+ All Categories
Home > Documents > MDSClear Ballot Security Test for State of Oregon …...2. SLI VSTL Quality System Manual, Revision...

MDSClear Ballot Security Test for State of Oregon …...2. SLI VSTL Quality System Manual, Revision...

Date post: 16-Jul-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
27
Doc Rev 01 Confidential Page | 1 Test Report Clear Ballot, ClearCount System Security Testing for State of Oregon Test Report Rev 01 February 18 th 2015 Prepared for: Vendor Name Clear Ballot Vendor System ClearCount Prepared by: 216 16 th St. Suite 700 Denver, CO 80202 303-575-6881 www.SLIGlobalsolutions.com Accredited by the Election Assistance Commission (EAC) for VSTL status.
Transcript
Page 1: MDSClear Ballot Security Test for State of Oregon …...2. SLI VSTL Quality System Manual, Revision v1.16, prepared by SLI, dated December 3rd, 2013 1.2 Terms and Abbreviations The

Doc Rev 01 Confidential P a g e | 1

Test Report

Clear Ballot, ClearCount System

Security Testing for State of Oregon

Test Report Rev 01

February 18th 2015

Prepared for:

Vendor Name Clear Ballot

Vendor System ClearCount

Prepared by:

216 16th St. Suite 700

Denver, CO 80202 303-575-6881

www.SLIGlobalsolutions.com

Accredited by the Election Assistance Commission (EAC) for VSTL status.

Page 2: MDSClear Ballot Security Test for State of Oregon …...2. SLI VSTL Quality System Manual, Revision v1.16, prepared by SLI, dated December 3rd, 2013 1.2 Terms and Abbreviations The

Clear Ballot ClearCount Security Testing for State of Oregon Test Report

Doc Rev 01 Confidential Page | 2

Revision History

Release Author Revisions

Rev 01 J. Peterson Initial Revision

Disclaimer

The test results reported herein must not be used by the client to claim product certification, approval, or endorsement by any agency of the Federal Government. Results herein relate only to the items tested.

Copyright 2014 SLI Global Solutions, Incorporated

Trademarks

• SLI is a registered trademark of SLI Global Solutions, Incorporated.

• All other products and company names are used for identification purposes only and may be trademarks of their respective owners.

The tests referenced in this document were performed in a controlled environment using specific systems and data sets, and results are related to the specific items tested. Actual results in other environments may vary.

Page 3: MDSClear Ballot Security Test for State of Oregon …...2. SLI VSTL Quality System Manual, Revision v1.16, prepared by SLI, dated December 3rd, 2013 1.2 Terms and Abbreviations The

Clear Ballot ClearCount Security Testing for State of Oregon Test Report

Doc Rev 01 Confidential Page | 3

TABLE OF CONTENTS

1 INTRODUCTION .................................................................................................................. 4

1.1 References ............................................................................................................................................. 4

1.2 Terms and Abbreviations ....................................................................................................................... 4

1.3 Document Overview ............................................................................................................................... 4

2 TEST BACKGROUND .......................................................................................................... 5

2.1 Source Code Security Review Testing .................................................................................................. 5

2.2 Documentation Testing .......................................................................................................................... 5

2.3 Functional Security Testing .................................................................................................................... 5

3 SYSTEM IDENTIFICATION .................................................................................................... 6

3.1 Configuration Tested .............................................................................................................................. 6

4 TESTING PERFORMED ........................................................................................................ 6

4.1 Security Provisions Tested ..................................................................................................................... 6

5 TEST RESULTS SUMMARY .................................................................................................. 8

5.1 Summary ................................................................................................................................................ 8

5.2 Deficiencies ............................................................................................................................................ 9

5.3 Conclusion .............................................................................................................................................. 9

6 RECOMMENDATIONS ........................................................................................................ 10

7 APPENDIX A –REQUIREMENTS ......................................................................................... 11

8 APPENDIX B - DIGESTS .................................................................................................... 25

Page 4: MDSClear Ballot Security Test for State of Oregon …...2. SLI VSTL Quality System Manual, Revision v1.16, prepared by SLI, dated December 3rd, 2013 1.2 Terms and Abbreviations The

Clear Ballot ClearCount Security Testing for State of Oregon Test Report

Doc Rev 01 Confidential Page | 4

1 Introduction

SLI Global Solutions is submitting this report as a summary of the testing efforts for the Clear Ballot "ClearCount" vote counting system. The purpose of this document is to provide an overview of the testing effort and the resultant findings for the system. The review and testing was performed at SLI’s Denver, Colorado facility.

1.1 References

1. FEC 2005 Voluntary Voting System Guidelines (VVSG) Volumes I and II. 2. SLI VSTL Quality System Manual, Revision v1.16, prepared by SLI, dated

December 3rd, 2013

1.2 Terms and Abbreviations

The following terms and abbreviations will be used throughout this document:

Table 1 – Terms and Abbreviations

Term Description

Test Deck A set of ballots that constitute one full cycle of voting of ballots that results in every ballot marking position having been marked in once.

Box A set of Test Decks run through a scanner and grouped together for accumulation.

1.3 Document Overview

This document contains:

• The Introduction, which discusses the application tested/reviewed

• The Test Background, which discusses the testing process

• The System Identification, which identifies hardware and software for the ClearCount system

• The Testing Performed section, which is a summary of the testing effort

• The Test Results summary section, which contains the final analysis of the testing effort

• The Recommendation section, which makes a final conclusion.

• Appendix A, which lists the prescribed requirements under review

• Appendix B, which contains software version and/or digests

Page 5: MDSClear Ballot Security Test for State of Oregon …...2. SLI VSTL Quality System Manual, Revision v1.16, prepared by SLI, dated December 3rd, 2013 1.2 Terms and Abbreviations The

Clear Ballot ClearCount Security Testing for State of Oregon Test Report

Doc Rev 01 Confidential Page | 5

2 Test Background

2.1 Source Code Security Review Testing

The security source code review testing performed for this project consisted of reviewing the code for vulnerabilities, malicious code and possible time bombs. No issues were discovered within the reviewed source code. This activity culminated in the performance of a Trusted Build, where SLI created the build environment and conducted the build process, resulting in installable items of the ClearCount system.

2.2 Documentation Testing

Clear Ballot provided a Technical Document Package with documentation that addressed security provisions of the ClearCount system. The documentation was reviewed to verify that all pertinent requirements were adequately addressed, as per the requirements listed in Append A.

2.3 Functional Security Testing

The Clear Ballot functional security testing comprised of the setup and configuration of the ClearCount™ tabulation system for the Validation of the VVSG requirements listed in APENDIX A these requirements include Access control of both the ScanStation and ScanServer devices, Physical Security Measures, Software security measures, Telecommunications and Data Transmissions security measures.

Testing covered all aspects of the system to ensure that the ClearCount system limits or detects access or modification to critical system components and to ensure that the system guards against the loss of Confidentiality, Integrity, availability and accountability.

Each role and user account defined in the Clear Ballot system was verified to be limited to only the prescribed roles. All attempts to access the system with unauthorized access attempts were sufficiently rebuffed. The access control policies and procedures also related to the COTS operating system software that were used for both the ScanStation and ScanServer hardware platforms.

Page 6: MDSClear Ballot Security Test for State of Oregon …...2. SLI VSTL Quality System Manual, Revision v1.16, prepared by SLI, dated December 3rd, 2013 1.2 Terms and Abbreviations The

Clear Ballot ClearCount Security Testing for State of Oregon Test Report

Doc Rev 01 Confidential Page | 6

The Physical security measure testing included Setup and review of System hardening requirements for identification of mitigation techniques for the safeguarding of physical connections including Networking components and required security considerations for the ScanServer Computer.

Software security of all devices used were tested for sufficient protection against Malicious software as well as validation of unsuccessful Unauthorized access to system BIOS functionality and for protection against unauthorized boot devices.

Telecommunications and Data Transmissions were tested for both auditing and Encryption standards, as well as the prevention of Wireless network broadcasts per the ClearCount Documentation. All the networking components are setup using isolated private LAN environments disabling the ability to use Wireless capabilities.

3 System Identification

The ClearCount system consisted of the following components:

• One ScanServer laptop

• One ScanStation laptop

• One Fujitsu fi-6140 optical scanner

3.1 Configuration Tested

A supported optical scanner was connected to a laptop containing ScanStation, which in turn was linked to a laptop containing ScanServer. All portions of the system were contained within a single room, connected by a local area network, as prescribed in Clear Ballot documentation.

4 Testing Performed

4.1 Security Provisions Tested

The roles listed below were created and tested to verify role delineation and limits.

Role Station Permitted Actions

Supervisor Election Admin • Oversees all ClearCount activity.

• Can do everything an Assistant

Page 7: MDSClear Ballot Security Test for State of Oregon …...2. SLI VSTL Quality System Manual, Revision v1.16, prepared by SLI, dated December 3rd, 2013 1.2 Terms and Abbreviations The

Clear Ballot ClearCount Security Testing for State of Oregon Test Report

Doc Rev 01 Confidential Page | 7

Supervisor can do.

• In addition, the Supervisor can create, delete, and modify ClearCount user accounts and may reset the passwords for those accounts.

Assistant Supervisor

Election Admin • Adds and deletes the election database.

• Selects which election is the activeelection.

• Changes an election database phase setting.

• Can do everything a Ballot Resolution Official can do.

Ballot Resolution Official

Election Admin or ScanStation

On Election Admin:

• Uses the BallotResolver application to modify election tabulation results of ballots that the system cannot automatically adjudicate, or for which the tabulation results are deemed incorrect.

• Cannot modify or delete any entry from any activity log.

• Can do everything an Election Reporter can do

On ScanStation:

• May delete boxes of ballots by running DeleteBox.

Election Reporter Election Admin • Records all activity surrounding opening, recording, and resealing sealed ballot boxes or bags

Public Relations Official

Election Admin • Pulls election reports from an election database, such as Statement of Votes Cast, and publishes the result.

Page 8: MDSClear Ballot Security Test for State of Oregon …...2. SLI VSTL Quality System Manual, Revision v1.16, prepared by SLI, dated December 3rd, 2013 1.2 Terms and Abbreviations The

Clear Ballot ClearCount Security Testing for State of Oregon Test Report

Doc Rev 01 Confidential Page | 8

Scan Operator ScanStation • Feeds batches of ballotsinto the scanner.

The Scanner Operator only has access to the ScanStation while it is running the Tabulator, which is always run using the “ScanStation” account. The Tabulator process is started by a more trusted official who does know the password.

Additionally, physical aspects of the system were inspected for adequate physical and/or procedural processes to protect the system.

5 Test Results Summary

5.1 Summary

The security testing of the ClearCount solution identified potential risks regarding use of cryptographic protocols used to ensure the traditional goals of confidentiality, integrity, and availability. Clear Ballot’s system does not employ encryption measures for the protection of data during the transmission between the ScanStation and the ScanServer devices.

To mitigate risks to the protection of data transmissions, Clear Ballot provides physical and process driven measures to minimize the risks mentioned above by requiring: 1) Physical containment of the ScanServer, as well as the router and networking equipment. 2) Disabling of wireless networking devices on ScanStation computers, 3) A closed wired network without external connectivity. 4) Each of the networking connections be protected by tamper evident security seals on the wired networking cords.

The ClearCount System doesn’t provide a validation mechanism such as digital signatures or file hashing algorithms to verify the integrity of all scanned ballot images prior to, or after electronic transmission, which, without rigorous process

Page 9: MDSClear Ballot Security Test for State of Oregon …...2. SLI VSTL Quality System Manual, Revision v1.16, prepared by SLI, dated December 3rd, 2013 1.2 Terms and Abbreviations The

Clear Ballot ClearCount Security Testing for State of Oregon Test Report

Doc Rev 01 Confidential Page | 9

controls, could compromise the integrity of cast votes when tallied from scanned ballot images.

