background image

XEROX WorkCentre 7755/7765/7775 Information Assurance Disclosure Paper

 

 

 30 

Ver. 1.01, April 2010 

        

Page 

 30 of 40 

 

4.4.

 

Encrypted Partitions 

The network controller disk is encrypted using the AES algorithm with a 128-bit key.  The key is generated 
dynamically on each boot, and is kept only in volatile memory. 

4.5.

 

Image Overwrite 

The Image Overwrite Security Option provides both Immediate Image Overwrite (IIO) and On-Demand 
Image Overwrite (ODIO) functions.  Immediately before a job is considered complete, IIO will overwrite any 
temporary files associated with copy, print, network scan, internet fax, network fax, or e-mail jobs that had 
been created on the Network Controller Hard Disk.  The ODIO feature can be executed at any time by the 
SA and will overwrite the entire document image partitions of the Network Controller Hard disk.  ODIO may 
also be scheduled to run at regular times.  A standard ODIO will overwrite all image data from memory and 
disks except for Jobs and Folders stored in the Reprint Saved Jobs feature; Jobs stored in the Scan to 
Mailbox feature (if installed); Fax Dial Directories (if fax card is installed); and Fax Mailbox contents (if fax 
card is installed).  A full ODIO will overwrite all image data from memory and disks as well as the items 
excluded from a standard ODIO. 

4.5.1.

 

Algorithm 

The overwrite mechanism for both IIO and ODIO conforms to the U.S. Department of Defense Directive 
5200.28-M (Section 7, Part 2, paragraph 7-202

3

, and is common to all WorkCentre models.  The algorithm 

for the Image Overwrite feature is: 

Step 1:  Pattern #1 is written to the sectors containing temporary files (IIO) or to the entire spooling 

area of the disks (ODIO).  (hex value 0x35 (ASCII “5”)). 

Step 2:  Pattern #2 is written to the sectors containing temporary files (IIO) or to the entire spooling 

area of the disks (ODIO).  (hex value 0xCA (ASCII compliment of 5)). 

Step 3:  Pattern #3 is written to the sectors containing temporary files (IIO) or to the entire spooling 

area of the disks (ODIO).  (hex value 0x97 (ASCII “ú”)). 

Step 4:  10% of the overwritten area is sampled to ensure Pattern #3 was properly written.  The 10% 

sampling is accomplished by sampling a random 10% of the overwritten area. 

4.5.2.

 

User Behavior 

Once enabled, IIO is invoked automatically immediately prior to the completion of a print, network scan, 
internet fax, network fax, or e-mail job.  If IIO completes successfully, status is displayed in the Job Queue.  
However, if IIO fails, a popup will appear on the Local UI recommending that the user run ODIO, and a 
failure sheet will be printed. 

ODIO may be invoked either from the Local UI in Tools Pathway or from the CentreWare Internet Services 
Web UI.  Network functions will be delayed until the overwrite is completed.  Copying is unavailable while 
the overwrite itself is underway, but copies may be made while the Network Controller is booting. 

Upon completion and verification of the ODIO process, a confirmation sheet is printed which indicates the 
status of the overwrite.  The completion status can be successful, failed, cancelled, or timed-out. 

                                                                      
 

3

http://www.dtic.mil/whs/directives/corres/archives/520028m_0173/p520028m.pdf

 

Summary of Contents for WORKCENTRE 7755

Page 1: ...Information Assurance Disclosure Paper Xerox WorkCentre 7755 7765 7775 Multifunction Systems Information Assurance Disclosure Paper Version 1 0 Prepared by Larry Kovnat Xerox Corporation 1350 Jefferso...

Page 2: ...1 01 April 2010 Page 2 of 40 2010 Xerox Corporation All rights reserved Xerox and the sphere of connectivity design are trademarks of Xerox Corporation in the United States and or other counties Othe...

Page 3: ...of this document is to inform Xerox customers of the design functions and features of the WorkCentre products relative to Information Assurance IA This document does NOT provide tutorial level inform...

Page 4: ...y to connect the copier to a LAN CopyCentre models of these products are available which provide copy only features and do not include a Network Controller Figure 2 1 WorkCentre Multifunction System 2...

Page 5: ...rget Port Foreign Device Interface Scanner Interface UI Physical external Interfaces Power Button Button and TOE internal wiring proprietary Physical external Interface Figure 2 2 TOE System Partition...

Page 6: ...nctions the CC works with the EPC DRAM to enable electronic pre collation sometimes referred to as scan once print many When producing multiple copies of a document the scanned image is processed and...

Page 7: ...e spooling space is dynamically allocated to each job at the job completion this space is de allocated to be available for new images All residual customer data in de allocated space can be overwritte...

Page 8: ...odem T 30 protocol only Foreign Device Interface FDI Allows connection of optional access control hardware accessory not present in evaluated TOE Scanner Proprietary connection between the Scan Module...

Page 9: ...mory and fax modem It connects to the CC via PCI bus The Fax Card is responsible for implementing the T 30 fax protocol and for managing all of the fax specific features of the product The fax telepho...

Page 10: ...ne is comprised of paper supply trays and feeders paper transport laser scanner xerographics and paper output and finishing 2 6 3 Control and Data Interfaces Images and control signals are transmitted...

Page 11: ...pril 2010 Page 11 of 40 IP Filtering is also provided by the kernel Figure 2 7 Network Controller Operating System layer components 2 7 3 Network Protocols Figure 2 3 is an interface diagram depicting...

Page 12: ...XEROX WorkCentre 7755 7765 7775 Information Assurance Disclosure Paper 12 Ver 1 01 April 2010 Page 12 of 40 Figure 2 3 IPv4 Network Protocol Stack...

