer Driver (English
version)
2) Outlining of Developer Testing
Outlining of the testing performed by the developer is as follow.
a. Test configuration
The testing was conducted using only some of the product models identified as
TOE platforms in the ST (only one used, out of four). However, these models all
sport the same controller hardware, which is the very place where the TOE runs,
and the difference between the scanner engine and the print engine is known to
have no impact on the TOE. Therefore, these facts collectively verify that the
test configuration was appropriate for the TOE operating environment, despite
not all of the targeted multifunction product models being used.
The communications software, and the printing software were used as the
equipment for retrieving necessary information for the testing, and they were
all confirmed to have no impact on the TOE security functions. A Central Office
simulator was used for data exchange with the facsimile apparatus, however,
the TOE security functions are not impacted by the difference between an actual
phone line and the Central Office simulator.
Other configuration components all match the TOE operating environment
13
CRP-C0036-01
described in the ST.
b. Testing Approach
For the testing, following approach was used.
1. The developer stimulated each security function at each external interface by
operating the multifunction product’s Control Panel or the Remote UI, and
observed its behavior.
2. As for the security functions whose behavior could not be observed at the
external interfaces, the developer verified their behavior by means of
monitoring the operating status of the TOE program, capturing hard disk
dumps, and monitoring packets on the network.
c. Scope of Testing Performed
Testing is performed about 107 items by the developer.
The coverage analysis is conducted and examined to testing satisfactorily all of
the security functions described in the functional specification and the external
interface.A depth analysis was performed and verified that the subsystems and
subsystem interfaces described in the high-level design have been all thoroughly
tested.
d. Result
The evaluator confirmed consistencies between the expected test results and the
actual test results provided by the developer. The Evaluator confirmed the
developer testing approach performed and legitimacy of items performed, and
confirmed consistencies between the testing approach described in the test plan
and the actual test results.
2.3.2 Evaluator Testing
1) Evaluator Test Environment
The evaluator used the same test configuration as the test configuration used by
the developer, plus an additional tool for penetration testing against the developer
test configuration.
2) Outlining of Evaluator Testing
Outlining of testing performed by the evaluator is as follow.
a. Testing Approach
The evaluator confirmed that the developer ’s testing methodology was
appropriate for examination of the expected behavior of the security functions
and thus adopted the same testing approach.
b. Scope of Testing Performed
The evaluator performed 48 tests in total; 10 independent tests, 24 sampled
developer tests, and 14 penetration tests. As for selection of the test subset, the
following factors are considered.
14
CRP-C0036-01
1. Security functions whose behavior could not be observed from outside
2. Security functions with changeable parameters
The evaluator sampled 24 (23%) of the developer ’s 107 tests for sample testing
in a way that all the functions would be covered.
The penetration testing comprises 14 tests according to the outcome of the
vulnerability analysis performed based on publicly-known vulnerabilities,
multifunction product-specific vulnerabilities, and the evaluator ’s knowledge of
the TOE gained during the evaluation.
c. Result
All evaluator testing conducted is completes correctly and could confirm the
behavior of the TOE. The evaluator also confirmed that all the test results are
consistent with the behavior, and that there are no obvious exploitable
vulnerabilities in the TOE.
2.4 Evaluation Result
The evaluator had the conclusion that the TOE satisfies all work units prescribed in
CEM Part 2 by submitting the Evaluation Technical Report.
15
CRP-C0036-01
3. Conduct of Certification
The following certification was conducted based on each materials submitted by
evaluation facility during evaluation process.
1. Contents pointed out in the Observation Report shall be adequate.
2. Contents pointed out in the Observation Report shall properly be reflected.
3. Evidential materials submitted were sampled, its contents were examined, and
related work units shall be evaluated as presented in the Evaluation Technical
Report.
4. Rationale of evaluation verdict by the evaluator presented in the Evaluation
Technical Report shall be adequate.
5. The Evaluator ’s evaluation methodology presented in the Evaluation Technical
Report shall conform to the CEM.