To mitigate risks to the ballot images, Clear Ballot provides physical and process driven measures to minimize the risks mentioned above by requiring:

1) Requiring a restricted scanner operator account 2) Utilization of a Windows “white list” to prevent unauthorized software from

running, including image modification programs such as MSPaint. 3) Disable access to ScanStation computers by removing access to removable

storage devices such as USB or CD-ROM, to prevent addition or removal of ballot images for external modification.

These hardening requirements all work in conjunction to help mitigate the risk of ballot image manipulation. The hardening procedures described in the TDP document “ClearCount Election Preparation and Installation Guide” must be followed as described and in whole to obtain the tested level of mitigation to the threats outlined.

5.2 Deficiencies

During the Security testing effort 16 deficiencies were discovered including the concerns of encryption use between devices as well as the integrity validation of scanned ballot images. All of the 16 discrepancies have been successfully addressed by Clear Ballot. The resolutions include system hardening and mitigation paths that successfully mitigate encountered risks to a satisfactory level.

5.3 Conclusion

Based upon SLI’s examination of the security implementation of the ClearCount system, SLI concludes that the ClearCount system is able to successfully mitigate the security risks of the system using a combination of technology, programmatic and procedural protocols.

Page 10: MDSClear Ballot Security Test for State of Oregon …...2. SLI VSTL Quality System Manual, Revision v1.16, prepared by SLI, dated December 3rd, 2013 1.2 Terms and Abbreviations The

Clear Ballot ClearCount Security Testing for State of Oregon Test Report

Doc Rev 01 Confidential Page | 10

6 Recommendations

SLI has successfully completed the prescribed Security testing of the Clear Ballot "ClearCount" vote verification system, as per Appendix A - Requirements. It has been determined that the system meets the requirements. This recommendation reflects the opinion SLI Global Solutions, based on testing scope and results.

Traci Mapps

Senior Director of Operations

Page 11: MDSClear Ballot Security Test for State of Oregon …...2. SLI VSTL Quality System Manual, Revision v1.16, prepared by SLI, dated December 3rd, 2013 1.2 Terms and Abbreviations The

Clear Ballot ClearCount Security Testing for State of Oregon Test Report

Doc Rev 01 Confidential Page | 11

7 Appendix A –Requirements

The listed requirements are referenced from the 2005 VVSG and were utilized for analysis against the system under review.

• 2.1.1 Security System security is achieved through a combination of technical capabilities and sound administrative practices. To ensure security, all systems shall:

o Provide security access controls that limit or detect access to critical system components to guard against loss of system integrity, availability, confidentiality, and accountability

o b. Provide system functions that are executable only in the intended manner and order, and only under the intended conditions

o c. Use the system's control logic to prevent a system function from executing if any preconditions to the function have not been met d.

o d. Provide safeguards in response to system failure to protect against tampering during system repair or interventions in system operations

o e. Provide security provisions that are compatible with the procedures and administrative tasks involved in equipment preparation, testing, and operation

o f. Incorporate a means of implementing a capability if access to a system function is to be restricted or controlled

o g. Provide documentation of mandatory administrative procedures for effective system security

• 7.2.1 General Access Control Policy

The vendor shall specify the general features and capabilities of the access control policy recommended to provide effective voting system security. Although the jurisdiction in which the voting system is operated is responsible

for determining the access policies for each election, the vendor shall provide a

description of recommended policies for:

• a. Software access controls

• b. Hardware access controls

• c. Communications

• d. Effective password management

Page 12: MDSClear Ballot Security Test for State of Oregon …...2. SLI VSTL Quality System Manual, Revision v1.16, prepared by SLI, dated December 3rd, 2013 1.2 Terms and Abbreviations The

Clear Ballot ClearCount Security Testing for State of Oregon Test Report

Doc Rev 01 Confidential Page | 12

• e. Protection abilities of a particular operating system

• f. General characteristics of supervisory access privileges

• g. Segregation of duties

• h. Any additional relevant characteristics

• 7.2.1.1 Individual Access Privileges Voting system vendors shall:

o a. Identify each person to whom access is granted, and the specific functions and data to which each person holds authorized access

o b. Specify whether an individual’s authorization is limited to a specific time, time interval or phase of the voting or counting operations

o c. Permit the voter to cast a ballot expeditiously, but preclude voter access to all aspects of the vote counting processes

• 7.2.1.2 Access Control Measures Vendors shall provide a detailed description of all system access control measures designed to permit authorized access to the system and prevent unauthorized access. Examples of such measures include:

• a. Use of data and user authorization

• b. Program unit ownership and other regional boundaries

• c. One-end or two-end port protection devices

• d. Security kernels

• e. Computer-generated password keys

• f. Special protocols

• g. Message encryption

• h. Controlled access security Vendors also shall define and provide a detailed description of the methods used to prevent unauthorized access to the access control capabilities of the system itself.

• 7.3.2 Physical Security Measures-Central Count Location Security o Vendors shall develop and document in detail the measures to be

taken in a central counting environment. These measures shall include physical and procedural controls related to the handling of ballot boxes, preparing of ballots for counting, counting operations and reporting data.

• 7.4.1 Software Security-Software and Firmware Installation o The system shall meet the following requirements for installation of

software, including hardware with embedded firmware. o a. If software is resident in the system as firmware, the vendor shall

require and state in the system documentation that every device is to be retested to validate each ROM prior to the start of elections operations.

o b. To prevent alteration of executable code, no software shall be permanently installed or resident in the voting system unless the

Page 13: MDSClear Ballot Security Test for State of Oregon …...2. SLI VSTL Quality System Manual, Revision v1.16, prepared by SLI, dated December 3rd, 2013 1.2 Terms and Abbreviations The

Clear Ballot ClearCount Security Testing for State of Oregon Test Report

Doc Rev 01 Confidential Page | 13

system documentation states that the jurisdiction must provide a secure physical and procedural environment for the storage, handling, preparation, and transportation of the system hardware.

o c. The voting system bootstrap, monitor, and device-controller software may be resident permanently as firmware, provided that this firmware has been shown to be inaccessible to activation or control by any means other than by the authorized initiation and execution of the vote counting program, and its associated exception handlers.

o d. The election-specific programming may be installed and resident as firmware, provided that such firmware is installed on a component (such as a computer chip) other than the component on which the operating system resides.

o e. After initiation of election day testing, no source code or compilers or assemblers shall be resident or accessible.

• 7.4.2 Software Security-Protection Against Malicious Software o Voting systems shall deploy protection against the many forms of

threats to which they may be exposed such as file and macro viruses, worms, Trojan horses, and logic bombs. Vendors shall develop and document the procedures to be followed to ensure that such protection is maintained in a current status

• 7.4.3 Software Security-Software Distribution and Setup Validation Subsections 7.4.4, 7.4.5 and 7.4.6 specify requirements for the distribution of voting system software and the setup validation performed on voting system equipment. These requirements are applicable to voting systems that have completed certification testing. The goal of the software distribution requirements is to ensure that the correct voting system software has been distributed without modification. The goal of setup validation requirements, including requirements for verifying the presence of certified software and the absence of other software, is to ensure that voting system equipment is in a proper initial state before being used. In general, a voting system can be considered to be composed of multiple associated systems including polling place systems, central counting/aggregation systems, and election management systems. These other systems may reside on different computer platforms at different locations and run different software. Voting system software is considered to be all executable code and associated configuration files critical for the proper operation of the voting system regardless of the location of installation and functionality provided. This includes third party software such as operating systems, drivers, and database management systems.

• 7.4.4.a, Software Security-Software Distribution o a. The vendor shall document all software including voting system

software, third party software (such as operating systems and drivers)

Page 14: MDSClear Ballot Security Test for State of Oregon …...2. SLI VSTL Quality System Manual, Revision v1.16, prepared by SLI, dated December 3rd, 2013 1.2 Terms and Abbreviations The

Clear Ballot ClearCount Security Testing for State of Oregon Test Report

Doc Rev 01 Confidential Page | 14

to be installed on the certified voting system, and installation programs.

o i. The documentation shall have a unique identifier (such as a serial number or part number) for the following set of information: documentation, software vendor name, product name, version, the certification application number of the voting system, file names and paths or other location information (such as storage addresses) of the software.

o ii. The documentation shall designate all software files as static, semi-static or dynamic.

o Discussion: Static voting system software such as executable code does not change based on the election being conducted or the voting equipment upon which it is installed. Semi-static voting system software contains configuration information for the voting system based on the voting equipment that is installed and the election being conducted. Semi-static software is only modified during the installation of (a) the voting system software on voting equipment or (b) the election-specific software such as ballot formats. Dynamic voting system software changes over time once installed on voting equipment. However, the specific time or value of the change in the dynamic software is usually unknown in advance, making it impossible to create reference information to verify the software.

• 7.4.6 Software Security-Software Setup Validation o a. Setup validation methods shall verify that no unauthorized software

is present on the voting equipment. o b. The vendor shall have a process to verify that the correct software

is loaded, that there is no unauthorized software, and that voting system software on voting equipment has not been modified, using the reference information from the NSRL or from a State designated repository.

o i. The process used to verify software should be possible to perform without using software installed on the voting system.

o ii. The vendor shall document the process used to verify software on voting equipment.

o iii.The process shall not modify the voting system software on the voting system during the verification process.

o c. The vendor shall provide a method to comprehensively list all software files that are installed on voting systems.

o d. The verification process should be able to be performed using COTS software and hardware available from sources other than the voting system vendor.

Page 15: MDSClear Ballot Security Test for State of Oregon …...2. SLI VSTL Quality System Manual, Revision v1.16, prepared by SLI, dated December 3rd, 2013 1.2 Terms and Abbreviations The

Clear Ballot ClearCount Security Testing for State of Oregon Test Report

Doc Rev 01 Confidential Page | 15

o i. If the process uses hashes or digital signatures, then the verification software shall use a FIPS 140-2 level 1 or higher validated cryptographic module.

o ii. The verification process shall either (a) use reference information on unalterable storage media received from the repository or (b) verify the digital signature of the reference information on any other media.

o e. Voting system equipment shall provide a means to ensure that the system software can be verified through a trusted external interface, such as a read-only external interface, or by other means.

o i. The external interface shall be protected using tamper evident techniques

o ii. The external interface shall have a physical indicator showing when the interface is enabled and disabled

o iii.The external interface shall be disabled during voting o iv. The external interface should provide a direct read-only access to

the location of the voting system software without the use of installed software

o f. Setup validation methods shall verify that registers and variables of the voting system equipment contain the proper static and initial values.

o i. The vendor should provide a method to query the voting system to determine the values of all static and dynamic registers and variables including the values that jurisdictions are required to modify to conduct a specific election.

o ii. The vendor shall document the values of all static registers and variables, and the initial starting values of all dynamic registers and variables listed for voting system software, except for the values set to conduct a specific election.

• 7.5.1- Maintaining Data Integrity o Voting systems that use telecommunications to communicate between

system components and locations are subject to the same security requirements governing access to any other system hardware, software, and data function.

o a. Voting systems that use electrical or optical transmission of data shall ensure the receipt of valid vote records is verified at the receiving station. This should include standard transmission error detection and correction methods such as checksums or message digest hashes. Verification of correct transmission shall occur at the voting system application level and ensure that the correct data is recorded on all relevant components consolidated within the polling place prior to the voter completing casting of his or her ballot.

Page 16: MDSClear Ballot Security Test for State of Oregon …...2. SLI VSTL Quality System Manual, Revision v1.16, prepared by SLI, dated December 3rd, 2013 1.2 Terms and Abbreviations The

Clear Ballot ClearCount Security Testing for State of Oregon Test Report

Doc Rev 01 Confidential Page | 16

o b. Voting systems that use telecommunications to communicate between system components and locations before the polling place is officially closed shall:

o i. Implement an encryption standard currently documented and validated for use by an agency of the U.S. government

o ii. Provide a means to detect the presence of an intrusive process, such as an Intrusion Detection System

• 7.5.2 Protection Against External Threats o a. Voting systems that use public telecommunications networks shall

implement protections against external threats to which commercial products

used in the system may be susceptible.

o b. Voting systems that use public telecommunications networks shall provide

system documentation that clearly identifies all COTS hardware and software

products and communications services used in the development and/or

operation of the voting system, including operating systems, communications

routers, modem drivers and dial-up networking software.

o i. Such documentation shall identify the name, vendor, and version used for

each such component.

o c. Voting systems that use public telecommunications networks shall use

protective software at the receiving-end of all communications paths to:

o i. Detect the presence of a threat in a transmission

o ii. Remove the threat from infected files/data

o iii.Prevent against storage of the threat anywhere on the receiving device

o iv. Provide the capability to confirm that no threats are stored in system

memory and in connected storage media

o v. Provide data to the system audit log indicating the detection of a threat and

the processing performed

o d. Vendors shall use multiple forms of protective software as needed to

provide capabilities for the full range of products used by the voting system.

• 7.5.3 Monitoring and Responding to External Threats o Voting systems that use public telecommunications networks may

become vulnerable, by virtue of their system components, to external threats to the accuracy and integrity of vote recording, vote counting, and vote consolidation and reporting processes. Therefore, vendors of such systems shall document how they plan to monitor and respond to known threats to which their voting systems are vulnerable. This documentation shall provide a detailed description, including scheduling information, of the procedures the vendor will use to:

o a. Monitor threats, such as through the review of assessments, advisories, and alerts or COTS components issued by the Computer Emergency Response Team (CERT), for which a current listing can

Page 17: MDSClear Ballot Security Test for State of Oregon …...2. SLI VSTL Quality System Manual, Revision v1.16, prepared by SLI, dated December 3rd, 2013 1.2 Terms and Abbreviations The

Clear Ballot ClearCount Security Testing for State of Oregon Test Report

Doc Rev 01 Confidential Page | 17

be found at http://www.cert.org, the National Infrastructure Protection Center (NIPC), and the Federal Computer Incident response Capability (FedCIRC), for which additional information can be found at www.uscert. gov

o b. Evaluate the threats and, if any, proposed responses o c. Develop responsive updates to the system and/or corrective

procedures o d. Submit the proposed response to the test labs and appropriate

states for approval, identifying the exact changes and whether or not they are temporary or permanent

o e. After implementation of the proposed response is approved by the state, assist clients, either directly or through detailed written procedures, how to update their systems and/or to implement the corrective procedures within the timeframe established by the state

o f. Address threats emerging too late to correct the system by: o i. Providing prompt, emergency notification to the accredited test labs

and the affected states and user jurisdictions o ii. Assisting client jurisdictions directly or advising them through

detailed written procedures to disable the public telecommunications mode of the system

o iii.Modifying the system after the election to address the threat, submitting the modified system to an accredited test lab and the EAC or state certification authority for approval, and assisting client jurisdictions directly or advising them through detailed written procedures, to update their systems and/or to implement the corrective procedures after approval

• 7.5.4 Telecommunications and Data Transmission-Shared Operating Environment

o Ballot recording and vote counting can be performed in either a dedicated or non-dedicated environment. If ballot recording and vote counting operations are performed in an environment that is shared with other data processing functions, both hardware and software features shall be present to protect the integrity of vote counting and of vote data. Systems that use a shared operating environment shall:

o a. Use security procedures and logging records to control access to system functions

Page 18: MDSClear Ballot Security Test for State of Oregon …...2. SLI VSTL Quality System Manual, Revision v1.16, prepared by SLI, dated December 3rd, 2013 1.2 Terms and Abbreviations The

Clear Ballot ClearCount Security Testing for State of Oregon Test Report

Doc Rev 01 Confidential Page | 18

o b. Partition or compartmentalize voting system functions from other concurrent functions at least logically, and preferably physically as well

o c. Control system access by means of passwords, and restrict account access to necessary functions only

o d. Have capabilities in place to control the flow of information, precluding data leakage through shared system resources

• 7.6 Use of Public Communications Networks o Voting systems that transmit data over public telecommunications

networks face security risks that are not present in other voting systems. This section describes standards applicable to voting systems that use public telecommunications networks.

• 7.6.1 Data Transmission o All systems that transmit data over public telecommunications

networks shall: o a. Preserve the secrecy of voter ballot selections and prevent anyone

from violating ballot privacy o b.Employ digital signatures for all communications between the vote

server and other devices that communicate with the server over the network

o c. Require that at least two authorized election officials activate any critical operation regarding the processing of ballots transmitted over a public communications network, i.e. the passwords or cryptographic keys of at least two employees are required to perform processing of votes

• 7.6.2 Casting Individual Ballots o Systems designed for transmission of telecommunications over public

networks shall meet security standards that address the security risks attendant with the casting of ballots from polling places controlled by election officials using voting devices configured and installed by election officials and/or their vendor or contractor, and using in-person authentication of individual voters.

• 7.6.2.1 Documentation of Mandatory Security Activities

o Vendors of voting systems that cast individual ballots over a public telecommunications network shall provide detailed descriptions of:

o a. All activities mandatory to ensuring effective voting system security to be performed in setting up the system for operation, including testing of security before an election

o b. All activities that should be prohibited during voting equipment setup and during the timeframe for voting operations, including both the hours when polls are open and when polls are closed

• 7.6.2.2 Ability to Operate During Interruption of Service

Page 19: MDSClear Ballot Security Test for State of Oregon …...2. SLI VSTL Quality System Manual, Revision v1.16, prepared by SLI, dated December 3rd, 2013 1.2 Terms and Abbreviations The

Clear Ballot ClearCount Security Testing for State of Oregon Test Report

Doc Rev 01 Confidential Page | 19

These systems shall provide the following capabilities to provide resistance to interruptions of telecommunications service that prevent voting devices at the polling place from communicating with external components via telecommunications:

o a. Detect the occurrence of a telecommunications interruption at the polling place and switch to an alternative mode of operation that is not dependent on the connection between polling place voting devices and external system components

o b. Provide an alternate mode of operation that includes the functionality of a conventional electronic voting system without losing any single vote

o c. Create and preserve an audit trail of every vote cast during the period of interrupted communication and system operation in conventional electronic voting system mode

o d. Upon reestablishment of communications, transmit and process votes accumulated while operating in conventional electronic voting system mode with all security safeguards in effect

o e. Ensure that all safeguards related to voter identification and authentication are not affected by the procedures employed by the system to counteract potential interruptions of telecommunications capabilities

• 7.7 Wireless Communications

This section provides requirements for implementing and using wireless communications within a voting system. These requirements reduce, but do not eliminate, the risk of using wireless communications for voting systems.

Wireless is defined as any means of communications that occurs without wires. This normally covers the entire electromagnetic spectrum. For the purposes of this section, wireless includes radio frequency, infrared, and microwave. This section provides requirements and considerations that apply to external wireless communications capabilities existing on voting equipment or as a component within a voting system. These requirements may be applied to internal wireless communications, but this is not required when the physical container that houses the voting equipment or voting system is considered adequate to protect the internal wireless between or among voting system components.

Since the wireless communications path on which the signals travel is via the air and not a wire or cable, devices other than those intended to receive the wireless signal e.g. voting data) can receive (intentionally and unintentionally) the wireless signals. Some of the wireless communications paths (i.e. signals) are weakened by walls and distance, but are not stopped. This makes it possible to eavesdrop from a distance as well as transmit wireless signals (e.g., interference or intrusive data) from a distance. In many cases, the wireless signals cannot be seen, heard, or felt, thus making the presence of wireless

Page 20: MDSClear Ballot Security Test for State of Oregon …...2. SLI VSTL Quality System Manual, Revision v1.16, prepared by SLI, dated December 3rd, 2013 1.2 Terms and Abbreviations The

Clear Ballot ClearCount Security Testing for State of Oregon Test Report

Doc Rev 01 Confidential Page | 20

communication hard to determine by the human senses. The requirements in this section mitigate the risks associated with wireless by controlling and identifying usage, and protecting the transmitted data and path.

There are other concerns when evaluating wireless usage; specifically radio frequency (RF). A device’s radio frequencies usage and the power output are governed by Federal Communications Commission (FCC) regulations and therefore all RF wireless communications devices are subject to the applicable FCC requirements. however, these FCC regulations do not fully address RF wireless interference caused by multiple FCC compliant devices. That is, the RF wireless used in a voting system may be using the same radio frequency as another non-voting wireless system and which may potentially cause a degradation of the wireless performance or a complete wireless failure for the voting system.

Sometimes a particular wireless technology permits a power output range, which may be used to overcome interference received from another device. A radio emissions site test can determine the extent of potential existing interference at the location where the wireless voting system is to be used. A radio emission site test can also determine the extent that the RF wireless transmission of the voting system escapes the building in which the RF wireless voting system is used.

o 7.7.1 Controlling Usage

o If wireless communications are used in a voting system, then the vendor shall supply documentation describing how to use all aspects of wireless communications in a secure manner. This documentation shall include:

o i. A complete description of the uses of wireless in the voting system including descriptions of the data elements and signals that are to be carried by the wireless mechanism

o ii. A complete description of the vulnerabilities associated with this proposed use of wireless, including vulnerabilities deriving from the insertion, deletion, modification, capture or suppression of wireless messages

o iii. A complete description of the techniques used to mitigate the risks associated with the described vulnerabilities including techniques used by the vendor to ensure that wireless cannot send or receive messages other than those situations specified in the documentation. Cryptographic techniques shall be carefully and fully described, including a description of cryptographic key generation, management, use, certification, and destruction

Page 21: MDSClear Ballot Security Test for State of Oregon …...2. SLI VSTL Quality System Manual, Revision v1.16, prepared by SLI, dated December 3rd, 2013 1.2 Terms and Abbreviations The

Clear Ballot ClearCount Security Testing for State of Oregon Test Report

Doc Rev 01 Confidential Page | 21

o iv. A rationale for the inclusion of wireless in the proposed voting system, based on a careful and complete description of the perceived advantages and disadvantages of using wireless for the documented uses compared to using non-wireless approaches

o Discussion: In general, convenience is not a sufficiently compelling reason, on its own, to justify the inclusion of wireless communications in a voting system. Convenience must be balanced against the difficulty of working with cryptographic keys.

o b. The details of all cryptographic protocols used for wireless communications, including the specific features and data, shall be documented.

o c. The wireless documentation shall be closely reviewed for accuracy, completeness, and correctness.

o d. There shall be no undocumented use of the wireless capability, nor any use of the wireless capability that is not entirely controlled by an election official.

o Discussion: This can be tested by reviewing all of the software, hardware, and documentation, and by testing the status of wireless activity during all phases of testing.

o e. If a voting system includes wireless capabilities, then the voting system shall be able to accomplish the same function if wireless capabilities are not available due to an error or no service.

o i. The vendor shall provide documentation how to accomplish these functions when wireless is not available.