Page 13: ...and are well behaved protocols There are no Xerox unique additions to these protocols 2 8 1 1 IPSec The device supports IPSec tunnel mode The print channel can be secured by establishing an IPSec asso...

Page 14: ...UDP NETBIOS Name Service 138 UDP NETBIOS Datagram Service SMB filing and Scan template retrieval 139 TCP NETBIOS SMB filing and Scan template retrieval 161 UDP SNMP 162 UDP SNMP trap 389 UDP LDAP 396...

Page 15: ...a proxy server Features that can make use of a proxy server include the Automatic Meter Read feature scanning to a remote repository or retrieving scan templates from a remote template pool 2 8 2 5 P...

Page 16: ...t supporting states Cuba Iran Libya North Korea Sudan and Syria their nationals and other sanctioned entities such as persons listed on the Denied Parties List Xerox provides this information for the...

Page 17: ...figurable port and may be explicitly enabled or disabled in User Tools via the Local User Interface or in the Properties tab of the device s web pages 2 8 2 14 Port 631 IPP This port supports the Inte...

Page 18: ...nts database When the device is set for network authentication the user s network credentials will be used to authenticate the user at the network domain controller User s can be entered into groups c...

Page 19: ...XEROX WorkCentre 7755 7765 7775 Information Assurance Disclosure Paper 19 Ver 1 01 April 2010 Page 19 of 40 Figure 3 1 Authentication and Authorization schematic...

Page 20: ...E mail and Scan to Fax Server The authentication steps are 1 A User enters a user name and password at the device in the Local UI The device sends an authentication request to the Kerberos Server 2 T...

Page 21: ...rver returns the IP Address of the Domain Controller 3 The device sends an authentication request directly to the Domain Controller through the router using the IP address of the Domain Controller 4 T...

Page 22: ...normal user with read only privileges User credentials are not used for this authentication step and are never transmitted over the network Scan to Fax Server The device logs in to the Fax Server as s...

Page 23: ...Network Controller DRAM or Network Controller hard disk However this mode is only used by a CSE if directed by a Field Engineer when all other diagnostics fail to solve a problem The written repair pr...

Page 24: ...the PSW must send the expected synchronization message to the machine 2 The Marking Engine will respond with an acknowledge message containing its serial number 3 The PSW will send a request for Diagn...

Page 25: ...Interface where host discovered Ethernet Token Ring etc Device subnet mask Device IP address Device Media Access Control MAC address The Novell test will NOT collect Print Queue Name Attached to File...

Page 26: ...parated file format The log does not clear when it is disabled and will persist through power cycles The following table lists the events that are recorded in the log Tagged index Event ID Event descr...

Page 27: ...ob Job name User Name Completion Status IIO status Accounting User ID Accounting Account ID Total fax recipient phone numbers fax recipient phone numbers 16 16 ODIO Full started Device name Device ser...

Page 28: ...Status Configured enabled disabled 34 40 SNMPv3 UserName Device name Device serial number Completion Status Configured enabled disabled 35 41 IP Filtering Rules UserName Device name Device serial num...

Page 29: ...he print driver or on the Web UI before a print job is submitted an XSA ID must also be entered The ID is sent to the Network controller for validation If the submitted ID is valid the job will print...

Page 30: ...s common to all WorkCentre models The algorithm for the Image Overwrite feature is Step 1 Pattern 1 is written to the sectors containing temporary files IIO or to the entire spooling area of the disks...

Page 31: ...he user should insure that all scan jobs have been completed before invoking ODIO Please refer to the customer documentation for a description on how failures are logged 4 5 3 Overwrite Timing The ODI...

Page 32: ...r 32 Ver 1 01 April 2010 Page 32 of 40 5 Responses to Known Vulnerabilities 5 1 Security Xerox www xerox com security Xerox maintains an evergreen public web page that contains the latest security inf...

Page 33: ...NS Dynamic Domain Name Server Maps host names to dynamic static IP addresses DRAM Dynamic Random Access Memory EGP Exterior Gateway Protocol EPC Electronic PreCollation GB Gigabyte HP Hewlett Packard...

Page 34: ...re Board Assembly PSW Portable Service Workstation PWS alternative acronym for Portable Service Workstation RFC Required Functional Capability ROM Read Only Memory ROS Raster Output Scanner SA System...

Page 35: ...nce can only support 0 or 3 for more than 1 sheet for prtInputCurrentLevel will be considered a caveat denoted as C 6 The Printer MIB requires a few groups from RFC 1213 and RFC 1514 to be supported T...

Page 36: ...y Buffer group 2 objects supported w caveats limited local UI messaging captured within table C local UI button selection messages are not captured within table Console Display Light group 5 objects s...

Page 37: ...View etc shareware program supported New type 2 enumerations from next generation Host Resources MIB supported optional not support because Host Resources MIBv2 has NOT entered the standards track New...

Page 38: ...works 894 Standard for the transmission of IP datagrams over IEEE802 networks 1042 ICMP ICMP Echo ICMP Time ICMP Echo Reply and ICMP Destination Unreachable message 792 Reverse Address Resolution Prot...

Page 39: ...of 40 Function RFC Standard Document Printing Application DPA 10175 Appletalk Inside Appletalk Second Edition Printing Description Languages Postscript Language Reference Third Edition PCL6 PCL5E 5SI...

Page 40: ...Information Assurance Disclosure Paper 40 Ver 1 01 April 2010 Page 40 of 40 6 4 Appendix E References Kerberos FAQ http www nrl navy mil CCS people kenh kerber os faq html IP port numbers http www ia...

Reviews: