Fidelis Cybersecurity
4500 East-West Highway, Suite 400
Bethesda, MD 20814
Fidelis Network™, version 9.0.3
Common Criteria Configuration Guide
Revised August 2018
Users are granted permission to copy and/or distribute this document in its original electronic form and
print copies for personal use. This document cannot be modified or converted to any other electronic or
machine-readable form in whole or in part without prior written approval of Fidelis Cybersecurity.
While we have done our best to ensure that the material found in this document is accurate, Fidelis
Cybersecurity makes no guarantee that the information contained herein is error free.
Fidelis Network includes GeoLite data created by MaxMind, available from http://www.maxmind.com/
Tab le &o f& Co nte nts&
Common Criteria Configuration Guide .............................................................................. 1
Enhanced Information for Chapter 2, Appendix A and Appendix B of [1] ................. 2
Chapter 2 Setup and Configure .................................................................................................... 2
Default Accounts and Initial Passwords .................................................................................................... 2
Connect a Physical Appliance to the Network and Configure ................................................................. 3
Appendix A Security Certificates and Common Access Cards ............................................. 3
Obtaining and Importing a Certificate ........................................................................................................ 3
Appendix B Security Best Practices ........................................................................................... 4
User Access ................................................................................................................................................ 4
Change the Default Account Passwords .............................................................................................. 4
Command Line Session Inactivity Timeout........................................................................................... 4
Configure Password Requirements for Local Users ............................................................................ 5
Enhanced Information for Common Criteria Configuration of [1]................................ 7
Appendix C Common Criteria ....................................................................................................... 7
Common Criteria Compliant Configuration ............................................................................................... 7
Common Criteria Compliant Trusted Channels to External Components .............................................. 8
System Updates .......................................................................................................................................... 8
Digital Signatures for Updates ............................................................................................................... 8
Common Criteria Compliant Published Hash for Updates .................................................................. 8
Power on Self Tests and Process Manager ............................................................................................. 9
Fidelis Network Common Criteria Configuration Guide Version 9.0.3 iii www.fidelissecurity.com
Common Criteria Configuration Guide
This document is the Fidelis Network Common Criteria Configuration Guide. It replaces Appendix C of the
Enterprise Setup and ConfigurationGuide [1]. The information in the following sections is new or
corrected information related to the Enterprise Setup and ConfigurationGuide [1] reproduced as entire
sections in this document. This document provides or references all the necessary instructions to
configure, monitor and maintain Fidelis Network as certified by Common Criteria.
This Configuration Guide is applicable to Fidelis Network Version 9.0.3, which is the Common Criteria
evaluated version of Fidelis Network.
Fidelis Network Common Criteria Configuration Guide Version 9.0.3 1 www.fidelissecurity.com
Account
Initial password
How to reset
fidelis
fidelispass
/usr/bin/passwd
Account
Initial password
How to reset
admin
system
Click user name at the
top of the GUI.
Account
Initial password
How to reset
USERID
PASSW0RD (with a zero,
not the letter O)
Click Login Settings in
the left column of the
IMM GUI.
Enhanced Information for Chapter 2, Appendix A
and Appendix B of [1]
The sections below provide corrected information required to configure, monitor and maintain a working
system as certified by Common Criteria. These sections are based on the information in the Enterprise Setup and Configuration Guide [1], and are reproduced here in entirety with new or corrected information.
Chapter 2 Setup and Configure
Default Accounts and Initial Passwords
The information in this section applies to all appliances.
To access the appliance from the Linux command line, connect the appliance to a local keyboard and
monitor.
The Linux command line account and initial password for all appliances are:
K2 GUI account and initial password are:
For iLO the user ID and password are on the unit’s label on top of the server. Once the user connects to
the iLO via a web browser, these credentials are needed. After logging in, the user ID and password can
be changed.
For IMM account and initial password are:
Important!
Ensure that you change the default password after the initial login. This can be performed in
the Configuration Wizard. Save the new password in a secure location so that you will have
access to accounts when needed.
Do not use the Linux command line account for normal system operation after initial setup
is complete. The account should only be used under the direction of Technical Support if
needed to determine the cause of system malfunction.
Only use the K2 GUI default account to run through the Configuration Wizard at initial setup.
The wizard will guide you through the creation of new user accounts and changing the
default password. Once user accounts are created, do not use the default account.
Fidelis Network Common Criteria Configuration Guide Version 9.0.3 2 www.fidelissecurity.com
Access to the iLO or IMM interface should be physically limited to only those users that
require access. These interfaces are not secured by Fidelis Network software.
Refer to Appendix B in the Enterprise Setup and Configuration Guide[1] for Security
practices regarding your installation.
Connect a Physical Appliance to the Network
and Configure
The first four steps in this section apply to physical appliances. The remaining steps apply to physical and
virtual appliances. For virtual appliances, you also need to refer to chapter 3 in the Enterprise Setup and Configuration Guide [1].
1. Rack the unit with access to proper power, cooling, and ventilation.
2. Connect power cables and attach to the power supplies in the back of the appliance.
3. Refer to the Quick Start Card for initial post-factory installation of the product if needed. It will guide
you through the process of finalizing Fidelis Network software installation.
4. Connect a keyboard and monitor to the appliance.
5. After configuration is complete, type exit to log out.
Appendix A Security Certificates and
Common Access Cards
Obtaining and Importing a Certificate
Follow instructions in this section to generate a Certificate Signing Request (CSR); obtain a certificate, CA
certificates, CRL; import these for use by a Fidelis Network component. Run all commands in this section
as root. In all commands, <subsystem> is the affected part of Fidelis Network functionality and must be
one of the recognized subsystems listed above.
1. Generate a Certificate Signing Request (CSR).
This will generate a new RSA private key, and create a new CSR based on it.
The --subject-dn=<component_dn> argument specifies the component's Distinguished Name (DN),
which will be used in the CSR and will eventually be used as a subject in the certificate.
If it is not specified, the component's hostname will be used as the default Common Name (CN).
where the DN fields are separated by ‘/’, with keys separated from values with ‘=’.
Supported DN fields are:
Fidelis Network Common Criteria Configuration Guide Version 9.0.3 3 www.fidelissecurity.com
‘C=’ – two letter country specification. See openssl documentation for details.
‘ST=’ – state.
‘L=’ – locale / city.
‘O=’ – organization name.
‘OU=’ – organizational unit.
‘CN=’ – common name
All fields in the Distinguished Name (DN) are optional, except for Common Name (CN).
For example,
2. Send the generated CSR to your desired Certificate Authority (CA) for it to issue a certificate. Each
CA may have different procedures for issuing certificates. Contact your CA for detailed instructions.
Note: for “--subsystem=internal”, the certificate, generated from the CSR created on the TOE component
as described above, must be signed by Certification Authority in a way that also adds X509v3 extension
Subject Alternative Name that contains IPv4 and IPv4-mapped IPv6 or IPv6 address of the component to
the certificate. For example, the component with IPv4 address ‘192.168.1.40’, hostname ‘sensor1’, and
domain ‘mycompany.local’, should have Subject Alternative Name, as follows:
X509v3 extensions:
X509v3 Subject Alternative Name:
IP Address:191.168.1.40, IP Address: 0:0:0:0:0:FFFF:C0A8:128,
DNS:sensor1, DNS:sensor1.mycompany.local
In Common Criteria-compliant mode of operation, the verifyhost parameter in configuration file
/FSS/etc/ssl.cf must be set to “1”.
Appendix B Security Best Practices
User Access
Change the Default Account Passwords
When you receive the Fidelis system, you receive an initial login and password for command line access.
You should change this password. To do this:
1. Connect to the appliance CLI via console using the fidelis account and default password .
2. Change the password using the command: /usr/bin/passwd
3. Repeat for each sensor and K2.
Command Line Session Inactivity Timeout
To force command line sessions, including local console sessions, to log out after a certain period of
inactivity:
1. As the root user, create the file: /etc/profile.d/autologout.sh
2. Set the permissions of /etc/profile.d/autologout.sh by running the following command:
# chmod 0644 /etc/profile.d/autologout.sh
Fidelis Network Common Criteria Configuration Guide Version 9.0.3 4 www.fidelissecurity.com
3. Add the following lines to /etc/profile.d/autologout.sh. The value given to the TMOUT
variable is in seconds, hence the example below sets an inactivity timeout of 15 minutes:
readonly TMOUT=900
export TMOUT
The inactivity timeout will be applied to all new login sessions. The TMOUT value in seconds should be
greater than 1 and less than 86400 (24 hours). Recommended default value is 900 (15 minutes). Setting
TMOUT to 0 or removing it from the configuration above will disable session inactivity timeout.
Configure Password Requirements for Local Users
Failed Login Attempts: Specify the maximum number of failed login attempts allowed. The “Failed Login
Attempts” parameter defines the number of unsuccessful login attempts the user is allowed before the
user account is locked out and is configurable between 1 and 999. Recommended value is 5. To
reactivate the locked-out account, an administrator must reset that account’s password. The default
“admin” user cannot be deleted. If any other user remote access is blocked the default admin can login to
unlock these accounts.
The minimum password length is administrator configurable from 1 to 999 characters. Recommended
value is 8.
Fidelis Network components utilize Linux Pluggable Authentication Module (PAM), which provides
dynamic authentication support for component applications and services. To configure minimum
password length for logging into the component via the console, the pam-cracklib module “minlen”
parameter must be set to the desired value in /etc/pam.d/system-auth PAM System
Authentication Configuration file, as shown below.
[root@linux90s ~]# cat /etc/pam.d/system-auth
#%PAM-1.0
# This file is auto-generated.
# User changes will be destroyed the next time authconfig is run.
session [success=1 default=ignore] pam_succeed_if.so service in crond quiet
use_uid
session required pam_unix.so
[root@linux90s ~]#
Figure 1. PAM System Authentication Configuration
Fidelis Network Common Criteria Configuration Guide Version 9.0.3 5 www.fidelissecurity.com
Note that “minlen” is not just a number of characters in the password. It is a computed value and includes
the number of characters in the password, as well as complexity factors from the password itself. For
example, if and how many capitals, numbers, or special characters it has. In addition to the number of
characters in the new password, credit (of +1 in length) is given for each different kind of character (other,
upper, lower, and digit). The default for this parameter is 9.
Fidelis Network Common Criteria Configuration Guide Version 9.0.3 6 www.fidelissecurity.com
Enhanced Information for Common Criteria
Configuration of [1]
Appendix C Common Criteria
This appendix includes information about the following Common Criteria compliant configuration and
other pertinent information.
Common Criteria Compliant Configuration
K2 and the Fidelis Network module have earned Common Criteria Certification. The following provides
the steps required to create the security configuration used for Common Criteria Certification.
1. During initial setup, make sure that NTP is setup correctly and servers are reachable from the
appliance.
2. Change the default passwords for command line for each appliance by following Change the
Default Account Passwords.
3. Change the default passwords for admin GUI account (provided in the Quick Start Card) for each
K2.
4. Configure password strength (Password Strength Requirements) and account lockout due to
requirements for failed login attempts.
5. Create a user with system administrator privileges.
6. Log in as the system administrator user and create user accounts for each person who will use the
K2. The admin account should not be used anymore.
7. Ensure that session timeouts are set for command line (Command Line Session Inactivity
Timeout) and GUI access (GUI Session Inactivity Timeout).
8. Create a custom login banner. Refer to Custom Login Banner.
9. If you are using LDAP, you must configure it to communicate using TLS. Refer to chapter 13 in the
User Guide.
10. Enable FIPS 140-2 compliant encryption for the K2 database. Refer to Encrypted Storage.
11. Before registering any components, obtain X509 certificates as described in Security Certificates
and install them on the K2 (Installing a K2 Certificate) and all the components being registered to
the K2 (Installing Certificates for Inter-Component Communications).
12. Enable sending syslog to a remote server over TLS using configuration described in Enable Client
Authenticationat Security Practices.
13. Enable TLS auditing. At System / Components / K2/ Config / Audit, select everything for TLS
Handshake.
14. To perform system updates, see Common Criteria Compliant Published Hash on published
hash as a common criteria compliant trusted system update.
Fidelis Network Common Criteria Configuration Guide Version 9.0.3 7 www.fidelissecurity.com
The certified configuration includes only the Fidelis Network configuration, including admin interface. Any
additional interface available by your hardware appliance is not certified. For example, the Integrated
Lights-Out (iLO) and the Integrated Management Module (IMM) are excluded from the certified
configuration.
Fidelis Common Criteria certification excludes the fidelis account for command line access (refer to
Default Accounts) after initial configuration. This account is used for initial system configuration. After
initial setup, the fidelis account should not be used unless directed by Fidelis Cybersecurity Technical
Support to diagnose problems.
Common Criteria certification applies to Rev H hardware. Contact Technical Support to determine your
hardware revision. Virtual appliances are supported by the certification on host hardware that includes
Intel Core or Xeon processors based on the Ivy Bridge or Haswell microarchitecture, which implement
Intel Secure Key.
The sections below provide additional information required to monitor and maintain a working system
configured for Common Criteria.
Common Criteria Compliant Trusted Channels to
External Components
Fidelis establishes secure connections to external components within the customer network. Fidelis will
establish trusted channels with an external audit and LDAP servers with TLS enabled communications.
Refer to Enable Client Authentication .
Refer to chapter 13 of User Guide.
System Updates
Digital Signatures for Updates
Fidelis checks for software updates available on the Fidelis Insight Cloud using HTTPS connections. A
software update is available as a tar package along with its digital signature created using RSA secret
key. Fidelis will download both via HTTPS and verify the signature using the on-board public key
(corresponding to the RSA key used to create the signature). If the verification fails, it is assumed that the
download was corrupted and hence the package and its signature are deleted.
Common Criteria Compliant Published Hash for Updates
Software and Policy updates for Fidelis Network are available at the Fidelis Support portal. Fidelis also
publishes the SHA256 hash with the updates. The Common Criteria compliant trusted update mechanism
for Fidelis Network is for an administrator to:
1. Operate the K2 in air gap mode. Refer to chapter 10 in the Guide to Creating Policies.
For Air Gap operation, access the K2 GUI and navigate to the System / Version Control / Download
Control page. Ensure that the parameter: Check for Updates is set to: Never. The K2 GUI page
System / Version Control / Scheduled Installs will then display: No scheduled installs, indicating that
automatic updates are disabled.
2. Download the updates and the hash files from the Fidelis Support portal.
3. Verify the SHA256 hash of the downloaded package is the same as published hash on the portal,
using openssl command line utility, for example:
openssl dgst -sha256 fidelis_xps_9.0.3.x86_64.tar
Fidelis Network Common Criteria Configuration Guide Version 9.0.3 8 www.fidelissecurity.com
4. If the hash values agree, upload the package on the K2 using the File Management configuration in
System / Version Control.
The installation package is uploaded to the File Management page and the policy updates are
uploaded to Policies / Insight / Air Gap Upload.
The TOE calculates the SHA256 hash and displays it to the administrator.
5. If the hash values agree; initiate installation to the distributed components from the K2.
K2 will copy the package to the desired component.
When the package reaches the intended component, the component will then be shut down, the
update installed, and restored to functionality at the new version.
Components that are not subject of the update (other than K2) are functional during update of other
components. K2 Management Console is unavailable while updates are in progress.
In case of component update failure, automatic roll-back action performed by the component and the
error message posted on K2. Depending on the type of failure, user can take appropriate action. For
example, redownload the update tar file in case of hash verification check failure.
Power on Self Tests and Process Manager
Each system daemon that utilizes Cryptographic Module of the component, openssl-1.0.1e-fips, performs
Power on Self-Test (POST) upon initialization. In case of POST failure, the process or service will fail to
initialize, and the Cryptographic Module initialization failure messages are entered in
/var/log/messages, for example:
Jun 3 23:01:01 linux90s db_maint.log[9313]: Error getting system time from
10.91.130.123, output tcp_cli_init
: error initializing ssl library
Jun 3 23:01:01 linux90s , error fips.c(143): OpenSSL internal error,
assertion failed: FATAL FIPS SELFTEST FAILURE
Jun 3 23:01:01 linux90s db_maint.log[9313]: Error getting system time from
Jun 3 23:01:01 linux90s , error fips.c(143): OpenSSL internal error,
assertion failed: FATAL FIPS SELFTEST FAILURE
The POST failure messages include identification of the distributed component (“linux90s” in the example
above) that sustained the failure.
WARNING: In case of fatal POST failures, contact Fidelis Support immediately.
The process manager service checks the binary integrity of every Fidelis daemon dedicated to the
primary security function of the product before it starts any of them. If a single integrity check fails,
process manager aborts, none of the daemons will be started, and the event will be logged in
/var/log/messages, for example:
Aug 12 08:14:23 linux76 pman[29765]: "/FSS/sbin/spoold": wrong checksum
Aug 12 08:14:23 linux76 pman[29765]: Giving up.
Fidelis Network Common Criteria Configuration Guide Version 9.0.3 9 www.fidelissecurity.com
If a system daemon fails to start for other reasons than integrity check failure, the event will be logged in
/var/log/messages. Depending on the daemon and the reason for its failure, more detailed
information may be found in the corresponding log in /FSS/log/.
Audit Events
The table below lists and describes applicable audit events and administrative actions for each of the
security functional requirements (SFRs) covered by Common Criteria.
The general order of the audit events is as follows:
1. Date.
2. Time.
3. TOE Component IP address.
4. TOE Component name (hostname).
5. Process name or audit function name (e.g. FSS audit).
6. Process ID (optional).
7. Audit event description string. This is specific to audit event type.
See the table below for examples and details.
Table 2. SFRs and Auditable Events
Fidelis Network Common Criteria Configuration Guide Version 9.0.3 10 www.fidelissecurity.com
SFR
Event
Additional
Information
Sample Log
_EXT.1
HTTPS Session.
failure.
Non-TOE
endpoint of
connection
(IP address)
for both
successes
and failures
audit: admin failed attempt to login from
10.42.209.155 (calling: login)
FCS_HTTPS
_EXT.1
Establishment/Termi
nation of a HTTPS
session.
Non-TOE
endpoint of
connection
(IP address)
for both
successes
and failures.
Mar 17 09:52:00 10.42.209.241 FSS:
audit: admin logged on from
10.42.29.155
Mar 17 10:00:07 10.42.209.241 FSS:
audit: admin logged out from
10.42.209.241
Mar 17 10:01:51 10.42.209.241 FSS:
audit: admin failed attempt to login from
10.42.209.155 (calling: login)
FCS_TLSC_
EXT.1
Failure to establish a
TLS session
Reason for
failure
Aug 10 10:31:28 localhost FSS
audit[91999]: Sensor <linux90s-sensor>
Error loading CA file:
/FSS/etc/pki/cacert.pem
Aug 10 10:31:28 localhost TLS ERROR:
error:02001002:system library:fopen:No
such file or directory
Aug 10 10:31:28 localhost
error:2006D080:BIO
routines:BIO_new_file:no such file
Aug 10 10:31:28 localhost
error:0B084002:x509 certificate
routines:X509_load_cert_crl_file:system
lib
Discontinuous
changes to time –
either administrator
actuated or changed
via an automated
process.
Distributed
TOE
component
identification
affected by
the time
change, old
time, new
time.
Sep 8 12:19:55 localhost FSS
audit[127431]: Sensor <linux90ssensor> Old time: Fri Sep 8 16:19:55
UTC 2017 America/New York. New
time: Fri Sep 8 17:46:40 UTC 2017
EST5EDT. Set by localhost.
FPT_TUD_E
XT.1
Initiation of update
Identification
of the initiator,
software
update
version and
target(s) of
update.
.
Feb 21 10:47:03 localhost FSS
audit[32671]: admin started install of
version 9.0.3-20180221 for components:
linux90col
Result of the update
attempt (success or
failure)
Target of
update
(distributed
TOE
component
identification)
Feb 21 10:49:54 localhost FSS
audit[34208]: Sensor <linux90col>
linux90col:installation success
FTA_SSL_E
XT.1 (if
“terminate
the session”
is selected)
The termination of a
local session by the
session locking
mechanism
Identity of
administrator.
