genuscreen 4.0

CSV information ?

Status archived
Valid from 29.10.2014
Valid until 30.10.2019
Scheme 🇩🇪 DE
Manufacturer GeNUA mbH
Category Boundary Protection Devices and Systems
Security level EAL4+, AVA_VAN.4, ASE_TSS.2, ALC_FLR.2

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-0823-2014

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, HMAC
Asymmetric Algorithms
DH
Hash functions
SHA1, SHA256, SHA512
Schemes
Key Exchange
Protocols
SSH, IKE, IPsec, VPN
Randomness
RNG
Block cipher modes
CBC

Security level
EAL 4, EAL 5, EAL 1, EAL 2, EAL 5+, EAL 6, EAL 3, EAL 7, EAL 4 augmented, ITSEC Evaluation
Claims
A.PHYSEC, A.INIT, A.NOEVIL, A.SINGEN, A.ADMIN, A.RANDOM, A.HANET, A.TIMESTMP, OE.PHYSEC, OE.INIT, OE.NOEVIL, OE.SINGEN, OE.TIMESTMP, OE.ADMIN, OE.RANDOM, OE.HANET
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.5, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_FLR.2, ALC_FLR, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_DVS.2, ALC_FLR.1, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV.1, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.2, ATE_DPT.3, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.4, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.5, AVA_VAN, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_TSS.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSS
Certificates
BSI-DSZ-CC-0823-2014, BSI-DSZ-CC-0565-2009, BSI-DSZ-CC-0823
Evaluation facilities
secuvera
Certification process
out of scope, The genucenter must be operated on real hardware. Running the genucenter in a virtual machine is out of scope for this TOE. The Security Target [6] is the basis for this certification. It is not based on a, or Mobile Clients, L2TP VPN, LDAP Authentication, Dynamic Routing, and virtual genucenter are out of scope of the evaluated configuration. In general, all information contained in the Security Target [6, Evaluation Technical Report BSI-DSZ-CC-0823 for genuscreen 4.0 from genua mbH of secuvera GmbH (confidential document) [8] Guidance documentation for the TOE, genucenter Installations- und Konfigurationshandbuch

Certification process
out of scope, The genucenter must be operated on real hardware. Running the genucenter in a virtual machine is out of scope for this TOE. The Security Target [6] is the basis for this certification. It is not based on a, or Mobile Clients, L2TP VPN, LDAP Authentication, Dynamic Routing, and virtual genucenter are out of scope of the evaluated configuration. In general, all information contained in the Security Target [6, Evaluation Technical Report BSI-DSZ-CC-0823 for genuscreen 4.0 from genua mbH of secuvera GmbH (confidential document) [8] Guidance documentation for the TOE, genucenter Installations- und Konfigurationshandbuch

Standards
AIS 32, AIS 34, AIS 38, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065
Technical reports
BSI TR-02102, BSI 7138, BSI 7125, BSI 7148

File metadata

Title: Certification Report BSI-DSZ-CC-xxxx-200x
Keywords: Common Criteria, Certification, Zertifizierung,
Author: BSI
Creation date: D:20141104142730+01'00'
Modification date: D:20141104150218+01'00'
Pages: 36
Creator: Writer
Producer: LibreOffice 4.2

Frontpage

Certificate ID: BSI-DSZ-CC-0823-2014
Certified item: genuscreen 4.0
Certification lab: BSI
Developer: genua mbh

References

Outgoing Incoming

Security target ?

Extracted keywords

Symmetric Algorithms
AES, HMAC
Asymmetric Algorithms
ECDH, Diffie-Hellman, DH
Hash functions
SHA1, SHA-256, SHA256
Schemes
Key Exchange, Key Agreement
Protocols
SSH, IKE, IKEv1, IPsec, VPN
Elliptic Curves
secp256r1
Block cipher modes
CBC, CTR

Security level
EAL4, EAL4 augmented
Claims
O.AUTH, O.MEDIAT, O.CONFID, O.INTEG, O.NOREPLAY, O.AUDREC, O.RS, O.AVAIL, T.NOAUTH, T.SNIFF, T.SELPRO, T.MEDIAT, T.MSNIFF, T.MODIFY, T.MMODIFY, A.PHYSEC, A.INIT, A.NOEVIL, A.SINGEN, A.TIMESTMP, A.ADMIN, A.RANDOM, A.HANET, OE.PHYSEC, OE.INIT, OE.NOEVIL, OE.SINGEN, OE.TIMESTMP, OE.ADMIN, OE.RANDOM, OE.HANET
Security Assurance Requirements (SAR)
ADV_INT, ADV_SPM, ADV_ARC, ADV_FSP, ADV_IMP, ADV_TDS, ADV_ARC.1, ADV_TDS.1, ADV_FSP.4, ADV_IMP.1, ADV_TAT.1, ADV_TDS.3, ADV_FSP.1, ADV_FSP.2, ADV_TDS.2, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ALC_CMC.4, ALC_DVS.1, ALC_LCD.1, ALC_CMS.4, ALC_DEL.1, ALC_TAT.1, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, ATE_COV.2, ATE_FUN.1, ATE_DPT.1, ATE_IND.2, ATE_COV.1, AVA_VAN.4, AVA_VAN, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_REQ.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1
Security Functional Requirements (SFR)
FAU_GEN, FAU_SAR, FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_SAR.3, FCS_COP, FCS_CKM, FCS_COP.1, FCS_CKM.4, FCS_CKM.1, FDP_IFC, FDP_IFF, FDP_ITT, FDP_IFC.1, FDP_IFF.1, FDP_ITT.1, FIA_ATD, FIA_SOS, FIA_UAU, FIA_UID, FIA_ATD.1, FIA_SOS.1, FIA_UAU.2, FIA_UAU.6, FIA_UID.2, FIA_UID.1, FMT_MSA, FMT_SMF, FMT_MOF, FMT_SMR, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1, FMT_IFC.2, FMT_MSA.2, FMT_MOF.1, FMT_SMR.1, FPT_ITT, FPT_TEE, FPT_TRC, FPT_STM.1, FPT_ITT.1, FPT_TEE.1, FPT_TRC.1.1, FPT_TRC.1.2, FPT_TRC.1, FTP_STM.1
Certification process
out of scope, to perform cryptographic operations for IPsec operations. However, usage of the cryptocard is out of scope for this TOE. 1.4.8.2 No USB update The management system genucenter can write configuration, when the USB stick is plug into the firewall component. However, usage of the USB update is out of scope for this TOE. 1.4.8.3 No FTP and SIP Relays The product allows the configuration of FTP and SIP, 1.4.8.7 Dynamic Routing The dynamic routing feature which uses OSPF only works with IPv4 and is out of scope for this TOE. 1.4.8.8 No virtual genucenter The genucenter must be operated on real hardware, the genucenter in a virtual machine is out of scope for this TOE. 1.4.9 Physical Scope The physical scope of TOE consists only of software and

Certification process
out of scope, to perform cryptographic operations for IPsec operations. However, usage of the cryptocard is out of scope for this TOE. 1.4.8.2 No USB update The management system genucenter can write configuration, when the USB stick is plug into the firewall component. However, usage of the USB update is out of scope for this TOE. 1.4.8.3 No FTP and SIP Relays The product allows the configuration of FTP and SIP, 1.4.8.7 Dynamic Routing The dynamic routing feature which uses OSPF only works with IPv4 and is out of scope for this TOE. 1.4.8.8 No virtual genucenter The genucenter must be operated on real hardware, the genucenter in a virtual machine is out of scope for this TOE. 1.4.9 Physical Scope The physical scope of TOE consists only of software and

Standards
FIPS180-4, PKCS#1, PKCS #1, AIS31, AIS20, RFC2409, RFC3526, RFC2104, RFC5656, RFC4418, RFC2460, RFC4253, RFC3502, RFC4301, RFC4432, RFC4344, RFC2617, RFC2965, RFC3602

File metadata

Title: genucreen 4.0 Security Target
Subject: Common Criteria
Keywords: CC 3.1
Author: Roland Meister
Creation date: D:20141023133113+02'00'
Pages: 72
Creator: Writer
Producer: LibreOffice 4.1

References

Outgoing
Incoming

Heuristics ?

Certificate ID: BSI-DSZ-CC-0823-2014

Extracted SARs

ALC_FLR.2, ALC_DVS.1, AGD_PRE.1, ADV_INT.3, APE_REQ.2, ASE_TSS.2, ASE_REQ.2, ASE_OBJ.2, AGD_OPE.1, AVA_VAN.4, ALC_CMC.4, ASE_CCL.1, ASE_INT.1, APE_CCL.1, ALC_DEL.1, ASE_ECD.1, ALC_LCD.1, ALC_TAT.1, ATE_FUN.1, ATE_DPT.1, APE_SPD.1, ADV_FSP.4, ADV_TDS.3, APE_OBJ.2, APE_ECD.1, ADV_SPM.1, ASE_SPD.1, ALC_CMS.4, ATE_COV.2, ATE_IND.2, ADV_IMP.1, ADV_ARC.1, ADV_TAT.1, APE_INT.1

References ?

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '7fc9248455d62d11fb9901031c9ff9f9be737e9112bbe7d8f3579501d9d3a9af', 'txt_hash': '5756149b9b9ee8f3f7c0eecc7022cdf85426c3879d8b9060f73ac92521eaa336'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '26f55b1ce78ef986dbe6a8612f94127cba1c682cd1d44e6990b485df4cd1a38f', 'txt_hash': 'e6abf0978b2265c537005f4323765dcbf6974258b72478d0fb6d8b49c8eca446'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': None, 'cert_frontpage': None, 'cert_keywords': None, 'cert_filename': None}.
    • The report_frontpage property was set to {'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0823-2014', 'cert_item': 'genuscreen 4.0', 'developer': 'genua mbh', 'cert_lab': 'BSI', 'ref_protection_profiles': 'None', 'cc_version': 'Product specific Security Target Common Criteria Part 2 extended', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.2, ASE_TSS.2, AVA_VAN.4 SOGIS Recognition Agreement for components up to EAL 4'}}.
    • The st_frontpage property was set to None.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-0823': 1}, '__update__': {'BSI-DSZ-CC-0823-2014': 18, 'BSI-DSZ-CC-0565-2009': 3}}}}} data.
  • 13.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0823-2014': 36, 'BSI-DSZ-CC-0565-2009': 6}, '__delete__': ['BSI-DSZ-CC-0823']}}}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__delete__': ['CA']}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'CA': {'1 1 1': 18, '1 2 3': 5, '5 5 6': 1, '1 1 2': 1, '2 3 3': 1, '4 5 5': 2, '5 5 5': 1, '1 2 2': 5, '2 2 2': 2, '1 1 3': 1, '2 2 3': 1}}, '__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-0823': 1}, '__update__': {'BSI-DSZ-CC-0823-2014': 18, 'BSI-DSZ-CC-0565-2009': 3}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'CA': {'31 4 23': 1, '61 6 23': 1}}} data.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': None}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 09.02.2023 The certificate data changed.
    Certificate changed

    The Status was updated.

    • The new value is archived.

    The Valid until date was updated.

    • The new value is 2019-10-30.
  • 26.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report_download_ok property was set to True.
    • The report_convert_ok property was set to True.
    • The report_extract_ok property was set to True.
    • The errors property was set to [].
    • The report_pdf_hash property was set to 7fc9248455d62d11fb9901031c9ff9f9be737e9112bbe7d8f3579501d9d3a9af.
    • The report_txt_hash property was set to 5756149b9b9ee8f3f7c0eecc7022cdf85426c3879d8b9060f73ac92521eaa336.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 1116569, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 36, '/Author': 'BSI', '/CreationDate': "D:20141104142730+01'00'", '/Creator': 'Writer', '/Keywords': 'Common Criteria, Certification, Zertifizierung, ', '/ModDate': "D:20141104150218+01'00'", '/Producer': 'LibreOffice 4.2', '/Title': 'Certification Report BSI-DSZ-CC-xxxx-200x', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/zertifizierung', 'http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/']}}.
    • The report_frontpage property was set to {'anssi': {}, 'bsi': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0823-2014', 'cert_item': 'genuscreen 4.0', 'developer': 'genua mbh', 'cert_lab': 'BSI', 'ref_protection_profiles': 'None', 'cc_version': 'Product specific Security Target Common Criteria Part 2 extended', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.2, ASE_TSS.2, AVA_VAN.4 SOGIS Recognition Agreement for components up to EAL 4'}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0823-2014': 36, 'BSI-DSZ-CC-0565-2009': 6}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 17, 'EAL 5': 9, 'EAL 1': 7, 'EAL 2': 4, 'EAL 5+': 1, 'EAL 6': 4, 'EAL 3': 4, 'EAL 7': 4, 'EAL 4 augmented': 3}, 'ITSEC': {'ITSEC Evaluation': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.1': 1, 'ADV_FSP.2': 1, 'ADV_FSP.3': 1, 'ADV_FSP.4': 1, 'ADV_FSP.5': 1, 'ADV_FSP.6': 1, 'ADV_IMP.1': 1, 'ADV_IMP.2': 1, 'ADV_INT.1': 1, 'ADV_INT.2': 1, 'ADV_INT.3': 1, 'ADV_SPM.1': 1, 'ADV_TDS.1': 1, 'ADV_TDS.2': 1, 'ADV_TDS.3': 1, 'ADV_TDS.4': 1, 'ADV_TDS.5': 1, 'ADV_TDS.6': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_FLR.2': 6, 'ALC_FLR': 3, 'ALC_CMC.1': 1, 'ALC_CMC.2': 1, 'ALC_CMC.3': 1, 'ALC_CMC.4': 1, 'ALC_CMC.5': 1, 'ALC_CMS.1': 1, 'ALC_CMS.2': 1, 'ALC_CMS.3': 1, 'ALC_CMS.4': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_DVS.2': 1, 'ALC_FLR.1': 1, 'ALC_FLR.3': 1, 'ALC_LCD.1': 1, 'ALC_LCD.2': 1, 'ALC_TAT.1': 1, 'ALC_TAT.2': 1, 'ALC_TAT.3': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_COV.2': 1, 'ATE_COV.3': 1, 'ATE_DPT.1': 1, 'ATE_DPT.2': 1, 'ATE_DPT.3': 1, 'ATE_DPT.4': 1, 'ATE_FUN.1': 1, 'ATE_FUN.2': 1, 'ATE_IND.1': 1, 'ATE_IND.2': 1, 'ATE_IND.3': 1, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.4': 7, 'AVA_VAN.1': 1, 'AVA_VAN.2': 1, 'AVA_VAN.3': 1, 'AVA_VAN.5': 1, 'AVA_VAN': 2}, 'APE': {'APE_INT.1': 1, 'APE_CCL.1': 1, 'APE_SPD.1': 1, 'APE_OBJ.1': 1, 'APE_OBJ.2': 1, 'APE_ECD.1': 1, 'APE_REQ.1': 1, 'APE_REQ.2': 1}, 'ASE': {'ASE_TSS.2': 7, 'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {'A': {'A.PHYSEC': 4, 'A.INIT': 3, 'A.NOEVIL': 3, 'A.SINGEN': 3, 'A.ADMIN': 3, 'A.RANDOM': 4, 'A.HANET': 3, 'A.TIMESTMP': 2}, 'OE': {'OE.PHYSEC': 1, 'OE.INIT': 1, 'OE.NOEVIL': 1, 'OE.SINGEN': 1, 'OE.TIMESTMP': 1, 'OE.ADMIN': 1, 'OE.RANDOM': 1, 'OE.HANET': 1}}, 'vendor': {}, 'eval_facility': {'secuvera': {'secuvera': 3}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}, 'constructions': {'MAC': {'HMAC': 1}}}, 'asymmetric_crypto': {'FF': {'DH': {'DH': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 2}, 'SHA2': {'SHA256': 2, 'SHA512': 2}}}, 'crypto_scheme': {'KEX': {'Key Exchange': 1}}, 'crypto_protocol': {'SSH': {'SSH': 15}, 'IKE': {'IKE': 2}, 'IPsec': {'IPsec': 10}, 'VPN': {'VPN': 6}}, 'randomness': {'RNG': {'RNG': 1}}, 'cipher_mode': {'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {'BSI': {'BSI TR-02102': 1, 'BSI 7138': 2, 'BSI 7125': 2, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 32': 1, 'AIS 34': 1, 'AIS 38': 1}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 2, 'The genucenter must be operated on real hardware. Running the genucenter in a virtual machine is out of scope for this TOE. The Security Target [6] is the basis for this certification. It is not based on a': 1, 'or Mobile Clients, L2TP VPN, LDAP Authentication, Dynamic Routing, and virtual genucenter are out of scope of the evaluated configuration. In general, all information contained in the Security Target [6': 1}, 'ConfidentialDocument': {'Evaluation Technical Report BSI-DSZ-CC-0823 for genuscreen 4.0 from genua mbH of secuvera GmbH (confidential document) [8] Guidance documentation for the TOE, genucenter Installations- und Konfigurationshandbuch': 1}}}.
    • The report_filename property was set to 0823a_pdf.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['BSI'].
    • The cert_id property was set to BSI-DSZ-CC-0823-2014.
    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0966-2015']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0966-2015']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0565-2009']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0565-2009', 'BSI-DSZ-CC-0382-2007']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}]} values added.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The report_download_ok property was set to False.
    • The st_convert_ok property was set to True.
    • The report_convert_ok property was set to False.
    • The st_extract_ok property was set to True.
    • The report_extract_ok property was set to False.
    • The errors property was updated, with the [[0, 'failed to download report from https://www.commoncriteriaportal.org/files/epfiles/0823a_pdf.pdf, code: nok'], [2, 'failed to download report from https://www.commoncriteriaportal.org/files/epfiles/0823a_pdf.pdf, code: nok']] values inserted.
    • The st_pdf_hash property was set to 26f55b1ce78ef986dbe6a8612f94127cba1c682cd1d44e6990b485df4cd1a38f.
    • The report_pdf_hash property was set to None.
    • The st_txt_hash property was set to e6abf0978b2265c537005f4323765dcbf6974258b72478d0fb6d8b49c8eca446.
    • The report_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to {'pdf_file_size_bytes': 657632, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 72, '/Title': 'genucreen 4.0 Security Target', '/Author': 'Roland Meister', '/Subject': 'Common Criteria', '/Keywords': 'CC 3.1', '/Creator': 'Writer', '/Producer': 'LibreOffice 4.1', '/CreationDate': "D:20141023133113+02'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to None.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The report_keywords property was set to None.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 3, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_INT': 2, 'ADV_SPM': 2, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_TDS': 1, 'ADV_ARC.1': 4, 'ADV_TDS.1': 1, 'ADV_FSP.4': 2, 'ADV_IMP.1': 3, 'ADV_TAT.1': 1, 'ADV_TDS.3': 2, 'ADV_FSP.1': 1, 'ADV_FSP.2': 2, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1, 'AGD_OPE.1': 3, 'AGD_PRE.1': 3}, 'ALC': {'ALC_FLR.2': 3, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_LCD': 1, 'ALC_TAT': 1, 'ALC_CMC.4': 1, 'ALC_DVS.1': 2, 'ALC_LCD.1': 2, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1, 'ATE_COV.2': 1, 'ATE_FUN.1': 4, 'ATE_DPT.1': 2, 'ATE_IND.2': 1, 'ATE_COV.1': 1}, 'AVA': {'AVA_VAN.4': 4, 'AVA_VAN': 1}, 'ASE': {'ASE_TSS.2': 4, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1, 'ASE_CCL.1': 1, 'ASE_ECD.1': 3, 'ASE_REQ.1': 2, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 20, 'FAU_SAR': 12, 'FAU_GEN.1': 5, 'FAU_GEN.2': 1, 'FAU_SAR.1': 3, 'FAU_SAR.3': 1}, 'FCS': {'FCS_COP': 100, 'FCS_CKM': 143, 'FCS_COP.1': 29, 'FCS_CKM.4': 31, 'FCS_CKM.1': 29}, 'FDP': {'FDP_IFC': 53, 'FDP_IFF': 43, 'FDP_ITT': 32, 'FDP_IFC.1': 33, 'FDP_IFF.1': 37, 'FDP_ITT.1': 4}, 'FIA': {'FIA_ATD': 6, 'FIA_SOS': 6, 'FIA_UAU': 12, 'FIA_UID': 6, 'FIA_ATD.1': 1, 'FIA_SOS.1': 1, 'FIA_UAU.2': 1, 'FIA_UAU.6': 1, 'FIA_UID.2': 2, 'FIA_UID.1': 3}, 'FMT': {'FMT_MSA': 166, 'FMT_SMF': 49, 'FMT_MOF': 6, 'FMT_SMR': 8, 'FMT_MSA.1': 26, 'FMT_MSA.3': 18, 'FMT_SMF.1': 22, 'FMT_IFC.2': 2, 'FMT_MSA.2': 4, 'FMT_MOF.1': 1, 'FMT_SMR.1': 26}, 'FPT': {'FPT_ITT': 8, 'FPT_TEE': 8, 'FPT_TRC': 6, 'FPT_STM.1': 3, 'FPT_ITT.1': 3, 'FPT_TEE.1': 2, 'FPT_TRC.1.1': 1, 'FPT_TRC.1.2': 1, 'FPT_TRC.1': 1}, 'FTP': {'FTP_STM.1': 1}}, 'cc_claims': {'O': {'O.AUTH': 12, 'O.MEDIAT': 4, 'O.CONFID': 13, 'O.INTEG': 9, 'O.NOREPLAY': 13, 'O.AUDREC': 5, 'O.RS': 11, 'O.AVAIL': 5}, 'T': {'T.NOAUTH': 4, 'T.SNIFF': 4, 'T.SELPRO': 4, 'T.MEDIAT': 4, 'T.MSNIFF': 4, 'T.MODIFY': 4, 'T.MMODIFY': 4}, 'A': {'A.PHYSEC': 4, 'A.INIT': 4, 'A.NOEVIL': 4, 'A.SINGEN': 5, 'A.TIMESTMP': 4, 'A.ADMIN': 4, 'A.RANDOM': 4, 'A.HANET': 5}, 'OE': {'OE.PHYSEC': 4, 'OE.INIT': 7, 'OE.NOEVIL': 3, 'OE.SINGEN': 4, 'OE.TIMESTMP': 5, 'OE.ADMIN': 2, 'OE.RANDOM': 3, 'OE.HANET': 5}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 18}}, 'constructions': {'MAC': {'HMAC': 3}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 2}}, 'FF': {'DH': {'Diffie-Hellman': 4, 'DH': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 1}, 'SHA2': {'SHA-256': 1, 'SHA256': 1}}}, 'crypto_scheme': {'KEX': {'Key Exchange': 4}, 'KA': {'Key Agreement': 2}}, 'crypto_protocol': {'SSH': {'SSH': 136}, 'IKE': {'IKE': 90, 'IKEv1': 3}, 'IPsec': {'IPsec': 34}, 'VPN': {'VPN': 17}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 6}, 'CTR': {'CTR': 7}}, 'ecc_curve': {'NIST': {'secp256r1': 1}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS180-4': 2}, 'PKCS': {'PKCS#1': 6, 'PKCS #1': 7}, 'BSI': {'AIS31': 4, 'AIS20': 4}, 'RFC': {'RFC2409': 9, 'RFC3526': 5, 'RFC2104': 7, 'RFC5656': 7, 'RFC4418': 7, 'RFC2460': 2, 'RFC4253': 6, 'RFC3502': 1, 'RFC4301': 1, 'RFC4432': 1, 'RFC4344': 1, 'RFC2617': 1, 'RFC2965': 1, 'RFC3602': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 4, 'to perform cryptographic operations for IPsec operations. However, usage of the cryptocard is out of scope for this TOE. 1.4.8.2 No USB update The management system genucenter can write configuration': 1, 'when the USB stick is plug into the firewall component. However, usage of the USB update is out of scope for this TOE. 1.4.8.3 No FTP and SIP Relays The product allows the configuration of FTP and SIP': 1, '1.4.8.7 Dynamic Routing The dynamic routing feature which uses OSPF only works with IPv4 and is out of scope for this TOE. 1.4.8.8 No virtual genucenter The genucenter must be operated on real hardware': 1, 'the genucenter in a virtual machine is out of scope for this TOE. 1.4.9 Physical Scope The physical scope of TOE consists only of software and': 1}}}.
    • The report_filename property was set to None.
    • The st_filename property was set to 0823b_pdf.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The report_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}]} values added.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/0823b_pdf.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0966-2015']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0966-2015']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 6}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 6}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}]} values added.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None} data.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0382-2007']}}} data.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/0823a_pdf.pdf, code: nok'].

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0382-2007']}}} data.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 26f55b1ce78ef986dbe6a8612f94127cba1c682cd1d44e6990b485df4cd1a38f.
    • The st_txt_hash property was set to e6abf0978b2265c537005f4323765dcbf6974258b72478d0fb6d8b49c8eca446.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 657632, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 72, '/Title': 'genucreen 4.0 Security Target', '/Author': 'Roland Meister', '/Subject': 'Common Criteria', '/Keywords': 'CC 3.1', '/Creator': 'Writer', '/Producer': 'LibreOffice 4.1', '/CreationDate': "D:20141023133113+02'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 3, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_INT': 2, 'ADV_SPM': 2, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_TDS': 1, 'ADV_ARC.1': 4, 'ADV_TDS.1': 1, 'ADV_FSP.4': 2, 'ADV_IMP.1': 3, 'ADV_TAT.1': 1, 'ADV_TDS.3': 2, 'ADV_FSP.1': 1, 'ADV_FSP.2': 2, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1, 'AGD_OPE.1': 3, 'AGD_PRE.1': 3}, 'ALC': {'ALC_FLR.2': 3, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_LCD': 1, 'ALC_TAT': 1, 'ALC_CMC.4': 1, 'ALC_DVS.1': 2, 'ALC_LCD.1': 2, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1, 'ATE_COV.2': 1, 'ATE_FUN.1': 4, 'ATE_DPT.1': 2, 'ATE_IND.2': 1, 'ATE_COV.1': 1}, 'AVA': {'AVA_VAN.4': 4, 'AVA_VAN': 1}, 'ASE': {'ASE_TSS.2': 4, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1, 'ASE_CCL.1': 1, 'ASE_ECD.1': 3, 'ASE_REQ.1': 2, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 20, 'FAU_SAR': 12, 'FAU_GEN.1': 5, 'FAU_GEN.2': 1, 'FAU_SAR.1': 3, 'FAU_SAR.3': 1}, 'FCS': {'FCS_COP': 100, 'FCS_CKM': 143, 'FCS_COP.1': 29, 'FCS_CKM.4': 31, 'FCS_CKM.1': 29}, 'FDP': {'FDP_IFC': 53, 'FDP_IFF': 43, 'FDP_ITT': 32, 'FDP_IFC.1': 33, 'FDP_IFF.1': 37, 'FDP_ITT.1': 4}, 'FIA': {'FIA_ATD': 6, 'FIA_SOS': 6, 'FIA_UAU': 12, 'FIA_UID': 6, 'FIA_ATD.1': 1, 'FIA_SOS.1': 1, 'FIA_UAU.2': 1, 'FIA_UAU.6': 1, 'FIA_UID.2': 2, 'FIA_UID.1': 3}, 'FMT': {'FMT_MSA': 166, 'FMT_SMF': 49, 'FMT_MOF': 6, 'FMT_SMR': 8, 'FMT_MSA.1': 26, 'FMT_MSA.3': 18, 'FMT_SMF.1': 22, 'FMT_IFC.2': 2, 'FMT_MSA.2': 4, 'FMT_MOF.1': 1, 'FMT_SMR.1': 26}, 'FPT': {'FPT_ITT': 8, 'FPT_TEE': 8, 'FPT_TRC': 6, 'FPT_STM.1': 3, 'FPT_ITT.1': 3, 'FPT_TEE.1': 2, 'FPT_TRC.1.1': 1, 'FPT_TRC.1.2': 1, 'FPT_TRC.1': 1}, 'FTP': {'FTP_STM.1': 1}}, 'cc_claims': {'O': {'O.AUTH': 12, 'O.MEDIAT': 4, 'O.CONFID': 13, 'O.INTEG': 9, 'O.NOREPLAY': 13, 'O.AUDREC': 5, 'O.RS': 11, 'O.AVAIL': 5}, 'T': {'T.NOAUTH': 4, 'T.SNIFF': 4, 'T.SELPRO': 4, 'T.MEDIAT': 4, 'T.MSNIFF': 4, 'T.MODIFY': 4, 'T.MMODIFY': 4}, 'A': {'A.PHYSEC': 4, 'A.INIT': 4, 'A.NOEVIL': 4, 'A.SINGEN': 5, 'A.TIMESTMP': 4, 'A.ADMIN': 4, 'A.RANDOM': 4, 'A.HANET': 5}, 'OE': {'OE.PHYSEC': 4, 'OE.INIT': 7, 'OE.NOEVIL': 3, 'OE.SINGEN': 4, 'OE.TIMESTMP': 5, 'OE.ADMIN': 2, 'OE.RANDOM': 3, 'OE.HANET': 5}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 18}}, 'constructions': {'MAC': {'HMAC': 3}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 2}}, 'FF': {'DH': {'Diffie-Hellman': 4, 'DH': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 1}, 'SHA2': {'SHA-256': 1, 'SHA256': 1}}}, 'crypto_scheme': {'KEX': {'Key Exchange': 4}, 'KA': {'Key Agreement': 2}}, 'crypto_protocol': {'SSH': {'SSH': 136}, 'IKE': {'IKE': 90, 'IKEv1': 3}, 'IPsec': {'IPsec': 34}, 'VPN': {'VPN': 17}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 6}, 'CTR': {'CTR': 7}}, 'ecc_curve': {'NIST': {'secp256r1': 1}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS180-4': 2}, 'PKCS': {'PKCS#1': 6, 'PKCS #1': 7}, 'BSI': {'AIS31': 4, 'AIS20': 4}, 'RFC': {'RFC2409': 9, 'RFC3526': 5, 'RFC2104': 7, 'RFC5656': 7, 'RFC4418': 7, 'RFC2460': 2, 'RFC4253': 6, 'RFC3502': 1, 'RFC4301': 1, 'RFC4432': 1, 'RFC4344': 1, 'RFC2617': 1, 'RFC2965': 1, 'RFC3602': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 4, 'to perform cryptographic operations for IPsec operations. However, usage of the cryptocard is out of scope for this TOE. 1.4.8.2 No USB update The management system genucenter can write configuration': 1, 'when the USB stick is plug into the firewall component. However, usage of the USB update is out of scope for this TOE. 1.4.8.3 No FTP and SIP Relays The product allows the configuration of FTP and SIP': 1, '1.4.8.7 Dynamic Routing The dynamic routing feature which uses OSPF only works with IPv4 and is out of scope for this TOE. 1.4.8.8 No virtual genucenter The genucenter must be operated on real hardware': 1, 'the genucenter in a virtual machine is out of scope for this TOE. 1.4.9 Physical Scope The physical scope of TOE consists only of software and': 1}}}.
    • The st_filename property was set to 0823b_pdf.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}]} values added.
  • 22.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was updated.
  • 21.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/0823a_pdf.pdf, code: nok', 'failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/0823b_pdf.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 6}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 6}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}]} values added.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 26.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'crypto_protocol': {'__insert__': {'VPN': {'VPN': 6}}}} data.
    • The st_keywords property was updated, with the {'crypto_protocol': {'__insert__': {'VPN': {'VPN': 17}}}} data.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': '0823a_pdf.pdf', 'st_filename': '0823b_pdf.pdf'}.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0823-2014': 36, 'BSI-DSZ-CC-0565-2009': 6}}}}, 'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL 4': 17, 'EAL 5': 9, 'EAL 2': 4, 'EAL 6': 4}}}}, 'cc_sar': {'__update__': {'ALC': {'__delete__': ['ALC_LCD']}, 'AVA': {'__update__': {'AVA_VAN.4': 7}}}}, 'cc_claims': {'__update__': {'A': {'__update__': {'A.TIMESTMP': 2}}}}, 'vendor': {}, 'asymmetric_crypto': {'__update__': {'FF': {'__update__': {'DH': {'__delete__': ['Diffie-Hellman']}}}}}, 'crypto_scheme': {'__delete__': ['MAC']}, 'crypto_protocol': {'__update__': {'IPsec': {'__update__': {'IPsec': 10}}}}, 'technical_report_id': {'__update__': {'BSI': {'__insert__': {'BSI TR-02102': 1}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'ISO': {'__insert__': {'ISO/IEC 18045': 4}, '__update__': {'ISO/IEC 15408': 4}}}}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {'The genucenter must be operated on real hardware. Running the genucenter in a virtual machine is out of scope for this TOE. The Security Target [6] is the basis for this certification. It is not based on a': 1, 'or Mobile Clients, L2TP VPN, LDAP Authentication, Dynamic Routing, and virtual genucenter are out of scope of the evaluated configuration. In general, all information contained in the Security Target [6': 1}, '__delete__': ['. The genucenter must be operated on real hardware. Running the genucenter in a virtual machine is out of scope for this TOE', 'e. The genucenter must be operated on real hardware. Running the genucenter in a virtual machine is out of scope for this TOE. The Security Target [6] is the basis for this certification. It is not based on a', 'ances or Mobile Clients, L2TP VPN, LDAP Authentication, Dynamic Routing, and virtual genucenter are out of scope of the evaluated configuration. In general, all information contained in the Security Target [6']}, 'ConfidentialDocument': {'Evaluation Technical Report BSI-DSZ-CC-0823 for genuscreen 4.0 from genua mbH of secuvera GmbH (confidential document) [8] Guidance documentation for the TOE, genucenter Installations- und Konfigurationshandbuch': 1}}}} data.
    • The st_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL4': 3}}}}, 'cc_sar': {'__update__': {'ADV': {'__update__': {'ADV_ARC.1': 4, 'ADV_FSP.4': 2, 'ADV_IMP.1': 3, 'ADV_TDS.3': 2, 'ADV_FSP.1': 1, 'ADV_TDS.1': 1}}, 'AGD': {'__update__': {'AGD_OPE.1': 3, 'AGD_PRE.1': 3}}, 'ALC': {'__update__': {'ALC_FLR.2': 3, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 2, 'ALC_LCD.1': 2, 'ALC_TAT.1': 1}, '__delete__': ['ALC_CMS.1']}, 'ATE': {'__update__': {'ATE_COV.2': 1, 'ATE_DPT.1': 2, 'ATE_FUN.1': 4, 'ATE_IND.2': 1, 'ATE_COV.1': 1}}, 'ASE': {'__update__': {'ASE_CCL.1': 1, 'ASE_ECD.1': 3, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1}}}}, 'cc_sfr': {'__update__': {'FAU': {'__insert__': {'FAU_SAR': 12, 'FAU_SAR.3': 1}, '__update__': {'FAU_GEN': 20, 'FAU_GEN.1': 5, 'FAU_SAR.1': 3}}, 'FCS': {'__insert__': {'FCS_COP': 100, 'FCS_CKM': 143}, '__update__': {'FCS_CKM.4': 31, 'FCS_COP.1': 29, 'FCS_CKM.1': 29}}, 'FDP': {'__insert__': {'FDP_IFC': 53, 'FDP_IFF': 43, 'FDP_ITT': 32, 'FDP_ITT.1': 4}, '__update__': {'FDP_IFF.1': 37, 'FDP_IFC.1': 33}}, 'FIA': {'__insert__': {'FIA_ATD': 6, 'FIA_SOS': 6, 'FIA_UAU': 12, 'FIA_UID': 6, 'FIA_ATD.1': 1, 'FIA_SOS.1': 1, 'FIA_UAU.2': 1, 'FIA_UAU.6': 1}, '__update__': {'FIA_UID.2': 2}}, 'FMT': {'__insert__': {'FMT_MSA': 166, 'FMT_SMF': 49, 'FMT_MOF': 6, 'FMT_SMR': 8, 'FMT_IFC.2': 2, 'FMT_MOF.1': 1}, '__update__': {'FMT_MSA.3': 18, 'FMT_SMR.1': 26, 'FMT_SMF.1': 22, 'FMT_MSA.1': 26, 'FMT_MSA.2': 4}}, 'FPT': {'__insert__': {'FPT_ITT': 8, 'FPT_TEE': 8, 'FPT_TRC': 6, 'FPT_TEE.1': 2}, '__update__': {'FPT_ITT.1': 3}}}}, 'cc_claims': {'__update__': {'O': {'__update__': {'O.AUDREC': 5, 'O.AVAIL': 5, 'O.MEDIAT': 4, 'O.INTEG': 9, 'O.NOREPLAY': 13}}, 'T': {'__update__': {'T.SNIFF': 4, 'T.SELPRO': 4, 'T.MEDIAT': 4, 'T.MSNIFF': 4, 'T.MODIFY': 4, 'T.MMODIFY': 4}, '__delete__': ['T']}, 'A': {'__update__': {'A.PHYSEC': 4, 'A.INIT': 4, 'A.SINGEN': 5, 'A.TIMESTMP': 4, 'A.ADMIN': 4}}, 'OE': {'__update__': {'OE.INIT': 7, 'OE.SINGEN': 4, 'OE.ADMIN': 2, 'OE.HANET': 5}, '__delete__': ['OE']}}, '__delete__': ['D']}, 'vendor': {}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 18}}}}, 'constructions': {'__update__': {'MAC': {'__update__': {'HMAC': 3}}}}}}, 'asymmetric_crypto': {'__update__': {'ECC': {'__update__': {'ECDH': {'__update__': {'ECDH': 2}}}}, 'FF': {'__update__': {'DH': {'__update__': {'DH': 2, 'Diffie-Hellman': 4}}}}}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA2': {'__update__': {'SHA256': 1}}}}}}, 'crypto_scheme': {'__delete__': ['MAC']}, 'crypto_protocol': {'__update__': {'SSH': {'__update__': {'SSH': 136}}, 'IKE': {'__update__': {'IKE': 90, 'IKEv1': 3}}, 'IPsec': {'__update__': {'IPsec': 34}}}}, 'cipher_mode': {'__update__': {'CBC': {'__update__': {'CBC': 6}}}}, 'standard_id': {'__update__': {'RFC': {'__insert__': {'RFC2617': 1, 'RFC2965': 1}, '__update__': {'RFC3526': 5, 'RFC4418': 7}}}}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {'to perform cryptographic operations for IPsec operations. However, usage of the cryptocard is out of scope for this TOE. 1.4.8.2 No USB update The management system genucenter can write configuration': 1, 'when the USB stick is plug into the firewall component. However, usage of the USB update is out of scope for this TOE. 1.4.8.3 No FTP and SIP Relays The product allows the configuration of FTP and SIP': 1, '1.4.8.7 Dynamic Routing The dynamic routing feature which uses OSPF only works with IPv4 and is out of scope for this TOE. 1.4.8.8 No virtual genucenter The genucenter must be operated on real hardware': 1, 'the genucenter in a virtual machine is out of scope for this TOE. 1.4.9 Physical Scope The physical scope of TOE consists only of software and': 1}, '__delete__': ['. However, usage of the cryptocard is out of scope for this TOE', '. However, usage of the USB update is out of scope for this TOE', '. 1.4.8.7 Dynamic Routing The dynamic routing feature which uses OSPF only works with IPv4 and is out of scope for this TOE', '. Running the genucenter in a virtual machine is out of scope for this TOE', 'ocard to perform cryptographic operations for IPsec operations. However, usage of the cryptocard is out of scope for this TOE. 1.4.8.2 No USB update The management system genucenter can write configuration', 'uration when the USB stick is plug into the firewall component. However, usage of the USB update is out of scope for this TOE. 1.4.8.3 No FTP and SIP Relays The product allows the configuration of FTP and SIP', 'ed. 1.4.8.7 Dynamic Routing The dynamic routing feature which uses OSPF only works with IPv4 and is out of scope for this TOE. 1.4.8.8 No virtual genucenter The genucenter must be operated on real hardware', 'Running the genucenter in a virtual machine is out of scope for this TOE. 1.4.9 Physical Scope The physical scope of TOE consists only of software and']}}}} data.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/zertifizierung', 'http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/']}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0823-2014': 70, 'BSI-DSZ-CC-0565-2009': 4}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 18, 'EAL 5': 8, 'EAL 1': 7, 'EAL 2': 5, 'EAL 5+': 1, 'EAL 6': 5, 'EAL 3': 4, 'EAL 7': 4, 'EAL 4 augmented': 3}, 'ITSEC': {'ITSEC Evaluation': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.1': 1, 'ADV_FSP.2': 1, 'ADV_FSP.3': 1, 'ADV_FSP.4': 1, 'ADV_FSP.5': 1, 'ADV_FSP.6': 1, 'ADV_IMP.1': 1, 'ADV_IMP.2': 1, 'ADV_INT.1': 1, 'ADV_INT.2': 1, 'ADV_INT.3': 1, 'ADV_SPM.1': 1, 'ADV_TDS.1': 1, 'ADV_TDS.2': 1, 'ADV_TDS.3': 1, 'ADV_TDS.4': 1, 'ADV_TDS.5': 1, 'ADV_TDS.6': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_FLR.2': 6, 'ALC_FLR': 3, 'ALC_CMC.1': 1, 'ALC_CMC.2': 1, 'ALC_CMC.3': 1, 'ALC_CMC.4': 1, 'ALC_CMC.5': 1, 'ALC_CMS.1': 1, 'ALC_CMS.2': 1, 'ALC_CMS.3': 1, 'ALC_CMS.4': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_DVS.2': 1, 'ALC_FLR.1': 1, 'ALC_FLR.3': 1, 'ALC_LCD.1': 1, 'ALC_LCD.2': 1, 'ALC_TAT.1': 1, 'ALC_TAT.2': 1, 'ALC_TAT.3': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_COV.2': 1, 'ATE_COV.3': 1, 'ATE_DPT.1': 1, 'ATE_DPT.2': 1, 'ATE_DPT.3': 1, 'ATE_DPT.4': 1, 'ATE_FUN.1': 1, 'ATE_FUN.2': 1, 'ATE_IND.1': 1, 'ATE_IND.2': 1, 'ATE_IND.3': 1, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.4': 6, 'AVA_VAN.1': 1, 'AVA_VAN.2': 1, 'AVA_VAN.3': 1, 'AVA_VAN.5': 1, 'AVA_VAN': 2}, 'APE': {'APE_INT.1': 1, 'APE_CCL.1': 1, 'APE_SPD.1': 1, 'APE_OBJ.1': 1, 'APE_OBJ.2': 1, 'APE_ECD.1': 1, 'APE_REQ.1': 1, 'APE_REQ.2': 1}, 'ASE': {'ASE_TSS.2': 7, 'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {'A': {'A.PHYSEC': 4, 'A.INIT': 3, 'A.NOEVIL': 3, 'A.SINGEN': 3, 'A.TIMESTMP': 3, 'A.ADMIN': 3, 'A.RANDOM': 4, 'A.HANET': 3}, 'OE': {'OE.PHYSEC': 1, 'OE.INIT': 1, 'OE.NOEVIL': 1, 'OE.SINGEN': 1, 'OE.TIMESTMP': 1, 'OE.ADMIN': 1, 'OE.RANDOM': 1, 'OE.HANET': 1}}, 'vendor': {'STMicroelectronics': {'STM': 4}}, 'eval_facility': {'secuvera': {'secuvera': 3}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}, 'constructions': {'MAC': {'HMAC': 1}}}, 'asymmetric_crypto': {'FF': {'DH': {'DH': 1, 'Diffie-Hellman': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 2}, 'SHA2': {'SHA256': 2, 'SHA512': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 1}, 'KEX': {'Key Exchange': 1}}, 'crypto_protocol': {'SSH': {'SSH': 15}, 'IKE': {'IKE': 2}, 'IPsec': {'IPsec': 9}}, 'randomness': {'RNG': {'RNG': 1}}, 'cipher_mode': {'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {'BSI': {'BSI 7138': 2, 'BSI 7125': 2, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 32': 1, 'AIS 34': 1, 'AIS 38': 1}, 'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 17065': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 2, '. The genucenter must be operated on real hardware. Running the genucenter in a virtual machine is out of scope for this TOE': 1, 'e. The genucenter must be operated on real hardware. Running the genucenter in a virtual machine is out of scope for this TOE. The Security Target [6] is the basis for this certification. It is not based on a': 1, 'ances or Mobile Clients, L2TP VPN, LDAP Authentication, Dynamic Routing, and virtual genucenter are out of scope of the evaluated configuration. In general, all information contained in the Security Target [6': 1}, 'ConfidentialDocument': {'14, Evaluation Technical Report BSI-DSZ-CC-0823 for genuscreen 4.0 from genua mbH of secuvera GmbH (confidential document) [8] Guidance documentation for the TOE, genucenter Installations- und Konfigurationshandbuch': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 2, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_INT': 2, 'ADV_SPM': 2, 'ADV_ARC': 1, 'ADV_ARC.1': 5, 'ADV_FSP': 1, 'ADV_FSP.4': 4, 'ADV_IMP': 1, 'ADV_IMP.1': 4, 'ADV_TDS': 1, 'ADV_TDS.3': 4, 'ADV_FSP.1': 2, 'ADV_TDS.1': 2, 'ADV_TAT.1': 1, 'ADV_FSP.2': 2, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_OPE.1': 4, 'AGD_PRE': 1, 'AGD_PRE.1': 4}, 'ALC': {'ALC_FLR.2': 4, 'ALC_CMC': 1, 'ALC_CMC.4': 2, 'ALC_CMS': 1, 'ALC_CMS.4': 2, 'ALC_DEL': 1, 'ALC_DEL.1': 2, 'ALC_DVS': 1, 'ALC_DVS.1': 3, 'ALC_FLR': 1, 'ALC_LCD': 1, 'ALC_LCD.1': 3, 'ALC_TAT': 1, 'ALC_TAT.1': 2, 'ALC_CMS.1': 1}, 'ATE': {'ATE_COV': 1, 'ATE_COV.2': 2, 'ATE_DPT': 1, 'ATE_DPT.1': 3, 'ATE_FUN': 1, 'ATE_FUN.1': 5, 'ATE_IND': 1, 'ATE_IND.2': 2, 'ATE_COV.1': 2}, 'AVA': {'AVA_VAN.4': 4, 'AVA_VAN': 1}, 'ASE': {'ASE_TSS.2': 4, 'ASE_CCL': 1, 'ASE_CCL.1': 2, 'ASE_ECD': 1, 'ASE_ECD.1': 4, 'ASE_INT': 1, 'ASE_INT.1': 4, 'ASE_OBJ': 1, 'ASE_OBJ.2': 3, 'ASE_REQ': 1, 'ASE_REQ.2': 2, 'ASE_SPD': 1, 'ASE_SPD.1': 3, 'ASE_TSS': 1, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN': 4, 'FAU_GEN.1': 4, 'FAU_GEN.2': 1, 'FAU_SAR.1': 1}, 'FCS': {'FCS_CKM.4': 27, 'FCS_COP.1': 16, 'FCS_CKM.1': 17}, 'FDP': {'FDP_IFF.1': 7, 'FDP_IFC.1': 27}, 'FIA': {'FIA_UID.1': 3, 'FIA_UID.2': 1}, 'FMT': {'FMT_MSA.3': 6, 'FMT_SMR.1': 24, 'FMT_SMF.1': 15, 'FMT_MSA.1': 10, 'FMT_MSA.2': 1}, 'FPT': {'FPT_STM.1': 3, 'FPT_TRC.1.1': 1, 'FPT_TRC.1.2': 1, 'FPT_ITT.1': 2, 'FPT_TRC.1': 1}, 'FTP': {'FTP_STM.1': 1}}, 'cc_claims': {'D': {'D': 1}, 'O': {'O.AUTH': 12, 'O.CONFID': 13, 'O.AUDREC': 10, 'O.RS': 11, 'O.AVAIL': 10, 'O.MEDIAT': 8, 'O.INTEG': 13, 'O.NOREPLAY': 12}, 'T': {'T': 1, 'T.NOAUTH': 4, 'T.SNIFF': 3, 'T.SELPRO': 3, 'T.MEDIAT': 3, 'T.MSNIFF': 3, 'T.MODIFY': 3, 'T.MMODIFY': 3}, 'A': {'A.NOEVIL': 4, 'A.RANDOM': 4, 'A.HANET': 5, 'A.PHYSEC': 3, 'A.INIT': 3, 'A.SINGEN': 4, 'A.TIMESTMP': 3, 'A.ADMIN': 3}, 'OE': {'OE': 1, 'OE.PHYSEC': 4, 'OE.INIT': 8, 'OE.NOEVIL': 3, 'OE.SINGEN': 5, 'OE.TIMESTMP': 5, 'OE.ADMIN': 3, 'OE.RANDOM': 3, 'OE.HANET': 6}}, 'vendor': {'STMicroelectronics': {'STM': 13}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 82}}, 'constructions': {'MAC': {'HMAC': 34}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 23}}, 'FF': {'DH': {'DH': 44, 'Diffie-Hellman': 6}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 1}, 'SHA2': {'SHA256': 5, 'SHA-256': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 74}, 'KEX': {'Key Exchange': 4}, 'KA': {'Key Agreement': 2}}, 'crypto_protocol': {'SSH': {'SSH': 134}, 'IKE': {'IKE': 91, 'IKEv1': 2}, 'IPsec': {'IPsec': 33}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 7}, 'CTR': {'CTR': 7}}, 'ecc_curve': {'NIST': {'secp256r1': 1}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS180-4': 2}, 'PKCS': {'PKCS#1': 6, 'PKCS #1': 7}, 'BSI': {'AIS31': 4, 'AIS20': 4}, 'RFC': {'RFC2409': 9, 'RFC2104': 7, 'RFC5656': 7, 'RFC2460': 2, 'RFC3526': 4, 'RFC4253': 6, 'RFC4418': 4, 'RFC3502': 1, 'RFC4301': 1, 'RFC4432': 1, 'RFC4344': 1, 'RFC3602': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 4, '. However, usage of the cryptocard is out of scope for this TOE': 1, '. However, usage of the USB update is out of scope for this TOE': 1, '. 1.4.8.7 Dynamic Routing The dynamic routing feature which uses OSPF only works with IPv4 and is out of scope for this TOE': 1, '. Running the genucenter in a virtual machine is out of scope for this TOE': 1, 'ocard to perform cryptographic operations for IPsec operations. However, usage of the cryptocard is out of scope for this TOE. 1.4.8.2 No USB update The management system genucenter can write configuration': 1, 'uration when the USB stick is plug into the firewall component. However, usage of the USB update is out of scope for this TOE. 1.4.8.3 No FTP and SIP Relays The product allows the configuration of FTP and SIP': 1, 'ed. 1.4.8.7 Dynamic Routing The dynamic routing feature which uses OSPF only works with IPv4 and is out of scope for this TOE. 1.4.8.8 No virtual genucenter The genucenter must be operated on real hardware': 1, 'Running the genucenter in a virtual machine is out of scope for this TOE. 1.4.9 Physical Scope The physical scope of TOE consists only of software and': 1}}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '7fc9248455d62d11fb9901031c9ff9f9be737e9112bbe7d8f3579501d9d3a9af', 'st_pdf_hash': '26f55b1ce78ef986dbe6a8612f94127cba1c682cd1d44e6990b485df4cd1a38f', 'report_txt_hash': '5756149b9b9ee8f3f7c0eecc7022cdf85426c3879d8b9060f73ac92521eaa336', 'st_txt_hash': 'e6abf0978b2265c537005f4323765dcbf6974258b72478d0fb6d8b49c8eca446'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 1, 'HMAC': 1}, 'rules_asymmetric_crypto': {'DH': 1, 'Diffie-Hellman': 1}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA1': 2, 'SHA256': 2, 'SHA512': 2}, 'rules_crypto_schemes': {'MAC': 1, 'Key Exchange': 1}, 'rules_randomness': {'RNG': 1}, 'rules_tee': {'SE': 1}, 'rules_side_channels': {}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 82, 'HMAC': 34}, 'rules_asymmetric_crypto': {'ECDH': 23, 'DH': 44, 'Diffie-Hellman': 5}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA1': 1, 'SHA256': 5, 'SHA-256': 1}, 'rules_crypto_schemes': {'MAC': 74, 'Key Exchange': 4}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {}} values inserted.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'AVA_VAN', 'level': 4}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_TAT', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 4}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0966-2015']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0966-2015']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0565-2009']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0565-2009', 'BSI-DSZ-CC-0382-2007']}}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['4.0']}.
    • The directly_affected_by property was set to {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0966-2015']}.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name genuscreen 4.0 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Boundary Protection Devices and Systems",
  "cert_link": null,
  "dgst": "0eff4063e68d7cd6",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-0823-2014",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "4.0"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0966-2015"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0565-2009"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0966-2015"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0382-2007",
          "BSI-DSZ-CC-0565-2009"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "GeNUA mbH",
  "manufacturer_web": "https://www.genua.de/",
  "name": "genuscreen 4.0",
  "not_valid_after": "2019-10-30",
  "not_valid_before": "2014-10-29",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "0823a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cc_security_level": "Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.2, ASE_TSS.2, AVA_VAN.4 SOGIS Recognition Agreement for components up to EAL 4",
        "cc_version": "Product specific Security Target Common Criteria Part 2 extended",
        "cert_id": "BSI-DSZ-CC-0823-2014",
        "cert_item": "genuscreen 4.0",
        "cert_lab": "BSI",
        "developer": "genua mbh",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "None"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "DH": 1
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0565-2009": 3,
          "BSI-DSZ-CC-0823": 1,
          "BSI-DSZ-CC-0823-2014": 18
        }
      },
      "cc_claims": {
        "A": {
          "A.ADMIN": 3,
          "A.HANET": 3,
          "A.INIT": 3,
          "A.NOEVIL": 3,
          "A.PHYSEC": 4,
          "A.RANDOM": 4,
          "A.SINGEN": 3,
          "A.TIMESTMP": 2
        },
        "OE": {
          "OE.ADMIN": 1,
          "OE.HANET": 1,
          "OE.INIT": 1,
          "OE.NOEVIL": 1,
          "OE.PHYSEC": 1,
          "OE.RANDOM": 1,
          "OE.SINGEN": 1,
          "OE.TIMESTMP": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 1,
          "ADV_FSP": 1,
          "ADV_FSP.1": 1,
          "ADV_FSP.2": 1,
          "ADV_FSP.3": 1,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 1,
          "ADV_FSP.6": 1,
          "ADV_IMP": 1,
          "ADV_IMP.1": 1,
          "ADV_IMP.2": 1,
          "ADV_INT": 1,
          "ADV_INT.1": 1,
          "ADV_INT.2": 1,
          "ADV_INT.3": 1,
          "ADV_SPM": 1,
          "ADV_SPM.1": 1,
          "ADV_TDS": 1,
          "ADV_TDS.1": 1,
          "ADV_TDS.2": 1,
          "ADV_TDS.3": 1,
          "ADV_TDS.4": 1,
          "ADV_TDS.5": 1,
          "ADV_TDS.6": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 1,
          "AGD_PRE": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.1": 1,
          "ALC_CMC.2": 1,
          "ALC_CMC.3": 1,
          "ALC_CMC.4": 1,
          "ALC_CMC.5": 1,
          "ALC_CMS": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.2": 1,
          "ALC_CMS.3": 1,
          "ALC_CMS.4": 1,
          "ALC_CMS.5": 1,
          "ALC_DEL": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS": 1,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 1,
          "ALC_FLR": 3,
          "ALC_FLR.1": 1,
          "ALC_FLR.2": 6,
          "ALC_FLR.3": 1,
          "ALC_LCD.1": 1,
          "ALC_LCD.2": 1,
          "ALC_TAT": 1,
          "ALC_TAT.1": 1,
          "ALC_TAT.2": 1,
          "ALC_TAT.3": 1
        },
        "APE": {
          "APE_CCL.1": 1,
          "APE_ECD.1": 1,
          "APE_INT.1": 1,
          "APE_OBJ.1": 1,
          "APE_OBJ.2": 1,
          "APE_REQ.1": 1,
          "APE_REQ.2": 1,
          "APE_SPD.1": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_CCL.1": 1,
          "ASE_ECD": 1,
          "ASE_ECD.1": 1,
          "ASE_INT": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ": 1,
          "ASE_OBJ.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.1": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS": 1,
          "ASE_TSS.1": 1,
          "ASE_TSS.2": 7
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.1": 1,
          "ATE_COV.2": 1,
          "ATE_COV.3": 1,
          "ATE_DPT": 1,
          "ATE_DPT.1": 1,
          "ATE_DPT.2": 1,
          "ATE_DPT.3": 1,
          "ATE_DPT.4": 1,
          "ATE_FUN": 1,
          "ATE_FUN.1": 1,
          "ATE_FUN.2": 1,
          "ATE_IND": 1,
          "ATE_IND.1": 1,
          "ATE_IND.2": 1,
          "ATE_IND.3": 1
        },
        "AVA": {
          "AVA_VAN": 2,
          "AVA_VAN.1": 1,
          "AVA_VAN.2": 1,
          "AVA_VAN.3": 1,
          "AVA_VAN.4": 7,
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 7,
          "EAL 2": 4,
          "EAL 3": 4,
          "EAL 4": 17,
          "EAL 4 augmented": 3,
          "EAL 5": 9,
          "EAL 5+": 1,
          "EAL 6": 4,
          "EAL 7": 4
        },
        "ITSEC": {
          "ITSEC Evaluation": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "Evaluation Technical Report BSI-DSZ-CC-0823 for genuscreen 4.0 from genua mbH of secuvera GmbH (confidential document) [8] Guidance documentation for the TOE, genucenter Installations- und Konfigurationshandbuch": 1
        },
        "OutOfScope": {
          "The genucenter must be operated on real hardware. Running the genucenter in a virtual machine is out of scope for this TOE. The Security Target [6] is the basis for this certification. It is not based on a": 1,
          "or Mobile Clients, L2TP VPN, LDAP Authentication, Dynamic Routing, and virtual genucenter are out of scope of the evaluated configuration. In general, all information contained in the Security Target [6": 1,
          "out of scope": 2
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 2
        },
        "IPsec": {
          "IPsec": 10
        },
        "SSH": {
          "SSH": 15
        },
        "VPN": {
          "VPN": 6
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "secuvera": {
          "secuvera": 3
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA1": 2
          },
          "SHA2": {
            "SHA256": 2,
            "SHA512": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "BSI": {
          "AIS 32": 1,
          "AIS 34": 1,
          "AIS 38": 1
        },
        "ISO": {
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 1
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7125": 2,
          "BSI 7138": 2,
          "BSI 7148": 1,
          "BSI TR-02102": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "BSI",
      "/CreationDate": "D:20141104142730+01\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "Common Criteria, Certification, Zertifizierung, ",
      "/ModDate": "D:20141104150218+01\u002700\u0027",
      "/Producer": "LibreOffice 4.2",
      "/Title": "Certification Report BSI-DSZ-CC-xxxx-200x",
      "pdf_file_size_bytes": 1116569,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.bsi.bund.de/zertifizierung",
          "http://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 36
    },
    "st_filename": "0823b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDH": {
            "ECDH": 2
          }
        },
        "FF": {
          "DH": {
            "DH": 2,
            "Diffie-Hellman": 4
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ADMIN": 4,
          "A.HANET": 5,
          "A.INIT": 4,
          "A.NOEVIL": 4,
          "A.PHYSEC": 4,
          "A.RANDOM": 4,
          "A.SINGEN": 5,
          "A.TIMESTMP": 4
        },
        "O": {
          "O.AUDREC": 5,
          "O.AUTH": 12,
          "O.AVAIL": 5,
          "O.CONFID": 13,
          "O.INTEG": 9,
          "O.MEDIAT": 4,
          "O.NOREPLAY": 13,
          "O.RS": 11
        },
        "OE": {
          "OE.ADMIN": 2,
          "OE.HANET": 5,
          "OE.INIT": 7,
          "OE.NOEVIL": 3,
          "OE.PHYSEC": 4,
          "OE.RANDOM": 3,
          "OE.SINGEN": 4,
          "OE.TIMESTMP": 5
        },
        "T": {
          "T.MEDIAT": 4,
          "T.MMODIFY": 4,
          "T.MODIFY": 4,
          "T.MSNIFF": 4,
          "T.NOAUTH": 4,
          "T.SELPRO": 4,
          "T.SNIFF": 4
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 4,
          "ADV_FSP": 1,
          "ADV_FSP.1": 1,
          "ADV_FSP.2": 2,
          "ADV_FSP.4": 2,
          "ADV_IMP": 1,
          "ADV_IMP.1": 3,
          "ADV_INT": 2,
          "ADV_SPM": 2,
          "ADV_TAT.1": 1,
          "ADV_TDS": 1,
          "ADV_TDS.1": 1,
          "ADV_TDS.2": 1,
          "ADV_TDS.3": 2
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 3,
          "AGD_PRE": 1,
          "AGD_PRE.1": 3
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.4": 1,
          "ALC_CMS": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS": 1,
          "ALC_DVS.1": 2,
          "ALC_FLR": 1,
          "ALC_FLR.2": 3,
          "ALC_LCD": 1,
          "ALC_LCD.1": 2,
          "ALC_TAT": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_CCL.1": 1,
          "ASE_ECD": 1,
          "ASE_ECD.1": 3,
          "ASE_INT": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ": 1,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 1,
          "ASE_SPD": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS": 1,
          "ASE_TSS.2": 4
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.1": 1,
          "ATE_COV.2": 1,
          "ATE_DPT": 1,
          "ATE_DPT.1": 2,
          "ATE_FUN": 1,
          "ATE_FUN.1": 4,
          "ATE_IND": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.4": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 3,
          "EAL4 augmented": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 20,
          "FAU_GEN.1": 5,
          "FAU_GEN.2": 1,
          "FAU_SAR": 12,
          "FAU_SAR.1": 3,
          "FAU_SAR.3": 1
        },
        "FCS": {
          "FCS_CKM": 143,
          "FCS_CKM.1": 29,
          "FCS_CKM.4": 31,
          "FCS_COP": 100,
          "FCS_COP.1": 29
        },
        "FDP": {
          "FDP_IFC": 53,
          "FDP_IFC.1": 33,
          "FDP_IFF": 43,
          "FDP_IFF.1": 37,
          "FDP_ITT": 32,
          "FDP_ITT.1": 4
        },
        "FIA": {
          "FIA_ATD": 6,
          "FIA_ATD.1": 1,
          "FIA_SOS": 6,
          "FIA_SOS.1": 1,
          "FIA_UAU": 12,
          "FIA_UAU.2": 1,
          "FIA_UAU.6": 1,
          "FIA_UID": 6,
          "FIA_UID.1": 3,
          "FIA_UID.2": 2
        },
        "FMT": {
          "FMT_IFC.2": 2,
          "FMT_MOF": 6,
          "FMT_MOF.1": 1,
          "FMT_MSA": 166,
          "FMT_MSA.1": 26,
          "FMT_MSA.2": 4,
          "FMT_MSA.3": 18,
          "FMT_SMF": 49,
          "FMT_SMF.1": 22,
          "FMT_SMR": 8,
          "FMT_SMR.1": 26
        },
        "FPT": {
          "FPT_ITT": 8,
          "FPT_ITT.1": 3,
          "FPT_STM.1": 3,
          "FPT_TEE": 8,
          "FPT_TEE.1": 2,
          "FPT_TRC": 6,
          "FPT_TRC.1": 1,
          "FPT_TRC.1.1": 1,
          "FPT_TRC.1.2": 1
        },
        "FTP": {
          "FTP_STM.1": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          "1.4.8.7 Dynamic Routing The dynamic routing feature which uses OSPF only works with IPv4 and is out of scope for this TOE. 1.4.8.8 No virtual genucenter The genucenter must be operated on real hardware": 1,
          "out of scope": 4,
          "the genucenter in a virtual machine is out of scope for this TOE. 1.4.9 Physical Scope The physical scope of TOE consists only of software and": 1,
          "to perform cryptographic operations for IPsec operations. However, usage of the cryptocard is out of scope for this TOE. 1.4.8.2 No USB update The management system genucenter can write configuration": 1,
          "when the USB stick is plug into the firewall component. However, usage of the USB update is out of scope for this TOE. 1.4.8.3 No FTP and SIP Relays The product allows the configuration of FTP and SIP": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 6
        },
        "CTR": {
          "CTR": 7
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 90,
          "IKEv1": 3
        },
        "IPsec": {
          "IPsec": 34
        },
        "SSH": {
          "SSH": 136
        },
        "VPN": {
          "VPN": 17
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 2
        },
        "KEX": {
          "Key Exchange": 4
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "secp256r1": 1
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA1": 1
          },
          "SHA2": {
            "SHA-256": 1,
            "SHA256": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "BSI": {
          "AIS20": 4,
          "AIS31": 4
        },
        "FIPS": {
          "FIPS180-4": 2
        },
        "PKCS": {
          "PKCS #1": 7,
          "PKCS#1": 6
        },
        "RFC": {
          "RFC2104": 7,
          "RFC2409": 9,
          "RFC2460": 2,
          "RFC2617": 1,
          "RFC2965": 1,
          "RFC3502": 1,
          "RFC3526": 5,
          "RFC3602": 1,
          "RFC4253": 6,
          "RFC4301": 1,
          "RFC4344": 1,
          "RFC4418": 7,
          "RFC4432": 1,
          "RFC5656": 7
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 18
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 3
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Roland Meister",
      "/CreationDate": "D:20141023133113+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "CC 3.1",
      "/Producer": "LibreOffice 4.1",
      "/Subject": "Common Criteria",
      "/Title": "genucreen 4.0 Security Target",
      "pdf_file_size_bytes": 657632,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 72
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/0823a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "AVA_VAN.4",
      "ASE_TSS.2",
      "ALC_FLR.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/0823b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "7fc9248455d62d11fb9901031c9ff9f9be737e9112bbe7d8f3579501d9d3a9af",
      "txt_hash": "5756149b9b9ee8f3f7c0eecc7022cdf85426c3879d8b9060f73ac92521eaa336"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "26f55b1ce78ef986dbe6a8612f94127cba1c682cd1d44e6990b485df4cd1a38f",
      "txt_hash": "e6abf0978b2265c537005f4323765dcbf6974258b72478d0fb6d8b49c8eca446"
    }
  },
  "status": "archived"
}