National Information Assurance Partnership ® TM Common Criteria Evaluation and Validation Scheme Validation Report BEA WebLogic Portal 8.1 SP5 Report Number: CCEVS-VR-07-0010 Dated: 2 April 2007 Version: 1.0 National Institute of Standards and Technology National Security Agency Information Technology Laboratory Information Assurance Directorate 100 Bureau Drive 9800 Savage Road STE 6740 Gaithersburg, MD 20899 Fort George G. Meade, MD 20755-6740 VALIDATION REPORT BEA WebLogic Portal 8.1 SP5 ACKNOWLEDGEMENTS Validation Team Franklin Haskell The MITRE Corporation Bedford, Massachusetts Common Criteria Testing Laboratory SAIC Columbia, Maryland ii VALIDATION REPORT BEA WebLogic Portal 8.1 SP5 Table of Contents 1 Executive Summary................................................................1 1.1 Evaluation Details.............................................................1 1.2 Interpretations ...................................................................2 1.3 Threats to Security............................................................3 2 Identification...........................................................................3 3 Security Policy........................................................................3 3.1 Access Control..................................................................3 3.2 Identification and Authentication .....................................4 3.3 Auditing ............................................................................4 4 Assumptions............................................................................4 4.1 Physical Assumptions.......................................................4 4.2 Personnel Assumptions.....................................................4 4.3 Operational Assumptions..................................................4 5 Architectural Information .......................................................5 6 Documentation........................................................................6 7 Product Testing.......................................................................7 7.1 Developer Testing.............................................................7 7.2 Evaluation Team Independent Testing .............................7 7.3 Penetration Testing ...........................................................8 8 Evaluated Configuration.........................................................8 9 Results of the Evaluation ........................................................8 10 Validator Comments/Recommendations ................................8 11 Annexes...................................................................................9 12 Security Target........................................................................9 13 Glossary ..................................................................................9 14 Bibliography ...........................................................................9 iii VALIDATION REPORT BEA WebLogic Portal 8.1 SP5 List of Tables Table 1 – Evaluation Details.................................................................................................. 1 Table 2 – Threats ................................................................................................................... 3 Table 3 – Physical Assumptions............................................................................................ 4 Table 4 – Personnel Assumptions.......................................................................................... 4 Table 5 – Connectivity Assumptions..................................................................................... 4 1 VALIDATION REPORT BEA WebLogic Portal 8.1 SP5 1 Executive Summary The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme. The criteria against which the WebLogic Portal TOE was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 2.2 and International Interpretations effective on 3 September, 2004. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 2.2. Science Applications International Corporation (SAIC) determined that the evaluation assurance level (EAL) for the product is EAL 2 augmented with ALC_FLR.1 family of assurance requirements. The product, when configured as specified in the guidance documentation, satisfies all of the security functional requirements stated in the BEA WebLogic Portal 8.1 Security Target. A validator on behalf of the CCEVS Validation Body monitored the evaluation carried out by SAIC. The evaluation was completed in February 2007. Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report for BEA WebLogic Portal 8.1, prepared by CCEVS. The validation team monitored the activities of the evaluation team, examined evaluation testing procedures, provided guidance on technical issues and evaluation processes, and reviewed the individual work units and successive versions of the ETR. The validation team found that the evaluation showed that the product satisfies all of the functional requirements and assurance requirements stated in the Security Target (ST). Therefore the validation team concludes that the testing laboratory’s findings are accurate, the conclusions justified, and the conformance results are correct. The conclusions of the testing laboratory in the evaluation technical report are consistent with the evidence produced. 1.1 Evaluation Details Table 1 – Evaluation Details Evaluated Product: BEA WebLogic Portal V8.1 SP5 with patches BEA06-81.02 and BEA07-107.02 Sponsor: BEA Systems, Inc 2315 North First Street San Jose, CA 95131 Developer: BEA Systems, Inc 2315 North First Street San Jose, CA 95131 CCTL: Science Applications International Corporation 7125 Columbia Gateway Drive, Suite 300 Columbia, MD 21046 Kickoff Date: September 3 2004 Completion Date: 28 February 2007 1 VALIDATION REPORT BEA WebLogic Portal 8.1 SP5 CC: Common Criteria for Information Technology Security Evaluation, Version 2.2 Interpretations: RI-137 CEM: Common Evaluation Methodology for Information Technology Security, Part 1: Introduction and General Model, Version 0.6, January 1997; Common Methodology for Information Technology Security Evaluation, Part 2: Evaluation Methodology, Version 2.2, August 1999. Evaluation Class: EAL 2 Description: BEA WebLogic Portal V8.1 SP5 with patches BEA06-81.02 and BEA07-107.02 consists of an enterprise portal infrastructure and an application server platform for building, extending, integrating, deploying, and managing software applications. The TOE consists of the following subsystems that are used in combination to support an end- user developed application: WebLogic Server and WebLogic Portal. Disclaimer: The information contained in this Validation Report is not an endorsement of the BEA WebLogic Portal V8.1 SP5 product by any agency of the U.S. Government and no warranty of the WebLogic Portal product is either expressed or implied. PP: None Evaluation Personnel: Science Applications International Corporation: Anthony J. Apted Keith W. Beatty Terrie L. Diaz Katie Sykes Validation Team: Franklin Haskell The MITRE Corporation 202 Burlington Road Bedford, MA 01730-1420 1.2 Interpretations Interpretation ID Impact on CC Requirements Impact on CEM Work Units Comment RI-137 FIA_USB.1 changed None Applied 2 VALIDATION REPORT BEA WebLogic Portal 8.1 SP5 1.3 Threats to Security The following are the threats that the evaluated product addresses: Table 2 – Threats Threat Identifier Threat Description T.BYPASS An attacker may be able to bypass TOE protection mechanisms through unprotected interfaces in order to inappropriately access protected data and services. T.EXCESS_AUTHORITY An unauthorized user may be able to exercise administrator authorities to inappropriately manage the TOE. T.NO_TIME Those responsible for the TOE may not be able to determine the sequence of audited security relevant events. T.NOCRYPTO An attacker may be able to observe authentication data transmitted in the clear due to cryptographic services not being available. T.STORAGE An attacker may be able to cause the loss or destruction of Audit and other TSF data. T.TAMPER An attacker may be able to inappropriately modify or otherwise tamper with TSF programs and data. T.TSF_COMPROMISE A user or process may cause TSF data or executable code to be inappropriately accessed (viewed, modified, or deleted). T.UNACCOUNTABLE Users of the TOE may not be held accountable for their security-relevant actions. T.UNAUTHORIZED_ACCESS A user may gain access to user data for which they are not authorized according to the TOE security policies. T.UNDETECTED_ACTIONS The administrator may not have the ability to detect potential security violations, thus limiting the administrator’s ability to identify and take action against a possible security breach. T.UNIDENTIFIED_USERS An attacker may gain access to the TOE without being reliably identified allowing them to gain unauthorized access to data or TOE resources. 2 3 Identification The product being evaluated is BEA WebLogic Portal V8.1 SP5 with patches BEA06- 81.02 and BEA07-107.02. Security Policy There are no specific security policies that the evaluated product enforces. It does enforce user security policies as described in the Security Target. 3.1 Access Control Policies are created by administrators but use attributes maintained by the product: username, group membership, role, resource type, resource identity, and time of day. The resources to which access is permitted or denied include Java constructs (beans, APIs, jars, etc.), the administrative console, servers, and WebLogic Portal objects. 3 VALIDATION REPORT BEA WebLogic Portal 8.1 SP5 4 3.2 Identification and Authentication The TOE supports multiple identification and authentication mechanisms: username and password; token-based (using either X.509 certificates or CORBA Common Secure Interoperability version 2 (CSIv2) identity assertion); and credential mapping which provides a capability by which legacy applications use their own I&A mechanisms to authenticate to a WebLogic Server (WLS) resource. 3.3 Auditing The TOE generates audit records of security relevant events as they occur within the security framework. They are stored by the underlying operating system and, hence, the TOE is dependent upon that OS for proper protection of the audit trail. Assumptions 4.1 Physical Assumptions The following physical assumptions are identified in the Security Target: Table 3 – Physical Assumptions Assumption Identifier Assumption Description A.PHYSICAL Physical security, commensurate with the value of the TOE and the data it contains, is provided by the IT environment. 4.2 Personnel Assumptions The following personnel assumptions are identified in the Security Target: Table 4 – Personnel Assumptions Assumption Identifier Assumption Description A.NO_EVIL Administrators are non-hostile, appropriately trained, and follow all administrator guidance. 4.3 Operational Assumptions The following operational assumptions are identified in the Security Target: Table 5 – Connectivity Assumptions Assumption Identifier Assumption Description A.NO_UNTRUSTED There are no untrusted user accounts or malicious software on the server platform. 4.4 Clarification of Scope The product being evaluated and consequently the TOE is entirely software. It runs utilizing the functionality (identical) of one of two Java runtime systems which, in 4 VALIDATION REPORT BEA WebLogic Portal 8.1 SP5 5 turn run on a variety of operating systems. This makes the TOE entirely dependent upon the correct operation of the Java systems as well as the operating system neither of which are included in the product and hence this evaluation. The access policy features implemented by the TOE are enforced only on access attempts generated by supported API’s connected through the TOE. The TOE does not and cannot control access to data from other applications. Administrators are advised not to authorize access to TOE data to other applications running on the server. If other applications must share TOE data sources, then the applications should be “trusted” applications" only. Note that certain resources allow access based upon the operation being requested. This capability is not mentioned in the ST nor was any comprehensive testing of it performed; therefore no statements can be made regarding it in this Validation Report. Architectural Information As indicated above, WLP consists of two distinct subsystems. The figure below shows a 'Security Service' which includes the basic ‘Security Framework’ of the WebLogic Server and a series of security service provider ‘modules’ (note that the security provider modules in the figure are only examples). The Security Service and the associated modules, identified in section 2.2.2 of the Security Target, form the core of the TOE; while the other entities in the figure depicted above the Security Service are examples of applications supported by the TOE. Note that WebLogic Portal is a 'BEA Layered Product' and represents the remainder of the TOE. Generally, user requests will come in from the network and will be handled by the security framework provided by WebLogic Server. If the user is attempting to access an application associated with the WebLogic Portal subsystem, it will be invoked in addition to the WebLogic Server security framework and hence serves to extend or add security features relative to resources within its control. Customer applications are acquired and installed by WLP administrators so that the appropriate controls are configured and subsequently enforced before the applications can be accessed. 5 VALIDATION REPORT BEA WebLogic Portal 8.1 SP5 Notice in the figure above that WebLogic Portal adds some features to the underlying WebLogic Server security services. It includes its own authentication and identity assertion providers: RDBMS Authentication provider and Web Services for Remote Portlets (WSRP) Identity Assertion Provider modules that are used in conjunction with access to Portal Web objects. 6 • • • • • • • • • • • • • Documentation The following documents are available to customers and are pertinent to the installation, configuration, and operation of the TOE. All of these can be found at http://e-docs.bea.com. Installing BEA WebLogic Platform Administration Console Online Help (http://e- docs.bea.com/wls/docs81/ConsoleHelp/index.html) Configuring and Managing WebLogic Server 8.1, 23 Sep 2005 Developing Web Applications for WebLogic Server 8.1, 26 Sep 2005 Introduction to WebLogic Security 8.1, Aug 2005 Managing WebLogic Security 8.1, 9 Dec 2004 Programming WebLogic Enterprise JavaBeans 8.1, 28 April 2006 Programming WebLogic jCOM 8.1, 07 April 2006 Programming WebLogic Security 8.1, Aug 2005 Programming WebLogic Server J2EE Connectors 8.1, 1 Jul 2003 Programming WebLogic Web Services 8.1, 25 Jun 2004 Securing a Production Environment 8.1, 21 Jun 2004 Securing WebLogic Resources 8.1, 13 Feb 2006 6 VALIDATION REPORT BEA WebLogic Portal 8.1 SP5 • • WebLogic Server Command Reference 8.1, 15 Mar 2004 WebLogic Administration Portal On-Line Help (http://e- docs.bea.com/wlp/docs81/sp5/adminportal/index.html) WebLogic Portal: Getting Started with Portal Administration 8.1,Dec 2004 • • • 7 WebLogic Portal: User Management Guide 8.1,May 2005 WebLogic Portal: Security 8.1, June 2006 Product Testing This section describes the testing efforts of the developer and the Evaluation Team. The test configuration comprised a laptop and a workstation communicating over a Local Area Network (LAN). The laptop, which was configured and provided by BEA, supported the Test Environment. The workstation, which is owned and configured by the SAIC CCTL, supported the Product Environment. The Test Environment was equipped with Windows XP and the following additional software: • Cygwin – used to provide a Unix shell on Windows • Apache Ant build tool – the test harness is driven by an Ant task • Perl – used by perl scripts to set up the environment • Python – used within the development test environment for scripting various build tools • JUnit – a framework used to execute tests implemented in Java • Cactus test framework. • the test procedures. The Product Environment was equipped with Windows Server 2003 (Enterprise Edition) Version 5.2 SP1 and the following additional software: • BEA WebLogic Portal 8.1 SP5 and BEA WebLogic Server 8.1 SP5 (the TOE) • BEA JRockit 1.4.2_08 SDK • Sun Java 2 SDK 1.4.2_08 with Java HotSpot™ Client VM 