genugate 9.0 Firewall Software
CSV information ?
Status | archived |
---|---|
Valid from | 29.12.2017 |
Valid until | 29.12.2022 |
Scheme | 🇩🇪 DE |
Manufacturer | GeNUA mbH |
Category | Network and Network-Related Devices and Systems |
Security level | EAL4+, ASE_TSS.2, AVA_VAN.5, ALC_FLR.2 |
Maintenance updates | genugate 9.0 Firewall Software (18.02.2021) Certification report Security target |
Heuristics summary ?
Certification report ?
Extracted keywords
Hash functions
SHA-256, SHA-512, SHA256, SHA512Protocols
SSH, SSL, VPNSecurity level
EAL 4, EAL 5, EAL 2, EAL 1, EAL 2+, EAL 5+, EAL 6, EAL 4 augmentedClaims
A.PHYSEC, A.NOEVIL, A.ADMIN, A.SINGEN, A.POLICY, A.TIMESTMP, A.HANET, A.USER, A.TRUSTK, A.TRUSTU, A.LEGACY, A.REMOTE_AUTH, A.OSPF, A.SERVER, OE.PHYSECSecurity Assurance Requirements (SAR)
ALC_FLR.2, ALC_FLR, AVA_VAN.5, AVA_VAN, ASE_TSS.2Certificates
BSI-DSZ-CC-1039-2017, BSI-DSZ-CC-0890-2013Evaluation facilities
secuveraCertification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Report BSI-DSZ-CC-01039 for genugate firewall 9.0, Version 1, Date 15.12.2017, secuvera Gmbh (confidential document) [8] genugate Installationshandbuch, Version 9.0 Z, Ausgabe November 2017, Revision gg.90.D021 [9Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Report BSI-DSZ-CC-01039 for genugate firewall 9.0, Version 1, Date 15.12.2017, secuvera Gmbh (confidential document) [8] genugate Installationshandbuch, Version 9.0 Z, Ausgabe November 2017, Revision gg.90.D021 [9Standards
AIS 34, AIS 32, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065Technical reports
BSI 7148File metadata
Title: | Certification Report BSI-DSZ-CC-1039-2017 |
---|---|
Subject: | Zertifizierung Firewall Software |
Keywords: | "Common Criteria, Certification, Zertifizierung, " |
Author: | Bundesamt für Sicherheit in der Informationstechnik |
Creation date: | D:20180126142805+01'00' |
Modification date: | D:20180126152155+01'00' |
Pages: | 28 |
Creator: | Writer |
Producer: | LibreOffice 5.2 |
Frontpage
Certificate ID: | BSI-DSZ-CC-1039-2017 |
---|---|
Certified item: | genugate 9.0 Firewall Software |
Certification lab: | BSI |
Developer: | genua gmbh |
References
Outgoing- BSI-DSZ-CC-0890-2013 - genugate firewall 8.0
- BSI-DSZ-CC-1154-2021 - genugate 10.0 Firewall Software
Security target ?
Extracted keywords
Protocols
SSH, SSL, TLS, IPsecSecurity level
EAL4, EAL4 augmentedClaims
O.IDAUTH, O.MEDIAT, O.SECSTA, O.SELPRO, O.AUDREC, O.ACCOUN, O.SECFUN, O.AVAIL, O.MISUSESSH, T.NOAUTH, T.SPOOF, T.MEDIAT, T.SELPRO, T.MISUSESSH, A.PHYSEC, A.NOEVIL, A.ADMIN, A.SINGEN, A.POLICY, A.TIMESTMP, A.HANET, A.USER, A.TRUSTK, A.TRUSTU, A.LEGACY, A.REMOTE_AUTH, A.OSPF, OE.PHYSEC, OE.NOEVIL, OE.ADMIN, OE.SINGEN, OE.POLICY, OE.TIMESTMP, OE.RTCLOCK, OE.HANET, OE.USER, OE.TRUSTK, OE.TRUSTU, OE.LEGACY, OE.REMOTE_AUTH, OE.PASSWD, OE.OSPFSecurity Assurance Requirements (SAR)
ADV_INT, ADV_SPM, ADV_ARC, ADV_FSP, ADV_IMP, ADV_TDS, ADV_ARC.1, ADV_TDS.1, ADV_FSP.4, ADV_IMP.1, ADV_TAT.1, ADV_TDS.3, ADV_FSP.1, ADV_FSP.2, ADV_TDS.2, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ALC_CMC.4, ALC_DVS.1, ALC_LCD.1, ALC_CMS.4, ALC_DEL.1, ALC_TAT.1, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, ATE_COV.2, ATE_FUN.1, ATE_DPT.1, ATE_IND.2, ATE_COV.1, AVA_VAN.5, AVA_VAN, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_REQ.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1Security Functional Requirements (SFR)
FAU_GEN, FAU_GEN.1, FAU_GEN.2, FAU_ARP, FAU_ARP.1, FAU_ARP.1.1, FAU_SAA, FAU_SAA.1, FAU_SAA.1.1, FAU_SAA.1.2, FAU_SAR, FAU_SAR.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2, FAU_SAR.2.1, FAU_SAR.3, FAU_SAR.3.1, FAU_STG, FAU_STG.1, FAU_STG.4, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FIA_UAU, FIA_UAU.5, FIA_UAU.1, FIA_UAU.2, FIA_UAU.3, FIA_UAU.4, FIA_UAU.6, FIA_UAU.7, FIA_AFL, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS, FIA_SOS.1, FIA_SOS.1.1, FIA_UAU.2.1, FIA_UAU.6.1, FIA_UID, FIA_UID.2, FIA_UID.2.1, FIA_UID.1, FMT_MOF, FMT_MOF.1, FMT_MSA, FMT_MSA.1, FMT_MSA.3, FMT_MTD, FMT_MTD.1, FMT_SMF, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR, FMT_SMR.2, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FMT_SMR.3, FMT_SMR.3.1, FMT_SMR.1, FMT_IFF, FMT_MOF.1.3, FPT_SST, FPT_STM.1, FPT_SST.1, FPT_SST.1.1, FPT_SST.1.2, FPT_RCV, FPT_RCV.2, FPT_RCV.2.1, FPT_RCV.2.2, FPT_TRC, FPT_TRC.1, FPT_TRC.1.1, FPT_TRC.1.2, FPT_STM, FPT_STM.1.1, FPT_ITT.1, FPT_TST.1, FPT_AMT.1Certification process
out of scope, genugate 400, genugate 600 and genugate 800 in the fead eith haideaie ievision 6 and 7 ehich aie out of scope foi the cuiient ceitifcation. The genugate fieeaaa 9.0 iuns on this haideaie eith the sameSide-channel analysis
side channelCertification process
out of scope, genugate 400, genugate 600 and genugate 800 in the fead eith haideaie ievision 6 and 7 ehich aie out of scope foi the cuiient ceitifcation. The genugate fieeaaa 9.0 iuns on this haideaie eith the sameFile metadata
Title: | genugate firewall 9.0 Security Target |
---|---|
Subject: | Common Criteria |
Keywords: | CC 3.1 |
Author: | Roland Meister |
Creation date: | D:20171213100427+01'00' |
Pages: | 68 |
Creator: | Writer |
Producer: | LibreOffice 5.4 |
References
OutgoingHeuristics ?
Extracted SARs
ALC_CMS.4, ASE_OBJ.2, ASE_CCL.1, AGD_OPE.1, ATE_COV.2, AGD_PRE.1, ALC_TAT.1, ATE_FUN.1, AVA_VAN.5, ALC_LCD.1, ADV_FSP.4, ADV_IMP.1, ASE_INT.1, ASE_SPD.1, ASE_TSS.2, ALC_FLR.2, ASE_ECD.1, ALC_DEL.1, ADV_TAT.1, ADV_ARC.1, ADV_TDS.3, ALC_DVS.1, ATE_IND.2, ALC_CMC.4, ASE_REQ.2, ATE_DPT.1References ?
Updates ?
-
28.01.2022 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name genugate 9.0 Firewall Software was processed.
-
18.02.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted. - The st_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted.
The computed heuristics were updated.
- The extracted_versions property was set to
{'_type': 'Set', 'elements': ['9.0']}
. - The directly_affected_by property was set to
{'_type': 'Set', 'elements': ['BSI-DSZ-CC-1154-2021']}
.
- The report_frontpage property was updated, with the
-
08.03.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1154-2021']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1154-2021']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0890-2013']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0890-2013', 'BSI-DSZ-CC-0718-2012']}}}
. - The following properties were deleted:
['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting']
.
- The following values were inserted:
-
24.04.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'direct_dependency_cves': None, 'indirect_dependency_cves': None}
.
- The following values were inserted:
-
13.05.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_TAT', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}]}}
.
- The following values were inserted:
-
21.05.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The cpe_matches property was set to
{'_type': 'Set', 'elements': ['cpe:2.3:a:genua:genuagate:9.0:p16:*:*:*:*:*:*', 'cpe:2.3:a:genua:genuagate:9.0:p1:*:*:*:*:*:*', 'cpe:2.3:a:genua:genuagate:9.0:p2:*:*:*:*:*:*', 'cpe:2.3:a:genua:genuagate:9.0:p13:*:*:*:*:*:*', 'cpe:2.3:a:genua:genuagate:9.0:p3:*:*:*:*:*:*', 'cpe:2.3:a:genua:genuagate:9.0:p5:*:*:*:*:*:*', 'cpe:2.3:a:genua:genuagate:9.0:p17:*:*:*:*:*:*', 'cpe:2.3:a:genua:genuagate:9.0:p12:*:*:*:*:*:*', 'cpe:2.3:a:genua:genuagate:9.0:p7:*:*:*:*:*:*', 'cpe:2.3:a:genua:genuagate:9.0:p8:*:*:*:*:*:*', 'cpe:2.3:a:genua:genuagate:9.0:-:*:*:*:*:*:*', 'cpe:2.3:a:genua:genuagate:9.0:p15:*:*:*:*:*:*', 'cpe:2.3:a:genua:genuagate:9.0:p4:*:*:*:*:*:*', 'cpe:2.3:a:genua:genuagate:9.0:p6:*:*:*:*:*:*', 'cpe:2.3:a:genua:genuagate:9.0:p10:*:*:*:*:*:*', 'cpe:2.3:a:genua:genuagate:9.0:p18:*:*:*:*:*:*', 'cpe:2.3:a:genua:genuagate:9.0:p14:*:*:*:*:*:*', 'cpe:2.3:a:genua:genuagate:9.0:p9:*:*:*:*:*:*', 'cpe:2.3:a:genua:genuagate:9.0:p11:*:*:*:*:*:*']}
. - The related_cves property was set to
{'_type': 'Set', 'elements': ['CVE-2021-27215']}
.
- The cpe_matches property was set to
-
14.06.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'report_pdf_hash': '18d7214debc29943f09dcceb69d7bb5a7171563a52809530b2711c89c34f26b2', 'st_pdf_hash': '2c3317a2cfeea7aca4fc8e21644e79debda9fbc08cf71855404cb14eac68e9f8', 'report_txt_hash': '95756da5c032142b81e20f2b90ba8b31eb62ccef1e6636c5f626179659d3187f', 'st_txt_hash': '40f0d5a2a98927a3420f6085dc39fb93f262aaf46bbf2f8dc490e0b9676c2058'}
.
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA1': 2, 'SHA-256': 1, 'SHA-512': 1, 'SHA256': 3, 'SHA512': 3}, 'rules_crypto_schemes': {'SSL': 1}, 'rules_randomness': {}, 'rules_tee': {'SE': 2}, 'rules_side_channels': {}}
values inserted. - The st_keywords property was updated, with the
{'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'TLS': 6, 'SSL': 4}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {'side channel': 13}}
values inserted.
