Use the procedure in this section to configure the SBC Core to operate in FIPS 140-2 compliant mode.
The SBC includes FIPS 140-2 Level 1 validated cryptographic hardware modules and software tool kits as described below. When enabled, the SBC operates these modules in FIPS 140-2 approved mode for all cryptographic operations.
To enable TLS support in Windows:
- Click Start and enter "Java Control Panel" in the Search field.
- Launch the Java Control Panel program.
- From the Java Control Panel, select Advanced tab.
- Check both "Use TLS 1.1" and "Use TLS 1.2" options under Advanced Security Settings section, and click Apply.
- Restart your browser for the changes to take effect.
SBC FIPS 140-2 Compliant Components
The following enhancements or changes have been made to achieve FIPS 140-2 certification:
Self-Tests – The SBC implements cryptographic algorithms using software firmware and hardware and the modules perform various self-tests (power-up self-test, conditional self-test, and critical function self-test) to verify their functionality and correctness. If any of the tests fail, the module goes into “Critical Error” state and disables all access to cryptographic functions and Critical Security Parameters (CSPs). The management interfaces do not respond to any commands until the module is operational. The Crypto Officer must reboot the modules to clear the error and return to normal operational mode.
The self-tests include:
- Power-Up self-tests – The SBC performs self-tests at power-up to verify the integrity of the firmware images and the correct operation of the FIPS-approved algorithm implementation in the modules
- Conditional self-tests – The SBC implements Conditional self-tests such as Continuous Random Number Generator Tests (CRNGT), RSA Pair-wise Consistency Tests, Firmware Load Tests, and so on.
- Critical function tests – The SBC implements the SP 800-90A CTR_DRBG as it's random number generator. The SP 800-90A specification requires that certain critical functions be tested conditionally to ensure the security of the DRBG. Therefore, the critical function tests are implemented by the cryptographic modules.
FIPS Finite State Model – The following diagram demonstrates the SBC states and state transitions that occur within the SBC server:
- Install/upgrade Software Integrity Check – Software updates or patches that are to be loaded onto the machine are automatically checked for integrity by validating Sonus-provided signature file for the particular package. (See install/upgrade guide). Failure in validation causes the installation/upgrade to be aborted.
TLS v1.1 and v1.2 support for EMA in Platform Mode and SIP/TLS – TLS v1.1 and v1.2 provide resistance to certain known attacks (e.g. the BEAST attack affecting TLS v1.0) against earlier TLS versions and offer additional cipher suites not supported with TLS v1.0.
- Configuration database encryption key regeneration support – The System Administrator can cause the encryption keys used to protect sensitive information in the configuration database to be regenerated.
- SSH key regeneration support – The System Administrator can regenerate the RSA keys used by the SBC to authenticate itself for SFTP and for CLI and netconf over ssh at any time.
Enabling FIPS-140-2 Mode
FIPS compliant operating mode is fully compliant with FIPS-140-2 at security level 1+. Putting the SBC system in FIPS-140-2 operating mode requires enabling the
fips-140-2 mode parameter as well as configuring other parameters.
Perform the following steps to set the FIPS-140-2 mode using CLI:
- Login to CLI.
Switch to configure private mode, using the command:
Execute the following commands:
where setting fips-140-2 mode to enabled accomplishes the following actions:
• regenerates all SSH keys
• regenerates encryption keys used by the system configuration database
• zeroizes (e.g. securely erases) all persistent CSPs from the system and cause server to reboot after confirmation.
To view the FIPS administrative state, global SIP Signaling Controls, EmaTlsProfile and TLS profile settings, use the 'show' command as depicted in the following examples:
To view FIPS finite state machine state, exit back to system mode and execute 'show table system fipsFSMState' command as in the following example:
- Once complete, continue to the next section to restore services to the EMA in Platform Mode.
EMA + CLI Method:
- Login to the EMA.
Using the EMA menu bar, navigate to All > Profiles > Security > TLS Profile. The TLS Profile window is displayed, with the TLS Profile List pane. Select the radio button corresponding to the
The Edit Selected TLS Profile pane is displayed. Set the fields
Disabled. Set the field
Enabled. Click Save to save the changes.
Using the EMA menu bar, navigate to All > Profiles > Security > EMA TLS Profile. The EMA TLS Profile window is displayed, with the EMA TLS Profile List pane. Select the radio button corresponding to the
The Edit Selected EMA TLS Profile pane is displayed. Set the fields
Disabled. Set the field
Enabled. Click Save to save the changes.
Using the EMA menu bar, navigate to All > OAM > Snmp. The Snmp window is displayed, with the Edit Snmp pane. Set the
V3only. Click Save to save the changes.
Login through the CLI, and execute the following command:
Restoring EMA in Platform Mode
To restore service to the EMA in Platform Mode in FIPS mode, CA certificates and newly-generated SBC certificate must be imported using CLI.
Import CA Certificates
Use this procedure to import up to three CA certificates.
The SBC provides a means to import SBC certificates generated with two different methods.
Import SBC Key and Certifcate Generated Externally
Use this procedure to import externally-generated SBC key and certificate in PKCS#12 format.
- Transfer the PKCS#12 formatted key/certificate file to SBC and save it as /opt/sonus/external/<filename>.p12.
Install certificate. For example, certificate "sbxCert.p12" with passPhrase "sonus".
If the server and the client certificates are not getting installed, it is often due to presence of old certificates. In that case, delete the old/existing certificates and then install the new ones. To delete the old/existing certificates and install the new certificates, execute the following steps:
- Copy the files
/opt/sonus/external/in both active and standby node of a High Availability (HA) configuration of a SBC.
Execute the following commands in the
Commit the commands after each step to make the changes effective and available for the next command.
Generate SBC Key and CSR Locally in SBC
Use this procedure to generate SBC key and CSR locally in SBC, and then re-import as PEM externally-signed cert.
- Copy CSR output from step 1 request, and obtain signed certificate from appropriate CA in a PEM formatted file.
- Transfer the certificate to SBC and save it as /opt/sonus/external/<filename>.pem.
Setting EMA in Platform Mode Client Authentication Method
Use this procedure to set appropriate EMA in Platform Mode client authentication method.
For example, to use either username/password login or PKI certificate based authentication, execute the following commands: