Olt Itsar - Pon Family BB Eqpt
Olt Itsar - Pon Family BB Eqpt
For
Optical Line terminal (OLT) – PON family
Broadband Equipment
Page 2 of 37
5.2 Audit Event Generation ................................................................................................. 16
5.3 Secure Log Export......................................................................................................... 20
Section 6: Data Protection ...................................................................................................... 20
6.1 Cryptographic Based Secure Communication with connecting entities .......................... 20
6.2 Cryptographic Module Security Assurance .................................................................... 21
6.3. Cryptographic Algorithms implementation Security Assurance ..................................... 21
6.4. Protecting data and information – Confidential System Internal Data ........................... 21
6.5. Protecting data and information in storage ................................................................... 22
6.6 Protection against Copy of Data .................................................................................... 22
6.7 Protection against Data Exfiltration - Overt Channel ...................................................... 23
6.8 Protection against Data Exfiltration - Covert Channel .................................................... 23
Section 7: Network Services ................................................................................................... 23
7.1 Traffic Separation .......................................................................................................... 23
7.2 Traffic Filtering – Network level ..................................................................................... 23
7.3. Traffic Protection –Anti-Spoofing .................................................................................. 24
Section 8: Attack Prevention Mechanisms .............................................................................. 24
8.1 Network Level and application level DDoS .................................................................... 24
8.2 Excessive Overload Protection ...................................................................................... 25
Section 9: Vulnerability Testing Requirements ........................................................................ 25
9.1 Fuzzing – Network and Application Level ...................................................................... 25
9.2 Port Scanning................................................................................................................ 25
9.3 Vulnerability Scanning ................................................................................................... 26
Section 10: Operating System ............................................................................................... 26
10.1 Growing Content Handling .......................................................................................... 26
10.2 Handling of ICMP ........................................................................................................ 26
10.3 Authenticated Privilege Escalation only ....................................................................... 27
10.4 System account identification ...................................................................................... 27
10.5 OS Hardening ............................................................................................................. 28
10.6 No automatic launch of removable media .................................................................... 28
10.7 Protection from buffer overflows .................................................................................. 28
10.8 External file system mount restrictions ........................................................................ 28
10.9 File-system Authorization privileges ............................................................................ 29
Section 11: Web Servers ........................................................................................................ 29
11.1 HTTPS ........................................................................................................................ 29
11.2 Webserver logging ...................................................................................................... 29
Page 3 of 37
11.3 HTTPS input validation ................................................................................................ 30
11.4 No system privileges ................................................................................................... 30
11.5 No unused HTTPS methods........................................................................................ 30
11.6 No unused add-ons ..................................................................................................... 30
11.7 No compiler, interpreter, or shell via CGI or other server-side scripting ..................... 30
11.8 No CGI or other scripting for uploads .......................................................................... 30
11.9 No execution of system commands with SSI ............................................................... 31
11.10 Access rights for web server configuration ................................................................ 31
11.11 No default content ..................................................................................................... 31
11.12 No directory listings ................................................................................................... 31
11.13 Web server information in HTTPS headers ............................................................... 31
11.14 Web server information in error pages....................................................................... 31
11.15 Minimized file type mappings..................................................................................... 32
11.16 Restricted file access ................................................................................................ 32
11.17 Execute rights exclusive for CGI/Scripting directory .................................................. 32
Section 12: Other Security requirements ................................................................................ 32
12.1 No System / Root Password Recovery ........................................................................ 32
12.2 Secure System Software Revocation .......................................................................... 32
12.3 Software Integrity Check – Boot .................................................................................. 33
12.4 Unused Physical and Logical Interfaces Disabling....................................................... 33
12.5 No Default Profile ........................................................................................................ 33
12.6 Security Algorithm Modification ................................................................................... 33
Section 13 Specific Requirement ............................................................................................ 33
13.1 Mutual Authentication with ONT .................................................................................. 34
13.2 MAC address filtering .................................................................................................. 34
13.3 Configuration and management support (Using OMCI/TR69 protocols) ...................... 34
13.4 Identification of Rogue Optical network behaviour ....................................................... 35
13.5 Key exchange mechanism .......................................................................................... 35
13.6 Inter VLAN routing support .......................................................................................... 35
13.7 Alarms ......................................................................................................................... 35
ABBREVIATIONS ................................................................................................................... 37
Page 4 of 37
Overview
The OLT/Optical Line Terminal, also known as optical line termination, is the endpoint
hardware device in a passive optical network (PON).
An OLT has two primary functions:
a) Converting the standard signals used by a FiOS service provider to the frequency
and framing used by the PON system.
b) Coordinating the multiplexing between the conversion devices on the optical
network terminals (ONTs) located on the customers' premises.
The OLT contains a central processing unit (CPU), passive optical network cards, a
gateway router (GWR) and voice gateway (VGW) uplink cards. It can transmit a data
signal to users at 1490 nanometers (nm). That signal can serve up to 128 ONTs at a
range of up to 12.5 miles by using optical splitters.
As one of the indispensable components of PON, optical line terminal thus plays an
essential role in the performance of the whole network connection.
Page 5 of 37
Scope
The present document contains Indian Telecom Security Assurance Requirements
(ITSAR) to the stand-alone OLT (Optical Line Terminal), a passive optical network Core
element with a dedicated hardware and dedicated software, which includes system
software as well as application software.
Page 6 of 37
OLT supports Role Based Access Control ( RBAC) with minimum of 3 user roles, in
particular, for OAM privilege management, for OLT Management and Maintenance,
including authorization of the operation for configuration data and software via the OLT
console interface.
Local access: The access from Console interface, from local Console network, from
LMT (Local Maintenance Terminal interface) or from OLT local hardware interface.
Remote access: The access which is not Local access. This includes access from the
EMS (Element Management System) network, and access that originates or passes
through the internet.
Page 7 of 37
This remote root user access restriction is also applicable to application softwares / tools
such as TeamViewer, desktop sharing etc which provide remote access to the OLT.
Alongside access to data, execution of applications and components shall also take
place with rights that are as low as possible. Applications should not be executed with
administrator or system rights.
[Reference: TSDSI STD T1.3GPP 33.117-14.2.0 V.1.0.0 . Section 4.2.3.4.6.1]
OLT shall support assignment of individual accounts per user, where a user could be a
person, or, for machine accounts, an application, or a system.
OLT shall not enable the use of group accounts or group credentials, or sharing of the
same account between several users.
Page 8 of 37
password, certificate, token) and single authentication attribute in case of machine
account, shall be prevented. System functions comprise, for example network
services (like SSH, SFTP, Web services), local access via a management console,
local usage of operating system and applications. This requirement shall also be
applied to accounts that are only used for communication between systems.
[Reference: TSDSI STD T1.3GPP 33.117-14.2.0 V.1.0.0. Section 4.2.3.4.1.1]
If the OLT supports external authentication mechanism such as AAA server (for
authentication, authorization and accounting services) then the communication between
OLT and the external authentication entity shall be protected using the authentication
and related service protocols built strictly using the Secure cryptographic controls
prescribed in Table1 of the latest document “Cryptographic Controls for Indian Telecom
Security Assurance Requirements (ITSAR)” only.
(i) Using the timer delay (this delay could be the same or increased depending the
operator's policy for each attempt) for each newly entered password input following
an incorrect entry ("tar pit").
(ii) Blocking an account following a specified number of incorrect attempts. However, it
has to be taken into account that this solution needs a process for unlocking and an
attacker can force this to deactivate accounts and make them unusable.
(iii) Using an AUTHENTICATION ATTRIBUTE blacklist to prevent vulnerable
passwords.
(iv) Using CAPTCHA to prevent automated attempts (often used for Web applications).
In order to achieve higher security, two or more of the measures indicated above
shall be mandatorily supported by OLT. An exception to this requirement is machine
accounts.
Page 9 of 37
2.4 Enforce Strong Password
Requirement:
(a) The configuration setting shall be such that an OLT shall only accept passwords that
comply with the following complexity criteria:
OLT shall have in-built mechanism to support this requirement, further If a central system
is used for user authentication password policy then additional assurance shall be
provided that the central system enforces the same password complexity rules as laid
down for the local system in this subclause.
And If a central system is not used for user authentication, the assurance on password
complexity rules shall be performed on the OLT.
Page 10 of 37
OLT shall monitor inactive sessions of administrative login users and initiate session
locking mechanism based on user configurable timers. Unlocking the session shall be
permissible only by authentication. If the inactivity period further continues for a defined
period, Session /user ID time out must occur after this inactivity. The timer values can
be admin configurable as per requirement, normally set between 2 to 5 minutes.
The system shall enforce password change based on password management policy.
In particular, the system shall enforce password expiry. OLT shall support a configurable
period for expiry of passwords.
Previously used passwords shall not be allowed upto a certain number (password
history).
The number of disallowed previously used passwords shall be:
• Configurable;
• Greater than 0;
• And its minimum value shall be 3. This means that the OLT shall store at least
the three previously set passwords. The maximum number of passwords that the
OLT can store for each user is up to the manufacturer.
And If a central system is not used for user authentication, the assurance on password
changes rules shall be performed on the OLT
Page 11 of 37
[Reference: TSDSI STD T1.3GPP 33.117-14.2.0 V.1.0.0. Section 4.2.3.4.3.2]
Software update integrity shall be verified strictly using the Secure cryptographic controls
prescribed in Table1 of the latest document “Cryptographic Controls for Indian Telecom
Security Assurance Requirements (ITSAR)” only.
Page 12 of 37
(i) OLT Software package integrity shall be validated in the installation and upgrade
stages strictly using the Secure cryptographic controls prescribed in Table1 of the latest
document “Cryptographic Controls for Indian Telecom Security Assurance
Requirements (ITSAR)” only.
(ii) OLT shall allow upgrades only if code signing certificate is valid and not time expired.
To this end, the OLT shall have a list of public keys or certificates of authorised software
sources, and uses the keys to verify that the software upgrade is originated from only
these sources.
(iii) Tampered software shall not be executed or installed if integrity check fails.
(iv) OLT’s software upgrades shall be carried out strictly using the Secure cryptographic
controls prescribed in Table1 of the latest document “Cryptographic Controls for Indian
Telecom Security Assurance Requirements (ITSAR)” only.
(v) A security mechanism is required to guarantee that only authorized individuals can
initiate and deploy a software upgrade.
[Reference: 1) TSDSI STD T1.3GPP 33.117-14.2.0 V.1.0.0. Section 4.2.3.3.5 ]
Page 13 of 37
Vendor shall submit an undertaking stating that OLT is free from all known malware and
backdoors as on the date of offer to the TSTL for testing and shall submit Malware test
document (MTD).
OEM shall provide the list of software that are necessary for its operation.
[Reference: TSDSI STD T1.3GPP 33.117-14.2.0 V.1.0.0. Section 4.3.2.3]
- FTP
- TFTP
- Telnet
- rlogin, RCP, RSH
- HTTP
- SNMPv1 and v2
- SSHv1
- TCP/UDP Small Servers (Echo, Chargen, Discard and Daytime)
- Finger
- BOOTP server
- Discovery protocols (CDP, LLDP)
- IP Identification Service (Identd)
- PAD
Page 14 of 37
- MOP
Full documentation of required protocols and services (Communication matrix) of the
Network product and their purpose needs to be provided by the OEM as prerequisite for
the test case.
[Reference: TSDSI STD T1.3GPP 33.117-14.2.0 V.1.0.0. Section 4.3.2.1]
OLT shall provide reliable time and date information provided through NTP/PTP server.
OLT shall establish secure communication channel with the NTP/PTP server.
OLT shall establish secure communication channel strictly using Secure cryptographic
controls prescribed in Table1 of the latest document “Cryptographic Controls for Indian
Telecom Security Assurance Requirements (ITSAR)” only with NTP/PTP server.
OLT shall generate audit logs for all changes to time settings.
Administrative services (e.g. SSH, HTTPS, RDP) shall be restricted to interfaces in the
management plane for separation of management traffic from user traffic.
[Reference: TSDSI STD T1.3GPP 33.117-14.2.0 V.1.0.0 Section 4.3.2.2]
Page 15 of 37
Requirement:
Unused functions i.e. the software and hardware functions which are not needed for
operation or functionality of the OLT shall not be present in the OLT’s software and/or
hardware.
List of the used functions of the Networks s software and hardware as given by the
vendor shall match the list of used software and hardware functions that are necessary
for the operation of the OLT.
[Reference: TSDSI STD T1.3GPP 33.117-14.2.0 V.1.0.0. Section 4.3.2.4]
Page 16 of 37
Event Types (Mandatory
Description Event data to be logged
or optional)
• Username,
• Source (IP address) if remote
Incorrect login attempts Records any user incorrect access
(Mandatory) login attempts to the DUT Outcome of event (Success or
failure)
• Timestamp
• Username,
• Timestamp,
Records any access • Length of session,
Administrator access
attempts to accounts that Outcome of event (Success or
(Mandatory)
have system privileges. failure)
• Source (IP address) if remote
access
• Administrator username,
• Administered account,
Records all account
Account administration administration activity, i.e. • Activity performed (configure,
(Mandatory) configure, delete, enable, delete, enable and disable)
and disable. Outcome of event (Success or
failure)
• Timestamp
• Value exceeded,
• Value reached
Records events that have
been triggered when system (Here suitable threshold values
Resource Usage parameter values such as shall be defined depending on
(Mandatory) disk space, CPU load over a the individual system.)
longer period have exceeded
their defined thresholds. Outcome of event (Success or
failure)
• Timestamp
• Change made
* Timestamp
Configuration change Changes to configuration of
(Mandatory) the network device Outcome of event (Success or
failure)
• Username
• Action performed (reboot,
This event records any shutdown, etc.)
action on the network device
Reboot/shutdown/crash • Username (for intentional
that forces a reboot or
(Mandatory) actions)
shutdown OR where the
network device has crashed. Outcome of event (Success or
failure)
Page 17 of 37
• Timestamp
• Interface name and type
• Status (shutdown, missing
Change to the status of link, etc.)
Interface status change
interfaces on the network
(Mandatory) Outcome of event (Success or
device (e.g. shutdown)
failure)
• Timestamp
• Administrator username,
• Administered account,
Change of group • Activity performed (group
Any change of group
membership or accounts added or removed)
membership for accounts
(Optional)
Outcome of event (Success or
failure)
• Timestamp.
• Administrator username,
• Administered account,
Resetting of user account • Activity performed (configure,
Resetting Passwords
passwords by the delete, enable and disable)
(Optional)
Administrator
Outcome of event (Success or
failure)
• Timestamp
Service identity
Activity performed (start, stop,
Starting and Stopping of etc.)
Services (Optional)
Services (if applicable) Timestamp
Outcome of event (Success or
failure)
user identity
origin of attempt (e.g. IP
All use of identification and address)
User login (Mandatory)
authentication mechanism Timestamp
outcome of event (Success or
failure)
Timestamp
X.509 Certificate Validation Unsuccessful attempt to Reason for failure
(Optional) validate a certificate Subject identity
Type of event
user identity
attempt to initiate manual
Secure Update (Optional) update, initiation of update, Timestamp
completion of update Outcome of event (Success or
failure)
Page 18 of 37
Activity performed
old value of time
new value of time
Timestamp
Page 19 of 37
Any attempt to scan Source IP Address
the network interface Destination Port Address
shall lead to triggering
of logging of the
appropriate
parameters
(I) (a) The OLT shall support forwarding of security event logging data to an external system by
push or pull mechanism.