- The following values were inserted:
-
17.07.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_metadata property was updated, with the
{'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.commoncriteriaportal.org/cc/', 'http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/AIS', 'http://www.sogisportal.eu/', 'https://www.bsi.bund.de/zertifizierung', 'https://www.bsi.bund.de/zertifizierungsreporte', 'https://www.bsi.bund.de/']}}
values inserted. - The st_metadata property was updated, with the
{'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.openbsd.org/', 'https://en.wikipedia.org/wiki/Secure_Sockets_Layer']}}
values inserted. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-1039-2017': 56, 'BSI-DSZ-CC-0890-2013': 4}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 8, 'EAL 5': 3, 'EAL 2': 2, 'EAL 1': 1, 'EAL 2+': 1, 'EAL 5+': 1, 'EAL 6': 1, 'EAL 4 augmented': 3}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 4, 'ALC_FLR': 3}, 'AVA': {'AVA_VAN.5': 3, 'AVA_VAN': 1}, 'ASE': {'ASE_TSS.2': 4}}, 'cc_sfr': {}, 'cc_claims': {'A': {'A.PHYSEC': 2, 'A.NOEVIL': 2, 'A.ADMIN': 2, 'A.SINGEN': 2, 'A.POLICY': 4, 'A.TIMESTMP': 2, 'A.HANET': 2, 'A.USER': 2, 'A.TRUSTK': 2, 'A.TRUSTU': 2, 'A.LEGACY': 2, 'A.REMOTE_AUTH': 1, 'A.OSPF': 2, 'A.SERVER': 1}, 'OE': {'OE.PHYSEC': 1}}, 'vendor': {'STMicroelectronics': {'STM': 2}}, 'eval_facility': {'secuvera': {'secuvera': 3}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 2}, 'SHA2': {'SHA-256': 1, 'SHA-512': 1, 'SHA256': 3, 'SHA512': 3}}}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 1}, 'TLS': {'SSL': {'SSL': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {'BSI': {'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 34': 2, 'AIS 32': 1}, 'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 17065': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'identiality being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'nical Report BSI-DSZ-CC-01039 for genugate firewall 9.0, Version 1, Date 15.12.2017, secuvera Gmbh (confidential document) [8] genugate Installationshandbuch, Version 9.0 Z, Ausgabe November 2017, Revision gg.90.D021 [9': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 2, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_INT': 2, 'ADV_SPM': 2, 'ADV_ARC': 1, 'ADV_ARC.1': 5, 'ADV_FSP': 1, 'ADV_FSP.4': 3, 'ADV_IMP': 1, 'ADV_IMP.1': 4, 'ADV_TDS': 1, 'ADV_TDS.3': 4, 'ADV_FSP.1': 2, 'ADV_TDS.1': 2, 'ADV_TAT.1': 1, 'ADV_FSP.2': 3, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_OPE.1': 5, 'AGD_PRE': 1, 'AGD_PRE.1': 4}, 'ALC': {'ALC_FLR.2': 5, 'ALC_CMC': 1, 'ALC_CMC.4': 2, 'ALC_CMS': 1, 'ALC_CMS.4': 2, 'ALC_DEL': 1, 'ALC_DEL.1': 2, 'ALC_DVS': 1, 'ALC_DVS.1': 3, 'ALC_FLR': 1, 'ALC_LCD': 1, 'ALC_LCD.1': 3, 'ALC_TAT': 1, 'ALC_TAT.1': 2, 'ALC_CMS.1': 1}, 'ATE': {'ATE_COV': 1, 'ATE_COV.2': 2, 'ATE_DPT': 1, 'ATE_DPT.1': 2, 'ATE_FUN': 1, 'ATE_FUN.1': 5, 'ATE_IND': 1, 'ATE_IND.2': 2, 'ATE_COV.1': 2}, 'AVA': {'AVA_VAN.5': 4, 'AVA_VAN': 1}, 'ASE': {'ASE_TSS.2': 4, 'ASE_CCL': 1, 'ASE_CCL.1': 2, 'ASE_ECD': 1, 'ASE_ECD.1': 4, 'ASE_INT': 1, 'ASE_INT.1': 4, 'ASE_OBJ': 1, 'ASE_OBJ.2': 3, 'ASE_REQ': 1, 'ASE_REQ.2': 2, 'ASE_SPD': 1, 'ASE_SPD.1': 3, 'ASE_TSS': 1, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN': 6, 'FAU_GEN.1': 11, 'FAU_GEN.2': 1, 'FAU_ARP': 1, 'FAU_ARP.1': 5, 'FAU_ARP.1.1': 1, 'FAU_SAA': 1, 'FAU_SAA.1': 7, 'FAU_SAA.1.1': 1, 'FAU_SAA.1.2': 1, 'FAU_SAR': 1, 'FAU_SAR.1': 7, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2': 5, 'FAU_SAR.2.1': 1, 'FAU_SAR.3': 5, 'FAU_SAR.3.1': 1, 'FAU_STG': 1, 'FAU_STG.1': 2}, 'FDP': {'FDP_IFC': 1, 'FDP_IFF': 1}, 'FIA': {'FIA_UAU': 3, 'FIA_UAU.5': 7, 'FIA_UAU.1': 2, 'FIA_UAU.2': 7, 'FIA_UAU.3': 1, 'FIA_UAU.4': 1, 'FIA_UAU.6': 6, 'FIA_UAU.7': 1, 'FIA_AFL': 1, 'FIA_AFL.1': 5, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD': 1, 'FIA_ATD.1': 5, 'FIA_ATD.1.1': 1, 'FIA_SOS': 1, 'FIA_SOS.1': 5, 'FIA_SOS.1.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UAU.6.1': 1, 'FIA_UID': 1, 'FIA_UID.2': 7, 'FIA_UID.2.1': 1, 'FIA_UID.1': 4}, 'FMT': {'FMT_MOF': 1, 'FMT_MSA': 1, 'FMT_MTD': 1, 'FMT_SMF': 1, 'FMT_SMF.1': 14, 'FMT_SMF.1.1': 1, 'FMT_SMR': 1, 'FMT_SMR.2': 20, 'FMT_SMR.2.1': 1, 'FMT_SMR.2.2': 1, 'FMT_SMR.2.3': 1, 'FMT_SMR.3': 6, 'FMT_SMR.3.1': 1, 'FMT_SMR.1': 13, 'FMT_MOF.1.3': 1}, 'FPT': {'FPT_SST': 5, 'FPT_STM.1': 8, 'FPT_SST.1': 9, 'FPT_SST.1.1': 2, 'FPT_SST.1.2': 2, 'FPT_RCV': 1, 'FPT_RCV.2': 6, 'FPT_RCV.2.1': 1, 'FPT_RCV.2.2': 1, 'FPT_TRC': 1, 'FPT_TRC.1': 6, 'FPT_TRC.1.1': 1, 'FPT_TRC.1.2': 1, 'FPT_STM': 1, 'FPT_STM.1.1': 1, 'FPT_ITT.1': 2, 'FPT_TST.1': 1}}, 'cc_claims': {'O': {'O.IDAUTH': 17, 'O.MEDIAT': 16, 'O.SECSTA': 9, 'O.SELPRO': 5, 'O.AUDREC': 17, 'O.ACCOUN': 9, 'O.SECFUN': 23, 'O.AVAIL': 7, 'O.MISUSESSH': 10, 'O.SELFPRO': 2}, 'T': {'T.NOAUTH': 2, 'T.SPOOF': 2, 'T.MEDIAT': 2, 'T.SELPRO': 2, 'T.MISUSESSH': 2}, 'A': {'A.PHYSEC': 2, 'A.NOEVIL': 2, 'A.ADMIN': 2, 'A.SINGEN': 3, 'A.POLICY': 2, 'A.TIMESTMP': 2, 'A.HANET': 2, 'A.USER': 2, 'A.TRUSTK': 2, 'A.TRUSTU': 2, 'A.LEGACY': 2, 'A.REMOTE_AUTH': 2, 'A.OSPF': 2}, 'OE': {'OE.PHYSEC': 2, 'OE.NOEVIL': 2, 'OE.ADMIN': 2, 'OE.SINGEN': 2, 'OE.POLICY': 2, 'OE.TIMESTMP': 3, 'OE.RTCLOCK': 3, 'OE.HANET': 4, 'OE.USER': 2, 'OE.TRUSTK': 4, 'OE.TRUSTU': 2, 'OE.LEGACY': 2, 'OE.REMOTE_AUTH': 2, 'OE.PASSWD': 3, 'OE.OSPF': 2}}, 'vendor': {'STMicroelectronics': {'STM': 16}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 32}, 'TLS': {'SSL': {'SSL': 4}, 'TLS': {'TLS': 6}}, 'IPsec': {'IPsec': 4}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side channel': 13, 'SPA': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, '0, genugate 400, genugate 600 and genugate 800 in the fead eith haideaie ievision 6 and 7 ehich aie out of scope foi the cuiient ceitifcation. The genugate fieeaaa 9.0 iuns on this haideaie eith the same': 1}}}
.
The computed heuristics were updated.
- The _type property was set to
Heuristics
.
- The report_metadata property was updated, with the
-
18.07.2022 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.common_criteria.CommonCriteriaCert
.
The Maintenance Updates of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2021-02-18', 'maintenance_title': 'genugate 9.0 Firewall Software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/1039MA1a_pdf.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/files/epfiles/1039ma1b_pdf.pdf'}]}
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData
.
The computed heuristics were updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics
. - The st_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The report_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}]}
.
- The new value is
-
24.09.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The following values were inserted:
{'report_filename': '1039a_pdf.pdf', 'st_filename': '1039b_pdf.pdf'}
. - The report_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1039-2017': 30, 'BSI-DSZ-CC-0890-2013': 6}}}}, 'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL 4': 9}}}}, 'cc_sar': {'__update__': {'AVA': {'__update__': {'AVA_VAN.5': 5}}}}, 'vendor': {}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA2': {'__update__': {'SHA256': 1, 'SHA512': 1}}}, '__delete__': ['SHA1']}}}, 'tee_name': {}, 'standard_id': {'__update__': {'ISO': {'__insert__': {'ISO/IEC 18045': 4}, '__update__': {'ISO/IEC 15408': 4}}}}, 'certification_process': {'__update__': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'Report BSI-DSZ-CC-01039 for genugate firewall 9.0, Version 1, Date 15.12.2017, secuvera Gmbh (confidential document) [8] genugate Installationshandbuch, Version 9.0 Z, Ausgabe November 2017, Revision gg.90.D021 [9': 1}}}}
data. - The st_keywords property was updated, with the
{'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL4': 4}}}}, 'cc_sar': {'__update__': {'ADV': {'__update__': {'ADV_ARC.1': 4, 'ADV_FSP.4': 1, 'ADV_IMP.1': 3, 'ADV_TDS.3': 2, 'ADV_FSP.1': 1, 'ADV_TDS.1': 1}}, 'AGD': {'__update__': {'AGD_OPE.1': 4, 'AGD_PRE.1': 3}}, 'ALC': {'__update__': {'ALC_FLR.2': 4, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 2, 'ALC_LCD.1': 2, 'ALC_TAT.1': 1}, '__delete__': ['ALC_CMS.1']}, 'ATE': {'__update__': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 4, 'ATE_IND.2': 1, 'ATE_COV.1': 1}}, 'ASE': {'__update__': {'ASE_CCL.1': 1, 'ASE_ECD.1': 3, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1}}}}, 'cc_sfr': {'__update__': {'FAU': {'__insert__': {'FAU_STG.4': 2}, '__update__': {'FAU_GEN': 28, 'FAU_GEN.1': 12, 'FAU_ARP': 2, 'FAU_SAA': 2, 'FAU_SAA.1': 6, 'FAU_SAR': 4, 'FAU_SAR.1': 5, 'FAU_STG': 29, 'FAU_STG.1': 7}}, 'FDP': {'__insert__': {'FDP_IFC.1': 5, 'FDP_IFF.1': 25}, '__update__': {'FDP_IFC': 60, 'FDP_IFF': 55}}, 'FIA': {'__update__': {'FIA_UAU': 27, 'FIA_UAU.5': 8, 'FIA_UAU.1': 1, 'FIA_AFL': 2, 'FIA_ATD': 2, 'FIA_SOS': 2, 'FIA_UID': 3, 'FIA_UID.1': 3}}, 'FMT': {'__insert__': {'FMT_MOF.1': 3, 'FMT_MSA.1': 4, 'FMT_MSA.3': 3, 'FMT_MTD.1': 2, 'FMT_IFF': 2}, '__update__': {'FMT_MOF': 21, 'FMT_MSA': 68, 'FMT_MTD': 16, 'FMT_SMF': 2, 'FMT_SMF.1': 23, 'FMT_SMR': 4, 'FMT_SMR.1': 16}}, 'FPT': {'__insert__': {'FPT_AMT.1': 1}, '__update__': {'FPT_SST': 7, 'FPT_RCV': 2, 'FPT_TRC': 2, 'FPT_STM': 2, 'FPT_ITT.1': 1, 'FPT_TST.1': 2}}}}, 'cc_claims': {'__update__': {'O': {'__update__': {'O.MEDIAT': 14, 'O.SECSTA': 7, 'O.AUDREC': 16, 'O.ACCOUN': 7, 'O.SECFUN': 22, 'O.AVAIL': 5}, '__delete__': ['O.SELFPRO']}, 'OE': {'__update__': {'OE.RTCLOCK': 2}}}}, 'vendor': {}, 'crypto_protocol': {'__update__': {'SSH': {'__update__': {'SSH': 26}}, 'TLS': {'__update__': {'SSL': {'__update__': {'SSL': 3}}}}}}, 'side_channel_analysis': {'__update__': {'SCA': {'__delete__': ['SPA']}}}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {'genugate 400, genugate 600 and genugate 800 in the fead eith haideaie ievision 6 and 7 ehich aie out of scope foi the cuiient ceitifcation. The genugate fieeaaa 9.0 iuns on this haideaie eith the same': 1}, '__delete__': ['0, genugate 400, genugate 600 and genugate 800 in the fead eith haideaie ievision 6 and 7 ehich aie out of scope foi the cuiient ceitifcation. The genugate fieeaaa 9.0 iuns on this haideaie eith the same']}}}}
data.
- The following values were inserted:
-
26.09.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'crypto_protocol': {'__insert__': {'VPN': {'VPN': 1}}}}
data.
- The report_keywords property was updated, with the
-
04.10.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The cpe_matches property was set to
None
. - The related_cves property was set to
None
.
- The cpe_matches property was set to
-
05.10.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'st_convert_garbage': False, 'report_convert_garbage': False}
.
- The following values were inserted:
-
23.12.2022 The certificate data changed.
Certificate changed
The manufacturer_web was updated.
- The new value is
None
.
The state of the certificate object was updated.
- The errors property was set to
['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/1039a_pdf.pdf, code: nok']
.
- The new value is
-
24.12.2022 The certificate data changed.
Certificate changed
The manufacturer_web was updated.
- The new value is
https://www.genua.de/
.
The state of the certificate object was updated.
- The errors property was set to
[]
.
- The new value is
-
24.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_ok property was set to
False
. - The st_extract_ok property was set to
False
. - The errors property was set to
['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/1039a_pdf.pdf, code: nok', 'failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/1039b_pdf.pdf, code: nok']
. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_frontpage property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}]}
values discarded.
- The st_download_ok property was set to
-
25.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The st_convert_ok property was set to
True
. - The st_extract_ok property was set to
True
. - The errors property was set to
[]
. - The st_pdf_hash property was set to
2c3317a2cfeea7aca4fc8e21644e79debda9fbc08cf71855404cb14eac68e9f8
. - The st_txt_hash property was set to
40f0d5a2a98927a3420f6085dc39fb93f262aaf46bbf2f8dc490e0b9676c2058
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 1187252, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 68, '/Title': 'genugate firewall 9.0 Security Target', '/Author': 'Roland Meister', '/Subject': 'Common Criteria', '/Keywords': 'CC 3.1', '/Creator': 'Writer', '/Producer': 'LibreOffice 5.4', '/CreationDate': "D:20171213100427+01'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.openbsd.org/', 'https://en.wikipedia.org/wiki/Secure_Sockets_Layer']}}
. - The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 4, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_INT': 2, 'ADV_SPM': 2, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_TDS': 1, 'ADV_ARC.1': 4, 'ADV_TDS.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 3, 'ADV_TAT.1': 1, 'ADV_TDS.3': 2, 'ADV_FSP.1': 1, 'ADV_FSP.2': 3, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1, 'AGD_OPE.1': 4, 'AGD_PRE.1': 3}, 'ALC': {'ALC_FLR.2': 4, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_LCD': 1, 'ALC_TAT': 1, 'ALC_CMC.4': 1, 'ALC_DVS.1': 2, 'ALC_LCD.1': 2, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1, 'ATE_COV.2': 1, 'ATE_FUN.1': 4, 'ATE_DPT.1': 1, 'ATE_IND.2': 1, 'ATE_COV.1': 1}, 'AVA': {'AVA_VAN.5': 4, 'AVA_VAN': 1}, 'ASE': {'ASE_TSS.2': 4, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1, 'ASE_CCL.1': 1, 'ASE_ECD.1': 3, 'ASE_REQ.1': 2, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 28, 'FAU_GEN.1': 12, 'FAU_GEN.2': 1, 'FAU_ARP': 2, 'FAU_ARP.1': 5, 'FAU_ARP.1.1': 1, 'FAU_SAA': 2, 'FAU_SAA.1': 6, 'FAU_SAA.1.1': 1, 'FAU_SAA.1.2': 1, 'FAU_SAR': 4, 'FAU_SAR.1': 5, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2': 5, 'FAU_SAR.2.1': 1, 'FAU_SAR.3': 5, 'FAU_SAR.3.1': 1, 'FAU_STG': 29, 'FAU_STG.1': 7, 'FAU_STG.4': 2}, 'FDP': {'FDP_IFC': 60, 'FDP_IFC.1': 5, 'FDP_IFF': 55, 'FDP_IFF.1': 25}, 'FIA': {'FIA_UAU': 27, 'FIA_UAU.5': 8, 'FIA_UAU.1': 1, 'FIA_UAU.2': 7, 'FIA_UAU.3': 1, 'FIA_UAU.4': 1, 'FIA_UAU.6': 6, 'FIA_UAU.7': 1, 'FIA_AFL': 2, 'FIA_AFL.1': 5, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD': 2, 'FIA_ATD.1': 5, 'FIA_ATD.1.1': 1, 'FIA_SOS': 2, 'FIA_SOS.1': 5, 'FIA_SOS.1.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UAU.6.1': 1, 'FIA_UID': 3, 'FIA_UID.2': 7, 'FIA_UID.2.1': 1, 'FIA_UID.1': 3}, 'FMT': {'FMT_MOF': 21, 'FMT_MOF.1': 3, 'FMT_MSA': 68, 'FMT_MSA.1': 4, 'FMT_MSA.3': 3, 'FMT_MTD': 16, 'FMT_MTD.1': 2, 'FMT_SMF': 2, 'FMT_SMF.1': 23, 'FMT_SMF.1.1': 1, 'FMT_SMR': 4, 'FMT_SMR.2': 20, 'FMT_SMR.2.1': 1, 'FMT_SMR.2.2': 1, 'FMT_SMR.2.3': 1, 'FMT_SMR.3': 6, 'FMT_SMR.3.1': 1, 'FMT_SMR.1': 16, 'FMT_IFF': 2, 'FMT_MOF.1.3': 1}, 'FPT': {'FPT_SST': 7, 'FPT_STM.1': 8, 'FPT_SST.1': 9, 'FPT_SST.1.1': 2, 'FPT_SST.1.2': 2, 'FPT_RCV': 2, 'FPT_RCV.2': 6, 'FPT_RCV.2.1': 1, 'FPT_RCV.2.2': 1, 'FPT_TRC': 2, 'FPT_TRC.1': 6, 'FPT_TRC.1.1': 1, 'FPT_TRC.1.2': 1, 'FPT_STM': 2, 'FPT_STM.1.1': 1, 'FPT_ITT.1': 1, 'FPT_TST.1': 2, 'FPT_AMT.1': 1}}, 'cc_claims': {'O': {'O.IDAUTH': 17, 'O.MEDIAT': 14, 'O.SECSTA': 7, 'O.SELPRO': 5, 'O.AUDREC': 16, 'O.ACCOUN': 7, 'O.SECFUN': 22, 'O.AVAIL': 5, 'O.MISUSESSH': 10}, 'T': {'T.NOAUTH': 2, 'T.SPOOF': 2, 'T.MEDIAT': 2, 'T.SELPRO': 2, 'T.MISUSESSH': 2}, 'A': {'A.PHYSEC': 2, 'A.NOEVIL': 2, 'A.ADMIN': 2, 'A.SINGEN': 3, 'A.POLICY': 2, 'A.TIMESTMP': 2, 'A.HANET': 2, 'A.USER': 2, 'A.TRUSTK': 2, 'A.TRUSTU': 2, 'A.LEGACY': 2, 'A.REMOTE_AUTH': 2, 'A.OSPF': 2}, 'OE': {'OE.PHYSEC': 2, 'OE.NOEVIL': 2, 'OE.ADMIN': 2, 'OE.SINGEN': 2, 'OE.POLICY': 2, 'OE.TIMESTMP': 3, 'OE.RTCLOCK': 2, 'OE.HANET': 4, 'OE.USER': 2, 'OE.TRUSTK': 4, 'OE.TRUSTU': 2, 'OE.LEGACY': 2, 'OE.REMOTE_AUTH': 2, 'OE.PASSWD': 3, 'OE.OSPF': 2}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 26}, 'TLS': {'SSL': {'SSL': 3}, 'TLS': {'TLS': 6}}, 'IPsec': {'IPsec': 4}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side channel': 13}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'genugate 400, genugate 600 and genugate 800 in the fead eith haideaie ievision 6 and 7 ehich aie out of scope foi the cuiient ceitifcation. The genugate fieeaaa 9.0 iuns on this haideaie eith the same': 1}}}
. - The st_filename property was set to
1039b_pdf.pdf
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}]}
values added.
- The st_download_ok property was set to
-
05.02.2023 The certificate data changed.
Certificate changed
The Status was updated.
- The new value is
archived
.
- The new value is
-
11.02.2023 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.cc.CCCertificate
.
The Maintenance Updates of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2021-02-18', 'maintenance_title': 'genugate 9.0 Firewall Software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/1039MA1a_pdf.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/files/epfiles/1039ma1b_pdf.pdf'}]}
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.InternalState
. - The following properties were deleted:
['errors']
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.PdfData
.
The computed heuristics were updated.
- The following values were inserted:
{'direct_transitive_cves': None, 'indirect_transitive_cves': None}
. - The _type property was set to
sec_certs.sample.cc.CCCertificate.Heuristics
. - The following properties were deleted:
['direct_dependency_cves', 'indirect_dependency_cves']
.
- The new value is
-
26.04.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'scheme_data': None}
.
- The following values were inserted:
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Network and Network-Related Devices and Systems",
"cert_link": null,
"dgst": "bd1a21ea3d047c14",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"cert_id": "BSI-DSZ-CC-1039-2017",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"9.0"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1154-2021"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0890-2013"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1154-2021"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0718-2012",
"BSI-DSZ-CC-0890-2013"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2021-02-18",
"maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/1039MA1a_pdf.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/files/epfiles/1039ma1b_pdf.pdf",
"maintenance_title": "genugate 9.0 Firewall Software"
}
]
},
"manufacturer": "GeNUA mbH",
"manufacturer_web": "https://www.genua.de/",
"name": "genugate 9.0 Firewall Software",
"not_valid_after": "2022-12-29",
"not_valid_before": "2017-12-29",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"report_filename": "1039a_pdf.pdf",
"report_frontpage": {
"anssi": {},
"bsi": {
"cc_security_level": "Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.2, ASE_TSS.2 and AVA_VAN.5",
"cc_version": "Product specific Security Target Common Criteria Part 2 extended",
"cert_id": "BSI-DSZ-CC-1039-2017",
"cert_item": "genugate 9.0 Firewall Software",
"cert_lab": "BSI",
"developer": "genua gmbh",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "None"
},
"canada": {},
"niap": {},
"nscib": {}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0890-2013": 6,
"BSI-DSZ-CC-1039-2017": 30
}
},
"cc_claims": {
"A": {
"A.ADMIN": 2,
"A.HANET": 2,
"A.LEGACY": 2,
"A.NOEVIL": 2,
"A.OSPF": 2,
"A.PHYSEC": 2,
"A.POLICY": 4,
"A.REMOTE_AUTH": 1,
"A.SERVER": 1,
"A.SINGEN": 2,
"A.TIMESTMP": 2,
"A.TRUSTK": 2,
"A.TRUSTU": 2,
"A.USER": 2
},
"OE": {
"OE.PHYSEC": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR": 3,
"ALC_FLR.2": 4
},
"ASE": {
"ASE_TSS.2": 4
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 5
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 2,
"EAL 2+": 1,
"EAL 4": 9,
"EAL 4 augmented": 3,
"EAL 5": 3,
"EAL 5+": 1,
"EAL 6": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"Report BSI-DSZ-CC-01039 for genugate firewall 9.0, Version 1, Date 15.12.2017, secuvera Gmbh (confidential document) [8] genugate Installationshandbuch, Version 9.0 Z, Ausgabe November 2017, Revision gg.90.D021 [9": 1,
"being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 1
},
"TLS": {
"SSL": {
"SSL": 1
}
},
"VPN": {
"VPN": 1
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"secuvera": {
"secuvera": 3
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 1,
"SHA-512": 1,
"SHA256": 1,
"SHA512": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 32": 1,
"AIS 34": 2
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
}
},
"symmetric_crypto": {},
"technical_report_id": {
"BSI": {
"BSI 7148": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20180126142805+01\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, \"",
"/ModDate": "D:20180126152155+01\u002700\u0027",
"/Producer": "LibreOffice 5.2",
"/Subject": "Zertifizierung Firewall Software",
"/Title": "Certification Report BSI-DSZ-CC-1039-2017",
"pdf_file_size_bytes": 1121966,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.bsi.bund.de/AIS",
"http://www.commoncriteriaportal.org/cc/",
"https://www.bsi.bund.de/",
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/zertifizierung",
"http://www.sogisportal.eu/",
"https://www.bsi.bund.de/zertifizierungsreporte"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 28
},
"st_filename": "1039b_pdf.pdf",
"st_frontpage": {
"anssi": {},
"bsi": {},
"canada": {},
"niap": {},
"nscib": {}
},
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ADMIN": 2,
"A.HANET": 2,
"A.LEGACY": 2,
"A.NOEVIL": 2,
"A.OSPF": 2,
"A.PHYSEC": 2,
"A.POLICY": 2,
"A.REMOTE_AUTH": 2,
"A.SINGEN": 3,
"A.TIMESTMP": 2,
"A.TRUSTK": 2,
"A.TRUSTU": 2,
"A.USER": 2
},
"O": {
"O.ACCOUN": 7,
"O.AUDREC": 16,
"O.AVAIL": 5,
"O.IDAUTH": 17,
"O.MEDIAT": 14,
"O.MISUSESSH": 10,
"O.SECFUN": 22,
"O.SECSTA": 7,
"O.SELPRO": 5
},
"OE": {
"OE.ADMIN": 2,
"OE.HANET": 4,
"OE.LEGACY": 2,
"OE.NOEVIL": 2,
"OE.OSPF": 2,
"OE.PASSWD": 3,
"OE.PHYSEC": 2,
"OE.POLICY": 2,
"OE.REMOTE_AUTH": 2,
"OE.RTCLOCK": 2,
"OE.SINGEN": 2,
"OE.TIMESTMP": 3,
"OE.TRUSTK": 4,
"OE.TRUSTU": 2,
"OE.USER": 2
},
"T": {
"T.MEDIAT": 2,
"T.MISUSESSH": 2,
"T.NOAUTH": 2,
"T.SELPRO": 2,
"T.SPOOF": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 4,
"ADV_FSP": 1,
"ADV_FSP.1": 1,
"ADV_FSP.2": 3,
"ADV_FSP.4": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 3,
"ADV_INT": 2,
"ADV_SPM": 2,
"ADV_TAT.1": 1,
"ADV_TDS": 1,
"ADV_TDS.1": 1,
"ADV_TDS.2": 1,
"ADV_TDS.3": 2
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 4,
"AGD_PRE": 1,
"AGD_PRE.1": 3
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.4": 1,
"ALC_CMS": 1,
"ALC_CMS.4": 1,
"ALC_DEL": 1,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.1": 2,
"ALC_FLR": 1,
"ALC_FLR.2": 4,
"ALC_LCD": 1,
"ALC_LCD.1": 2,
"ALC_TAT": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 1,
"ASE_ECD": 1,
"ASE_ECD.1": 3,
"ASE_INT": 1,
"ASE_INT.1": 1,
"ASE_OBJ": 1,
"ASE_OBJ.2": 1,
"ASE_REQ": 1,
"ASE_REQ.1": 2,
"ASE_REQ.2": 1,
"ASE_SPD": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 1,
"ASE_TSS.2": 4
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 1,
"ATE_COV.2": 1,
"ATE_DPT": 1,
"ATE_DPT.1": 1,
"ATE_FUN": 1,
"ATE_FUN.1": 4,
"ATE_IND": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL4": 4,
"EAL4 augmented": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP": 2,
"FAU_ARP.1": 5,
"FAU_ARP.1.1": 1,
"FAU_GEN": 28,
"FAU_GEN.1": 12,
"FAU_GEN.2": 1,
"FAU_SAA": 2,
"FAU_SAA.1": 6,
"FAU_SAA.1.1": 1,
"FAU_SAA.1.2": 1,
"FAU_SAR": 4,
"FAU_SAR.1": 5,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2": 5,
"FAU_SAR.2.1": 1,
"FAU_SAR.3": 5,
"FAU_SAR.3.1": 1,
"FAU_STG": 29,
"FAU_STG.1": 7,
"FAU_STG.4": 2
},
"FDP": {
"FDP_IFC": 60,
"FDP_IFC.1": 5,
"FDP_IFF": 55,
"FDP_IFF.1": 25
},
"FIA": {
"FIA_AFL": 2,
"FIA_AFL.1": 5,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD": 2,
"FIA_ATD.1": 5,
"FIA_ATD.1.1": 1,
"FIA_SOS": 2,
"FIA_SOS.1": 5,
"FIA_SOS.1.1": 1,
"FIA_UAU": 27,
"FIA_UAU.1": 1,
"FIA_UAU.2": 7,
"FIA_UAU.2.1": 1,
"FIA_UAU.3": 1,
"FIA_UAU.4": 1,
"FIA_UAU.5": 8,
"FIA_UAU.6": 6,
"FIA_UAU.6.1": 1,
"FIA_UAU.7": 1,
"FIA_UID": 3,
"FIA_UID.1": 3,
"FIA_UID.2": 7,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_IFF": 2,
"FMT_MOF": 21,
"FMT_MOF.1": 3,
"FMT_MOF.1.3": 1,
"FMT_MSA": 68,
"FMT_MSA.1": 4,
"FMT_MSA.3": 3,
"FMT_MTD": 16,
"FMT_MTD.1": 2,
"FMT_SMF": 2,
"FMT_SMF.1": 23,
"FMT_SMF.1.1": 1,
"FMT_SMR": 4,
"FMT_SMR.1": 16,
"FMT_SMR.2": 20,
"FMT_SMR.2.1": 1,
"FMT_SMR.2.2": 1,
"FMT_SMR.2.3": 1,
"FMT_SMR.3": 6,
"FMT_SMR.3.1": 1
},
"FPT": {
"FPT_AMT.1": 1,
"FPT_ITT.1": 1,
"FPT_RCV": 2,
"FPT_RCV.2": 6,
"FPT_RCV.2.1": 1,
"FPT_RCV.2.2": 1,
"FPT_SST": 7,
"FPT_SST.1": 9,
"FPT_SST.1.1": 2,
"FPT_SST.1.2": 2,
"FPT_STM": 2,
"FPT_STM.1": 8,
"FPT_STM.1.1": 1,
"FPT_TRC": 2,
"FPT_TRC.1": 6,
"FPT_TRC.1.1": 1,
"FPT_TRC.1.2": 1,
"FPT_TST.1": 2
}
},
"certification_process": {
"OutOfScope": {
"genugate 400, genugate 600 and genugate 800 in the fead eith haideaie ievision 6 and 7 ehich aie out of scope foi the cuiient ceitifcation. The genugate fieeaaa 9.0 iuns on this haideaie eith the same": 1,
"out of scope": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IPsec": {
"IPsec": 4
},
"SSH": {
"SSH": 26
},
"TLS": {
"SSL": {
"SSL": 3
},
"TLS": {
"TLS": 6
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"SCA": {
"side channel": 13
}
},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Roland Meister",
"/CreationDate": "D:20171213100427+01\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "CC 3.1",
"/Producer": "LibreOffice 5.4",
"/Subject": "Common Criteria",
"/Title": "genugate firewall 9.0 Security Target",
"pdf_file_size_bytes": 1187252,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://en.wikipedia.org/wiki/Secure_Sockets_Layer",
"http://www.openbsd.org/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 68
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/files/epfiles/1039a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"EAL4+",
"ASE_TSS.2",
"AVA_VAN.5",
"ALC_FLR.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/files/epfiles/1039b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"report_convert_garbage": false,
"report_convert_ok": true,
"report_download_ok": true,
"report_extract_ok": true,
"report_pdf_hash": "18d7214debc29943f09dcceb69d7bb5a7171563a52809530b2711c89c34f26b2",
"report_txt_hash": "95756da5c032142b81e20f2b90ba8b31eb62ccef1e6636c5f626179659d3187f",
"st_convert_garbage": false,
"st_convert_ok": true,
"st_download_ok": true,
"st_extract_ok": true,
"st_pdf_hash": "2c3317a2cfeea7aca4fc8e21644e79debda9fbc08cf71855404cb14eac68e9f8",
"st_txt_hash": "40f0d5a2a98927a3420f6085dc39fb93f262aaf46bbf2f8dc490e0b9676c2058"
},
"status": "archived"
}