[PDF] Windows 7 Winload OS Loader (winload.exe) Security Policy





Previous PDF Next PDF



Linterface de Windows 7

Windows 7 est un système d'exploitation doté d'une interface graphique intuitive qui vous permet de communiquer avec votre ordinateur pour lui demander de 



Linterface de Windows 7

L'interface de Windows 7. 1.1 Utiliser le menu Démarrer et la barre des tâches de Windows 7 . 21. 1.2 Profiter de l'affichage Aero et de Windows Flip 3D ...



Création dune connexion VPN dans Windows 7 pour accéder au

Cette documentation est composée de captures d'écrans faites dans Windows 7 Professionnel en français avec l'interface « standard » et il se peut que l' 



Windows 7: Using USB TAP on a Classic CodeWarrior Installation

6 déc. 2011 Certain classic CodeWarrior tools do not support the USB TAP run control interface when the host computer is running the Windows. 7 64-bit ...



Microsoft Windows 7 Cryptographic Primitives Library

2 mai 2011 and Windows 7 are either registered trademarks or trademarks of Microsoft Corporation in ... 3 CRYPTOGRAPHIC MODULE PORTS AND INTERFACES .



Accéder à linterface de ligne de commande dun commutateur

Dans cet exemple Windows 7 Édition Intégrale est utilisé et la version PuTTY est. 0.63. Étape 1. Lancez le client PuTTY sur votre ordinateur. Étape 2.



Microsoft Windows 7 Kernel Mode Cryptographic Primitives Library

16 janv. 2013 and Windows 7 are either registered trademarks or trademarks of Microsoft Corporation in ... 3 CRYPTOGRAPHIC MODULE PORTS AND INTERFACES .



Microsoft Windows 7 Kernel Mode Cryptographic Primitives Library

16 janv. 2013 and Windows 7 are either registered trademarks or trademarks of Microsoft Corporation in ... 3 CRYPTOGRAPHIC MODULE PORTS AND INTERFACES .



Dell Precision Rack 7910 Fiche technique de mise à jour des

l'interface « Démarrage de Windows ». Windows 7 32 bits : définissez MMIO sur. DISABLED (Désactivé) dans le programme de configuration du système. Windows 7 



Windows 7 Winload OS Loader (winload.exe) Security Policy

31 août 2011 Control Input Interface . ... Status Output Interface . ... system loader which loads the Windows 7 operating system kernel (ntoskrnl.exe) ...

Winload OS Loader (winload.exe) Security Policy

This Security Policy is non-proprietary and may be reproduced only in its original entirety (without revision)

Windows 7 Winload OS Loader

(winload.exe) Security Policy

For FIPS 140-2 Validation

v 4.3

08/31/11

1 INTRODUCTION .................................................................................................................. 2

1.1 Cryptographic Boundary for WINLOAD.EXE .............................................................................. 2

2 SECURITY POLICY .............................................................................................................. 2

2.1 WINLOAD.EXE Security Policy ..................................................................................................... 2

3 WINLOAD.EXE PORTS AND INTERFACES ....................................................................... 4

3.1 Control Input Interface ................................................................................................................. 4

3.2 Status Output Interface ................................................................................................................ 4

3.3 Data Output Interface ................................................................................................................... 5

3.4 Data Input Interface ...................................................................................................................... 5

4 SPECIFICATION OF ROLES ............................................................................................... 5

4.1 Maintenance Roles ......................................................................................................................... 5

4.2 Multiple Concurrent Interactive Operators ............................................................................... 5

5 CRYPTOGRAPHIC KEY MANAGEMENT ............................................................................ 5

6 WINLOAD.EXE SELF TESTS ............................................................................................... 6

7 ADDITIONAL DETAILS ....................................................................................................... 6

This Security Policy is non-proprietary and may be reproduced only in its original entirety (without revision) 2

1 Introduction

The Windows OS Loader (WINLOAD.exe, versions 6.1.7600.16385, 6.1.7600.16757, 6.1.7600.20897,

6.1.7600.20916, 6.1.7601.17514, 6.1.7601.17556, 6.1.7601.21655 and 6.1.7601.21675) is an operating

system loader which loads the Windows 7 operating system kernel (ntoskrnl.exe) and other boot start binary image files.

1.1 Cryptographic Boundary for WINLOAD.EXE

The Windows 7 WINLOAD.EXE consists of a single executable (EXE). The cryptographic boundary for WINLOAD.EXE is defined as the enclosure of the computer system, on which WINLOAD.EXE is to be executed. The physical configuration of WINLOAD.EXE, as defined in FIPS-140-2, is multi-chip standalone.

2 Security Policy

2.1 WINLOAD.EXE Security Policy

WINLOAD.EXE operates under several rules that encapsulate its security policy. WINLOAD.EXE is validated on Windows 7 Ultimate and Windows 7 Ultimate SP1 both x86 and x64 editions. WINLOAD.EXE operates in FIPS mode of operation only when used with the FIPS approved version of Windows 7 Boot Manager (bootmgr) validated to FIPS 140-2 under Cert. #1319 operating in FIPS mode. Windows 7 is an operating system supporting a "single user" mode where there is only one interactive user during a logon session. WINLOAD.EXE is only in its Approved mode of operation when Windows is booted normally, meaning Debug mode is disabled and Driver Signing enforcement is enabled. The following diagram illustrates the master components of the WINLOAD.EXE module

This Security Policy is non-proprietary and may be reproduced only in its original entirety (without revision) 3

The following diagram illustrates WINLOAD.EXE module interaction with cryptographic module: WINLOAD.EXE's main function is to load the Windows 7 operating system kernel (ntoskrnl.exe) and other boot start binary image files, including CI.DLL, after it determines their integrity using its cryptographic algorithm implementations using the FIPS 140-2 approved algorithms mentioned below. After the verified kernel and boot start binary image files, including CI.DLL, are loaded, WINLOAD.EXE passes the execution control to the kernel and it terminates its own

This Security Policy is non-proprietary and may be reproduced only in its original entirety (without revision) 4execution. In addition to this service, WINLOAD.EXE also provides status and self-test services.

The Crypto office and User have access to all services WINLOAD supports. If the integrity of the kernel or CI.DLL is not verified, WINLOAD.EXE does not transfer the execution to the kernel. The module provides a power-up self-tests services that is automatically executed when the module is loaded into memory, as well as, a show status service, that is automatically executed by the module to provide the status response of the module either via output to the GPC monitor or to log files. Winload verifies the integrity of multiple kernel mode crypto modules. This verification relies on RSA 2048-bit signature verification using SHA-256. If the verification fails, the modules are not loaded into memory, and this will prevent Windows from booting. The following crypto modules are verified in this manner: o CI.DLL o CNG.SYS o FVEVOL.SYS WINLOAD.EXE implements the following FIPS-140-2 Approved algorithms. o RSA PKCS#1 (v1.5) digital signature verification (Cert. #557) RSA signature with 1024-bit keys and SHA-1 message digest RSA signature with 2048-bit keys and SHA-256 message digest o SHS (SHA-1) (Cert. #1081) o SHS (SHA-256) (Cert. #1081) o SHS (SHA-512) (Cert. #1081) o AES (Certs. #1168 and 1177) Cryptographic bypass is not supported by WINLOAD.EXE. WINLOAD.EXE (version: 6.1.7600.16385) was tested using the following machine configurations: x86 Windows 7 Ultimate - HP Compaq dc7600 x64 Windows 7 Ultimate - HP Compaq dc7600 WINLOAD.EXE (version: 6.1.7601.17514) was tested using the following machine configurations: x86 Windows 7 Ultimate SP1 - HP Compaq dc7600 x64 Windows 7 Ultimate SP1 - HP Compaq dc7600

3 WINLOAD.EXE Ports and Interfaces

3.1 Control Input Interface

The WINLOAD.EXE Control Input Interface is the set of system flags and data that is read using internal

functions. These internal (non-callable) functions are: BlBdInitialize - Reads the system status to determine if a boot debugger is attached. OslMain - This function receives and parses the Boot Application parameters, which are passed to the module when execution is passed from Boot Manager. BlInitializeLibrary - Performs the parsing Boot Application parameters. BlXmiRead - Reads the operator selection from the Winload user interface.

3.2 Status Output Interface

This Security Policy is non-proprietary and may be reproduced only in its original entirety (without revision) 5The Status Output Interface is the BlXmiWrite function that is responsible for displaying the integrity

verification errors to the screen. The Status Output Interface is also defined as the BlLogData responsible for writing the name of the corrupt driver to the bootlog.

3.3 Data Output Interface

The Data Output Interface is represented by the OslArchTransferToKernel function and the AhCreateLoadOptionsString function. OslArchTransferToKernel is responsible for transferring the

execution from Winload to the initial execution point of the Windows 7 kernel. Data exits the module in

the form of the initial instruction address of the Windows 7 kernel. Data exits the module from the AhCreateLoadOptionsString function in the form of boot application parameters passed to the Windows 7 kernel.

3.4 Data Input Interface

The Data Input Interface is represented by the BlFileReadEx function and the BlDeviceRead function.

BlFileReadEx is responsible for reading the binary data of unverified components from the computer hard

drive. In addition the FVEK key can also be entered into the module over the module's data input interface. BlDeviceRead is responsible for reading data directly from devices.

4 Specification of Roles

WINLOAD.EXE supports both User and Cryptographic Officer roles (as defined in FIPS-140-2). Both roles

have access to all services implemented in WINLOAD.EXE. The module does not implement any authentication services. Therefore, roles are assumed implicitly by booting the Windows 7 operating system.

4.1 Maintenance Roles

Maintenance roles are not supported by WINLOAD.EXE.

4.2 Multiple Concurrent Interactive Operators

There is only one interactive operator during a logon session. Multiple concurrent interactive operators

sharing a logon session are not supported.

5 Cryptographic Key Management

WINLOAD.EXE does not store any secret or private cryptographic keys across power-cycles. However, it

does use two AES keys in support of the BitLocker feature. These keys are: Volume Master Key (VMK) - 256-bit AES key used to decrypt the Full Volume Encryption Key. Full Volume Encryption Key (FVEK) - 128 or 256-bit AES key that is used to decrypt data on disk sectors of the hard drive. Both keys are stored in memory and are zeroized by power-cycling the OS.

WINLOAD.EXE also uses public keys stored on the computer hard disk to verify digital signatures using its

implementation of RSA PKCS#1 (v1.5) verify. These public keys are available to both roles. Zeroization

is performed by deleting the Winload module. All the keys (mentioned above) are accessed only by the WINLOAD.EXE service that loads the Windows 7

operating system kernel (ntoskrnl.exe) and other boot start binary image files, including CI.DLL. This

service only has execute access to the keys mentioned above.

This Security Policy is non-proprietary and may be reproduced only in its original entirety (without revision) 6

6 WINLOAD.EXE Self Tests

WINLOAD.EXE performs the following power-on (start up) self-tests.

SHS (SHA-1) Known Answer Test

SHS (SHA-256) Known Answer Test

SHS (SHA-512) Known Answer Test

RSA PKCS#1 (v1.5) verify with public key

o RSA signature with 1024-bit key and SHA-1 message digest o RSA signature with 2048-bit key and SHA-256 message digest

AES Known Answer Tests

7 Additional details

For the latest information on Windows 7, check out the Microsoft web site at http://www.microsoft.com.

CHANGE HISTORY

AUTHOR DATE VERSIONCOMMENT

9/2/2009 4.0 Initial version of Windows 7 Winload Security Policy

5/26/2010 4.1 Updates based on CMVP review

quotesdbs_dbs4.pdfusesText_8
[PDF] Code civil local art. 21 à 79

[PDF] Cour municipale de la Ville de Montréal Direction des services judiciaires

[PDF] POLITIQUE DE FORMATION CONTINUE DE L ORDRE DES AGRONOMES DU QUÉBEC 2014-2017

[PDF] Problèmes à propos des nombres entiers naturels

[PDF] La démarche «projets de service»

[PDF] Vu les articles 4, 19 et 85 de la Loi sur les compétences municipales (RLRQ, chapitre C-47.1);

[PDF] PROGRAMME D ETUDE FORMATION MUSICALE POUR DANSEURS

[PDF] DOSSIER D APPRENTISSAGE

[PDF] Objectif des gardes barrières. Barrière de Sécurité. Pare-feu. Pare-feu. Types de Pare-feu. Une vue d'ensemble

[PDF] Document associé : Plan de formation continue des membres du CA Modèle type

[PDF] Election du Conseil Municipal Enfants 2013

[PDF] + + Construction en bottes de paille. Professionnaliser. pourquoi, pour qui, comment? Réseau Français de la Construction en Paille

[PDF] Document validé en CNP le 17/12/2010 et présenté aux DG ARS le 21/01/2011.

[PDF] Vous n êtes pas seul. Guide à l intention des parents pour aider les jeunes victimes d un crime

[PDF] Classes : QUATRIEMES