(b) Log functions should support secure uploading of log files to a central location or to a
system external for the OLT.
(II) OLT shall be able to store generated audit data itself, may be with limitations.
(III) OLT shall alert administrator when its security log buffer reaches configured threshold limit.
(IV)In the absence of external system (due to loss of connectivity or due to node failure or due
to any other reasons), OLT shall have mechanism to store audit data locally. OLT shall have
sufficient memory to store minimum 1000 messages/events allocated for this purpose.
vendor to submit justification document for sufficiency of local storage requirement.
(V) Secure Log export shall comply the Secure cryptographic controls prescribed in Table1 of
the latest document “Cryptographic Controls for Indian Telecom Security Assurance
Requirements (ITSAR)” only.
Page 20 of 37
OLT shall Communicate with the connected entities strictly using the Secure cryptographic
controls prescribed in Table1 of the latest document “Cryptographic Controls for Indian Telecom
Security Assurance Requirements (ITSAR)” only.
Vendor shall submit cryptographic algorithm implementation testing document and the
detailed self / Lab test report along with test results for scrutiny.
Page 21 of 37
Access to maintenance mode shall be restricted only to authorised privileged user.
[Reference: TSDSI STD T1.3GPP 33.117-14.2.0 V.1.0.0. Section 4.2.3.2.2.]
Page 22 of 37
6.7 Protection against Data Exfiltration - Overt Channel
Requirement:
OLT shall have mechanisms to prevent data exfiltration attacks for theft of data in use /
data in transit. Establishment of outbound overt channels such as, HTTPS IM, P2P,
Email etc. are to be forbidden if they are auto-initiated by / auto-originated from the
Network product.
Session logs shall be generated for establishment of any session initiated by either
user or OLT.
Session logs shall be generated for establishment of any session initiated by either
user or OLT.
Page 23 of 37
(i) To filter incoming IP packets on any IP interface at Network Layer and Transport
Layer of the stack ISO/OSI.
(ii) To allow specified actions to be taken when a filter rule matches. In particular at
least the following actions should be supported:
− Account: the matching message is accounted for i.e. a counter for the rule
is incremented. This action can be combined with the previous ones. This
feature is useful to monitor traffic before its blocking.
(iii) To enable/disable for each rule the logging for Dropped packets, i.e. details on
messages matching the rule for troubleshooting.
(iv) To filter on the basis of the value(s) of any portion of the protocol header.
(v) To reset the accounting.
(vi) The Network product shall provide a mechanism to disable/enable each defined
rule.
Page 24 of 37
OLT shall provide security measures to deal with overload situations which may occur
as a result of a denial of service attack or during periods of increased traffic. In particular,
partial or complete impairment of system availability shall be avoided.
Potential protective measures (as applicable to OLT) include, but not limited to, the
following:
Page 25 of 37
Requirement:
It shall be ensured that on all network interfaces of OLT, only documented ports on the
transport layer respond to requests from outside the system.
[Reference: TSDSI STD T1.3GPP 33.117-14.2.0 V.1.0.0.section 4.4.2]
Page 26 of 37
3 1 Destination Unreachable Permitted N/A
8 128 Echo Request Permitted Optional
11 3 Time Exceeded Optional N/A
12 4 Parameter Problem Permitted N/A
N/A 2 Packet Too Big Permitted N/A
N/A 135 Neighbour Solicitation Permitted Permitted
N/A 136 Neighbour Advertisement Permitted N/A
OLT shall not respond to, or process (i.e. do changes to configuration), under any
circumstances certain ICMP message types as marked in below table.
Page 27 of 37
Requirement:
Each system account in OLT shall have a unique identification with appropriate non-
repudiation controls.
[Reference: TSDSI STD T1.3GPP 33.117-14.2.0 V.1.0.0 . Section 4.2.4.2.2]
10.5 OS Hardening
Requirement:
Appropriate OS hardening procedures including security measures required to ensure
the kernel security and miniaturization etc. shall be implemented in OLT.