16
CRP-C0036-01
4. Conclusion
4.1 Certification Result
The Certification Body verified the Evaluation Technical Report, the Observation
Report and the related evaluation evidential materials submitted and confirmed that
all evaluator action elements required in CC Part 3 are conducted appropriately to the
TOE. The Certification Body verified the TOE is satisfied the EAL3 assurance
requirements prescribed in CC Part 3.
4.2 Recommendations
None
17
CRP-C0036-01
5. Glossary
The abbreviations used in this report are listed below.
CC:
Common Criteria for Information Technology Security Evaluation
CEM:
Common Methodology for Information Technology Security
Evaluation
EAL:
Evaluation Assurance Level
PP:
Protection Profile
SOF:
Strength of Function
ST:
Security Target
TOE:
Target of Evaluation
TSF:
TOE Security Functions
The glossaries used in this report are listed below.
Confidential
Fax Inbox:
An inbox to store incoming faxes/I-faxes as sorted by recipient for
later printing.
Controller:
The TOE platform. A hardware device with a CPU and memory.
Control Panel:
A hardware component of the multifunction product consisting of
operation keys and a touch panel display. It is used for operating the
multifunction product.
Department
ID:
An ID assigned to each multifunction product user, who could be an
individual or a department. When the Department ID Management
function is active, every user must be identified and authenticated
before operating the multifunction product.
The System Manager is a user who is given a special department ID
called the System Manager ID.
Department ID
Management:
A function of the multifunction product that issues a department ID
and a password to each multifunction product user, in order to keep
track and control of the number of printed copies, etc., on a
per-department basis. When the Department ID Management
function is active, every user has to be identified and authenticated
by providing the correct department ID and password before using
the multifunction product.
Document:
Form of user data handled within the multifunction product. A
document consists of management information and image data.
Form image:
Internal image data that is stored in the multifunction product and
used for overlay printing.
HDD:
The hard disk drive of the multifunction product, where the TOE
and its assets will be stored.
I-fax:
An Internet faxing service that allows transmission and reception of
faxes using the Internet instead of telephone lines.
Image data:
Data that is created on the HDD of the multifunction product
through scanning, printing and fax reception.
18
CRP-C0036-01
Inbox user:
A regular user of an inbox. Each inbox user can password-protect his
desired inbox to prevent access by other regular users.
In-memory-rec
eption:
An act of receiving incoming faxes/I-faxes in memory for storage in
the Memory Reception Inbox, without printing.
MEAP:
Short for Multifunctional Embedded Application Platform, which is
a platform for running applications on the multifunction product.
MEAP
application:
Special applications developed with the Java language for use in
Canon digital multifunction products. They can be used in
conjunction with a Canon digital multifunction product’s functions,
e.g. print, copy, fax, scan, etc., to customize the user interface,
simplify the document flow and automate routine tasks.
An inbox to store “in-memory-received” faxes/I-faxes for later
printing or transfer to an external destination.
Memory
Reception
Inbox:
Multifunction
product:
Printer engine:
A collective name for the Canon iR4570/iR3570/iR2870/iR2270
series copiers that offer the combined functionality of copying,
faxing, printing and transmission (Universal Send). The
multifunction product is equipped with a large-capacity HDD to
perform these functions, and allows the TOE to run embedded in it.
A hardware component of the multifunction product that prints
image data on paper.
Regular user:
A user of the multifunction product.
Remote UI:
An interface that allows remote access to the multifunction product
from a desktop Web browser for viewing device status information,
manipulating jobs, configuring Mail Box settings, configuring
various settings, etc.
Scan
engine/ADF:
A hardware component of the multifunction product that scans
paper documents and stores acquired image data in the
multifunction product.
System
Management
mode:
A mode in which System Manager privileges are maintained on the
multifunction product. Any operations specified in this mode are
performed as System Manager actions. To enter this mode, the
System Manager ID and System Password must be provided. The
System Management mode is canceled when the ID key is pressed
down on the multifunction product’s Control Panel.