o f. The system shall be designed and configured so it is not vulnerable to a single point of failure using wireless communications that causes a total loss of any voting capabilities.

o g. If a voting system includes wireless capabilities, then the system shall have the ability to turn on the wireless capability when it is to be used and to turn off the wireless capability when the wireless capability is not in use.

o h. If a voting system includes wireless capabilities, then the system shall not activate the

o wireless capabilities without confirmation from an elections official.

o 7.7.2 Identifying Usage

Page 22: MDSClear Ballot Security Test for State of Oregon …...2. SLI VSTL Quality System Manual, Revision v1.16, prepared by SLI, dated December 3rd, 2013 1.2 Terms and Abbreviations The

Clear Ballot ClearCount Security Testing for State of Oregon Test Report

Doc Rev 01 Confidential Page | 22

o Since there are a wide variety of wireless technologies (both standard and proprietary) and differing physical properties of wireless signals, it is important to identify some of the characteristics of the wireless technologies used in the voting system.

o a. If a voting system provides wireless communications capabilities, then there shall be a method for determining the existence of the wireless communications capabilities.

o b. If a voting system provides wireless communications capabilities, then there shall be an indication that allows one to determine when the wireless communications (such as radio frequencies) capability is active.

o c. The indication shall be visual.

o d. If a voting system provides wireless communications capabilities, then the type of wireless communications used (such as radio frequencies) shall be identified either via a label or via the voting system documentation.

7.7.3 Protecting Transmitted Data

The transmitted data, especially via wireless communications, needs to be protected to ensure confidentiality and integrity. Examples of election information that needs to be protected include: ballot definitions, voting device counts, precinct counts, opening of poll signal, and closing of poll signal. Examples of other information that needs to be protected include: protocol messages, address or device identification information, and passwords. Since radio frequency wireless signals radiate in all directions and pass through most construction material, anyone may easily receive the wireless signals. In contrast, infrared signals are line of sight and do not pass through most construction material. However, infrared signals can still be received by other devices that are in the line of sight. Similarly, wireless signals can be transmitted by others to create unwanted signals. Thus, encryption is required to protect the privacy and confidentiality of the voting information.

o a. All information transmitted via wireless communications shall be encrypted and authenticated--with the exception of wireless T-coil coupling--to protect against eavesdropping and data manipulation including modification, insertion, and deletion.

o i. The encryption shall be as defined in Federal Information Processing Standards (FIPS) 197, “Advanced Encryption Standard (AES).”

o The cryptographic modules used shall comply with FIPS 140-2, Security Requirements for Cryptographic Modules.

o b. The capability to transmit non-encrypted and non-authenticated information via wireless communications shall not exist.

Page 23: MDSClear Ballot Security Test for State of Oregon …...2. SLI VSTL Quality System Manual, Revision v1.16, prepared by SLI, dated December 3rd, 2013 1.2 Terms and Abbreviations The

Clear Ballot ClearCount Security Testing for State of Oregon Test Report

Doc Rev 01 Confidential Page | 23

o c. If audible wireless communication is used, and the receiver of the wireless transmission is the human ear, then the information shall not be encrypted.

o Discussion: This specifically covers wireless T-Coil coupling for assistive devices used by people who are hard of hearing.

7.7.4 Protecting the Wireless Path

If wireless communications are used, then the following capabilities shall exist in order to mitigate the effects of a denial of service (DoS) attack:

o a. The voting system shall be able to function properly throughout a DoS attack, since the DoS attack may continue throughout the voting period.

o b. The voting system shall function properly as if the wireless capability were never available for use. c. Alternative procedures or capabilities shall exist to accomplish the same functions that the wireless communications capability would have done.

o c. If infrared is being used, the shielding shall be strong enough to prevent escape of the voting system signal, as well as strong enough to prevent infrared saturation jamming.

o Discussion: Since infrared has the line-of-sight property, securing the wireless path can be accomplished by shielding the path between the communicating devices with an opaque enclosure. However, this is only practical for short distances. This shielding would also help prevent accidental eye damage from the infrared signal.

7.7.5 Protecting the Voting System

Physical security measures to prevent access to a voting system are not possible when using a wireless communications interface because there is no discrete physical communications path that can be secured.

o a. The security requirements in Subsection 2.1.1 shall be applicable to systems with wireless communications.

o b. The accuracy requirements in Subsection 2.1.2 shall be applicable to systems with wireless communications.

o c. The use of wireless communications that may cause impact to the system accuracy through electromagnetic stresses is prohibited.

o d. The error recovery requirements in Subsection 2.1.3 shall be applicable to systems with wireless communications.

o e. All wireless communications actions shall be logged.

Page 24: MDSClear Ballot Security Test for State of Oregon …...2. SLI VSTL Quality System Manual, Revision v1.16, prepared by SLI, dated December 3rd, 2013 1.2 Terms and Abbreviations The

Clear Ballot ClearCount Security Testing for State of Oregon Test Report

Doc Rev 01 Confidential Page | 24

o i. The log shall contain at least the following entries: times when the wireless is activated and deactivated, services accessed, identification of device to which data was transmitted to or received from, identification of authorized user, and successful and unsuccessful attempts to access wireless communications or service.

o Discussion: Other information such as the number of frames or packets transmitted or received at various logical layers may be useful, but is dependent on the wireless technology used.

o f. Device authentication shall occur before any access to, or services from, the voting system are granted through wireless communications.

o Discussion: Authentication is an important element to protect the security of wireless communications. Authentication verifies the identity and legitimacy of users, devices, and services.

o i. User authentication shall be at least level 2 as per NIST Special Publication 800-63 Version 1.0.1, Electronic Authentication Guideline.

Page 25: MDSClear Ballot Security Test for State of Oregon …...2. SLI VSTL Quality System Manual, Revision v1.16, prepared by SLI, dated December 3rd, 2013 1.2 Terms and Abbreviations The

Clear Ballot ClearCount Security Testing for State of Oregon Test Report

Doc Rev 01 Confidential Page | 25

8 Appendix B - Digests

The following tables list pertinent files and versions, or digests.

COTS files found on ScanStation

Scanner Version

ScandAll Pro 2.0.12

Fujitsu fi-6140z 12.0.0.49974

Files found on ScanServer

File Digest (SHA-256)

/usr/share/cbg/web/BallotMonitor 038261d22f411ea689e0970927f4f724b219ec782f076d9224bb0edb1e887c89

/usr/share/cbg/web/BallotBackground 25800a51920287e58a825a4b367625b246a0a8c2ac9d8995b1aedb5201640d61

/usr/share/cbg/web/webCBG.fcgi 1b7b1c2445470468c259f508a4ab980a4d33b19a9e5c2393a478e7173a181040

/usr/share/cbg/client/SetupScanner.exe 69ca39138dd13be44708a3e510bd91147e73f3e931870537dff57c62b05a229a

/usr/share/cbg/client/GetScannerInfo.exe 54ca35278df89c7b76424b723569ba170486f310aeca9399be1ab18069c1ef6f

/usr/share/cbg/client/BallotDeleteBox.exe 71181708f086c4fdfd8be0f0a58b27b25736fe6c3a8a4abd7617df7f41f94dbd

/usr/share/cbg/client/BallotTabulator.exe a31c2051d1005ce66ed587f2fdb6d4bc607c01ae7200647bcd90037dd434c985

/usr/share/cbg/web/media/js/jquery.dataTables.five_button.js 268b504d01631f7b1861e719850861d6dca6c8b1f391029e40110efa17834519

/usr/share/cbg/web/media/js/jquery.dataTables.customizations.js 787e1016470b4d5b4bf57bf16d5737740a56abd99bb54b8aa9532f281b2b6272

/usr/share/cbg/web/media/js/ballot_remaking.js 0aa1e22e3ac59e5fe89c64453662612aec62b54b3d1721c4c553508952b7b1cf

/usr/share/cbg/client/StartTabulator.cmd 224842e2e18b31bbd3fc9ee15de6d94e7e5770de8235bb5fd52298624746f856

Page 26: MDSClear Ballot Security Test for State of Oregon …...2. SLI VSTL Quality System Manual, Revision v1.16, prepared by SLI, dated December 3rd, 2013 1.2 Terms and Abbreviations The

Clear Ballot ClearCount Security Testing for State of Oregon Test Report

Doc Rev 01 Confidential Page | 26

/usr/share/cbg/client/Update5950.bat ce37f091c73b4506c33c78d0008657c97241b834e15ed11162f7302277d40747

/usr/share/cbg/client/Update6140.bat f8f254058560962acd7d06f90752a27f4fcbc8d98ebd729f80247032ef2d1069

/usr/share/cbg/client/Update7180.bat 635ac41e5f71eeeca60cbc9cb29d630bfe166fe20c16558f5f735200d675e641

/usr/share/cbg/client/Update6800-18-22.bat 69fa91540d2e7276df29634ac89605cb5528286a79347b8c3cc3e0b3efc36264

/usr/share/cbg/client/Update6670.bat 6f42cc4fc8a6c423e7467826ad42d727f28c2b36eee9f46072a25dcc7038a96a

/usr/share/cbg/client/Update6800.bat b8ce5db24c16efd92e1ac4254606684a36d5b766f75b9288488a6e73ab77b02f

/usr/share/cbg/client/fi5950/CBG fi5950 Profile.dsi de8a88c66d8c068ada1f246639364f1bf8ee9acfcc1a40dfbc1576e9f5f57497

/usr/share/cbg/client/fi5950/CBG fi5950 Profile.ini 2ecb19814a804638a5f3e44dc6eb3f7f02c3eb12e97b332eab38ac52b1dc4efe

/usr/share/cbg/client/DeleteBox.bat b68da4bda0e2f4e5487cf24e343279f0156ed0a8a00f35337e8dbbe064511d7a

/usr/share/cbg/client/fi7180/CBG fi-7180 Profile.ini e52b388bfc658b872f4867bcfa6ff5baf224bd64a7764c395ccfe6d28b504441

/usr/share/cbg/client/fi7180/CBG fi-7180 Profile.dsi 81732f497a09f5be1bf784b2e3aedd201f1e4f43d6365c638706a0045e4edb42

/usr/share/cbg/web/media/css/ballot_remaking.css 8d600f669129196d4c0c79a451c42361b4df5ae52cf31e548589355f4a69df5d

/usr/share/cbg/web/sql/cbgweb.sql ada31bb2d377e360555c420f9913a17658293d8eb413b4b1dc4fe2bda9be2a8a

/usr/share/cbg/web/media/js/jquery.pep.min.js 4854650bea111ef9ed7931f6a8ff8614fe878aebd815cf8e6b6d22e7c95f4715

/usr/share/cbg/web/media/css/style.css ba7738df4115d3c4f3d6194bd25a5b3b1a9fea4e99df017ce072faddea527f76

/usr/share/cbg/client/fi6800/CBG fi6800 18-22 Profile.dsi e305689f291b3e9140d9221d588a47c006f644fe3381f892a916337123311e25

/usr/share/cbg/client/fi6800/CBG fi6800 Profile.dsi 293186f7a113221ecad5ef32e38f9c10d029d161a76754ce42a831081b7f1b62

/usr/share/cbg/web/media/img/ballot_remaking.png a4def66462c12ea160e1c67fda67e5cd486c1c5f1450e8c2f2ed60bffa06f1d7

Page 27: MDSClear Ballot Security Test for State of Oregon …...2. SLI VSTL Quality System Manual, Revision v1.16, prepared by SLI, dated December 3rd, 2013 1.2 Terms and Abbreviations The

Clear Ballot ClearCount Security Testing for State of Oregon Test Report

Doc Rev 01 Confidential Page | 27

End of Report


Recommended