Kernel based network functions not needed for the operation of the OLT shall be
deactivated.
[Reference: TSDSI STD T1.3GPP 33.117-14.2.0 V.1.0.0. Section 4.3.3.1.2]
Page 28 of 37
escalation or extended access permissions due to the contents of the mounted file
systems.
OS-level restrictions shall apply to normal users against mount / use of removable media
devices (e.g. USB drive, CD ROM etc.) for data transfer.
- Access timestamp
- Source (IP address)
- Account (if known)
- Attempted login name (if the associated account does not exist)
- Relevant fields in http request. The URL should be included whenever
possible.
Page 29 of 37
- Status code of web server response
[Reference: TSDSI STD T1.3GPP 33.117-14.2.0 V.1.0.0.section 4.2.5.2.1]
Page 30 of 37
Requirement:
If CGI or other scripting technology is used, the associated CGI/script directory shall not
be used for uploads.
[Reference: TSDSI STD T1.3GPP 33.117-14.2.0 V.1.0.0. section 4.3.4.6]
Page 31 of 37
Default error pages of the OLT web server shall be replaced by error pages defined by
the vendor.
In the event of system password reset (e.g., through press of Hard-reset button), the
entire configuration of the OLT shall be irretrievably deleted.
Page 32 of 37
In case roll back is essential, it shall be done only by the administrator with appropriate
non-repudiation controls.
OLT shall support a well-established control mechanism for rolling back to previous
software image.
Page 33 of 37
Network) family network Core element with a dedicated hardware and dedicated
software, which includes system software as well as application software
Before letting any device join the network, the OLT should checks the device's
MAC address against a list of approved addresses. If the client's address
matches one on list, access is granted as usual; otherwise, it's blocked from joining.
Page 34 of 37
Remote configuration management, fault management, performance management &
security management of OLT shall comply mutual authentication & encryption using
Secure cryptographic controls prescribed in Table1 of the latest document of “Cryptographic
Controls For Indian Telecom Security Assurance Requirements (ITSAR) of the management
traffic.
Inter VLAN routing functionality by default is not permitted, only permitted configuration
by administrator.
13.7 Alarms
Requirement:
The OLT should be able to get the following alarms
a. Loss of Signal(LoS): The OLT did not receive any expected transmission in the
upstream( complete PON failure) for 4 consecutive frames. When the OLT
receives at least one upstream transmission
b. Loss of Frame (LoF): When 5 consecutive invalid Psync from OLT are received.
When 2 consecutive frames have correct PSync.
Page 35 of 37
c. Loss of signal for ONUi (LOSI): No valid optical signal from ONU when it was
expected during 4consecutive no continuous allocations to that ONU. When the
OLT receives a valid optical signal from ONUi.
d. Loss of frame of ONUi(LOFI): When n (default 4) consecutive invalid delimiters
from ONUi are received. When frame delineation for ONUi is achieved in the
operation state.
Page 36 of 37
ABBREVIATIONS
AES Advanced Encryption Standard
CVE Common Vulnerabilities and Exposures
CWE Common Weakness Enumeration
DDOS Distributed Denial of Service
FIPS Federal Information Processing Standards
HTTP Hypertext Transfer Protocol
HTTPS Hypertext Transfer Protocol Secure
IPSec VPN Internet Protocol Security Virtual Private Network
NIST National Institute of Standards and Technology
NTP Network Time Protocol
OS Operating System
PTP Precision Time protocol
SFTP Secure File Transfer Protocol
AUTN Authentication token
DoS Denial of Service
OLT Optical Line Terminal
ONT Optical Network Terminal
ONU Optical Network Unit
PON Passive Optical Network
GPON Gigabit Passive Optical Network
NCCS National Centre for Communication Security
NTP Network Time Protocol
OS Operating System
PTP Precision Time Protocol
Page 37 of 37