System
Manager:
A special user of the multifunction product who is in responsible for
device configuration and management. The System Manager may
also be put in charge of inbox management on behalf of inbox users.
The multifunction product will identify a user who owns the System
Manager ID as the System Manager.
User Inbox:
An inbox to store documents scanned by regular users and
documents sent for storage from a connected PC. Documents stored
in a User Inbox can be extracted at a later time for printing or
transfer to an external destination.
19
CRP-C0036-01
6. Bibliography
[1]
Canon iR4570/iR3570/iR2870/iR2270 Series iR Security Kit-B2 V2 Security
Target Version 1.03 (November 17, 2005) Canon Inc.
[2]
IT
Security
Evaluation
and
Certification
Scheme,
Information-Technology Promotion Agency, Japan EC-01
[3]
IT Security Certification Procedure,
Promotion Agency, Japan EC-03
[4]
Evaluation Facility Approval Procedure, July 2005, Information-Technology
Promotion Agency, Japan EC-05
[5]
Common Criteria for Information Technology Security Evaluation Part 1:
Introduction and general model Version 2.1 August 1999 CCIMB-00-031
[6]
Common Criteria for Information Technology Security Evaluation Part 2:
Security functional requirements Version 2.1 August 1999 CCIMB-99-032
[7]
Common Criteria for Information Technology Security Evaluation Part 3:
Security assurance requirements Version 2.1 August 1999 CCIMB-99-033
[8]
Common Criteria for Information Technology Security Evaluation Part 1:
Introduction and general model Version 2.1 August 1999 CCIMB-99-031
(Translation Version 1.2 January 2001)
[9]
Common Criteria for Information Technology Security Evaluation Part 2:
Security functional requirements Version 2.1 August 1999 CCIMB-99-032
(Translation Version 1.2 January 2001)
[10]
Common Criteria for Information Technology Security Evaluation Part 3:
Security assurance requirements Version 2.1 August 1999 CCIMB-99-033
(Translation Version 1.2 January 2001)
[11]
ISO/IEC15408-1: 1999 - Information Technology - Security techniques Evaluation criteria for IT security - Part 1: Introduction and general model JIS
[12]
ISO/IEC 15408-2: 1999 - Information technology - Security techniques Evaluation criteria for IT security - Part 2: Security functional requirements
[13]
ISO/IEC 15408-3:1999 - Information technology - Security techniques
Evaluation criteria for IT security - Part 3: Security assurance requirements
[14]
JIS X 5070-1: 2000 - Security techniques - Evaluation criteria for IT security Part 1: General Rules and general model
[15]
JIS X 5070-2: 2000 - Security techniques - Evaluation criteria for IT security Part 2: Security functional requirements
[16]
JIS X 5070-3: 2000 - Security techniques - Evaluation criteria for IT security Part 3: Security assurance requirements
20
July
2005,
July
2005,
Information-Technology
–
CRP-C0036-01
[17]
Common Methodology for Information Technology Security Evaluation
CEM-99/045 Part 2: Evaluation Methodology Version 1.0 August 1999
[18]
Common Methodology for Information Technology Security Evaluation
CEM-99/045 Part 2: Evaluation Methodology Version 1.0 August 1999
(Translation Version 1.0 February 2001)
[19]
JIS TR X 0049: 2001 – Common Methodology for Information Technology Security
Evaluation
[20]
CCIMB Interpretations (as of 01 December 2003)
[21]
CCIMB Interpretations (as of 01 December 2003)
(Translation Version 1.0 August 2004)
[22]
Canon iR4570/iR3570/iR2870/iR2270 Series iR Security Kit-B2 Version 2.03
(Japanese version) iR Security Kit-B2 Version 2.03 (International version)
Evaluation Technical Report VAA-ETR-0001-01 Version 1.1, December 26, 2005,
Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
21
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertising