Ubuntu LTS 16.04.4 with KVM and QEMU 2.5

CSV information ?

Status archived
Valid from 04.07.2018
Valid until 04.07.2023
Scheme 🇸🇪 SE
Manufacturer Canonical Group Limited
Category Operating Systems
Security level ALC_FLR.3, EAL2

Heuristics summary ?

Certificate ID: CSEC2016011

Certification report ?

Extracted keywords

Hash functions
SHA-256
Protocols
SSH

Security level
EAL 2
Claims
T.ACCESS, T.RESTRICT, T.IA, T.INFOFLOW, T.COMM, A.AUTHUSER, A.DETECT, A.MANAGE, A.TRAINEDUSER, A.PHYSICAL, A.PEER, A.IT, A.KEYS, A.CONNECT
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.3, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_FLR, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1
Certificates
CSEC2016011
Evaluation facilities
atsec

Vulnerabilities
CVE-2018-9056, CVE-2018-3639, CVE-2017-16808, CVE-2017-0861, CVE-2017-15129, CVE-2017-17805, CVE-2017-17806

Standards
RFC 2460, RFC 3484, RFC 3542, RFC 4213, ISO/IEC 17025, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title: Certification Report Canonical Ubuntu LTS 16.04.4
Subject: 16FMV12482-52:1
Author: Jerry Johansson
Creation date: D:20190131103138+01'00'
Modification date: D:20190201073718+01'00'
Pages: 20
Creator: Acrobat PDFMaker 11 för Word
Producer: Adobe PDF Library 11.0

References

No references.

Security target ?

Extracted keywords

Symmetric Algorithms
AES, AES-256, Triple-DES, TDES, HMAC
Asymmetric Algorithms
ECDSA, Diffie-Hellman
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-2, PBKDF2
Schemes
MAC, Key Exchange
Protocols
SSH, SSL, TLS, IKE, VPN
Randomness
DRBG, RNG
Libraries
OpenSSL, libgcrypt
Elliptic Curves
curve P-256, curve P-384, curve P-521, P-256, P-384, P-521
Block cipher modes
ECB, CBC, CTR, XTS

Security level
EAL2, EAL4, EAL2 augmented
Claims
O.AUDITING, O.CRYPTO, O.DISCRETIONARY, O.NETWORK, O.SUBJECT, O.MANAGE, O.COMP, O.CP, O.TRUSTED_CHANNEL, T.ACCESS, T.RESTRICT, T.IA, T.INFOFLOW, T.COMM, A.CONNECT, A.PHYSICAL, A.MANAGE, A.AUTHUSER, A.TRAINEDUSER, A.DETECT, A.PEER, A.KEYS, A.IT, OE.ADMIN, OE.REMOTE, OE.INSTALL, OE.MAINTENANCE, OE.PHYSICAL, OE.RECOVER, OE.TRUSTED, OE.IT, OE.INFO_PROTECT
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.3, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_SAR.2, FAU_SEL.1, FAU_STG.1, FAU_STG.3, FAU_STG.4, FAU_GEN, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SEL.1.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3.1, FAU_STG.4.1, FCS_RNG.1, FCS_COP.1, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_RNG, FCS_RNG.1.1, FCS_RNG.1.2, FCS_COP.1.1, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FDP_CDP, FDP_CDP.1, FDP_ACC.1, FDP_ACF.1, FDP_IFC.2, FDP_IFF.1, FDP_ITC.2, FDP_RIP.2, FDP_ACC.2, FDP_ETC.2, FDP_IFC.1, FDP_CDP.1.1, FDP_UCT, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ACF.1.2, FDP_IFC.2.1, FDP_IFC.2.2, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_ITC.2.1, FDP_ITC.2.2, FDP_ITC.2.3, FDP_ITC.2.4, FDP_ITC.2.5, FDP_RIP.2.1, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ETC.2.1, FDP_ETC.2.2, FDP_ETC.2.3, FDP_ETC.2.4, FDP_ITC.1, FIA_AFL.1, FIA_ATD.1, FIA_SOS.1, FIA_UAU.1, FIA_UAU.5, FIA_UAU.7, FIA_UID.1, FIA_USB.1, FIA_UID.2, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.7.1, FIA_UID.1.1, FIA_UID.1.2, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_UID.2.1, FMT_MSA.3, FMT_MSA.1, FMT_MTD.1, FMT_MSA.4, FMT_REV.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.1.1, FMT_MTD.1.1, FMT_MSA.4.1, FMT_REV.1.1, FMT_REV.1.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_STM.1, FPT_TDC.1, FPT_STM.1.1, FPT_TDC.1.1, FPT_TDC.1.2, FTA_SSL.1, FTA_SSL.2, FTA_SSL.1.1, FTA_SSL.1.2, FTA_SSL.2.1, FTA_SSL.2.2, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1
Certificates
CSEC 2016011
Evaluation facilities
atsec
Certification process
out of scope, PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation, as Port Address Translation (PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation. Furthermore, packet mangling support is provided with IPTables which is also, DAC mechanism but may be supplemented by further restrictions. These additional restrictions are out of scope for this evaluation. Examples of objects which are accessible to users that cannot be used to store

Certification process
out of scope, PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation, as Port Address Translation (PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation. Furthermore, packet mangling support is provided with IPTables which is also, DAC mechanism but may be supplemented by further restrictions. These additional restrictions are out of scope for this evaluation. Examples of objects which are accessible to users that cannot be used to store

Standards
FIPS 197, FIPS 180-4, FIPS 140-2, FIPS PUB 186-4, FIPS 46-3, FIPS 198-1, FIPS 186-4, FIPS197, FIPS180-4, PKCS #1, AIS 20, AIS 31, RFC 2460, RFC 3484, RFC 3542, RFC 4213, RFC4253, RFC3526, RFC4419, RFC5656, RFC6668, RFC4252, RFC 791, RFC 793, RFC 768, RFC 792, RFC 4253, RFC 4252

File metadata

Title: Security Target for Ubuntu 16.04 LTS (version 1.0 as of 2018-06-27)
Subject: Ubuntu
Keywords: Security Target, Common Criteria, Linux Distribution
Author: Stephan Mueller (generated by CCTool version 2.8.4.6)
Creation date: D:20180627092838Z
Modification date: D:20180730084951+02'00'
Pages: 114
Creator: Unknown
Producer: XEP 4.18 build 20100322

References

No references.

Heuristics ?

Certificate ID: CSEC2016011

Extracted SARs

ADV_FSP.2, ASE_TSS.1, ATE_FUN.1, ASE_CCL.1, ALC_CMC.2, ASE_INT.1, ATE_COV.1, ALC_CMS.2, AVA_VAN.2, ASE_REQ.2, ASE_SPD.1, ALC_DEL.1, AGD_PRE.1, AGD_OPE.1, ASE_OBJ.2, ATE_IND.2, ASE_ECD.1, ALC_FLR.3, ADV_TDS.1, ADV_ARC.1

Scheme data ?

Product Ubuntu LTS 16.04.4 med KVM och QEMU 2.5
Url https://www.fmv.se/verksamhet/ovrig-verksamhet/csec/arkiverade-certifikat-aldre-an-5-ar/ubuntu-lts-16.04.4-med-kvm-och-qemu-2.5/
Enhanced
Title Ubuntu LTS 16.04.4 med KVM och QEMU 2.5
Mutual Recognition CCRA, SOGIS-MRA
Product Ubuntu LTS 16.04.4 med KVM och QEMU 2.5
Category Operativsystem
Target Link https://www.fmv.se/globalassets/csec/ubuntu-lts-16.04.4-med-kvm-och-qemu-2.5/st-ubuntu_16.04_lts-1.0.pdf
Assurance Level EAL 2+ ALC_FLR.3
Certification Date 2018-07-04
Report Link https://www.fmv.se/globalassets/csec/ubuntu-lts-16.04.4-med-kvm-och-qemu-2.5/certification-report-ubuntu-lts-16.04.4.pdf
Cert Link https://www.fmv.se/globalassets/csec/ubuntu-lts-16.04.4-med-kvm-och-qemu-2.5/ccra-certificate-ubuntu.pdf
Sponsor Canonical Group Limited
Developer Canonical Group Limited
Evaluation Facility atsec information security AB

References ?

No references are available for this certificate.

Updates ?

  • 17.07.2023 The certificate data changed.
    Certificate changed

    The Status was updated.

    • The new value is archived.

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'Ubuntu LTS 16.04.4 med KVM och QEMU 2.5', 'url': 'https://www.fmv.se/verksamhet/ovrig-verksamhet/csec/arkiverade-certifikat-aldre-an-5-ar/ubuntu-lts-16.04.4-med-kvm-och-qemu-2.5/', 'enhanced': {'title': 'Ubuntu LTS 16.04.4 med KVM och QEMU 2.5', 'mutual_recognition': 'CCRA, SOGIS-MRA', 'product': 'Ubuntu LTS 16.04.4 med KVM och QEMU 2.5', 'category': 'Operativsystem', 'target_link': 'https://www.fmv.se/globalassets/csec/ubuntu-lts-16.04.4-med-kvm-och-qemu-2.5/st-ubuntu_16.04_lts-1.0.pdf', 'assurance_level': 'EAL 2+ ALC_FLR.3', 'certification_date': '2018-07-04', 'report_link': 'https://www.fmv.se/globalassets/csec/ubuntu-lts-16.04.4-med-kvm-och-qemu-2.5/certification-report-ubuntu-lts-16.04.4.pdf', 'cert_link': 'https://www.fmv.se/globalassets/csec/ubuntu-lts-16.04.4-med-kvm-och-qemu-2.5/ccra-certificate-ubuntu.pdf', 'sponsor': 'Canonical Group Limited', 'developer': 'Canonical Group Limited', 'evaluation_facility': 'atsec information security AB'}}.
  • 20.06.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': {'product': 'Ubuntu LTS 16.04.4 med KVM och QEMU 2.5', 'url': 'https://www.fmv.se/verksamhet/ovrig-verksamhet/csec/certifikat-utgivna-av-csec/ubuntu-lts-16.04.4-med-kvm-och-qemu-2.5/', 'enhanced': {'title': 'Ubuntu LTS 16.04.4 med KVM och QEMU 2.5', 'mutual_recognition': 'CCRA, SOGIS-MRA', 'product': 'Ubuntu LTS 16.04.4 med KVM och QEMU 2.5', 'category': 'Operativsystem', 'target_link': 'https://www.fmv.se/globalassets/csec/ubuntu-lts-16.04.4-med-kvm-och-qemu-2.5/st-ubuntu_16.04_lts-1.0.pdf', 'assurance_level': 'EAL 2+ ALC_FLR.3', 'certification_date': '2018-07-04', 'report_link': 'https://www.fmv.se/globalassets/csec/ubuntu-lts-16.04.4-med-kvm-och-qemu-2.5/certification-report-ubuntu-lts-16.04.4.pdf', 'cert_link': 'https://www.fmv.se/globalassets/csec/ubuntu-lts-16.04.4-med-kvm-och-qemu-2.5/ccra-certificate-ubuntu.pdf', 'sponsor': 'Canonical Group Limited', 'developer': 'Canonical Group Limited', 'evaluation_facility': 'atsec information security AB'}}}.
  • 24.03.2023 The certificate data changed.
    Certificate changed

    The Valid until date was updated.

    • The new value is 2023-07-04.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 77d52c3904d73ecc7c71b84536cb3f5c6a7a42b06960d79189133b422d90e375.
    • The st_txt_hash property was set to fd849fc162a647e54ba05ed3fe3cc30cc9a3923b135ae9ec2ffa2a9145fff305.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1143627, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 114, '/Author': 'Stephan Mueller (generated by CCTool version 2.8.4.6)', '/CreationDate': 'D:20180627092838Z', '/Creator': 'Unknown', '/Keywords': 'Security Target, Common Criteria, Linux Distribution', '/ModDate': "D:20180730084951+02'00'", '/Producer': 'XEP 4.18 build 20100322', '/Subject': 'Ubuntu', '/Title': 'Security Target for Ubuntu 16.04 LTS (version 1.0 as of 2018-06-27)', '/Trapped': '/False', '/application': 'CCTool version x.y', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://tools.ietf.org/html/rfc3526', 'http://csrc.nist.gov/publications/fips/fips180-4/fips-180-4.pdf', 'http://tools.ietf.org/html/rfc6668', 'http://tools.ietf.org/html/rfc4419', 'http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R4.pdf', 'http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf', 'http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R4.pdf', 'http://tools.ietf.org/html/rfc5656', 'http://tools.ietf.org/html/rfc4253', 'http://tools.ietf.org/html/rfc4252', 'http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R4.pdf']}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'SE': {'CSEC 2016011': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 4, 'EAL4': 1, 'EAL2 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.3': 5, 'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 2, 'ASE_INT.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 12, 'FAU_GEN.2': 6, 'FAU_SAR.1': 8, 'FAU_SAR.2': 6, 'FAU_SEL.1': 8, 'FAU_STG.1': 10, 'FAU_STG.3': 7, 'FAU_STG.4': 8, 'FAU_GEN': 2, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_SEL.1.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.3.1': 1, 'FAU_STG.4.1': 1}, 'FCS': {'FCS_RNG.1': 33, 'FCS_COP.1': 26, 'FCS_CKM.1': 34, 'FCS_CKM.2': 13, 'FCS_CKM.4': 13, 'FCS_RNG': 2, 'FCS_RNG.1.1': 4, 'FCS_RNG.1.2': 5, 'FCS_COP.1.1': 6, 'FCS_CKM.1.1': 3, 'FCS_CKM.2.1': 1, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_CDP': 5, 'FDP_CDP.1': 14, 'FDP_ACC.1': 38, 'FDP_ACF.1': 42, 'FDP_IFC.2': 20, 'FDP_IFF.1': 26, 'FDP_ITC.2': 22, 'FDP_RIP.2': 13, 'FDP_ACC.2': 19, 'FDP_ETC.2': 8, 'FDP_IFC.1': 14, 'FDP_CDP.1.1': 2, 'FDP_UCT': 1, 'FDP_ACC.1.1': 3, 'FDP_ACF.1.1': 5, 'FDP_ACF.1.3': 5, 'FDP_ACF.1.4': 5, 'FDP_ACF.1.2': 4, 'FDP_IFC.2.1': 2, 'FDP_IFC.2.2': 2, 'FDP_IFF.1.1': 3, 'FDP_IFF.1.2': 3, 'FDP_IFF.1.3': 3, 'FDP_IFF.1.4': 3, 'FDP_IFF.1.5': 3, 'FDP_ITC.2.1': 2, 'FDP_ITC.2.2': 2, 'FDP_ITC.2.3': 2, 'FDP_ITC.2.4': 2, 'FDP_ITC.2.5': 2, 'FDP_RIP.2.1': 1, 'FDP_ACC.2.1': 2, 'FDP_ACC.2.2': 2, 'FDP_ETC.2.1': 1, 'FDP_ETC.2.2': 1, 'FDP_ETC.2.3': 1, 'FDP_ETC.2.4': 1, 'FDP_ITC.1': 4}, 'FIA': {'FIA_AFL.1': 9, 'FIA_ATD.1': 19, 'FIA_SOS.1': 8, 'FIA_UAU.1': 12, 'FIA_UAU.5': 10, 'FIA_UAU.7': 6, 'FIA_UID.1': 14, 'FIA_USB.1': 8, 'FIA_UID.2': 8, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1.1': 2, 'FIA_SOS.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.7.1': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_UID.2.1': 1}, 'FMT': {'FMT_MSA.3': 51, 'FMT_MSA.1': 50, 'FMT_MTD.1': 91, 'FMT_MSA.4': 6, 'FMT_REV.1': 15, 'FMT_SMF.1': 25, 'FMT_SMR.1': 35, 'FMT_MSA.3.1': 7, 'FMT_MSA.3.2': 7, 'FMT_MSA.1.1': 5, 'FMT_MTD.1.1': 13, 'FMT_MSA.4.1': 1, 'FMT_REV.1.1': 2, 'FMT_REV.1.2': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM.1': 8, 'FPT_TDC.1': 22, 'FPT_STM.1.1': 1, 'FPT_TDC.1.1': 2, 'FPT_TDC.1.2': 2}, 'FTA': {'FTA_SSL.1': 7, 'FTA_SSL.2': 7, 'FTA_SSL.1.1': 1, 'FTA_SSL.1.2': 1, 'FTA_SSL.2.1': 1, 'FTA_SSL.2.2': 1}, 'FTP': {'FTP_ITC.1': 11, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1': 2}}, 'cc_claims': {'O': {'O.AUDITING': 14, 'O.CRYPTO': 15, 'O.DISCRETIONARY': 10, 'O.NETWORK': 12, 'O.SUBJECT': 10, 'O.MANAGE': 26, 'O.COMP': 32, 'O.CP': 17, 'O.TRUSTED_CHANNEL': 4}, 'T': {'T.ACCESS': 24, 'T.RESTRICT': 3, 'T.IA': 6, 'T.INFOFLOW': 4, 'T.COMM': 4}, 'A': {'A.CONNECT': 5, 'A.PHYSICAL': 4, 'A.MANAGE': 5, 'A.AUTHUSER': 3, 'A.TRAINEDUSER': 3, 'A.DETECT': 3, 'A.PEER': 6, 'A.KEYS': 3, 'A.IT': 2}, 'OE': {'OE.ADMIN': 6, 'OE.REMOTE': 4, 'OE.INSTALL': 4, 'OE.MAINTENANCE': 3, 'OE.PHYSICAL': 3, 'OE.RECOVER': 4, 'OE.TRUSTED': 5, 'OE.IT': 4, 'OE.INFO_PROTECT': 8}}, 'vendor': {}, 'eval_facility': {'atsec': {'atsec': 116}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 14, 'AES-256': 2}}, 'DES': {'3DES': {'Triple-DES': 2, 'TDES': 1}}, 'constructions': {'MAC': {'HMAC': 3}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 16}}, 'FF': {'DH': {'Diffie-Hellman': 11}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 6}, 'SHA2': {'SHA-224': 1, 'SHA-256': 4, 'SHA-384': 4, 'SHA-512': 4, 'SHA-2': 2}}, 'PBKDF': {'PBKDF2': 5}}, 'crypto_scheme': {'MAC': {'MAC': 2}, 'KEX': {'Key Exchange': 1}}, 'crypto_protocol': {'SSH': {'SSH': 59}, 'TLS': {'SSL': {'SSL': 11}, 'TLS': {'TLS': 3}}, 'IKE': {'IKE': 1}, 'VPN': {'VPN': 1}}, 'randomness': {'PRNG': {'DRBG': 1}, 'RNG': {'RNG': 17}}, 'cipher_mode': {'ECB': {'ECB': 3}, 'CBC': {'CBC': 5}, 'CTR': {'CTR': 3}, 'XTS': {'XTS': 3}}, 'ecc_curve': {'NIST': {'curve P-256': 1, 'curve P-384': 1, 'curve P-521': 1, 'P-256': 1, 'P-384': 1, 'P-521': 1}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 5}, 'libgcrypt': {'libgcrypt': 2}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 197': 5, 'FIPS 180-4': 6, 'FIPS 140-2': 7, 'FIPS PUB 186-4': 4, 'FIPS 46-3': 1, 'FIPS 198-1': 2, 'FIPS 186-4': 1, 'FIPS197': 2, 'FIPS180-4': 2}, 'PKCS': {'PKCS #1': 1}, 'BSI': {'AIS 20': 1, 'AIS 31': 1}, 'RFC': {'RFC 2460': 1, 'RFC 3484': 1, 'RFC 3542': 1, 'RFC 4213': 1, 'RFC4253': 13, 'RFC3526': 2, 'RFC4419': 3, 'RFC5656': 4, 'RFC6668': 2, 'RFC4252': 6, 'RFC 791': 2, 'RFC 793': 1, 'RFC 768': 1, 'RFC 792': 1, 'RFC 4253': 3, 'RFC 4252': 4}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 3, 'PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation': 1, 'as Port Address Translation (PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation. Furthermore, packet mangling support is provided with IPTables which is also': 1, 'DAC mechanism but may be supplemented by further restrictions. These additional restrictions are out of scope for this evaluation. Examples of objects which are accessible to users that cannot be used to store': 1}}}.
    • The st_filename property was set to ST-Ubuntu_16.04_LTS-1.0.pdf.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is https://www.commoncriteriaportal.org/files/epfiles/CCRA%20Certificate%20Ubuntu.pdf.

    The manufacturer_web was updated.

    • The new value is https://www.canonical.com/.

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/ST-Ubuntu_16.04_LTS-1.0.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is None.

    The manufacturer_web was updated.

    • The new value is None.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].
  • 22.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/Certification%20Report%20Ubuntu%20LTS%2016.04.4.pdf, code: nok'].
  • 16.11.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'/Ansvarigt OmrÃ¥de/enhet': 'CSEC', '/CSEC ID': '', '/Current Version': '0.9', '/Datum, skapat': '-', '/Deluppdragsbenämning': ' ', '/Dokument Status': 'Aktiv', '/Dokumentansvarigs enhet': 'KC Ledsyst', '/Fastställarens roll': 'Lead Certifier', '/Fastställd den': '2016-06-10T19:05:00Z', '/Fastställt av': 'Jerry Johansson', '/Fastställt av1': 'Jerry Johansson', '/Giltigt frÃ¥n': '-', '/Referens ID': 'FMVID-297-738', '/Sekr. gäller tom.': '-', '/Stämpel': '0', '/Uppdragsbenämning': ' ', '/UtgÃ¥va': '1.0', '/Ärendetyp': '6'} values inserted.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 26.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The st_keywords property was updated, with the {'crypto_protocol': {'__insert__': {'VPN': {'VPN': 1}}}} data.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'Certification Report Ubuntu LTS 16.04.4.pdf', 'st_filename': 'ST-Ubuntu_16.04_LTS-1.0.pdf'}.
    • The report_keywords property was updated, with the {'cc_sar': {'__update__': {'ALC': {'__insert__': {'ALC_FLR': 1}, '__update__': {'ALC_FLR.3': 4}}}}, 'cc_claims': {'__update__': {'T': {'T.ACCESS': 6, 'T.RESTRICT': 1, 'T.IA': 2, 'T.INFOFLOW': 1, 'T.COMM': 1}, 'A': {'__insert__': {'A.PEER': 2, 'A.IT': 1}, '__delete__': ['A.PEER.MGT', 'A.PEER.FUNC', 'A.IT.FUNC', 'A.MASQUERADE', 'A.USER']}}, '__delete__': ['R']}, 'crypto_protocol': {'__update__': {'SSH': {'__update__': {'SSH': 8}}}}, 'ecc_curve': {}, 'side_channel_analysis': {}, 'tee_name': {}, 'standard_id': {'__update__': {'RFC': {'__insert__': {'RFC 4213': 1}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'SE': {'CSEC 2016011': 1}}, 'cc_security_level': {'__update__': {'EAL': {'__insert__': {'EAL4': 1}}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR.3': 5}}}}, 'cc_sfr': {'__update__': {'FAU': {'__update__': {'FAU_GEN.1': 12, 'FAU_GEN.2': 6, 'FAU_SAR.1': 8, 'FAU_SAR.2': 6, 'FAU_SEL.1': 8, 'FAU_STG.1': 10, 'FAU_STG.4': 8}}, 'FCS': {'__update__': {'FCS_RNG.1': 33, 'FCS_COP.1': 26, 'FCS_CKM.1': 34, 'FCS_CKM.2': 13, 'FCS_CKM.4': 13}}, 'FDP': {'__update__': {'FDP_ACC.1': 38, 'FDP_ACF.1': 42, 'FDP_IFC.2': 20, 'FDP_IFF.1': 26, 'FDP_ITC.2': 22, 'FDP_ACC.2': 19, 'FDP_ETC.2': 8, 'FDP_ACF.1.2': 4}}, 'FIA': {'__update__': {'FIA_AFL.1': 9, 'FIA_ATD.1': 19, 'FIA_SOS.1': 8, 'FIA_UAU.1': 12, 'FIA_UAU.5': 10, 'FIA_UAU.7': 6, 'FIA_UID.1': 14, 'FIA_USB.1': 8, 'FIA_UID.2': 8}}, 'FMT': {'__update__': {'FMT_MSA.3': 51, 'FMT_MSA.1': 50, 'FMT_MTD.1': 91, 'FMT_MSA.4': 6, 'FMT_REV.1': 15, 'FMT_SMF.1': 25, 'FMT_SMR.1': 35}}, 'FPT': {'__update__': {'FPT_TDC.1': 22}}, 'FTA': {'__update__': {'FTA_SSL.2': 7}}, 'FTP': {'__update__': {'FTP_ITC.1': 11}}}}, 'cc_claims': {'__update__': {'O': {'__insert__': {'O.CRYPTO': 15, 'O.NETWORK': 12, 'O.SUBJECT': 10, 'O.COMP': 32, 'O.CP': 17}, '__update__': {'O.TRUSTED_CHANNEL': 4, 'O.DISCRETIONARY': 10}, '__delete__': ['O.CRYPTO.NET', 'O.DISCRETIONARY.ACCESS', 'O.NETWORK.FLOW', 'O.SUBJECT.COM', 'O.COMP.INFO_FLOW_CTRL', 'O.COMP.RESOURCE_ACCESS', 'O.COMP.IDENT', 'O.CP.USERDATA', 'O.CP.ANCHOR']}, 'T': {'T.ACCESS': 24, 'T.RESTRICT': 3, 'T.IA': 6, 'T.INFOFLOW': 4, 'T.COMM': 4}, 'A': {'__insert__': {'A.PEER': 6, 'A.IT': 2}, '__update__': {'A.MANAGE': 5, 'A.AUTHUSER': 3, 'A.TRAINEDUSER': 3, 'A.DETECT': 3, 'A.KEYS': 3}, '__delete__': ['A.MASQUERADE', 'A.USER', 'A.PEER.MGT', 'A.PEER.FUNC', 'A.IT.FUNC']}, 'OE': {'__insert__': {'OE.TRUSTED': 5, 'OE.IT': 4}, '__update__': {'OE.INFO_PROTECT': 8}, '__delete__': ['OE.TRUSTED.IT.SYSTEM', 'OE.IT.SYSTEM']}}, '__delete__': ['D', 'R']}, 'vendor': {}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 14}}}}, 'DES': {'__delete__': ['DES']}}}, 'asymmetric_crypto': {'__update__': {'FF': {'__delete__': ['DSA']}}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA2': {'__update__': {'SHA-2': 2}}}}, 'PBKDF': {'__update__': {'PBKDF2': 5}}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 2}}}}, 'crypto_protocol': {'__update__': {'SSH': {'__update__': {'SSH': 59}}, 'TLS': {'__update__': {'SSL': {'__update__': {'SSL': 11}}}}}}, 'randomness': {'__update__': {'PRNG': {'__update__': {'DRBG': 1}}, 'RNG': {'__update__': {'RNG': 17}, '__delete__': ['RBG']}}, '__delete__': ['TRNG']}, 'crypto_library': {'__update__': {'OpenSSL': {'__update__': {'OpenSSL': 5}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'FIPS': {'__update__': {'FIPS PUB 186-4': 4, 'FIPS 180-4': 6}}, 'RFC': {'__insert__': {'RFC 4213': 1}}}}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {'PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation': 1, 'as Port Address Translation (PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation. Furthermore, packet mangling support is provided with IPTables which is also': 1, 'DAC mechanism but may be supplemented by further restrictions. These additional restrictions are out of scope for this evaluation. Examples of objects which are accessible to users that cannot be used to store': 1}, '__delete__': ['(PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation', '. These additional restrictions are out of scope for this evaluation', 'l as Port Address Translation (PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation. Furthermore, packet mangling support is provided with IPTables which is also', 'out of scope for the evaluation. IPTables registers all hooks provided by the netfilter framework. The NAT/PAT', 'he DAC mechanism but may be supplemented by further restrictions. These additional restrictions are out of scope for this evaluation. Examples of objects which are accessible to users that cannot be used to store']}}}} data.
  • 28.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report_extract_ok property was set to True.
    • The errors property was set to [].

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 166835, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 20, '/Ansvarigt#20Omr#C3#A5de#2Fenhet': 'CSEC', '/Author': 'Jerry Johansson', '/C-datum': '2008', '/CSEC#20ID': '', '/CSECID': '', '/Company': 'FMV/CSEC', '/ContentTypeId': '0x010100209C0526C7C5A44683868ABD684765F80200B916D1351C38174AA524317F62806230', '/Copy': '0', '/CreationDate': "D:20190131103138+01'00'", '/Creator': 'Acrobat PDFMaker 11 för Word', '/Current#20Version': '0.9', '/DDocBinder': 'Scheme (CB)', '/DDocCabinet': 'QMS', '/DDocID': '2005-03-05-64D6-T9YR', '/DDocLastModDate': '2006-03-16 10:56:39', '/DDocLibrary': 'https://haddock.fmv.se/domdoc/CSECLib.nsf', '/DDocRevision': '3,7', '/DDocTitle': '035 CB General Document - Template', '/Datum,#20skapat': '-', '/Deluppdragsben#C3#A4mning': ' ', '/Dokument#20Status': 'Aktiv', '/Dokumentansvarig': 'Jerry Johansson', '/Dokumentansvarigs#20enhet': 'KC Ledsyst', '/Dokumentbeteckning': '', '/Dokumentdatum': '2018-Jul-04', '/Dokumenttitel': 'Certification Report Canonical Ubuntu LTS 16.04.4', '/Dokumenttyp': 'CB', '/FMV_beteckning': '16FMV12482-52:1', '/Fast_Roll': '', '/Fast_av': '', '/Fast_den': '2014-01-27T19:05:45Z', '/Fastst#C3#A4llarens#20roll': 'Lead Certifier', '/Fastst#C3#A4lld#20den': '2016-06-10T19:05:00Z', '/Fastst#C3#A4llt#20av': 'Jerry Johansson', '/Fastst#C3#A4llt#20av1': 'Jerry Johansson', '/Giltigt#20fr#C3#A5n': '-', '/Infoklass': 'Öppen', '/Informationsklass': '', '/Keywords': '', '/Klassificeringsnr': '25 550', '/MallVersion': '7.0', '/ModDate': "D:20190201073718+01'00'", '/Paragraf': '', '/Platina': '1', '/Producer': 'Adobe PDF Library 11.0', '/Referens#20ID': 'FMVID-297-738', '/Sekr.#20g#C3#A4ller#20tom.': '-', '/SourceModified': '', '/Status': 'Aktivt', '/St#C3#A4mpel': '0', '/Subject': '16FMV12482-52:1', '/Title': 'Certification Report Canonical Ubuntu LTS 16.04.4', '/Uncontrolled': '0.000000', '/Uppdragsben#C3#A4mning': ' ', '/Utg#C3#A5va': '1.0', '/_dlc_DocId': 'CSEC-37-1650', '/_dlc_DocIdItemGuid': 'cfa7e571-175c-4889-bd10-378edb70609a', '/_dlc_DocIdUrl': 'http://sp.fmv.se/sites/CSEC/_layouts/15/DocIdRedir.aspx?ID=CSEC-37-1650, CSEC-37-1650', '/#C3#84rendetyp': '6', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report_extract_ok property was set to False.
    • The errors property was set to ['Failed to read metadata of certs/reports/pdf/866422258dc2abc6.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/reports/pdf/866422258dc2abc6.pdf, error: can only concatenate list (not "IndirectObject") to list'].

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://tools.ietf.org/html/rfc3526', 'http://csrc.nist.gov/publications/fips/fips180-4/fips-180-4.pdf', 'http://tools.ietf.org/html/rfc6668', 'http://tools.ietf.org/html/rfc4419', 'http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R4.pdf', 'http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf', 'http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R4.pdf', 'http://tools.ietf.org/html/rfc5656', 'http://tools.ietf.org/html/rfc4253', 'http://tools.ietf.org/html/rfc4252', 'http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R4.pdf']}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'SE': {'CSEC2016011': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 3}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.3': 3, 'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.FUNC': 1, 'T.ACCESS.TSFDATA': 1, 'T.ACCESS.USERDATA': 1, 'T.ACCESS.TSFFUNC': 1, 'T.ACCESS.COMM': 1, 'T.RESTRICT.NETTRAFFIC': 1, 'T.IA.MASQUERADE': 1, 'T.IA.USER': 1, 'T.ACCESS.COMPENV': 1, 'T.INFOFLOW.COMP': 1, 'T.COMM.COMP': 1, 'T.ACCESS.CP.USERDATA': 1}, 'A': {'A.AUTHUSER': 1, 'A.DETECT': 1, 'A.MANAGE': 1, 'A.TRAINEDUSER': 1, 'A.PHYSICAL': 1, 'A.PEER.MGT': 1, 'A.PEER.FUNC': 1, 'A.IT.FUNC': 1, 'A.KEYS': 1, 'A.CONNECT': 1, 'A.MASQUERADE': 1, 'A.USER': 1}, 'R': {'R.MGT': 1, 'R.FUNC': 1}}, 'vendor': {}, 'eval_facility': {'atsec': {'atsec': 4}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 11}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {'NIST': {'P-002': 2, 'P-188': 2}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {'CVE': {'CVE-2018-9056': 1, 'CVE-2018-3639': 1, 'CVE-2017-16808': 1, 'CVE-2017-0861': 1, 'CVE-2017-15129': 1, 'CVE-2017-17805': 1, 'CVE-2017-17806': 1}}, 'side_channel_analysis': {'SCA': {'t-test': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'RFC': {'RFC 2460': 1, 'RFC 3484': 1, 'RFC 3542': 1}, 'ISO': {'ISO/IEC 17025': 2}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 4, 'EAL2 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.3': 3, 'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 2, 'ASE_INT.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 16, 'FAU_GEN.2': 7, 'FAU_SAR.1': 9, 'FAU_SAR.2': 7, 'FAU_SEL.1': 7, 'FAU_STG.1': 12, 'FAU_STG.3': 7, 'FAU_STG.4': 6, 'FAU_GEN': 2, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_SEL.1.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.3.1': 1, 'FAU_STG.4.1': 1}, 'FCS': {'FCS_RNG.1': 36, 'FCS_COP.1': 28, 'FCS_CKM.1': 39, 'FCS_CKM.2': 14, 'FCS_CKM.4': 19, 'FCS_RNG': 2, 'FCS_RNG.1.1': 4, 'FCS_RNG.1.2': 5, 'FCS_COP.1.1': 6, 'FCS_CKM.1.1': 3, 'FCS_CKM.2.1': 1, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_CDP': 5, 'FDP_CDP.1': 14, 'FDP_ACC.1': 42, 'FDP_ACF.1': 50, 'FDP_IFC.2': 24, 'FDP_IFF.1': 31, 'FDP_ITC.2': 24, 'FDP_RIP.2': 13, 'FDP_ACC.2': 23, 'FDP_ETC.2': 9, 'FDP_IFC.1': 14, 'FDP_CDP.1.1': 2, 'FDP_UCT': 1, 'FDP_ACC.1.1': 3, 'FDP_ACF.1.1': 5, 'FDP_ACF.1.2': 5, 'FDP_ACF.1.3': 5, 'FDP_ACF.1.4': 5, 'FDP_IFC.2.1': 2, 'FDP_IFC.2.2': 2, 'FDP_IFF.1.1': 3, 'FDP_IFF.1.2': 3, 'FDP_IFF.1.3': 3, 'FDP_IFF.1.4': 3, 'FDP_IFF.1.5': 3, 'FDP_ITC.2.1': 2, 'FDP_ITC.2.2': 2, 'FDP_ITC.2.3': 2, 'FDP_ITC.2.4': 2, 'FDP_ITC.2.5': 2, 'FDP_RIP.2.1': 1, 'FDP_ACC.2.1': 2, 'FDP_ACC.2.2': 2, 'FDP_ETC.2.1': 1, 'FDP_ETC.2.2': 1, 'FDP_ETC.2.3': 1, 'FDP_ETC.2.4': 1, 'FDP_ITC.1': 4}, 'FIA': {'FIA_AFL.1': 7, 'FIA_ATD.1': 22, 'FIA_SOS.1': 7, 'FIA_UAU.1': 17, 'FIA_UAU.5': 9, 'FIA_UAU.7': 7, 'FIA_UID.1': 16, 'FIA_USB.1': 7, 'FIA_UID.2': 9, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1.1': 2, 'FIA_SOS.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.7.1': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_UID.2.1': 1}, 'FMT': {'FMT_MSA.3': 63, 'FMT_MSA.1': 55, 'FMT_MTD.1': 104, 'FMT_MSA.4': 7, 'FMT_REV.1': 17, 'FMT_SMF.1': 43, 'FMT_SMR.1': 60, 'FMT_MSA.3.1': 7, 'FMT_MSA.3.2': 7, 'FMT_MSA.1.1': 5, 'FMT_MTD.1.1': 13, 'FMT_MSA.4.1': 1, 'FMT_REV.1.1': 2, 'FMT_REV.1.2': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM.1': 8, 'FPT_TDC.1': 24, 'FPT_STM.1.1': 1, 'FPT_TDC.1.1': 2, 'FPT_TDC.1.2': 2}, 'FTA': {'FTA_SSL.1': 7, 'FTA_SSL.2': 6, 'FTA_SSL.1.1': 1, 'FTA_SSL.1.2': 1, 'FTA_SSL.2.1': 1, 'FTA_SSL.2.2': 1}, 'FTP': {'FTP_ITC.1': 10, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1': 2}}, 'cc_claims': {'D': {'D.IT.SYSTEM': 5}, 'O': {'O.AUDITING': 14, 'O.CRYPTO.NET': 15, 'O.DISCRETIONARY.ACCESS': 1, 'O.NETWORK.FLOW': 12, 'O.SUBJECT.COM': 10, 'O.MANAGE': 26, 'O.TRUSTED_CHANNEL': 5, 'O.COMP.INFO_FLOW_CTRL': 12, 'O.COMP.RESOURCE_ACCESS': 13, 'O.COMP.IDENT': 7, 'O.CP.USERDATA': 12, 'O.CP.ANCHOR': 5, 'O.DISCRETIONARY': 9}, 'T': {'T.ACCESS.TSFDATA': 5, 'T.ACCESS.USERDATA': 5, 'T.ACCESS.TSFFUNC': 4, 'T.ACCESS.COMM': 4, 'T.RESTRICT.NETTRAFFIC': 3, 'T.IA.MASQUERADE': 3, 'T.IA.USER': 3, 'T.ACCESS.COMPENV': 4, 'T.INFOFLOW.COMP': 4, 'T.COMM.COMP': 4, 'T.ACCESS.CP.USERDATA': 3, 'T.FUNC': 3, 'T.COM': 10, 'T.SYSTEM': 9}, 'A': {'A.CONNECT': 5, 'A.MASQUERADE': 3, 'A.USER': 3, 'A.PHYSICAL': 4, 'A.MANAGE': 6, 'A.AUTHUSER': 4, 'A.TRAINEDUSER': 4, 'A.DETECT': 5, 'A.PEER.MGT': 3, 'A.PEER.FUNC': 3, 'A.IT.FUNC': 3, 'A.KEYS': 4}, 'R': {'R.MGT': 3, 'R.FUNC': 3}, 'OE': {'OE.ADMIN': 6, 'OE.REMOTE': 4, 'OE.INFO_PROTECT': 9, 'OE.INSTALL': 4, 'OE.MAINTENANCE': 3, 'OE.PHYSICAL': 3, 'OE.RECOVER': 4, 'OE.TRUSTED.IT.SYSTEM': 5, 'OE.IT.SYSTEM': 4}}, 'vendor': {'STMicroelectronics': {'STM': 10}}, 'eval_facility': {'atsec': {'atsec': 116}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 13, 'AES-256': 2}}, 'DES': {'DES': {'DES': 3}, '3DES': {'Triple-DES': 2, 'TDES': 1}}, 'constructions': {'MAC': {'HMAC': 3}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 16}}, 'FF': {'DH': {'Diffie-Hellman': 11}, 'DSA': {'DSA': 16}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 6}, 'SHA2': {'SHA-224': 1, 'SHA-256': 4, 'SHA-384': 4, 'SHA-512': 4, 'SHA-2': 3}}, 'PBKDF': {'PBKDF2': 4}}, 'crypto_scheme': {'MAC': {'MAC': 5}, 'KEX': {'Key Exchange': 1}}, 'crypto_protocol': {'SSH': {'SSH': 100}, 'TLS': {'SSL': {'SSL': 14}, 'TLS': {'TLS': 3}}, 'IKE': {'IKE': 1}}, 'randomness': {'TRNG': {'TRNG': 3}, 'PRNG': {'DRBG': 2}, 'RNG': {'RNG': 24, 'RBG': 2}}, 'cipher_mode': {'ECB': {'ECB': 3}, 'CBC': {'CBC': 5}, 'CTR': {'CTR': 3}, 'XTS': {'XTS': 3}}, 'ecc_curve': {'NIST': {'curve P-256': 1, 'curve P-384': 1, 'curve P-521': 1, 'P-256': 1, 'P-384': 1, 'P-521': 1}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 4}, 'libgcrypt': {'libgcrypt': 2}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 3}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 197': 5, 'FIPS 140-2': 7, 'FIPS PUB 186-4': 2, 'FIPS 46-3': 1, 'FIPS 180-4': 3, 'FIPS 198-1': 2, 'FIPS 186-4': 1, 'FIPS197': 2, 'FIPS180-4': 2}, 'PKCS': {'PKCS #1': 1}, 'BSI': {'AIS 20': 1, 'AIS 31': 1}, 'RFC': {'RFC 2460': 1, 'RFC 3484': 1, 'RFC 3542': 1, 'RFC4253': 13, 'RFC3526': 2, 'RFC4419': 3, 'RFC5656': 4, 'RFC6668': 2, 'RFC4252': 6, 'RFC 791': 2, 'RFC 793': 1, 'RFC 768': 1, 'RFC 792': 1, 'RFC 4253': 3, 'RFC 4252': 4}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 3, '(PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation': 1, '. These additional restrictions are out of scope for this evaluation': 1, 'l as Port Address Translation (PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation. Furthermore, packet mangling support is provided with IPTables which is also': 1, 'out of scope for the evaluation. IPTables registers all hooks provided by the netfilter framework. The NAT/PAT': 1, 'he DAC mechanism but may be supplemented by further restrictions. These additional restrictions are out of scope for this evaluation. Examples of objects which are accessible to users that cannot be used to store': 1}}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '10f99d730a6e205ce4231244cb4b6be728058539713cdd5089c8d4273e9c20e7', 'st_pdf_hash': '77d52c3904d73ecc7c71b84536cb3f5c6a7a42b06960d79189133b422d90e375', 'report_txt_hash': '89636640fac87f12f9ff2994586b24ff30d19baad66da4f37176faa3372637ed', 'st_txt_hash': 'fd849fc162a647e54ba05ed3fe3cc30cc9a3923b135ae9ec2ffa2a9145fff305'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_ecc_curves': {'P-002': 2, 'P-188': 2}} data.
    • The st_keywords property was updated, with the {'rules_block_cipher_modes': {'__insert__': {'XTS': 3}}, 'rules_ecc_curves': {'__insert__': {'P-256': 1, 'P-384': 1, 'P-521': 1}}} data.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The report_keywords property was updated, with the {'rules_cert_id': {'CSEC2016011': 1}} data.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['2.5', '16.04.4']}.
    • The cert_id property was set to CSEC2016011.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Ubuntu LTS 16.04.4 with KVM and QEMU 2.5 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Operating Systems",
  "cert_link": "https://www.commoncriteriaportal.org/files/epfiles/CCRA%20Certificate%20Ubuntu.pdf",
  "dgst": "866422258dc2abc6",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "cert_id": "CSEC2016011",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "16.04.4",
        "2.5"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "enhanced": {
        "assurance_level": "EAL 2+ ALC_FLR.3",
        "category": "Operativsystem",
        "cert_link": "https://www.fmv.se/globalassets/csec/ubuntu-lts-16.04.4-med-kvm-och-qemu-2.5/ccra-certificate-ubuntu.pdf",
        "certification_date": "2018-07-04",
        "developer": "Canonical Group Limited",
        "evaluation_facility": "atsec information security AB",
        "mutual_recognition": "CCRA, SOGIS-MRA",
        "product": "Ubuntu LTS 16.04.4 med KVM och QEMU 2.5",
        "report_link": "https://www.fmv.se/globalassets/csec/ubuntu-lts-16.04.4-med-kvm-och-qemu-2.5/certification-report-ubuntu-lts-16.04.4.pdf",
        "sponsor": "Canonical Group Limited",
        "target_link": "https://www.fmv.se/globalassets/csec/ubuntu-lts-16.04.4-med-kvm-och-qemu-2.5/st-ubuntu_16.04_lts-1.0.pdf",
        "title": "Ubuntu LTS 16.04.4 med KVM och QEMU 2.5"
      },
      "product": "Ubuntu LTS 16.04.4 med KVM och QEMU 2.5",
      "url": "https://www.fmv.se/verksamhet/ovrig-verksamhet/csec/arkiverade-certifikat-aldre-an-5-ar/ubuntu-lts-16.04.4-med-kvm-och-qemu-2.5/"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Canonical Group Limited",
  "manufacturer_web": "https://www.canonical.com/",
  "name": "Ubuntu LTS 16.04.4 with KVM and QEMU 2.5",
  "not_valid_after": "2023-07-04",
  "not_valid_before": "2018-07-04",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "report_filename": "Certification Report Ubuntu LTS 16.04.4.pdf",
    "report_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "SE": {
          "CSEC2016011": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.AUTHUSER": 1,
          "A.CONNECT": 1,
          "A.DETECT": 1,
          "A.IT": 1,
          "A.KEYS": 1,
          "A.MANAGE": 1,
          "A.PEER": 2,
          "A.PHYSICAL": 1,
          "A.TRAINEDUSER": 1
        },
        "T": {
          "T.ACCESS": 6,
          "T.COMM": 1,
          "T.IA": 2,
          "T.INFOFLOW": 1,
          "T.RESTRICT": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.2": 1,
          "ADV_TDS.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.2": 1,
          "ALC_CMS.2": 1,
          "ALC_DEL.1": 1,
          "ALC_FLR": 1,
          "ALC_FLR.3": 4
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 3
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 8
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "atsec": {
          "atsec": 4
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        },
        "ISO": {
          "ISO/IEC 17025": 2
        },
        "RFC": {
          "RFC 2460": 1,
          "RFC 3484": 1,
          "RFC 3542": 1,
          "RFC 4213": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {
        "CVE": {
          "CVE-2017-0861": 1,
          "CVE-2017-15129": 1,
          "CVE-2017-16808": 1,
          "CVE-2017-17805": 1,
          "CVE-2017-17806": 1,
          "CVE-2018-3639": 1,
          "CVE-2018-9056": 1
        }
      }
    },
    "report_metadata": {
      "/Ansvarigt Omr\u00e5de/enhet": "CSEC",
      "/Author": "Jerry Johansson",
      "/C-datum": "2008",
      "/CSEC ID": "",
      "/CSECID": "",
      "/Company": "FMV/CSEC",
      "/ContentTypeId": "0x010100209C0526C7C5A44683868ABD684765F80200B916D1351C38174AA524317F62806230",
      "/Copy": "0",
      "/CreationDate": "D:20190131103138+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 11 f\u00f6r Word",