Feb 18 09:48:53 10.42.209.241 FSS
audit: admin’s session has timed out
FTA_SSL.3
The termination of a
remote session by
the session locking
mechanism
Identity of
administrator
Feb 18 09:48:53 10.42.209.241 FSS
audit: admin’s session has timed out
FTA_SSL.4
The termination of an
interactive session
Identity of
administrator
Feb 18 10:31:57 10.42.209.241 FSS
audit: admin logged out from
Fidelis Network Common Criteria Configuration Guide Version 9.0.3 16 www.fidelissecurity.com
Mar 17 09:52:00 10.42.209.241 FSS:
audit: admin logged on from
10.42.29.155
Termination of the
trusted channel.
Identification
of the claimed
user identity.
Mar 17 10:00:07 10.42.209.241 FSS:
audit: admin logged out from
10.42.209.241
Failure of the trusted
channel functions.
Identification
of the claimed
user identity.
Mar 17 10:01:51 10.42.209.241 FSS:
audit: admin failed attempt to login from
10.42.209.155 (calling: login)
Component
Process Name
Privilege
Description
All
sshd
Runs as root
Secure shell daemon for remote
access
All
rconfigd
Runs as root
Serves as the Remote
Configuration Daemon that is
required for communication
between components
Component Processes and Descriptions
The table below lists all Fidelis Network processes that handle network traffic.
Table 3. Traffic Handling Processes and Descriptions
Fidelis Network Common Criteria Configuration Guide Version 9.0.3 17 www.fidelissecurity.com
Component
Process Name
Privilege
Description
K2
netspool
Runs with
setuid
Accepts alert and statistical data
from the different components
configured
K2
httpd
Runs as root
Web server for spawning GUI for
users
Direct Sensor
sniffer
Runs as root
Captures packets from the sniffing
interfaces configured and
reassembles them into transport
protocol sessions
Collector
sesdbd
Runs with
setuid
Receives metadata sent from
sensors and writes it into the
database
Mail (Milter)
mailer
Runs with
setuid
Receives emails for processing
from an MTA and processes them
for policy violations
Mail (MTA)
postfix
Runs as root
Serves as a MTA that receives,
analyzes and forwards email traffic
Web Sensor
icapd
Runs with
setuid
Receives ICAP traffic from a Web
Proxy and processes it for policy
violations.
Making Configuration Changes
The vi editor (/bin/vi) may be used when making manual changes to files on a Fidelis Network system.
Set Up FIPS 140-2 Certificates
Fidelis Network ships with FIPS 140-2 mode for communication enabled by default. Users must install
and set up FIPS 140-2-compliant certificates and enable FIPS 140-2 encryption for data storage on K2.
To install and set up FIPS 140-2-compliant certificates, refer to Appendix A in the Enterprise Setup and Configuration Guide[1].
The Common Criteria-compliant Random Number Generation (RNG), cipher suites, DH and RSA key
sizes, hash algorithms, NIST elliptic curves, and TLS version 1.2 are configured by default and do not
require user intervention, when the procedures in Appendix A of the Enterprise Setup and
Configuration Guide [1] are followed. For example, when generating a Certificate Signing Request (CSR),
no additional configuration is required to generate a new RSA private key. A new RSA key of 3072-bit
length is generated by default .
Fidelis Network Common Criteria Configuration Guide Version 9.0.3 18 www.fidelissecurity.com
SFR
Error
Recovery
Steps
Sample Log
FCS_TLSC_
EXT.1
Failure to
establish a TLS
session due to
misconfiguration.
CA certificate file
is not found. CRL
file is not found.
Verify that
correct CA
certificate and
CRL files are
installed in the
path specified
by the error
message.
Aug 10 10:31:28 localhost FSS
audit[91999]: Sensor <linux90s-sensor>
Error loading CA file:
/FSS/etc/pki/cacert.pem
Aug 10 10:31:28 localhost TLS ERROR:
error:02001002:system library:fopen:No
such file or directory
Aug 10 10:31:28 localhost
error:2006D080:BIO
routines:BIO_new_file:no such file
Aug 10 10:31:28 localhost
error:0B084002:x509 certificate
routines:X509_load_cert_crl_file:system
lib
FCS_TLSC_
EXT.2
Failure to
establish a TLS
Session due to
peer
misconfiguration.
Peer is configured
for Anonymous
Diffie-Hellman and
not authenticated
TLS. Or peer is
configured with
wrong CA
certificate. Or peer
is not configured
with correct end
point certificate.
No peer certificate
is returned.
Verify that peer
is configured
with correct CA
and end point
certificate(s).
When setting up TLS communications using certificates, following guidance instructions is crucial, as it
will help to avoid potential TLS Handshake problems, such as TLS certificate verification failures,
common cipher negotiation failures, TLS version mismatch, etc. Examples of these failures are given in
the table: SFRs and Auditable Events for SFRs FCS_TLSC_EXT.1, FCS_TLSC_EXT.2,
FCS_TLSS_EXT.1, FCS_TLSS_EXT.2.
Recovery steps for TLS failures are common for all TOE interfaces utilizing TLS as secure transport layer,
whether the TOE acts a TLS client or a TLS server, or both, and apply to K2 Web Server, K2 LDAP TLS
client, syslog-ng TLS client, the Fidelis Insight Server TLS client, and distributed TOE intercomponent
TLS communications.
Table 1. Common TLS Errors and Recovery Options
Fidelis Network Common Criteria Configuration Guide Version 9.0.3 19 www.fidelissecurity.com
SFR
Error
Recovery
Steps
Sample Log
FCS_TLSS_
EXT.1
Failure to
establish a TLS
Session due to
ciphers mismatch.
Verify that the
TLS endpoint
and the TLS
peer configured
with Common
Criteria
validated
common
ciphers.
Aug 7 12:01:01 localhost FSS
audit[27394]: Sensor <linux90s-sensor>
TLS ERROR: Local: ::ffff:10.89.184.31,
Remote: ::ffff:10.89.184.32,
error:1408A0C1:SSL
routines:SSL3_GET_CLIENT_HELLO:n
o shared cipher
FCS_TLSS_
EXT.2
Failure to
establish a TLS
Session due to
invalid certificate
purpose.
Verify that the
peer is
configured with
certificate that
has extended
key usage bits
TLS Server
and/or TLS
Client set, as
appropriate.
140890B2:SSL
routines:SSL3_GET_CLIENT_CERTIFI
CATE:no certificate returned
Fidelis Network Common Criteria Configuration Guide Version 9.0.3 20 www.fidelissecurity.com
Remote Authentication
LDAP is the only allowable remote authentication method, and neither RADIUS nor TACACS can be
used.
Connections between Distributed TOE
Components
Fidelis Network components establish and disable secure connections over TLS to other components
within the distributed TOE using register and unregister mechanism. [ESCG] “Continue Setup” [1], [UG]
“Add a Fidelis Component” [2] and “Component Management” [2] sections describe this mechanism.
“Unregister” action removes component from TOE and disables communications with it, with exception of
“registration channel”.
When a connection is first established upon successful registration of the component to K2, test functions
are available to verify proper connections. However, network connections may fail for many reasons.
Fidelis Network will continually attempt to reestablish the connection until working order is restored.
Messages are available from log files to indicate any detected errors in communications.
After restoring the network, the Fidelis Network administration will not need to perform any restoration
tasks since Fidelis Network will recover automatically.
Secure Disposal of Equipment
Before removing or discarding equipment from its operational environment, the disk needs to be scrubbed
with a wiper approved for your organization to ensure secure disposal.
Fidelis Network Common Criteria Configuration Guide Version 9.0.3 21 www.fidelissecurity.com
References
[1] Fidelis Cybersecurity, Fidelis Network Version 9.0.3 Enterprise Setup and Configuration Guide, 2017.
[2] Fidelis Cybersecurity, Fidelis Network Version 9.0.3 User Guide, 2017.
Fidelis Network Common Criteria Configuration Guide Version 9.0.3 22 www.fidelissecurity.com
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.