7.1 Developer Testing The vendor ran the automated test suite in various configurations, consistent with the test environment described in the Testing Documentation, and gave the evaluation team the actual results. The test configurations were representative of both the operating systems supported and the application environment (JVM). All tests passed. While performing the ATE_FUN work units, the evaluation team examined in detail a sample (amounting to slightly over 20%) of the vendor test cases and determined that all actual results matched the expected results. These results provided sufficient confidence that the entire test suite results match as well. 7.2 Evaluation Team Independent Testing The evaluation team devised a test subset based on coverage of the security functions described in the ST. The vendor test system was used with team generated test procedures 7 VALIDATION REPORT BEA WebLogic Portal 8.1 SP5 8 9 10 and team analysis to determine the expected results. All actual results matched the expected results. 7.3 Penetration Testing The evaluation team conducted an open source search for vulnerabilities in the product and found none not already known to and addressed by the developer through security advisories and patches. They also examined the vendor’s vulnerability assessment and identified three vulnerabilities relevant to the evaluated version of the TOE in its evaluated configuration. The team testing showed that either the vulnerability was not present in the evaluated configuration or that a patch was available. Evaluated Configuration The evaluated configuration is the Java 2 environment. The BEA JRockit 1.4.2_08 SDK and Sun Java 2 SDK 1.4.2_08 with Java HotSpot™ Client VM are specifically supported. As customer applications and dataset sizes vary tremendously no configuration guidelines can be given here. Potential customers are encouraged to seek very competent assistance to size their hardware. Results of the Evaluation A verdict for an assurance component is determined by the resulting verdicts assigned to the corresponding evaluator action elements. The evaluation was conducted based upon CC version 2.2 and CEM version 2.2. The evaluation determined the BEA TOE to be Part 2 conformant, and to meet the Part 3 Evaluation Assurance Level (EAL 2) requirements augmented with ALC_FLR.1. The rationale supporting each CEM work unit verdict is recorded in the Evaluation Technical Report for the WebLogic Portal 8.1 SP5 Part 2 which is considered proprietary. Validator Comments/Recommendations BEA WebLogic Portal is a product with functionality intended to provide frameworks for managing access to: data, data structures, and application components supporting both new applications and existing ones connecting over networks. As such its implementation has to be robust. The validation team believes that the claims made and successfully evaluated for the product represent a set of requirements that are a reasonable selection covering, to a certain depth, the functionality of the product. The product, while extensive in functionality, only runs at the application level. It relies upon the underlying operating system for several types of support: audit review and storage, cryptographic facilities, security management, time stamps, and separation of the product and its users. Also, the usual training and physical assumptions apply. Because of this product construction, purchasers should be very careful to follow the configuration guidance. Controlling access, both physical and network, is very important; as is the injunction not to allow anything other than the TOE and its required supporting environment to run on the server machine. 8 VALIDATION REPORT BEA WebLogic Portal 8.1 SP5 11 12 13 14 [1] [2] [3] [4] [5] [6] [7] [8] [9] No claims are made for the network connections that must be in place between remote applications and the server or those between servers on different machines. It is up to the customer to put measures in place to appropriately secure these data paths. Annexes Not applicable. Security Target The security target for this product’s evaluation is BEA WebLogic Portal 8.1 Security Target, Version 1.0, dated February 21, 2007. Glossary No definitions beyond those in the CC or CEM are supplied. Bibliography The Validation Team used the following documents to produce this Validation Report: Common Criteria for Information Technology Security Evaluation – Part 1: Introduction and general model, Version 2.2, January 2004, CCIMB-2004-01-001. Common Criteria for Information Technology Security Evaluation – Part 2: Security functional requirements, Version 2.2, January 2004, CCIMB-2004-01-002. Common Criteria for Information Technology Security Evaluation – Part 3: Security assurance requirements, Version 2.2, January 2004, CCIMB-2004-01-003. Common Methodology for Information Technology Security: Evaluation Methodology, Version 2.2, January 2004, CCIMB-2004-01-004. Evaluation Technical Report for BEA WebLogic Portal 8.1 SP5 Part 1, Version 1.0, 21 February 2007. Evaluation Technical Report for BEA WebLogic Portal 8.1 Part 2, Version 1.0, 21 February 2007. Evaluation Team Test Report for BEA WebLogic Portal 8.1 SP5 Part 2 Supplement, Version 1.0, 21 February 2007. BEA WebLogic Portal 8.1 Security Target, Version 1.0, 21 February 2007. NIAP Common Criteria Evaluation and Validation Scheme for IT Security, Guidance to Common Criteria Testing Laboratories, Version 1.0, March 20, 2001. 9