genugate 10.0 Firewall Software

CSV information ?

Status active
Valid from 22.06.2021
Valid until 21.06.2026
Scheme 🇩🇪 DE
Manufacturer genua GmbH
Category Network and Network-Related Devices and Systems
Security level EAL4+, ASE_TSS.2, AVA_VAN.5, ALC_FLR.2
Maintenance updates genugate 10.0 p14 Firewall Software (Assurance Continuity Maintenance Report with partial re-evaluation applying ALC_PAM for patch management) (25.09.2023) Certification report Security target

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-1154-2021

Certificate ?

Extracted keywords

Security level
EAL 4, EAL 5, EAL 2, EAL 4 augmented
Security Assurance Requirements (SAR)
ALC_FLR.2, ALC_PAM.1, ALC_FLR, AVA_VAN.5, ASE_TSS.2
Certificates
BSI-DSZ-CC-1154-2021

Standards
ISO/IEC 15408, ISO/IEC 18045

File metadata

Title: Urkunde BSI-DSZ-CC-1154-2021
Subject: Zertifikat, Certificate, Urkunde
Keywords: "Zertifizierung, Certification, genugate 10.0 Firewall Software from genua GmbH", Urkunde
Author: Bundesamt für Sicherheit in der Informationstechnik
Creation date: D:20210630131150+02'00'
Modification date: D:20210630132300+02'00'
Pages: 1
Creator: Writer
Producer: LibreOffice 6.3

Certification report ?

Extracted keywords

Hash functions
SHA-256, SHA-512, SHA256, SHA512, SHA-384
Protocols
SSH, SSL, TLS, IPsec, VPN

Security level
EAL 4, EAL 5, EAL 2, EAL 1, EAL 2+, EAL 5+, EAL 6, EAL 4 augmented
Claims
A.PHYSEC, A.NOEVIL, A.ADMIN, A.LOCAL, A.REST, A.SINGEN, A.POLICY, A.TIMESTMP, A.HANET, A.USER, A.TRUSTK, A.TRUSTU, A.LEGACY, A.REMOTE_AUTH, A.OSPF, OE.PHYSEC
Security Assurance Requirements (SAR)
ALC_FLR.2, ALC_PAM.1, ALC_FLR, ALC_PAM, AVA_VAN.5, ASE_TSS.2
Certificates
BSI-DSZ-CC-1154-2021, BSI-DSZ-CC-1039-2017, BSI-DSZ-CC-01154
Evaluation facilities
secuvera
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Report BSI-DSZ-CC-01154 for genugate firewall 10.0, Version 2, Date 11.06.2021, secuvera Gmbh (confidential document) [8] genugate 10.0 Z Installationshandbuch, Version 10.0 Z Patch 000, Ausgabe März 2021, Revision, v10.0-RC3 [10] Archiv von Konfigurationslisten, 1154-ALC_CMS-RC3-20210331.tgz, Date 31.03.2021 (confidential document) 7 specifically • AIS 32, Version 7, CC-Interpretationen im deutschen Zertifizierungsschema • AIS

Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Report BSI-DSZ-CC-01154 for genugate firewall 10.0, Version 2, Date 11.06.2021, secuvera Gmbh (confidential document) [8] genugate 10.0 Z Installationshandbuch, Version 10.0 Z Patch 000, Ausgabe März 2021, Revision, v10.0-RC3 [10] Archiv von Konfigurationslisten, 1154-ALC_CMS-RC3-20210331.tgz, Date 31.03.2021 (confidential document) 7 specifically • AIS 32, Version 7, CC-Interpretationen im deutschen Zertifizierungsschema • AIS

Standards
FIPS PUB 180-4, PKCS#1, AIS 34, AIS 32, AIS 38, RFC 3447, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065
Technical reports
BSI TR-02102, BSI 7148

File metadata

Title: Zertifizierungsreport BSI-DSZ-CC-1154-2021
Subject: BSI-DSZ-CC-1154-2021 for genugate 10.0 Firewall Software from genua GmbH
Keywords: "Zertifizierung, Certification, genugate 10.0 Firewall Software from genua GmbH"
Author: Bundesamt für Sicherheit in der Informationstechnik
Creation date: D:20210630113008+02'00'
Modification date: D:20210701114458+02'00'
Pages: 29
Creator: Writer
Producer: LibreOffice 6.3

Frontpage

Certificate ID: BSI-DSZ-CC-1154-2021
Certified item: genugate 10.0 Firewall Software
Certification lab: BSI
Developer: genua GmbH

References

Outgoing

Security target ?

Extracted keywords

Hash functions
SHA-384, SHA-256, SHA-512
Protocols
SSH, SSL, TLS, IPsec

Vendor
Microsoft

Security level
EAL4, EAL4 augmented
Claims
O.IDAUTH, O.MEDIAT, O.SECSTA, O.SELPRO, O.SECFUN, O.MISUSESSH, O.AUDREC, O.ACCOUN, O.AVAIL, O.PATCH, T.NOAUTH, T.SPOOF, T.MEDIAT, T.SELPRO, T.MISUSESSH, T.PATCH, A.PHYSEC, A.NOEVIL, A.ADMIN, A.LOCAL, A.REST, A.SINGEN, A.POLICY, A.TIMESTMP, A.HANET, A.USER, A.TRUSTK, A.TRUSTU, A.LEGACY, A.REMOTE_AUTH, A.OSPF, OE.PHYSEC, OE.NOEVIL, OE.ADMIN, OE.LOCAL, OE.REST, OE.SINGEN, OE.POLICY, OE.TIMESTMP, OE.RTCLOCK, OE.HANET, OE.USER, OE.TRUSTK, OE.TRUSTU, OE.LEGACY, OE.REMOTE_AUTH, OE.OSPF, OE.PASSWD
Security Assurance Requirements (SAR)
ADV_INT, ADV_SPM, ADV_ARC, ADV_FSP, ADV_IMP, ADV_TDS, ADV_ARC.1, ADV_TDS.1, ADV_FSP.4, ADV_IMP.1, ADV_TAT.1, ADV_TDS.3, ADV_FSP.1, ADV_FSP.2, ADV_TDS.2, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_PAM, ALC_PAM.1, ALC_FLR.2, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ALC_CMC.4, ALC_DVS.1, ALC_LCD.1, ALC_CMS.4, ALC_DEL.1, ALC_TAT.1, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, ATE_COV.2, ATE_FUN.1, ATE_DPT.1, ATE_IND.2, ATE_COV.1, AVA_VAN.5, AVA_VAN, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_REQ.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1
Security Functional Requirements (SFR)
FAU_GEN, FAU_GEN.1, FAU_GEN.2, FAU_UPD, FAU_ARP, FAU_ARP.1, FAU_ARP.1.1, FAU_SAA, FAU_SAA.1, FAU_SAA.1.1, FAU_SAA.1.2, FAU_SAR, FAU_SAR.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2, FAU_SAR.2.1, FAU_SAR.3, FAU_SAR.3.1, FAU_STG, FAU_STG.1, FAU_STG.4, FCS_COP.1, FCS_COP, FCS_COP.1.1, FCS_CKM.4, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_ITC.1, FIA_UAU, FIA_UAU.5, FIA_UAU.1, FIA_UAU.2, FIA_UAU.3, FIA_UAU.4, FIA_UAU.6, FIA_UAU.7, FIA_AFL, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS, FIA_SOS.1, FIA_SOS.1.1, FIA_UAU.2.1, FIA_UAU.6.1, FIA_UID, FIA_UID.2, FIA_UID.2.1, FIA_UID.1, FMT_MOF, FMT_MOF.1, FMT_MSA, FMT_MSA.1, FMT_MSA.3, FMT_MTD, FMT_MTD.1, FMT_SMF, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR, FMT_SMR.2, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FMT_SMR.3, FMT_SMR.3.1, FMT_SMR.1, FMT_IFF, FMT_MOF.1.3, FPT_SST, FPT_UPD, FPT_STM.1, FPT_RCV, FPT_RCV.2, FPT_RCV.2.1, FPT_RCV.2.2, FPT_STM, FPT_STM.1.1, FPT_TRC, FPT_TRC.1, FPT_TRC.1.1, FPT_TRC.1.2, FPT_ITT.1, FPT_TST.1, FPT_AMT.1
Certification process
out of scope, genugate 400, genugate 600 and genugate 800 in the field with hardware revision 6 and 7 which are out of scope for the current certification. The genugate firewall 10.0 runs on this hardware with the same

Side-channel analysis
side channel
Certification process
out of scope, genugate 400, genugate 600 and genugate 800 in the field with hardware revision 6 and 7 which are out of scope for the current certification. The genugate firewall 10.0 runs on this hardware with the same

Standards
FIPS PUB 180-4, PKCS#1, RFC 4251, ISO/IEC 18045, CCMB-2017-04-002

File metadata

Title: genugate 10.0 Security Target
Subject: Common Criteria certification
Keywords: firewall, application level gateway, packet filter
Author: genua GmbH
Creation date: D:20210616140218+02'00'
Modification date: D:20210616140218+02'00'
Pages: 81
Creator: LaTeX with hyperref
Producer: GPL Ghostscript 9.53.3

References

Outgoing

Heuristics ?

Certificate ID: BSI-DSZ-CC-1154-2021

Extracted SARs

ADV_TAT.1, ADV_ARC.1, ASE_TSS.2, AGD_PRE.1, AVA_VAN.5, ALC_LCD.1, ASE_REQ.2, AGD_OPE.1, ASE_ECD.1, ADV_IMP.1, ALC_CMS.4, ALC_DEL.1, ATE_FUN.1, ATE_DPT.1, ATE_IND.2, ADV_FSP.4, ASE_SPD.1, ATE_COV.2, ASE_CCL.1, ALC_DVS.1, ALC_TAT.1, ALC_PAM.1, ADV_TDS.3, ALC_FLR.2, ASE_OBJ.2, ASE_INT.1, ALC_CMC.4

Scheme data ?

Cert Id BSI-DSZ-CC-1154-2021
Product genugate 10.0 p14 Firewall Software
Vendor genua GmbH
Certification Date 22.06.2021
Category Network and Network related Devices and Systems
Url https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Netzwerk_und_Kommunikationsprodukte/1154.html
Enhanced
Product genugate 10.0 p14 Firewall Software
Applicant genua GmbH Domagkstrasse 7 85551 Kirchheim
Evaluation Facility secuvera GmbH
Assurance Level EAL4+,ALC_FLR.2,ALC_PAM.1,ASE_TSS.2,AVA_VAN.5
Certification Date 22.06.2021
Expiration Date 21.06.2026
Entries [frozendict({'id': 'BSI-DSZ-CC-1154-2023-MA-01 (Ausstellungsdatum / Certification Date 25.09.2023)\nAssurance Continuity Maintenance Report with partial re-evaluation applying ALC_PAM for patch management\nAssurance Continuity Maintanance Report', 'description': 'patchlevel is p14'}), frozendict({'id': 'BSI-DSZ-CC-1154-2021', 'description': 'Certificate'})]
Report Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1154a_pdf.pdf?__blob=publicationFile&v=2
Target Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1154b_pdf.pdf?__blob=publicationFile&v=2
Cert Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1154c_pdf.pdf?__blob=publicationFile&v=2
Description The TOE genugate 10.0 Z is a combination of an application level gateway (ALG) and a packet filter (PFL), which are implemented on two different systems. It is part of a larger product. The firewall genugate 10.0 Z consists of hardware and software. The TOE is part of the shipped software. The operating system is a modified OpenBSD.

References ?

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '86f2e0bcc7b11465da147358585db0557864c6ee3cc3c4b8f66697ed4f81f005', 'txt_hash': '9fac66d6037ff7ad36d6794c98da55311ba1c1ab1cc70583ddce0f44e8d49817'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '96c4c9f54d244ab966c01f45fcb1397efdf08aa2e9a2ed78a23f60f03b8d901a', 'txt_hash': '9e20dc50bb971bc87293f3d8def7cf419800b5d3b0abc4d5b8717c0589596495'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'f6490f4bd3755b5ab3f32cd34a07501e045fc8ddc32ad5987b5966a41eed50da', 'txt_hash': '50af03dfddd87de76ca33b6444f5af10f1cfde18c9794963f3114b29f0b170b4'}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': {'pdf_file_size_bytes': 263084, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20210630131150+02'00'", '/Creator': 'Writer', '/Keywords': '"Zertifizierung, Certification, genugate 10.0 Firewall Software from genua GmbH", Urkunde', '/ModDate': "D:20210630132300+02'00'", '/Producer': 'LibreOffice 6.3', '/Subject': 'Zertifikat, Certificate, Urkunde', '/Title': 'Urkunde BSI-DSZ-CC-1154-2021', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}, 'cert_frontpage': None, 'cert_keywords': {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1154-2021': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 2, 'EAL 5': 1, 'EAL 2': 1, 'EAL 4 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 1, 'ALC_PAM.1': 1, 'ALC_FLR': 1}, 'AVA': {'AVA_VAN.5': 1}, 'ASE': {'ASE_TSS.2': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}, 'cert_filename': '1154c_pdf.pdf'}.
    • The report_frontpage property was set to {'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-1154-2021', 'cert_item': 'genugate 10.0 Firewall Software', 'developer': 'genua GmbH', 'cert_lab': 'BSI', 'ref_protection_profiles': 'None', 'cc_version': 'Product specific Security Target Common Criteria Part 2 extended', 'cc_security_level': 'Common Criteria Part 3 extended EAL 4 augmented by ASE_TSS.2, ALC_FLR.2, ALC_PAM.1, AVA_VAN.5'}}.
    • The st_frontpage property was set to None.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-01154': 1}, '__update__': {'BSI-DSZ-CC-1154-2021': 15, 'BSI-DSZ-CC-1039-2017': 3}}}}} data.
  • 13.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1154-2021': 30, 'BSI-DSZ-CC-1039-2017': 6}, '__delete__': ['BSI-DSZ-CC-01154']}}}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The st_keywords property was updated, with the {'cc_cert_id': {}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-01154': 1}, '__update__': {'BSI-DSZ-CC-1154-2021': 15, 'BSI-DSZ-CC-1039-2017': 3}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'CA': {'1 2 3': 1, '5 6 7': 1, '1 1-3': 1, '1 5-3': 1, '1 1-2': 4, '1 1-4': 2, '1 1-7': 1, '2-1-1': 2, '2-2-1': 1, '2-2-2': 2, '2-2-3': 1, '2-2-4': 2, '2-2-5': 1, '2-1-2': 1, '4-3-1': 2, '2-1-3': 1, '2-1-4': 2, '4-3-2': 2, '2-1-5': 4, '4-3-3': 2, '1 3-4': 2, '1 3-3': 1, '1 3-7': 2, '6 3-7': 1, '4-1-1': 1, '1 4-5': 9, '1 4-6': 14, '4-1-2': 1, '4-1-3': 1, '4-2-1': 2, '4-2-2': 2, '4-2-3': 3, '4-2-4': 3, '4-4-1': 1, '4-4-2': 1, '6 5-2': 1, '1 5-4': 1, '1 1-11': 1}}} data.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
  • 19.10.2023 The certificate data changed.
    Certificate changed

    The Maintenance Updates of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2023-09-25', 'maintenance_title': 'genugate 10.0 p14 Firewall Software (Assurance Continuity Maintenance Report with partial re-evaluation applying ALC_PAM for patch management)', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/1154MA01a_pdf.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/files/epfiles/1154MA01b_pdf.pdf'}]}.

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'product': 'genugate 10.0 p14 Firewall Software', 'enhanced': {'__insert__': {'entries': [{'id': 'BSI-DSZ-CC-1154-2023-MA-01 (Ausstellungsdatum / Certification Date 25.09.2023)\nAssurance Continuity Maintenance Report with partial re-evaluation applying ALC_PAM for patch management\nAssurance Continuity Maintanance Report', 'description': 'patchlevel is p14'}, {'id': 'BSI-DSZ-CC-1154-2021', 'description': 'Certificate'}]}, '__update__': {'product': 'genugate 10.0 p14 Firewall Software'}}} data.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': {'cert_id': 'BSI-DSZ-CC-1154-2021', 'product': 'genugate 10.0 Firewall Software', 'vendor': 'genua GmbH', 'certification_date': '22.06.2021', 'category': 'Network and Network related Devices and Systems', 'url': 'https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Netzwerk_und_Kommunikationsprodukte/1154.html', 'enhanced': {'product': 'genugate 10.0 Firewall Software', 'applicant': 'genua GmbH\nDomagkstrasse 7\n85551 Kirchheim', 'evaluation_facility': 'secuvera GmbH', 'assurance_level': 'EAL4+,ALC_FLR.2,ALC_PAM.1,ASE_TSS.2,AVA_VAN.5', 'certification_date': '22.06.2021', 'expiration_date': '21.06.2026', 'report_link': 'https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1154a_pdf.pdf?__blob=publicationFile&v=2', 'target_link': 'https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1154b_pdf.pdf?__blob=publicationFile&v=2', 'cert_link': 'https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1154c_pdf.pdf?__blob=publicationFile&v=2', 'description': 'The TOE genugate 10.0 Z is a combination of an application level gateway (ALG) and a packet filter (PFL), which are implemented on two different systems. It is part of a larger product. The firewall genugate 10.0 Z consists of hardware and software. The TOE is part of the shipped software. The operating system is a modified OpenBSD.'}}}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 26.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 96c4c9f54d244ab966c01f45fcb1397efdf08aa2e9a2ed78a23f60f03b8d901a.
    • The st_txt_hash property was set to 9e20dc50bb971bc87293f3d8def7cf419800b5d3b0abc4d5b8717c0589596495.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 460773, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 81, '/Producer': 'GPL Ghostscript 9.53.3', '/CreationDate': "D:20210616140218+02'00'", '/ModDate': "D:20210616140218+02'00'", '/Author': 'genua GmbH', '/Creator': 'LaTeX with hyperref', '/Title': 'genugate 10.0 Security Target', '/Subject': 'Common Criteria certification', '/Keywords': 'firewall, application level gateway, packet filter', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.ietf.org/rfc/rfc4251.txt', 'http://www.openssh.org']}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 4, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_INT': 2, 'ADV_SPM': 2, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_TDS': 1, 'ADV_ARC.1': 4, 'ADV_TDS.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 3, 'ADV_TAT.1': 1, 'ADV_TDS.3': 2, 'ADV_FSP.1': 1, 'ADV_FSP.2': 3, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1, 'AGD_OPE.1': 5, 'AGD_PRE.1': 3}, 'ALC': {'ALC_PAM': 32, 'ALC_PAM.1': 48, 'ALC_FLR.2': 5, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 3, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_LCD': 1, 'ALC_TAT': 1, 'ALC_CMC.4': 1, 'ALC_DVS.1': 2, 'ALC_LCD.1': 2, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1, 'ATE_COV.2': 1, 'ATE_FUN.1': 4, 'ATE_DPT.1': 1, 'ATE_IND.2': 1, 'ATE_COV.1': 1}, 'AVA': {'AVA_VAN.5': 4, 'AVA_VAN': 1}, 'ASE': {'ASE_TSS.2': 4, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1, 'ASE_CCL.1': 1, 'ASE_ECD.1': 3, 'ASE_REQ.1': 2, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 33, 'FAU_GEN.1': 16, 'FAU_GEN.2': 1, 'FAU_UPD': 1, 'FAU_ARP': 2, 'FAU_ARP.1': 6, 'FAU_ARP.1.1': 1, 'FAU_SAA': 2, 'FAU_SAA.1': 7, 'FAU_SAA.1.1': 1, 'FAU_SAA.1.2': 1, 'FAU_SAR': 4, 'FAU_SAR.1': 8, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2': 6, 'FAU_SAR.2.1': 1, 'FAU_SAR.3': 6, 'FAU_SAR.3.1': 1, 'FAU_STG': 31, 'FAU_STG.1': 7, 'FAU_STG.4': 2}, 'FCS': {'FCS_COP.1': 11, 'FCS_COP': 2, 'FCS_COP.1.1': 1, 'FCS_CKM.4': 2}, 'FDP': {'FDP_IFC': 60, 'FDP_IFC.1': 5, 'FDP_IFF': 52, 'FDP_IFF.1': 25, 'FDP_ITC.1': 2}, 'FIA': {'FIA_UAU': 28, 'FIA_UAU.5': 8, 'FIA_UAU.1': 2, 'FIA_UAU.2': 8, 'FIA_UAU.3': 1, 'FIA_UAU.4': 1, 'FIA_UAU.6': 7, 'FIA_UAU.7': 1, 'FIA_AFL': 2, 'FIA_AFL.1': 6, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD': 2, 'FIA_ATD.1': 6, 'FIA_ATD.1.1': 1, 'FIA_SOS': 2, 'FIA_SOS.1': 6, 'FIA_SOS.1.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UAU.6.1': 1, 'FIA_UID': 3, 'FIA_UID.2': 7, 'FIA_UID.2.1': 1, 'FIA_UID.1': 3}, 'FMT': {'FMT_MOF': 21, 'FMT_MOF.1': 3, 'FMT_MSA': 68, 'FMT_MSA.1': 4, 'FMT_MSA.3': 3, 'FMT_MTD': 15, 'FMT_MTD.1': 2, 'FMT_SMF': 2, 'FMT_SMF.1': 24, 'FMT_SMF.1.1': 1, 'FMT_SMR': 5, 'FMT_SMR.2': 19, 'FMT_SMR.2.1': 1, 'FMT_SMR.2.2': 1, 'FMT_SMR.2.3': 1, 'FMT_SMR.3': 6, 'FMT_SMR.3.1': 1, 'FMT_SMR.1': 25, 'FMT_IFF': 2, 'FMT_MOF.1.3': 1}, 'FPT': {'FPT_SST': 22, 'FPT_UPD': 42, 'FPT_STM.1': 9, 'FPT_RCV': 2, 'FPT_RCV.2': 6, 'FPT_RCV.2.1': 1, 'FPT_RCV.2.2': 1, 'FPT_STM': 2, 'FPT_STM.1.1': 1, 'FPT_TRC': 3, 'FPT_TRC.1': 5, 'FPT_TRC.1.1': 1, 'FPT_TRC.1.2': 1, 'FPT_ITT.1': 1, 'FPT_TST.1': 2, 'FPT_AMT.1': 1}}, 'cc_claims': {'O': {'O.IDAUTH': 15, 'O.MEDIAT': 13, 'O.SECSTA': 8, 'O.SELPRO': 4, 'O.SECFUN': 22, 'O.MISUSESSH': 7, 'O.AUDREC': 17, 'O.ACCOUN': 6, 'O.AVAIL': 8, 'O.PATCH': 5}, 'T': {'T.NOAUTH': 2, 'T.SPOOF': 2, 'T.MEDIAT': 2, 'T.SELPRO': 2, 'T.MISUSESSH': 2, 'T.PATCH': 2}, 'A': {'A.PHYSEC': 2, 'A.NOEVIL': 2, 'A.ADMIN': 2, 'A.LOCAL': 3, 'A.REST': 2, 'A.SINGEN': 3, 'A.POLICY': 2, 'A.TIMESTMP': 2, 'A.HANET': 2, 'A.USER': 2, 'A.TRUSTK': 2, 'A.TRUSTU': 2, 'A.LEGACY': 2, 'A.REMOTE_AUTH': 2, 'A.OSPF': 2}, 'OE': {'OE.PHYSEC': 2, 'OE.NOEVIL': 1, 'OE.ADMIN': 2, 'OE.LOCAL': 1, 'OE.REST': 2, 'OE.SINGEN': 1, 'OE.POLICY': 2, 'OE.TIMESTMP': 2, 'OE.RTCLOCK': 3, 'OE.HANET': 3, 'OE.USER': 2, 'OE.TRUSTK': 3, 'OE.TRUSTU': 2, 'OE.LEGACY': 1, 'OE.REMOTE_AUTH': 2, 'OE.OSPF': 1, 'OE.PASSWD': 3}}, 'vendor': {'Microsoft': {'Microsoft': 1}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-384': 3, 'SHA-256': 3, 'SHA-512': 2}}}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 26}, 'TLS': {'SSL': {'SSL': 3}, 'TLS': {'TLS': 5}}, 'IPsec': {'IPsec': 2}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side channel': 31}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 180-4': 3}, 'PKCS': {'PKCS#1': 3}, 'RFC': {'RFC 4251': 1}, 'ISO': {'ISO/IEC 18045': 4}, 'CC': {'CCMB-2017-04-002': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'genugate 400, genugate 600 and genugate 800 in the field with hardware revision 6 and 7 which are out of scope for the current certification. The genugate firewall 10.0 runs on this hardware with the same': 1}}}.
    • The st_filename property was set to 1154b_pdf.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values added.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/1154a_pdf.pdf, code: nok', 'failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/1154b_pdf.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values discarded.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 96c4c9f54d244ab966c01f45fcb1397efdf08aa2e9a2ed78a23f60f03b8d901a.
    • The st_txt_hash property was set to 9e20dc50bb971bc87293f3d8def7cf419800b5d3b0abc4d5b8717c0589596495.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 460773, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 81, '/Producer': 'GPL Ghostscript 9.53.3', '/CreationDate': "D:20210616140218+02'00'", '/ModDate': "D:20210616140218+02'00'", '/Author': 'genua GmbH', '/Creator': 'LaTeX with hyperref', '/Title': 'genugate 10.0 Security Target', '/Subject': 'Common Criteria certification', '/Keywords': 'firewall, application level gateway, packet filter', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.ietf.org/rfc/rfc4251.txt', 'http://www.openssh.org']}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 4, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_INT': 2, 'ADV_SPM': 2, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_TDS': 1, 'ADV_ARC.1': 4, 'ADV_TDS.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 3, 'ADV_TAT.1': 1, 'ADV_TDS.3': 2, 'ADV_FSP.1': 1, 'ADV_FSP.2': 3, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1, 'AGD_OPE.1': 5, 'AGD_PRE.1': 3}, 'ALC': {'ALC_PAM': 32, 'ALC_PAM.1': 48, 'ALC_FLR.2': 5, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 3, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_LCD': 1, 'ALC_TAT': 1, 'ALC_CMC.4': 1, 'ALC_DVS.1': 2, 'ALC_LCD.1': 2, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1, 'ATE_COV.2': 1, 'ATE_FUN.1': 4, 'ATE_DPT.1': 1, 'ATE_IND.2': 1, 'ATE_COV.1': 1}, 'AVA': {'AVA_VAN.5': 4, 'AVA_VAN': 1}, 'ASE': {'ASE_TSS.2': 4, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1, 'ASE_CCL.1': 1, 'ASE_ECD.1': 3, 'ASE_REQ.1': 2, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 33, 'FAU_GEN.1': 16, 'FAU_GEN.2': 1, 'FAU_UPD': 1, 'FAU_ARP': 2, 'FAU_ARP.1': 6, 'FAU_ARP.1.1': 1, 'FAU_SAA': 2, 'FAU_SAA.1': 7, 'FAU_SAA.1.1': 1, 'FAU_SAA.1.2': 1, 'FAU_SAR': 4, 'FAU_SAR.1': 8, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2': 6, 'FAU_SAR.2.1': 1, 'FAU_SAR.3': 6, 'FAU_SAR.3.1': 1, 'FAU_STG': 31, 'FAU_STG.1': 7, 'FAU_STG.4': 2}, 'FCS': {'FCS_COP.1': 11, 'FCS_COP': 2, 'FCS_COP.1.1': 1, 'FCS_CKM.4': 2}, 'FDP': {'FDP_IFC': 60, 'FDP_IFC.1': 5, 'FDP_IFF': 52, 'FDP_IFF.1': 25, 'FDP_ITC.1': 2}, 'FIA': {'FIA_UAU': 28, 'FIA_UAU.5': 8, 'FIA_UAU.1': 2, 'FIA_UAU.2': 8, 'FIA_UAU.3': 1, 'FIA_UAU.4': 1, 'FIA_UAU.6': 7, 'FIA_UAU.7': 1, 'FIA_AFL': 2, 'FIA_AFL.1': 6, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD': 2, 'FIA_ATD.1': 6, 'FIA_ATD.1.1': 1, 'FIA_SOS': 2, 'FIA_SOS.1': 6, 'FIA_SOS.1.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UAU.6.1': 1, 'FIA_UID': 3, 'FIA_UID.2': 7, 'FIA_UID.2.1': 1, 'FIA_UID.1': 3}, 'FMT': {'FMT_MOF': 21, 'FMT_MOF.1': 3, 'FMT_MSA': 68, 'FMT_MSA.1': 4, 'FMT_MSA.3': 3, 'FMT_MTD': 15, 'FMT_MTD.1': 2, 'FMT_SMF': 2, 'FMT_SMF.1': 24, 'FMT_SMF.1.1': 1, 'FMT_SMR': 5, 'FMT_SMR.2': 19, 'FMT_SMR.2.1': 1, 'FMT_SMR.2.2': 1, 'FMT_SMR.2.3': 1, 'FMT_SMR.3': 6, 'FMT_SMR.3.1': 1, 'FMT_SMR.1': 25, 'FMT_IFF': 2, 'FMT_MOF.1.3': 1}, 'FPT': {'FPT_SST': 22, 'FPT_UPD': 42, 'FPT_STM.1': 9, 'FPT_RCV': 2, 'FPT_RCV.2': 6, 'FPT_RCV.2.1': 1, 'FPT_RCV.2.2': 1, 'FPT_STM': 2, 'FPT_STM.1.1': 1, 'FPT_TRC': 3, 'FPT_TRC.1': 5, 'FPT_TRC.1.1': 1, 'FPT_TRC.1.2': 1, 'FPT_ITT.1': 1, 'FPT_TST.1': 2, 'FPT_AMT.1': 1}}, 'cc_claims': {'O': {'O.IDAUTH': 15, 'O.MEDIAT': 13, 'O.SECSTA': 8, 'O.SELPRO': 4, 'O.SECFUN': 22, 'O.MISUSESSH': 7, 'O.AUDREC': 17, 'O.ACCOUN': 6, 'O.AVAIL': 8, 'O.PATCH': 5}, 'T': {'T.NOAUTH': 2, 'T.SPOOF': 2, 'T.MEDIAT': 2, 'T.SELPRO': 2, 'T.MISUSESSH': 2, 'T.PATCH': 2}, 'A': {'A.PHYSEC': 2, 'A.NOEVIL': 2, 'A.ADMIN': 2, 'A.LOCAL': 3, 'A.REST': 2, 'A.SINGEN': 3, 'A.POLICY': 2, 'A.TIMESTMP': 2, 'A.HANET': 2, 'A.USER': 2, 'A.TRUSTK': 2, 'A.TRUSTU': 2, 'A.LEGACY': 2, 'A.REMOTE_AUTH': 2, 'A.OSPF': 2}, 'OE': {'OE.PHYSEC': 2, 'OE.NOEVIL': 1, 'OE.ADMIN': 2, 'OE.LOCAL': 1, 'OE.REST': 2, 'OE.SINGEN': 1, 'OE.POLICY': 2, 'OE.TIMESTMP': 2, 'OE.RTCLOCK': 3, 'OE.HANET': 3, 'OE.USER': 2, 'OE.TRUSTK': 3, 'OE.TRUSTU': 2, 'OE.LEGACY': 1, 'OE.REMOTE_AUTH': 2, 'OE.OSPF': 1, 'OE.PASSWD': 3}}, 'vendor': {'Microsoft': {'Microsoft': 1}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-384': 3, 'SHA-256': 3, 'SHA-512': 2}}}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 26}, 'TLS': {'SSL': {'SSL': 3}, 'TLS': {'TLS': 5}}, 'IPsec': {'IPsec': 2}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side channel': 31}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 180-4': 3}, 'PKCS': {'PKCS#1': 3}, 'RFC': {'RFC 4251': 1}, 'ISO': {'ISO/IEC 18045': 4}, 'CC': {'CCMB-2017-04-002': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'genugate 400, genugate 600 and genugate 800 in the field with hardware revision 6 and 7 which are out of scope for the current certification. The genugate firewall 10.0 runs on this hardware with the same': 1}}}.
    • The st_filename property was set to 1154b_pdf.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values added.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is https://www.commoncriteriaportal.org/files/epfiles/1154c_pdf.pdf.

    The manufacturer_web was updated.

    • The new value is https://www.genua.de.

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/1154b_pdf.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values discarded.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is None.

    The manufacturer_web was updated.

    • The new value is None.

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 96c4c9f54d244ab966c01f45fcb1397efdf08aa2e9a2ed78a23f60f03b8d901a.
    • The st_txt_hash property was set to 9e20dc50bb971bc87293f3d8def7cf419800b5d3b0abc4d5b8717c0589596495.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 460773, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 81, '/Producer': 'GPL Ghostscript 9.53.3', '/CreationDate': "D:20210616140218+02'00'", '/ModDate': "D:20210616140218+02'00'", '/Author': 'genua GmbH', '/Creator': 'LaTeX with hyperref', '/Title': 'genugate 10.0 Security Target', '/Subject': 'Common Criteria certification', '/Keywords': 'firewall, application level gateway, packet filter', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.ietf.org/rfc/rfc4251.txt', 'http://www.openssh.org']}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 4, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_INT': 2, 'ADV_SPM': 2, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_TDS': 1, 'ADV_ARC.1': 4, 'ADV_TDS.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 3, 'ADV_TAT.1': 1, 'ADV_TDS.3': 2, 'ADV_FSP.1': 1, 'ADV_FSP.2': 3, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1, 'AGD_OPE.1': 5, 'AGD_PRE.1': 3}, 'ALC': {'ALC_PAM': 32, 'ALC_PAM.1': 48, 'ALC_FLR.2': 5, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 3, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_LCD': 1, 'ALC_TAT': 1, 'ALC_CMC.4': 1, 'ALC_DVS.1': 2, 'ALC_LCD.1': 2, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1, 'ATE_COV.2': 1, 'ATE_FUN.1': 4, 'ATE_DPT.1': 1, 'ATE_IND.2': 1, 'ATE_COV.1': 1}, 'AVA': {'AVA_VAN.5': 4, 'AVA_VAN': 1}, 'ASE': {'ASE_TSS.2': 4, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1, 'ASE_CCL.1': 1, 'ASE_ECD.1': 3, 'ASE_REQ.1': 2, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 33, 'FAU_GEN.1': 16, 'FAU_GEN.2': 1, 'FAU_UPD': 1, 'FAU_ARP': 2, 'FAU_ARP.1': 6, 'FAU_ARP.1.1': 1, 'FAU_SAA': 2, 'FAU_SAA.1': 7, 'FAU_SAA.1.1': 1, 'FAU_SAA.1.2': 1, 'FAU_SAR': 4, 'FAU_SAR.1': 8, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2': 6, 'FAU_SAR.2.1': 1, 'FAU_SAR.3': 6, 'FAU_SAR.3.1': 1, 'FAU_STG': 31, 'FAU_STG.1': 7, 'FAU_STG.4': 2}, 'FCS': {'FCS_COP.1': 11, 'FCS_COP': 2, 'FCS_COP.1.1': 1, 'FCS_CKM.4': 2}, 'FDP': {'FDP_IFC': 60, 'FDP_IFC.1': 5, 'FDP_IFF': 52, 'FDP_IFF.1': 25, 'FDP_ITC.1': 2}, 'FIA': {'FIA_UAU': 28, 'FIA_UAU.5': 8, 'FIA_UAU.1': 2, 'FIA_UAU.2': 8, 'FIA_UAU.3': 1, 'FIA_UAU.4': 1, 'FIA_UAU.6': 7, 'FIA_UAU.7': 1, 'FIA_AFL': 2, 'FIA_AFL.1': 6, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD': 2, 'FIA_ATD.1': 6, 'FIA_ATD.1.1': 1, 'FIA_SOS': 2, 'FIA_SOS.1': 6, 'FIA_SOS.1.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UAU.6.1': 1, 'FIA_UID': 3, 'FIA_UID.2': 7, 'FIA_UID.2.1': 1, 'FIA_UID.1': 3}, 'FMT': {'FMT_MOF': 21, 'FMT_MOF.1': 3, 'FMT_MSA': 68, 'FMT_MSA.1': 4, 'FMT_MSA.3': 3, 'FMT_MTD': 15, 'FMT_MTD.1': 2, 'FMT_SMF': 2, 'FMT_SMF.1': 24, 'FMT_SMF.1.1': 1, 'FMT_SMR': 5, 'FMT_SMR.2': 19, 'FMT_SMR.2.1': 1, 'FMT_SMR.2.2': 1, 'FMT_SMR.2.3': 1, 'FMT_SMR.3': 6, 'FMT_SMR.3.1': 1, 'FMT_SMR.1': 25, 'FMT_IFF': 2, 'FMT_MOF.1.3': 1}, 'FPT': {'FPT_SST': 22, 'FPT_UPD': 42, 'FPT_STM.1': 9, 'FPT_RCV': 2, 'FPT_RCV.2': 6, 'FPT_RCV.2.1': 1, 'FPT_RCV.2.2': 1, 'FPT_STM': 2, 'FPT_STM.1.1': 1, 'FPT_TRC': 3, 'FPT_TRC.1': 5, 'FPT_TRC.1.1': 1, 'FPT_TRC.1.2': 1, 'FPT_ITT.1': 1, 'FPT_TST.1': 2, 'FPT_AMT.1': 1}}, 'cc_claims': {'O': {'O.IDAUTH': 15, 'O.MEDIAT': 13, 'O.SECSTA': 8, 'O.SELPRO': 4, 'O.SECFUN': 22, 'O.MISUSESSH': 7, 'O.AUDREC': 17, 'O.ACCOUN': 6, 'O.AVAIL': 8, 'O.PATCH': 5}, 'T': {'T.NOAUTH': 2, 'T.SPOOF': 2, 'T.MEDIAT': 2, 'T.SELPRO': 2, 'T.MISUSESSH': 2, 'T.PATCH': 2}, 'A': {'A.PHYSEC': 2, 'A.NOEVIL': 2, 'A.ADMIN': 2, 'A.LOCAL': 3, 'A.REST': 2, 'A.SINGEN': 3, 'A.POLICY': 2, 'A.TIMESTMP': 2, 'A.HANET': 2, 'A.USER': 2, 'A.TRUSTK': 2, 'A.TRUSTU': 2, 'A.LEGACY': 2, 'A.REMOTE_AUTH': 2, 'A.OSPF': 2}, 'OE': {'OE.PHYSEC': 2, 'OE.NOEVIL': 1, 'OE.ADMIN': 2, 'OE.LOCAL': 1, 'OE.REST': 2, 'OE.SINGEN': 1, 'OE.POLICY': 2, 'OE.TIMESTMP': 2, 'OE.RTCLOCK': 3, 'OE.HANET': 3, 'OE.USER': 2, 'OE.TRUSTK': 3, 'OE.TRUSTU': 2, 'OE.LEGACY': 1, 'OE.REMOTE_AUTH': 2, 'OE.OSPF': 1, 'OE.PASSWD': 3}}, 'vendor': {'Microsoft': {'Microsoft': 1}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-384': 3, 'SHA-256': 3, 'SHA-512': 2}}}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 26}, 'TLS': {'SSL': {'SSL': 3}, 'TLS': {'TLS': 5}}, 'IPsec': {'IPsec': 2}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side channel': 31}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 180-4': 3}, 'PKCS': {'PKCS#1': 3}, 'RFC': {'RFC 4251': 1}, 'ISO': {'ISO/IEC 18045': 4}, 'CC': {'CCMB-2017-04-002': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'genugate 400, genugate 600 and genugate 800 in the field with hardware revision 6 and 7 which are out of scope for the current certification. The genugate firewall 10.0 runs on this hardware with the same': 1}}}.
    • The st_filename property was set to 1154b_pdf.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values added.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was updated.
  • 22.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/1154a_pdf.pdf, code: nok', 'failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/1154b_pdf.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values discarded.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 26.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'crypto_protocol': {'__insert__': {'VPN': {'VPN': 1}}}} data.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': '1154a_pdf.pdf', 'st_filename': '1154b_pdf.pdf'}.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1154-2021': 30, 'BSI-DSZ-CC-1039-2017': 6}}}}, 'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL 4': 8}}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_PAM.1': 13, 'ALC_PAM': 3}}, 'AVA': {'__update__': {'AVA_VAN.5': 5}}}}, 'vendor': {}, 'eval_facility': {'__update__': {'secuvera': {'__update__': {'secuvera': 3}}}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA2': {'__update__': {'SHA256': 36, 'SHA512': 36}}}, '__delete__': ['SHA1']}}}, 'technical_report_id': {'__update__': {'BSI': {'__insert__': {'BSI TR-02102': 1}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'ISO': {'__update__': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4}}}}, 'certification_process': {'__update__': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'Report BSI-DSZ-CC-01154 for genugate firewall 10.0, Version 2, Date 11.06.2021, secuvera Gmbh (confidential document) [8] genugate 10.0 Z Installationshandbuch, Version 10.0 Z Patch 000, Ausgabe März 2021, Revision': 1, 'v10.0-RC3 [10] Archiv von Konfigurationslisten, 1154-ALC_CMS-RC3-20210331.tgz, Date 31.03.2021 (confidential document) 7 specifically • AIS 32, Version 7, CC-Interpretationen im deutschen Zertifizierungsschema • AIS': 1}}}} data.
    • The st_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL4': 4}}}}, 'cc_sar': {'__update__': {'ADV': {'__update__': {'ADV_ARC.1': 4, 'ADV_FSP.4': 1, 'ADV_IMP.1': 3, 'ADV_TDS.3': 2, 'ADV_FSP.1': 1, 'ADV_TDS.1': 1}}, 'AGD': {'__update__': {'AGD_OPE.1': 5, 'AGD_PRE.1': 3}}, 'ALC': {'__update__': {'ALC_PAM': 32, 'ALC_FLR.2': 5, 'ALC_PAM.1': 48, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL': 3, 'ALC_DEL.1': 1, 'ALC_DVS.1': 2, 'ALC_LCD.1': 2, 'ALC_TAT.1': 1}, '__delete__': ['ALC_CMS.1']}, 'ATE': {'__update__': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 4, 'ATE_IND.2': 1, 'ATE_COV.1': 1}}, 'ASE': {'__update__': {'ASE_CCL.1': 1, 'ASE_ECD.1': 3, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1}}}}, 'cc_sfr': {'__update__': {'FAU': {'__insert__': {'FAU_UPD': 1, 'FAU_STG.4': 2}, '__update__': {'FAU_GEN': 33, 'FAU_GEN.1': 16, 'FAU_ARP': 2, 'FAU_SAA': 2, 'FAU_SAR': 4, 'FAU_SAR.1': 8, 'FAU_STG': 31, 'FAU_STG.1': 7}}, 'FCS': {'__update__': {'FCS_COP.1': 11, 'FCS_COP': 2, 'FCS_CKM.4': 2}}, 'FDP': {'__insert__': {'FDP_IFC.1': 5, 'FDP_IFF.1': 25}, '__update__': {'FDP_IFC': 60, 'FDP_IFF': 52, 'FDP_ITC.1': 2}}, 'FIA': {'__update__': {'FIA_UAU': 28, 'FIA_UAU.5': 8, 'FIA_UAU.1': 2, 'FIA_UAU.2': 8, 'FIA_AFL': 2, 'FIA_ATD': 2, 'FIA_SOS': 2, 'FIA_UID': 3, 'FIA_UID.1': 3}}, 'FMT': {'__insert__': {'FMT_MOF.1': 3, 'FMT_MSA.1': 4, 'FMT_MSA.3': 3, 'FMT_MTD.1': 2, 'FMT_IFF': 2}, '__update__': {'FMT_MOF': 21, 'FMT_MSA': 68, 'FMT_MTD': 15, 'FMT_SMF': 2, 'FMT_SMF.1': 24, 'FMT_SMR': 5, 'FMT_SMR.1': 25}}, 'FPT': {'__insert__': {'FPT_AMT.1': 1}, '__update__': {'FPT_SST': 22, 'FPT_UPD': 42, 'FPT_RCV': 2, 'FPT_STM': 2, 'FPT_TRC': 3, 'FPT_ITT.1': 1, 'FPT_TST.1': 2}}}}, 'cc_claims': {'__update__': {'O': {'__update__': {'O.MEDIAT': 13, 'O.SELPRO': 4, 'O.MISUSESSH': 7, 'O.ACCOUN': 6, 'O.PATCH': 5}, '__delete__': ['O.SELFPRO']}, 'OE': {'__update__': {'OE.NOEVIL': 1, 'OE.LOCAL': 1, 'OE.SINGEN': 1, 'OE.TIMESTMP': 2, 'OE.HANET': 3, 'OE.TRUSTK': 3, 'OE.LEGACY': 1, 'OE.OSPF': 1}}}}, 'vendor': {'__delete__': ['STMicroelectronics']}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA2': {'__update__': {'SHA-256': 3}}}}}}, 'crypto_protocol': {'__update__': {'SSH': {'__update__': {'SSH': 26}}, 'TLS': {'__update__': {'SSL': {'__update__': {'SSL': 3}}}}}}, 'side_channel_analysis': {'__update__': {'SCA': {'__update__': {'side channel': 31}, '__delete__': ['SPA']}}}, 'standard_id': {'__insert__': {'CC': {'CCMB-2017-04-002': 1}}}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {'genugate 400, genugate 600 and genugate 800 in the field with hardware revision 6 and 7 which are out of scope for the current certification. The genugate firewall 10.0 runs on this hardware with the same': 1}, '__delete__': [', genugate 400, genugate 600 and genugate 800 in the field with hardware revision 6 and 7 which are out of scope for the current certification. The genugate firewall 10.0 runs on this hardware with the same']}}}} data.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_PAM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/zertifizierung', 'https://www.bsi.bund.de/zertifizierungsreporte', 'https://www.sogis.eu/', 'https://www.bsi.bund.de/AIS', 'http://www.commoncriteriaportal.org/cc/', 'https://www.bsi.bund.de/', 'http://www.commoncriteriaportal.org/']}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.ietf.org/rfc/rfc4251.txt', 'http://www.openssh.org']}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1154-2021': 58, 'BSI-DSZ-CC-1039-2017': 4}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 7, 'EAL 5': 3, 'EAL 2': 2, 'EAL 1': 1, 'EAL 2+': 1, 'EAL 5+': 1, 'EAL 6': 1, 'EAL 4 augmented': 3}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 4, 'ALC_PAM.1': 5, 'ALC_FLR': 3, 'ALC_PAM': 1}, 'AVA': {'AVA_VAN.5': 4}, 'ASE': {'ASE_TSS.2': 5}}, 'cc_sfr': {}, 'cc_claims': {'A': {'A.PHYSEC': 2, 'A.NOEVIL': 2, 'A.ADMIN': 2, 'A.LOCAL': 2, 'A.REST': 2, 'A.SINGEN': 2, 'A.POLICY': 3, 'A.TIMESTMP': 2, 'A.HANET': 2, 'A.USER': 2, 'A.TRUSTK': 2, 'A.TRUSTU': 2, 'A.LEGACY': 2, 'A.REMOTE_AUTH': 2, 'A.OSPF': 2}, 'OE': {'OE.PHYSEC': 1}}, 'vendor': {'STMicroelectronics': {'STM': 2}}, 'eval_facility': {'secuvera': {'secuvera': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 2}, 'SHA2': {'SHA-256': 2, 'SHA-512': 2, 'SHA256': 38, 'SHA512': 38, 'SHA-384': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 5}, 'TLS': {'SSL': {'SSL': 1}, 'TLS': {'TLS': 1}}, 'IPsec': {'IPsec': 1}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {'BSI': {'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 180-4': 4}, 'PKCS': {'PKCS#1': 2}, 'BSI': {'AIS 34': 2, 'AIS 32': 1, 'AIS 38': 1}, 'RFC': {'RFC 3447': 1}, 'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 17065': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'identiality being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'ical Report BSI-DSZ-CC-01154 for genugate firewall 10.0, Version 2, Date 11.06.2021, secuvera Gmbh (confidential document) [8] genugate 10.0 Z Installationshandbuch, Version 10.0 Z Patch 000, Ausgabe März 2021, Revision': 1, 'ion v10.0-RC3 [10] Archiv von Konfigurationslisten, 1154-ALC_CMS-RC3-20210331.tgz, Date 31.03.2021 (confidential document) 7 specifically • AIS 32, Version 7, CC-Interpretationen im deutschen Zertifizierungsschema • AIS': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 2, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_INT': 2, 'ADV_SPM': 2, 'ADV_ARC': 1, 'ADV_ARC.1': 5, 'ADV_FSP': 1, 'ADV_FSP.4': 3, 'ADV_IMP': 1, 'ADV_IMP.1': 4, 'ADV_TDS': 1, 'ADV_TDS.3': 4, 'ADV_FSP.1': 2, 'ADV_TDS.1': 2, 'ADV_TAT.1': 1, 'ADV_FSP.2': 3, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_OPE.1': 6, 'AGD_PRE': 1, 'AGD_PRE.1': 4}, 'ALC': {'ALC_PAM': 8, 'ALC_FLR.2': 7, 'ALC_PAM.1': 5, 'ALC_CMC': 1, 'ALC_CMC.4': 2, 'ALC_CMS': 1, 'ALC_CMS.4': 2, 'ALC_DEL': 2, 'ALC_DEL.1': 2, 'ALC_DVS': 1, 'ALC_DVS.1': 3, 'ALC_FLR': 1, 'ALC_LCD': 1, 'ALC_LCD.1': 3, 'ALC_TAT': 1, 'ALC_TAT.1': 2, 'ALC_CMS.1': 1}, 'ATE': {'ATE_COV': 1, 'ATE_COV.2': 2, 'ATE_DPT': 1, 'ATE_DPT.1': 2, 'ATE_FUN': 1, 'ATE_FUN.1': 5, 'ATE_IND': 1, 'ATE_IND.2': 2, 'ATE_COV.1': 2}, 'AVA': {'AVA_VAN.5': 4, 'AVA_VAN': 1}, 'ASE': {'ASE_TSS.2': 4, 'ASE_CCL': 1, 'ASE_CCL.1': 2, 'ASE_ECD': 1, 'ASE_ECD.1': 4, 'ASE_INT': 1, 'ASE_INT.1': 4, 'ASE_OBJ': 1, 'ASE_OBJ.2': 3, 'ASE_REQ': 1, 'ASE_REQ.2': 2, 'ASE_SPD': 1, 'ASE_SPD.1': 3, 'ASE_TSS': 1, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN': 7, 'FAU_GEN.1': 15, 'FAU_GEN.2': 1, 'FAU_ARP': 1, 'FAU_ARP.1': 6, 'FAU_ARP.1.1': 1, 'FAU_SAA': 1, 'FAU_SAA.1': 7, 'FAU_SAA.1.1': 1, 'FAU_SAA.1.2': 1, 'FAU_SAR': 1, 'FAU_SAR.1': 10, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2': 6, 'FAU_SAR.2.1': 1, 'FAU_SAR.3': 6, 'FAU_SAR.3.1': 1, 'FAU_STG': 1, 'FAU_STG.1': 2}, 'FCS': {'FCS_COP.1': 10, 'FCS_COP': 1, 'FCS_COP.1.1': 1, 'FCS_CKM.4': 1}, 'FDP': {'FDP_IFC': 1, 'FDP_IFF': 1, 'FDP_ITC.1': 1}, 'FIA': {'FIA_UAU': 4, 'FIA_UAU.5': 7, 'FIA_UAU.1': 3, 'FIA_UAU.2': 7, 'FIA_UAU.3': 1, 'FIA_UAU.4': 1, 'FIA_UAU.6': 7, 'FIA_UAU.7': 1, 'FIA_AFL': 1, 'FIA_AFL.1': 6, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD': 1, 'FIA_ATD.1': 6, 'FIA_ATD.1.1': 1, 'FIA_SOS': 1, 'FIA_SOS.1': 6, 'FIA_SOS.1.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UAU.6.1': 1, 'FIA_UID': 1, 'FIA_UID.2': 7, 'FIA_UID.2.1': 1, 'FIA_UID.1': 4}, 'FMT': {'FMT_MOF': 1, 'FMT_MSA': 1, 'FMT_MTD': 1, 'FMT_SMF': 1, 'FMT_SMF.1': 15, 'FMT_SMF.1.1': 1, 'FMT_SMR': 1, 'FMT_SMR.2': 19, 'FMT_SMR.2.1': 1, 'FMT_SMR.2.2': 1, 'FMT_SMR.2.3': 1, 'FMT_SMR.3': 6, 'FMT_SMR.3.1': 1, 'FMT_SMR.1': 13, 'FMT_MOF.1.3': 1}, 'FPT': {'FPT_SST': 5, 'FPT_UPD': 6, 'FPT_STM.1': 9, 'FPT_RCV': 1, 'FPT_RCV.2': 6, 'FPT_RCV.2.1': 1, 'FPT_RCV.2.2': 1, 'FPT_STM': 1, 'FPT_STM.1.1': 1, 'FPT_TRC': 1, 'FPT_TRC.1': 5, 'FPT_TRC.1.1': 1, 'FPT_TRC.1.2': 1, 'FPT_ITT.1': 2, 'FPT_TST.1': 1}}, 'cc_claims': {'O': {'O.IDAUTH': 15, 'O.MEDIAT': 16, 'O.SECSTA': 8, 'O.SELPRO': 5, 'O.SECFUN': 22, 'O.MISUSESSH': 10, 'O.AUDREC': 17, 'O.ACCOUN': 9, 'O.AVAIL': 8, 'O.PATCH': 8, 'O.SELFPRO': 2}, 'T': {'T.NOAUTH': 2, 'T.SPOOF': 2, 'T.MEDIAT': 2, 'T.SELPRO': 2, 'T.MISUSESSH': 2, 'T.PATCH': 2}, 'A': {'A.PHYSEC': 2, 'A.NOEVIL': 2, 'A.ADMIN': 2, 'A.LOCAL': 3, 'A.REST': 2, 'A.SINGEN': 3, 'A.POLICY': 2, 'A.TIMESTMP': 2, 'A.HANET': 2, 'A.USER': 2, 'A.TRUSTK': 2, 'A.TRUSTU': 2, 'A.LEGACY': 2, 'A.REMOTE_AUTH': 2, 'A.OSPF': 2}, 'OE': {'OE.PHYSEC': 2, 'OE.NOEVIL': 2, 'OE.ADMIN': 2, 'OE.LOCAL': 2, 'OE.REST': 2, 'OE.SINGEN': 2, 'OE.POLICY': 2, 'OE.TIMESTMP': 3, 'OE.RTCLOCK': 3, 'OE.HANET': 4, 'OE.USER': 2, 'OE.TRUSTK': 4, 'OE.TRUSTU': 2, 'OE.LEGACY': 2, 'OE.REMOTE_AUTH': 2, 'OE.OSPF': 2, 'OE.PASSWD': 3}}, 'vendor': {'STMicroelectronics': {'STM': 19}, 'Microsoft': {'Microsoft': 1}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-384': 3, 'SHA-512': 2, 'SHA-256': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 34}, 'TLS': {'SSL': {'SSL': 4}, 'TLS': {'TLS': 5}}, 'IPsec': {'IPsec': 2}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side channel': 29, 'SPA': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 180-4': 3}, 'PKCS': {'PKCS#1': 3}, 'RFC': {'RFC 4251': 1}, 'ISO': {'ISO/IEC 18045': 4}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, ', genugate 400, genugate 600 and genugate 800 in the field with hardware revision 6 and 7 which are out of scope for the current certification. The genugate firewall 10.0 runs on this hardware with the same': 1}}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '86f2e0bcc7b11465da147358585db0557864c6ee3cc3c4b8f66697ed4f81f005', 'st_pdf_hash': '96c4c9f54d244ab966c01f45fcb1397efdf08aa2e9a2ed78a23f60f03b8d901a', 'report_txt_hash': '9fac66d6037ff7ad36d6794c98da55311ba1c1ab1cc70583ddce0f44e8d49817', 'st_txt_hash': '9e20dc50bb971bc87293f3d8def7cf419800b5d3b0abc4d5b8717c0589596495'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA1': 2, 'SHA-256': 2, 'SHA-512': 2, 'SHA256': 38, 'SHA512': 38, 'SHA-384': 1}, 'rules_crypto_schemes': {'TLS': 1, 'SSL': 1}, 'rules_randomness': {}, 'rules_tee': {'SE': 2}, 'rules_side_channels': {}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-384': 3, 'SHA-512': 2, 'SHA-256': 1}, 'rules_crypto_schemes': {'TLS': 5, 'SSL': 4}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {'side channel': 29}} values inserted.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ALC_PAM', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'SAR', 'family': 'ADV_TAT', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1039-2017']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0718-2012', 'BSI-DSZ-CC-0890-2013', 'BSI-DSZ-CC-1039-2017']}}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['10.0']}.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name genugate 10.0 Firewall Software was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Network and Network-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/files/epfiles/1154c_pdf.pdf",
  "dgst": "96106c2d31eea8b2",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-1154-2021",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_PAM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "10.0"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1039-2017"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0890-2013",
          "BSI-DSZ-CC-0718-2012",
          "BSI-DSZ-CC-1039-2017"
        ]
      }
    },
    "scheme_data": {
      "category": "Network and Network related Devices and Systems",
      "cert_id": "BSI-DSZ-CC-1154-2021",
      "certification_date": "22.06.2021",
      "enhanced": {
        "applicant": "genua GmbH\nDomagkstrasse 7\n85551 Kirchheim",
        "assurance_level": "EAL4+,ALC_FLR.2,ALC_PAM.1,ASE_TSS.2,AVA_VAN.5",
        "cert_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1154c_pdf.pdf?__blob=publicationFile\u0026v=2",
        "certification_date": "22.06.2021",
        "description": "The TOE genugate 10.0 Z is a combination of an application level gateway (ALG) and a packet filter (PFL), which are implemented on two different systems. It is part of a larger product. The firewall genugate 10.0 Z consists of hardware and software. The TOE  is part of the shipped software. The operating system is a modified OpenBSD.",
        "entries": [
          {
            "description": "patchlevel is p14",
            "id": "BSI-DSZ-CC-1154-2023-MA-01 (Ausstellungsdatum / Certification Date 25.09.2023)\nAssurance Continuity Maintenance Report with partial re-evaluation applying ALC_PAM for patch management\nAssurance Continuity Maintanance Report"
          },
          {
            "description": "Certificate",
            "id": "BSI-DSZ-CC-1154-2021"
          }
        ],
        "evaluation_facility": "secuvera GmbH",
        "expiration_date": "21.06.2026",
        "product": "genugate 10.0 p14 Firewall Software",
        "report_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1154a_pdf.pdf?__blob=publicationFile\u0026v=2",
        "target_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1154b_pdf.pdf?__blob=publicationFile\u0026v=2"
      },
      "product": "genugate 10.0 p14 Firewall Software",
      "url": "https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Netzwerk_und_Kommunikationsprodukte/1154.html",
      "vendor": "genua GmbH"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2023-09-25",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/1154MA01a_pdf.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/files/epfiles/1154MA01b_pdf.pdf",
        "maintenance_title": "genugate 10.0 p14 Firewall Software (Assurance Continuity Maintenance Report with partial re-evaluation applying ALC_PAM for patch management)"
      }
    ]
  },
  "manufacturer": "genua GmbH",
  "manufacturer_web": "https://www.genua.de",
  "name": "genugate 10.0 Firewall Software",
  "not_valid_after": "2026-06-21",
  "not_valid_before": "2021-06-22",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "1154c_pdf.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1154-2021": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 1,
          "ALC_FLR.2": 1,
          "ALC_PAM.1": 1
        },
        "ASE": {
          "ASE_TSS.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 4": 2,
          "EAL 4 augmented": 1,
          "EAL 5": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408": 2,
          "ISO/IEC 18045": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20210630131150+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Zertifizierung, Certification, genugate 10.0 Firewall Software from genua GmbH\", Urkunde",
      "/ModDate": "D:20210630132300+02\u002700\u0027",
      "/Producer": "LibreOffice 6.3",
      "/Subject": "Zertifikat, Certificate, Urkunde",
      "/Title": "Urkunde BSI-DSZ-CC-1154-2021",
      "pdf_file_size_bytes": 263084,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "1154a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cc_security_level": "Common Criteria Part 3 extended EAL 4 augmented by ASE_TSS.2, ALC_FLR.2, ALC_PAM.1, AVA_VAN.5",
        "cc_version": "Product specific Security Target Common Criteria Part 2 extended",
        "cert_id": "BSI-DSZ-CC-1154-2021",
        "cert_item": "genugate 10.0 Firewall Software",
        "cert_lab": "BSI",
        "developer": "genua GmbH",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "None"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-01154": 1,
          "BSI-DSZ-CC-1039-2017": 3,
          "BSI-DSZ-CC-1154-2021": 15
        }
      },
      "cc_claims": {
        "A": {
          "A.ADMIN": 2,
          "A.HANET": 2,
          "A.LEGACY": 2,
          "A.LOCAL": 2,
          "A.NOEVIL": 2,
          "A.OSPF": 2,
          "A.PHYSEC": 2,
          "A.POLICY": 3,
          "A.REMOTE_AUTH": 2,
          "A.REST": 2,
          "A.SINGEN": 2,
          "A.TIMESTMP": 2,
          "A.TRUSTK": 2,
          "A.TRUSTU": 2,
          "A.USER": 2
        },
        "OE": {
          "OE.PHYSEC": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 3,
          "ALC_FLR.2": 4,
          "ALC_PAM": 3,
          "ALC_PAM.1": 13
        },
        "ASE": {
          "ASE_TSS.2": 5
        },
        "AVA": {
          "AVA_VAN.5": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 2,
          "EAL 2+": 1,
          "EAL 4": 8,
          "EAL 4 augmented": 3,
          "EAL 5": 3,
          "EAL 5+": 1,
          "EAL 6": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "Report BSI-DSZ-CC-01154 for genugate firewall 10.0, Version 2, Date 11.06.2021, secuvera Gmbh (confidential document) [8] genugate 10.0 Z Installationshandbuch, Version 10.0 Z Patch 000, Ausgabe M\u00e4rz 2021, Revision": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1,
          "v10.0-RC3 [10] Archiv von Konfigurationslisten, 1154-ALC_CMS-RC3-20210331.tgz, Date 31.03.2021 (confidential document) 7 specifically \u2022 AIS 32, Version 7, CC-Interpretationen im deutschen Zertifizierungsschema \u2022 AIS": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IPsec": {
          "IPsec": 1
        },
        "SSH": {
          "SSH": 5
        },
        "TLS": {
          "SSL": {
            "SSL": 1
          },
          "TLS": {
            "TLS": 1
          }
        },
        "VPN": {
          "VPN": 1
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "secuvera": {
          "secuvera": 3
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 2,
            "SHA-384": 1,
            "SHA-512": 2,
            "SHA256": 36,
            "SHA512": 36
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "BSI": {
          "AIS 32": 1,
          "AIS 34": 2,
          "AIS 38": 1
        },
        "FIPS": {
          "FIPS PUB 180-4": 4
        },
        "ISO": {
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4
        },
        "PKCS": {
          "PKCS#1": 2
        },
        "RFC": {
          "RFC 3447": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {
        "BSI": {
          "BSI 7148": 1,
          "BSI TR-02102": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20210630113008+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Zertifizierung, Certification, genugate 10.0 Firewall Software from genua GmbH\"",
      "/ModDate": "D:20210701114458+02\u002700\u0027",
      "/Producer": "LibreOffice 6.3",
      "/Subject": "BSI-DSZ-CC-1154-2021 for genugate 10.0 Firewall Software from genua GmbH",
      "/Title": "Zertifizierungsreport BSI-DSZ-CC-1154-2021",
      "pdf_file_size_bytes": 637521,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.bsi.bund.de/zertifizierung",
          "https://www.bsi.bund.de/zertifizierungsreporte",
          "https://www.sogis.eu/",
          "http://www.commoncriteriaportal.org/cc/",
          "https://www.bsi.bund.de/AIS",
          "http://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 29
    },
    "st_filename": "1154b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ADMIN": 2,
          "A.HANET": 2,
          "A.LEGACY": 2,
          "A.LOCAL": 3,
          "A.NOEVIL": 2,
          "A.OSPF": 2,
          "A.PHYSEC": 2,
          "A.POLICY": 2,
          "A.REMOTE_AUTH": 2,
          "A.REST": 2,
          "A.SINGEN": 3,
          "A.TIMESTMP": 2,
          "A.TRUSTK": 2,
          "A.TRUSTU": 2,
          "A.USER": 2
        },
        "O": {
          "O.ACCOUN": 6,
          "O.AUDREC": 17,
          "O.AVAIL": 8,
          "O.IDAUTH": 15,
          "O.MEDIAT": 13,
          "O.MISUSESSH": 7,
          "O.PATCH": 5,
          "O.SECFUN": 22,
          "O.SECSTA": 8,
          "O.SELPRO": 4
        },
        "OE": {
          "OE.ADMIN": 2,
          "OE.HANET": 3,
          "OE.LEGACY": 1,
          "OE.LOCAL": 1,
          "OE.NOEVIL": 1,
          "OE.OSPF": 1,
          "OE.PASSWD": 3,
          "OE.PHYSEC": 2,
          "OE.POLICY": 2,
          "OE.REMOTE_AUTH": 2,
          "OE.REST": 2,
          "OE.RTCLOCK": 3,
          "OE.SINGEN": 1,
          "OE.TIMESTMP": 2,
          "OE.TRUSTK": 3,
          "OE.TRUSTU": 2,
          "OE.USER": 2
        },
        "T": {
          "T.MEDIAT": 2,
          "T.MISUSESSH": 2,
          "T.NOAUTH": 2,
          "T.PATCH": 2,
          "T.SELPRO": 2,
          "T.SPOOF": 2
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 4,
          "ADV_FSP": 1,
          "ADV_FSP.1": 1,
          "ADV_FSP.2": 3,
          "ADV_FSP.4": 1,
          "ADV_IMP": 1,
          "ADV_IMP.1": 3,
          "ADV_INT": 2,
          "ADV_SPM": 2,
          "ADV_TAT.1": 1,
          "ADV_TDS": 1,
          "ADV_TDS.1": 1,
          "ADV_TDS.2": 1,
          "ADV_TDS.3": 2
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 5,
          "AGD_PRE": 1,
          "AGD_PRE.1": 3
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.4": 1,
          "ALC_CMS": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL": 3,
          "ALC_DEL.1": 1,
          "ALC_DVS": 1,
          "ALC_DVS.1": 2,
          "ALC_FLR": 1,
          "ALC_FLR.2": 5,
          "ALC_LCD": 1,
          "ALC_LCD.1": 2,
          "ALC_PAM": 32,
          "ALC_PAM.1": 48,
          "ALC_TAT": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_CCL.1": 1,
          "ASE_ECD": 1,
          "ASE_ECD.1": 3,
          "ASE_INT": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ": 1,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 1,
          "ASE_SPD": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS": 1,
          "ASE_TSS.2": 4
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.1": 1,
          "ATE_COV.2": 1,
          "ATE_DPT": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN": 1,
          "ATE_FUN.1": 4,
          "ATE_IND": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 4,
          "EAL4 augmented": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP": 2,
          "FAU_ARP.1": 6,
          "FAU_ARP.1.1": 1,
          "FAU_GEN": 33,
          "FAU_GEN.1": 16,
          "FAU_GEN.2": 1,
          "FAU_SAA": 2,
          "FAU_SAA.1": 7,
          "FAU_SAA.1.1": 1,
          "FAU_SAA.1.2": 1,
          "FAU_SAR": 4,
          "FAU_SAR.1": 8,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.2": 6,
          "FAU_SAR.2.1": 1,
          "FAU_SAR.3": 6,
          "FAU_SAR.3.1": 1,
          "FAU_STG": 31,
          "FAU_STG.1": 7,
          "FAU_STG.4": 2,
          "FAU_UPD": 1
        },
        "FCS": {
          "FCS_CKM.4": 2,
          "FCS_COP": 2,
          "FCS_COP.1": 11,
          "FCS_COP.1.1": 1
        },
        "FDP": {
          "FDP_IFC": 60,
          "FDP_IFC.1": 5,
          "FDP_IFF": 52,
          "FDP_IFF.1": 25,
          "FDP_ITC.1": 2
        },
        "FIA": {
          "FIA_AFL": 2,
          "FIA_AFL.1": 6,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD": 2,
          "FIA_ATD.1": 6,
          "FIA_ATD.1.1": 1,
          "FIA_SOS": 2,
          "FIA_SOS.1": 6,
          "FIA_SOS.1.1": 1,
          "FIA_UAU": 28,
          "FIA_UAU.1": 2,
          "FIA_UAU.2": 8,
          "FIA_UAU.2.1": 1,
          "FIA_UAU.3": 1,
          "FIA_UAU.4": 1,
          "FIA_UAU.5": 8,
          "FIA_UAU.6": 7,
          "FIA_UAU.6.1": 1,
          "FIA_UAU.7": 1,
          "FIA_UID": 3,
          "FIA_UID.1": 3,
          "FIA_UID.2": 7,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_IFF": 2,
          "FMT_MOF": 21,
          "FMT_MOF.1": 3,
          "FMT_MOF.1.3": 1,
          "FMT_MSA": 68,
          "FMT_MSA.1": 4,
          "FMT_MSA.3": 3,
          "FMT_MTD": 15,
          "FMT_MTD.1": 2,
          "FMT_SMF": 2,
          "FMT_SMF.1": 24,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 5,
          "FMT_SMR.1": 25,
          "FMT_SMR.2": 19,
          "FMT_SMR.2.1": 1,
          "FMT_SMR.2.2": 1,
          "FMT_SMR.2.3": 1,
          "FMT_SMR.3": 6,
          "FMT_SMR.3.1": 1
        },
        "FPT": {
          "FPT_AMT.1": 1,
          "FPT_ITT.1": 1,
          "FPT_RCV": 2,
          "FPT_RCV.2": 6,
          "FPT_RCV.2.1": 1,
          "FPT_RCV.2.2": 1,
          "FPT_SST": 22,
          "FPT_STM": 2,
          "FPT_STM.1": 9,
          "FPT_STM.1.1": 1,
          "FPT_TRC": 3,
          "FPT_TRC.1": 5,
          "FPT_TRC.1.1": 1,
          "FPT_TRC.1.2": 1,
          "FPT_TST.1": 2,
          "FPT_UPD": 42
        }
      },
      "certification_process": {
        "OutOfScope": {
          "genugate 400, genugate 600 and genugate 800 in the field with hardware revision 6 and 7 which are out of scope for the current certification. The genugate firewall 10.0 runs on this hardware with the same": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IPsec": {
          "IPsec": 2
        },
        "SSH": {
          "SSH": 26
        },
        "TLS": {
          "SSL": {
            "SSL": 3
          },
          "TLS": {
            "TLS": 5
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 3,
            "SHA-384": 3,
            "SHA-512": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "SCA": {
          "side channel": 31
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2017-04-002": 1
        },
        "FIPS": {
          "FIPS PUB 180-4": 3
        },
        "ISO": {
          "ISO/IEC 18045": 4
        },
        "PKCS": {
          "PKCS#1": 3
        },
        "RFC": {
          "RFC 4251": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "genua GmbH",
      "/CreationDate": "D:20210616140218+02\u002700\u0027",
      "/Creator": "LaTeX with hyperref",
      "/Keywords": "firewall, application level gateway, packet filter",
      "/ModDate": "D:20210616140218+02\u002700\u0027",
      "/Producer": "GPL Ghostscript 9.53.3",
      "/Subject": "Common Criteria certification",
      "/Title": "genugate 10.0 Security Target",
      "pdf_file_size_bytes": 460773,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.ietf.org/rfc/rfc4251.txt",
          "http://www.openssh.org"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 81
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/1154a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "AVA_VAN.5",
      "ASE_TSS.2",
      "ALC_FLR.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/1154b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "f6490f4bd3755b5ab3f32cd34a07501e045fc8ddc32ad5987b5966a41eed50da",
      "txt_hash": "50af03dfddd87de76ca33b6444f5af10f1cfde18c9794963f3114b29f0b170b4"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "86f2e0bcc7b11465da147358585db0557864c6ee3cc3c4b8f66697ed4f81f005",
      "txt_hash": "9fac66d6037ff7ad36d6794c98da55311ba1c1ab1cc70583ddce0f44e8d49817"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "96c4c9f54d244ab966c01f45fcb1397efdf08aa2e9a2ed78a23f60f03b8d901a",
      "txt_hash": "9e20dc50bb971bc87293f3d8def7cf419800b5d3b0abc4d5b8717c0589596495"
    }
  },
  "status": "active"
}