      "/Current Version": "0.9",
      "/DDocBinder": "Scheme (CB)",
      "/DDocCabinet": "QMS",
      "/DDocID": "2005-03-05-64D6-T9YR",
      "/DDocLastModDate": "2006-03-16 10:56:39",
      "/DDocLibrary": "https://haddock.fmv.se/domdoc/CSECLib.nsf",
      "/DDocRevision": "3,7",
      "/DDocTitle": "035 CB General Document - Template",
      "/Datum, skapat": "-",
      "/Deluppdragsben\u00e4mning": " ",
      "/Dokument Status": "Aktiv",
      "/Dokumentansvarig": "Jerry Johansson",
      "/Dokumentansvarigs enhet": "KC Ledsyst",
      "/Dokumentbeteckning": "",
      "/Dokumentdatum": "2018-Jul-04",
      "/Dokumenttitel": "Certification Report Canonical Ubuntu LTS 16.04.4",
      "/Dokumenttyp": "CB",
      "/FMV_beteckning": "16FMV12482-52:1",
      "/Fast_Roll": "",
      "/Fast_av": "",
      "/Fast_den": "2014-01-27T19:05:45Z",
      "/Fastst\u00e4llarens roll": "Lead Certifier",
      "/Fastst\u00e4lld den": "2016-06-10T19:05:00Z",
      "/Fastst\u00e4llt av": "Jerry Johansson",
      "/Fastst\u00e4llt av1": "Jerry Johansson",
      "/Giltigt fr\u00e5n": "-",
      "/Infoklass": "\u00d6ppen",
      "/Informationsklass": "",
      "/Keywords": "",
      "/Klassificeringsnr": "25 550",
      "/MallVersion": "7.0",
      "/ModDate": "D:20190201073718+01\u002700\u0027",
      "/Paragraf": "",
      "/Platina": "1",
      "/Producer": "Adobe PDF Library 11.0",
      "/Referens ID": "FMVID-297-738",
      "/Sekr. g\u00e4ller tom.": "-",
      "/SourceModified": "",
      "/Status": "Aktivt",
      "/St\u00e4mpel": "0",
      "/Subject": "16FMV12482-52:1",
      "/Title": "Certification Report Canonical Ubuntu LTS 16.04.4",
      "/Uncontrolled": "0.000000",
      "/Uppdragsben\u00e4mning": " ",
      "/Utg\u00e5va": "1.0",
      "/_dlc_DocId": "CSEC-37-1650",
      "/_dlc_DocIdItemGuid": "cfa7e571-175c-4889-bd10-378edb70609a",
      "/_dlc_DocIdUrl": "http://sp.fmv.se/sites/CSEC/_layouts/15/DocIdRedir.aspx?ID=CSEC-37-1650, CSEC-37-1650",
      "/\u00c4rendetyp": "6",
      "pdf_file_size_bytes": 166835,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 20
    },
    "st_filename": "ST-Ubuntu_16.04_LTS-1.0.pdf",
    "st_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDSA": {
            "ECDSA": 16
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 11
          }
        }
      },
      "cc_cert_id": {
        "SE": {
          "CSEC 2016011": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.AUTHUSER": 3,
          "A.CONNECT": 5,
          "A.DETECT": 3,
          "A.IT": 2,
          "A.KEYS": 3,
          "A.MANAGE": 5,
          "A.PEER": 6,
          "A.PHYSICAL": 4,
          "A.TRAINEDUSER": 3
        },
        "O": {
          "O.AUDITING": 14,
          "O.COMP": 32,
          "O.CP": 17,
          "O.CRYPTO": 15,
          "O.DISCRETIONARY": 10,
          "O.MANAGE": 26,
          "O.NETWORK": 12,
          "O.SUBJECT": 10,
          "O.TRUSTED_CHANNEL": 4
        },
        "OE": {
          "OE.ADMIN": 6,
          "OE.INFO_PROTECT": 8,
          "OE.INSTALL": 4,
          "OE.IT": 4,
          "OE.MAINTENANCE": 3,
          "OE.PHYSICAL": 3,
          "OE.RECOVER": 4,
          "OE.REMOTE": 4,
          "OE.TRUSTED": 5
        },
        "T": {
          "T.ACCESS": 24,
          "T.COMM": 4,
          "T.IA": 6,
          "T.INFOFLOW": 4,
          "T.RESTRICT": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.2": 1,
          "ADV_TDS.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.2": 1,
          "ALC_CMS.2": 1,
          "ALC_DEL.1": 1,
          "ALC_FLR.3": 5
        },
        "ASE": {
          "ASE_CCL.1": 2,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 4,
          "EAL2 augmented": 1,
          "EAL4": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 2,
          "FAU_GEN.1": 12,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 6,
          "FAU_GEN.2.1": 1,
          "FAU_SAR.1": 8,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.2": 6,
          "FAU_SAR.2.1": 1,
          "FAU_SEL.1": 8,
          "FAU_SEL.1.1": 1,
          "FAU_STG.1": 10,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1,
          "FAU_STG.3": 7,
          "FAU_STG.3.1": 1,
          "FAU_STG.4": 8,
          "FAU_STG.4.1": 1
        },
        "FCS": {
          "FCS_CKM.1": 34,
          "FCS_CKM.1.1": 3,
          "FCS_CKM.2": 13,
          "FCS_CKM.2.1": 1,
          "FCS_CKM.4": 13,
          "FCS_CKM.4.1": 1,
          "FCS_COP.1": 26,
          "FCS_COP.1.1": 6,
          "FCS_RNG": 2,
          "FCS_RNG.1": 33,
          "FCS_RNG.1.1": 4,
          "FCS_RNG.1.2": 5
        },
        "FDP": {
          "FDP_ACC.1": 38,
          "FDP_ACC.1.1": 3,
          "FDP_ACC.2": 19,
          "FDP_ACC.2.1": 2,
          "FDP_ACC.2.2": 2,
          "FDP_ACF.1": 42,
          "FDP_ACF.1.1": 5,
          "FDP_ACF.1.2": 4,
          "FDP_ACF.1.3": 5,
          "FDP_ACF.1.4": 5,
          "FDP_CDP": 5,
          "FDP_CDP.1": 14,
          "FDP_CDP.1.1": 2,
          "FDP_ETC.2": 8,
          "FDP_ETC.2.1": 1,
          "FDP_ETC.2.2": 1,
          "FDP_ETC.2.3": 1,
          "FDP_ETC.2.4": 1,
          "FDP_IFC.1": 14,
          "FDP_IFC.2": 20,
          "FDP_IFC.2.1": 2,
          "FDP_IFC.2.2": 2,
          "FDP_IFF.1": 26,
          "FDP_IFF.1.1": 3,
          "FDP_IFF.1.2": 3,
          "FDP_IFF.1.3": 3,
          "FDP_IFF.1.4": 3,
          "FDP_IFF.1.5": 3,
          "FDP_ITC.1": 4,
          "FDP_ITC.2": 22,
          "FDP_ITC.2.1": 2,
          "FDP_ITC.2.2": 2,
          "FDP_ITC.2.3": 2,
          "FDP_ITC.2.4": 2,
          "FDP_ITC.2.5": 2,
          "FDP_RIP.2": 13,
          "FDP_RIP.2.1": 1,
          "FDP_UCT": 1
        },
        "FIA": {
          "FIA_AFL.1": 9,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD.1": 19,
          "FIA_ATD.1.1": 2,
          "FIA_SOS.1": 8,
          "FIA_SOS.1.1": 1,
          "FIA_UAU.1": 12,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.5": 10,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.7": 6,
          "FIA_UAU.7.1": 1,
          "FIA_UID.1": 14,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1,
          "FIA_UID.2": 8,
          "FIA_UID.2.1": 1,
          "FIA_USB.1": 8,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_MSA.1": 50,
          "FMT_MSA.1.1": 5,
          "FMT_MSA.3": 51,
          "FMT_MSA.3.1": 7,
          "FMT_MSA.3.2": 7,
          "FMT_MSA.4": 6,
          "FMT_MSA.4.1": 1,
          "FMT_MTD.1": 91,
          "FMT_MTD.1.1": 13,
          "FMT_REV.1": 15,
          "FMT_REV.1.1": 2,
          "FMT_REV.1.2": 2,
          "FMT_SMF.1": 25,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 35,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_STM.1": 8,
          "FPT_STM.1.1": 1,
          "FPT_TDC.1": 22,
          "FPT_TDC.1.1": 2,
          "FPT_TDC.1.2": 2
        },
        "FTA": {
          "FTA_SSL.1": 7,
          "FTA_SSL.1.1": 1,
          "FTA_SSL.1.2": 1,
          "FTA_SSL.2": 7,
          "FTA_SSL.2.1": 1,
          "FTA_SSL.2.2": 1
        },
        "FTP": {
          "FTP_ITC.1": 11,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP.1": 2
        }
      },
      "certification_process": {
        "OutOfScope": {
          "DAC mechanism but may be supplemented by further restrictions. These additional restrictions are out of scope for this evaluation. Examples of objects which are accessible to users that cannot be used to store": 1,
          "PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation": 1,
          "as Port Address Translation (PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation. Furthermore, packet mangling support is provided with IPTables which is also": 1,
          "out of scope": 3
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 5
        },
        "CTR": {
          "CTR": 3
        },
        "ECB": {
          "ECB": 3
        },
        "XTS": {
          "XTS": 3
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 5
        },
        "libgcrypt": {
          "libgcrypt": 2
        }
      },
      "crypto_protocol": {
        "IKE": {
          "IKE": 1
        },
        "SSH": {
          "SSH": 59
        },
        "TLS": {
          "SSL": {
            "SSL": 11
          },
          "TLS": {
            "TLS": 3
          }
        },
        "VPN": {
          "VPN": 1
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 1
        },
        "MAC": {
          "MAC": 2
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-256": 1,
          "P-384": 1,
          "P-521": 1,
          "curve P-256": 1,
          "curve P-384": 1,
          "curve P-521": 1
        }
      },
      "eval_facility": {
        "atsec": {
          "atsec": 116
        }
      },
      "hash_function": {
        "PBKDF": {
          "PBKDF2": 5
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 6
          },
          "SHA2": {
            "SHA-2": 2,
            "SHA-224": 1,
            "SHA-256": 4,
            "SHA-384": 4,
            "SHA-512": 4
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 1
        },
        "RNG": {
          "RNG": 17
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "BSI": {
          "AIS 20": 1,
          "AIS 31": 1
        },
        "FIPS": {
          "FIPS 140-2": 7,
          "FIPS 180-4": 6,
          "FIPS 186-4": 1,
          "FIPS 197": 5,
          "FIPS 198-1": 2,
          "FIPS 46-3": 1,
          "FIPS PUB 186-4": 4,
          "FIPS180-4": 2,
          "FIPS197": 2
        },
        "PKCS": {
          "PKCS #1": 1
        },
        "RFC": {
          "RFC 2460": 1,
          "RFC 3484": 1,
          "RFC 3542": 1,
          "RFC 4213": 1,
          "RFC 4252": 4,
          "RFC 4253": 3,
          "RFC 768": 1,
          "RFC 791": 2,
          "RFC 792": 1,
          "RFC 793": 1,
          "RFC3526": 2,
          "RFC4252": 6,
          "RFC4253": 13,
          "RFC4419": 3,
          "RFC5656": 4,
          "RFC6668": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 14,
            "AES-256": 2
          }
        },
        "DES": {
          "3DES": {
            "TDES": 1,
            "Triple-DES": 2
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 3
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Stephan Mueller (generated by CCTool version 2.8.4.6)",
      "/CreationDate": "D:20180627092838Z",
      "/Creator": "Unknown",
      "/Keywords": "Security Target, Common Criteria, Linux Distribution",
      "/ModDate": "D:20180730084951+02\u002700\u0027",
      "/Producer": "XEP 4.18 build 20100322",
      "/Subject": "Ubuntu",
      "/Title": "Security Target for Ubuntu 16.04 LTS (version 1.0 as of 2018-06-27)",
      "/Trapped": "/False",
      "/application": "CCTool version x.y",
      "pdf_file_size_bytes": 1143627,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://tools.ietf.org/html/rfc6668",
          "http://tools.ietf.org/html/rfc4419",
          "http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R4.pdf",
          "http://tools.ietf.org/html/rfc4253",
          "http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf",
          "http://tools.ietf.org/html/rfc3526",
          "http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R4.pdf",
          "http://tools.ietf.org/html/rfc5656",
          "http://csrc.nist.gov/publications/fips/fips180-4/fips-180-4.pdf",
          "http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R4.pdf",
          "http://tools.ietf.org/html/rfc4252"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 114
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/Certification%20Report%20Ubuntu%20LTS%2016.04.4.pdf",
  "scheme": "SE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL2",
      "ALC_FLR.3"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/ST-Ubuntu_16.04_LTS-1.0.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "report_convert_garbage": false,
    "report_convert_ok": true,
    "report_download_ok": true,
    "report_extract_ok": true,
    "report_pdf_hash": "10f99d730a6e205ce4231244cb4b6be728058539713cdd5089c8d4273e9c20e7",
    "report_txt_hash": "89636640fac87f12f9ff2994586b24ff30d19baad66da4f37176faa3372637ed",
    "st_convert_garbage": false,
    "st_convert_ok": true,
    "st_download_ok": true,
    "st_extract_ok": true,
    "st_pdf_hash": "77d52c3904d73ecc7c71b84536cb3f5c6a7a42b06960d79189133b422d90e375",
    "st_txt_hash": "fd849fc162a647e54ba05ed3fe3cc30cc9a3923b135ae9ec2ffa2a9145fff305"
  },
  "status": "archived"
}