NIAP: View Technical Decision Details
NIAP/CCEVS
  NIAP  »»  Protection Profiles  »»  Technical Decisions  »»  View Details  
TD0690:  Missing EAs for FDP_VPN_EXT.1

Publication Date
2022.12.07

Protection Profiles
MOD_VPNC_V2.4

Other References
FDP_VPN_EXT.1

Issue Description

The VPN Client v2.4 Supporting Document (SD) doesn't contain EAs for implementation-based SFR FDP_VPN_EXT.1.

Resolution

A new Section 2.9 is created in MOD_VPNC_V2.4 SD containing the following information:

2.9 Evaluation Activities for Implementation-Dependent SFRs

2.9.1 User Data Protection (FDP)

FDP_VPN_EXT.1/VPN Split Tunnel Prevention

FDP_VPN_EXT.1/VPN

TSS

The evaluator shall verify that the TSS section of the ST describes the routing of IP traffic through processes on the TSF when a VPN client is enabled. The evaluator shall ensure that the description indicates which traffic does not go through the VPN and which traffic does and that a configuration exists for each baseband protocol in which only the traffic identified by the ST author is necessary for establishing the VPN connection (IKE traffic and perhaps HTTPS or DNS traffic) is not encapsulated by the VPN protocol (IPsec). The ST author shall also identify in the TSS section any differences in the routing of IP traffic when using any supported baseband protocols (e.g. Wi-Fi or LTE).

Operational Guidance

The evaluator shall verify that the following is addressed by the documentation:

• The description above indicates that if a VPN client is enabled, all configurations route all IP traffic (other than IP traffic required to establish the VPN connection) through the VPN client.

• The AGD guidance describes how the user and/or administrator can configure the TSF to meet this requirement.

Test

The evaluator shall perform the following test:

Step 1 - The evaluator shall use the platform to enable a network connection without using IPsec. The evaluator shall use a packet sniffing tool between the platform and an Internet-connected network. The evaluator shall turn on the sniffing tool and perform actions with the device such as navigating to websites, using provided applications, accessing other Internet resources (Use Case 1), accessing another VPN client (Use Case 2), or accessing an IPsec-capable network device (Use Case 3). The evaluator shall verify that the sniffing tool captures the traffic generated by these actions, turn off the sniffing tool, and save the session data.

Step 2 - The evaluator shall configure an IPsec VPN client that supports the routing specified in this requirement, and if necessary, configure the device to perform the routing specified as described in the AGD guidance. The evaluator shall turn on the sniffing tool, establish the VPN connection, and perform the same actions with the device as performed in the first step. The evaluator shall verify that the sniffing tool captures traffic generated by these actions, turn off the sniffing tool, and save the session data.

Step 3 - The evaluator shall examine the traffic from both step one and step two to verify that all IP traffic, aside from and after traffic necessary for establishing the VPN (such as IKE, DNS, and possibly HTTPS), is encapsulated by IPsec.

Step 4 - The evaluator shall attempt to send packets to the TOE outside the VPN connection and shall verify that the TOE discards them.

 

Justification

See issue description.

 
 
Site Map              Contact Us              Home