background image

XEROX WorkCentre 6400 Information Assurance Disclosure Paper 

 20 

Ver. 1.00, May 2010 

        

Page 

 20 of 44 

software.  However, there are a few deviations our version of Kerberos takes from the standard Kerberos 
implementation from MIT.  These deviations are: 

1)

 

The device does not keep a user’s initial authentication and key after the user has been authenticated.  In a 

standard Kerberos implementation, once a user is authenticated, the device holds onto the authentication for a 
programmed timeout (the usual default is 12 hours) or until the user removes it (prior to the timeout period).  In 
the Xerox implementation, all traces of authentication of the user are removed once they have been 
authenticated to the device.  The user can send any number of jobs until the user logs off the system, either 
manually or through system timeout. 

2)

 

The device ignores clock skew errors.  In a standard implementation of Kerberos, authentication tests will fail if a 

device clock is 5 minutes (or more) different from the Kerberos server.  The reason for this is that given enough 
time, someone could reverse engineer the authentication and gain access to the network.  With the 5-minute 
timeout, the person has just 5 minutes to reverse engineer the authentication and the key before it becomes 
invalid.  It was determined during the implementation of Kerberos for our device that it would be too difficult for 
the user/SA to keep the device clock in sync with the Kerberos server, so the Xerox instantiation of Kerberos has 
the clock skew check removed.  The disadvantage is that this gives malicious users unlimited time to reverse 
engineer the user’s key.  However, since this key is only valid to access the Network Scanning features on a 
device, possession of this key is of little use for nefarious purposes. 

3)

 

The device ignores much of the information provided by Kerberos for authenticating.  For the most part, the 

device only pays attention to information that indicates whether authentication has passed.  Other information 
that the server may return (e.g. what services the user is authenticated for) is ignored or disabled in the Xerox 
implementation.  This is not an issue since the only service a user is being authenticated for is access to an e-
mail directory.  No other network services are accessible from the Local UI. 

Xerox has received an opinion from its legal counsel that the device software, including the implementation of a 
Kerberos encryption protocol in its network authentication feature, is not subject to encryption restrictions based on 
Export Administration Regulations of the United States Bureau of Export Administration (BXA).  This means that it 
can be exported from the United States to most destinations and purchasers without the need for previous approval 
from or notification to BXA.  At the time of the opinion, restricted destinations and entities included terrorist-
supporting states (Cuba, Iran, Libya, North Korea, Sudan and Syria), their nationals, and other sanctioned entities 
such as persons listed on the Denied Parties List.  Xerox provides this information for the convenience of its customers 
and not as legal advice.  Customers are encouraged to consult with legal counsel to assure their own compliance with 
applicable export laws. 

2.8.2.6.

 

Port 110, POP-3 Client 

This unidirectional port is used when receiving an Internet Fax (I-Fax) or E-Mail.  These jobs may only be printed, and 
the port is only open if I-Fax is enabled and while receiving the job.  It is not configurable. 

2.8.2.7.

 

Ports 137, 138, 139, NETBIOS 

For print jobs, these ports support the submission of files for printing as well as support Network Authentication 
through SMB.  Port 137 is the standard NetBIOS Name Service port, which is used primarily for WINS.  Port 138 
supports the CIFS browsing protocol.  Port 139 is the standard NetBIOS Session port, which is used for printing.  Ports 
137, 138 and 139 may be configured in the Properties tab of the device’s web page. 

For Network Scanning features, ports 138 and 139 are used for both outbound (i.e. exporting scanned images and 
associated data) and inbound functionality (i.e. retrieving Scan Templates). In both instances, these ports are only 
open when the files are being stored to the server or templates are being retrieved from the Template Pool. For these 
features, SMB protocol is used. 

2.8.2.8.

 

Ports 161, 162, SNMP 

These ports support the SNMPv1, SNMPv2c, and SNMPv3 protocols.  Please note that SNMP v1 does not have any 
password or community string control. SNMPv2 relies on a community string to keep unwanted people from 
changing values or browsing parts of the MIB.  This community string is transmitted on the network in clear text so 
anyone sniffing the network can see the password.  Xerox strongly recommends that the customer change the 
community string upon product installation.  SNMP is configurable, and may be explicitly enabled or disabled in the 
Properties tab of the device’s web pages. 

SNMP traffic may be secured if an IPSec tunnel has been established between the agent (the device) and the 
manager (i.e. the user’s PC).   

Содержание WorkCentre 6400

Страница 1: ...Xerox WorkCentre 6400 Multifunction System Information Assurance Disclosure Paper Version 1 0 Prepared by Larry Kovnat Xerox Corporation 1350 Jefferson Road Rochester New York 14623...

Страница 2: ...00 May 2010 Page 2 of 44 2010 Xerox Corporation All rights reserved Xerox and the sphere of connectivity design are trademarks of Xerox Corporation in the United States and or other counties Other com...

Страница 3: ...Connections 10 2 2 4 USB Host Port 11 2 2 Fax Module 11 2 3 1 Purpose 11 2 3 2 Hardware 11 2 4 Scanner 12 2 4 1 Purpose 12 2 4 2 Hardware 12 2 5 Graphical User Interface GUI 12 2 5 1 Purpose 12 2 5 2...

Страница 4: ...ics 27 3 4 1 Service All product configurations 27 3 4 2 tty Mode 27 3 4 3 Summary 28 4 SECURITY ASPECTS OF SELECTED FEATURES 29 4 1 Audit Log 29 4 2 Xerox Standard Accounting 33 4 3 Automatic Meter R...

Страница 5: ...functions and features of the WorkCentre products relative to Information Assurance IA This document does NOT provide tutorial level information about security connectivity PDLs or WorkCentre product...

Страница 6: ...er path controller and user interface Not shown in the picture below are optional additional paper trays and an optional finisher Figure 2 1 WorkCentre Multifunction System 2 1 Security relevant Subsy...

Страница 7: ...Foreign Device Interface Scanner Interface Physical external Interfaces Power Button Button and TOE internal wiring proprietary Physical external Interface Figure 2 2 System functional block diagram 2...

Страница 8: ...itmaps are then read from DRAM and sent to the Image Output Terminal IOT for marking on hardcopy output For long documents the production of hardcopy may begin before the entire original is scanned ac...

Страница 9: ...agnostic for all areas and during normal operation spooling areas with Image Overwrite Network Disk Yes but not normal use 80GB min N with normal operation NC and UI Application SW NC and XUI paramete...

Страница 10: ...age Scanner Proprietary connection between the scanner and controller USB Host Port Software upgrade module network logging and save restore machine settings during service Ethernet Network connectivi...

Страница 11: ...ge data from the WorkCentre 6400 to a USB device 2 2 Fax Module 2 3 1 Purpose The embedded FAX service uses the installed embedded fax card to send and receive images over the telephone interface 2 3...

Страница 12: ...of captured image Power Off System Additional Information All memory listed above contains code for execution and configuration information No user or job data is permanently stored in this location...

Страница 13: ...execution and configuration information No user or job data is stored in this location 2 6 Marking Engine also known as the Image Output Terminal or IOT 2 6 1 Purpose The Marking Engine performs copy...

Страница 14: ...ocation 2 7 System Software Structure 2 7 1 Open source components Open source components in the connectivity layer implement high level protocol services The security relevant connectivity layer comp...

Страница 15: ...re Paper 15 Ver 1 00 May 2010 Page 15 of 44 Figure 2 4 Controller Operating System layer components 2 7 3 Network Protocols Figure 2 5 is an interface diagram depicting the protocol stacks supported b...

Страница 16: ...XEROX WorkCentre 6400 Information Assurance Disclosure Paper 16 Ver 1 00 May 2010 Page 16 of 44 Figure 2 5 IPv4 Network Protocol Stack...

Страница 17: ...and the device A shared secret is used to encrypt the traffic flowing through this tunnel SSL must be enabled in order to set up the shared secret When an IPSec tunnel is established between a client...

Страница 18: ...L 515 TCP LPR 631 TCP IPP 1900 UDP SSDP 3003 TCP http SNMP reply 9100 TCP raw IP Please note that there is no ftp port in this list ftp is only used to export scanned images and to retrieve Scan Job T...

Страница 19: ...when this is disabled IPP Port 631 is also disabled HTTP may be secured by enabling Secure Sockets Layer 2 8 2 4 1 Proxy Server The device can be configured to communicate through a proxy server Featu...

Страница 20: ...ryption protocol in its network authentication feature is not subject to encryption restrictions based on Export Administration Regulations of the United States Bureau of Export Administration BXA Thi...

Страница 21: ...self signed certificate In the first instance the device creates a Certificate Signing Request CSR that can be downloaded and forwarded to the well known CA for signing The signed device certificate i...

Страница 22: ...disabled in the Properties tab of the device s web pages 2 8 3 IP Filtering The devices contain a static host based firewall that provides the ability to prevent unauthorized network access based on...

Страница 23: ...Jobs Email Internet Fax Workflow Scanning Server Also users can be authorized to access one or any combination of the following machine pathways Services Job Status or Machine Status Assignment of use...

Страница 24: ...XEROX WorkCentre 6400 Information Assurance Disclosure Paper 24 Ver 1 00 May 2010 Page 24 of 44 Figure 3 1 Authentication and Authorization schematic...

Страница 25: ...ail internet fax and Scan to Fax Server The authentication steps are 1 A User enters a user name and password at the device in the Local UI The device sends an authentication request to the Kerberos S...

Страница 26: ...e device sends the Domain Controller hostname to the DNS Server 2 The DNS Server returns the IP Address of the Domain Controller 3 The device sends an authentication request directly to the Domain Con...

Страница 27: ...are never transmitted over the network Scan to Fax Server The device logs in to the Fax Server as set up by the SA in User Tools on the Local UI or from the Properties tab on the WebUI Please note tha...

Страница 28: ...May 2010 Page 28 of 44 3 4 3 Summary As stated above accessibility of customer documents files or network resources is impossible via the PSW In the extremely unlikely event that someone did spoof th...

Страница 29: ...file format The log does not clear when it is disabled and will persist through power cycles The following table lists the events that are recorded in the log Event ID Event description Entry Data 1 S...

Страница 30: ...Accounting User ID Accounting Account ID Total fax recipient phone numbers fax recipient phone numbers 13 Efax Job name User Name Completion Status IIO status Accounting User ID Accounting Account ID...

Страница 31: ...serial number StartupMode enabled disabled System Params Password changed or failed Start Job Password changed or failed Completion Status Success Failed 29 Network User Login UsereName Device name D...

Страница 32: ...led 43 Device clock UserName Device name Device serial number Completion Status time changed date changed 44 SW upgrade Device name Device serial number Completion Status Success Failed 45 Cloning Dev...

Страница 33: ...job is deleted and an error sheet is printed in its place On demand the SA will be able to download a report that shows activity for all of the users The SA can add modify or remove users and their a...

Страница 34: ...the entire spooling area of the disks ODIO hex value 0xCA ASCII compliment of 5 Step 3 Pattern 3 is written to the sectors containing temporary files IIO or to the entire spooling area of the disks O...

Страница 35: ...4 4 5 3 Overwrite Timing The ODIO overwrite time is dependent on the type of hard disk in the product The overwrite and reset average time is 10 minutes but longer times are possible IIO is performed...

Страница 36: ...Ver 1 00 May 2010 Page 36 of 44 5 Responses to Known Vulnerabilities 5 1 Security Xerox www xerox com security Xerox maintains an evergreen public web page that contains the latest security informati...

Страница 37: ...otocol IBM International Business Machines ICMP Internet Control Message Protocol IETF Internet Engineering Task Force IFAX Internet Fax IIO Immediate Image Overwrite IIT Image Input Terminal the scan...

Страница 38: ...vice Location Protocol SNMP Simple Network Management Protocol SRAM Static Random Access Memory SSDP Simple Service Discovery Protocol SSL Secure Sockets Layer TCP Transmission Control Protocol TIFF T...

Страница 39: ...n only support 0 or 3 for more than 1 sheet for prtInputCurrentLevel will be considered a caveat denoted as C 6 The Printer MIB requires a few groups from RFC 1213 and RFC 1514 to be supported Therefo...

Страница 40: ...local UI messaging captured within table C local UI button selection messages are not captured within table Console Display Light group 5 objects supported w caveats only the Power Saver LED is suppor...

Страница 41: ...rations from next generation Host Resources MIB supported optional not support because Host Resources MIBv2 has NOT entered the standards track New type 2 enumerations from next generation Printer MIB...

Страница 42: ...ssion of IP datagrams over IEEE802 networks 1042 ICMP ICMP Echo ICMP Time ICMP Echo Reply and ICMP Destination Unreachable message 792 Reverse Address Resolution Protocol RARP 903 Bootstrap Protocol B...

Страница 43: ...2010 Page 43 of 44 Function RFC Standard Appletalk Inside Appletalk Second Edition Printing Description Languages Postscript Language Reference Third Edition PCL6 PCL5E 5SI emulation PCL6 PCLXL 5M em...

Страница 44: ...ormation Assurance Disclosure Paper 44 Ver 1 00 May 2010 Page 44 of 44 6 4 Appendix E References Kerberos FAQ http www nrl navy mil CCS people kenh kerberos faq html IP port numbers http www iana org...

Отзывы: