genugate 9.0 Firewall Software

CSV information ?

Status archived
Valid from 29.12.2017
Valid until 29.12.2022
Scheme 🇩🇪 DE
Manufacturer GeNUA mbH
Category Network and Network-Related Devices and Systems
Security level AVA_VAN.5, EAL4+, ASE_TSS.2, ALC_FLR.2
Maintenance updates genugate 9.0 Firewall Software (18.02.2021) Certification report Security target

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-1039-2017

Certificate ?

Certification report ?

Extracted keywords

Hash functions
SHA-256, SHA-512, SHA256, SHA512
Protocols
SSH, SSL, VPN

Security level
EAL 4, EAL 5, EAL 2, EAL 1, EAL 2+, EAL 5+, EAL 6, EAL 4 augmented
Claims
A.PHYSEC, A.NOEVIL, A.ADMIN, A.SINGEN, A.POLICY, A.TIMESTMP, A.HANET, A.USER, A.TRUSTK, A.TRUSTU, A.LEGACY, A.REMOTE_AUTH, A.OSPF, A.SERVER, OE.PHYSEC
Security Assurance Requirements (SAR)
ALC_FLR.2, ALC_FLR, AVA_VAN.5, AVA_VAN, ASE_TSS.2
Certificates
BSI-DSZ-CC-1039-2017, BSI-DSZ-CC-0890-2013, BSI-DSZ-CC-01039
Evaluation facilities
secuvera
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Report BSI-DSZ-CC-01039 for genugate firewall 9.0, Version 1, Date 15.12.2017, secuvera Gmbh (confidential document) [8] genugate Installationshandbuch, Version 9.0 Z, Ausgabe November 2017, Revision gg.90.D021 [9

Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Report BSI-DSZ-CC-01039 for genugate firewall 9.0, Version 1, Date 15.12.2017, secuvera Gmbh (confidential document) [8] genugate Installationshandbuch, Version 9.0 Z, Ausgabe November 2017, Revision gg.90.D021 [9

Standards
AIS 34, AIS 32, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065
Technical reports
BSI 7148

File metadata

Title: Certification Report BSI-DSZ-CC-1039-2017
Subject: Zertifizierung Firewall Software
Keywords: "Common Criteria, Certification, Zertifizierung, "
Author: Bundesamt für Sicherheit in der Informationstechnik
Creation date: D:20180126142805+01'00'
Modification date: D:20180126152155+01'00'
Pages: 28
Creator: Writer
Producer: LibreOffice 5.2

Frontpage

Certificate ID: BSI-DSZ-CC-1039-2017
Certified item: genugate 9.0 Firewall Software
Certification lab: BSI
Developer: genua gmbh

References

Outgoing Incoming

Security target ?

Extracted keywords

Protocols
SSH, SSL, TLS, IPsec

Security level
EAL4, EAL4 augmented
Claims
O.IDAUTH, O.MEDIAT, O.SECSTA, O.SELPRO, O.AUDREC, O.ACCOUN, O.SECFUN, O.AVAIL, O.MISUSESSH, T.NOAUTH, T.SPOOF, T.MEDIAT, T.SELPRO, T.MISUSESSH, A.PHYSEC, A.NOEVIL, A.ADMIN, A.SINGEN, A.POLICY, A.TIMESTMP, A.HANET, A.USER, A.TRUSTK, A.TRUSTU, A.LEGACY, A.REMOTE_AUTH, A.OSPF, OE.PHYSEC, OE.NOEVIL, OE.ADMIN, OE.SINGEN, OE.POLICY, OE.TIMESTMP, OE.RTCLOCK, OE.HANET, OE.USER, OE.TRUSTK, OE.TRUSTU, OE.LEGACY, OE.REMOTE_AUTH, OE.PASSWD, OE.OSPF
Security Assurance Requirements (SAR)
ADV_INT, ADV_SPM, ADV_ARC, ADV_FSP, ADV_IMP, ADV_TDS, ADV_ARC.1, ADV_TDS.1, ADV_FSP.4, ADV_IMP.1, ADV_TAT.1, ADV_TDS.3, ADV_FSP.1, ADV_FSP.2, ADV_TDS.2, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ALC_CMC.4, ALC_DVS.1, ALC_LCD.1, ALC_CMS.4, ALC_DEL.1, ALC_TAT.1, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, ATE_COV.2, ATE_FUN.1, ATE_DPT.1, ATE_IND.2, ATE_COV.1, AVA_VAN.5, AVA_VAN, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_REQ.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1
Security Functional Requirements (SFR)
FAU_GEN, FAU_GEN.1, FAU_GEN.2, FAU_ARP, FAU_ARP.1, FAU_ARP.1.1, FAU_SAA, FAU_SAA.1, FAU_SAA.1.1, FAU_SAA.1.2, FAU_SAR, FAU_SAR.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2, FAU_SAR.2.1, FAU_SAR.3, FAU_SAR.3.1, FAU_STG, FAU_STG.1, FAU_STG.4, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FIA_UAU, FIA_UAU.5, FIA_UAU.1, FIA_UAU.2, FIA_UAU.3, FIA_UAU.4, FIA_UAU.6, FIA_UAU.7, FIA_AFL, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS, FIA_SOS.1, FIA_SOS.1.1, FIA_UAU.2.1, FIA_UAU.6.1, FIA_UID, FIA_UID.2, FIA_UID.2.1, FIA_UID.1, FMT_MOF, FMT_MOF.1, FMT_MSA, FMT_MSA.1, FMT_MSA.3, FMT_MTD, FMT_MTD.1, FMT_SMF, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR, FMT_SMR.2, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FMT_SMR.3, FMT_SMR.3.1, FMT_SMR.1, FMT_IFF, FMT_MOF.1.3, FPT_SST, FPT_STM.1, FPT_SST.1, FPT_SST.1.1, FPT_SST.1.2, FPT_RCV, FPT_RCV.2, FPT_RCV.2.1, FPT_RCV.2.2, FPT_TRC, FPT_TRC.1, FPT_TRC.1.1, FPT_TRC.1.2, FPT_STM, FPT_STM.1.1, FPT_ITT.1, FPT_TST.1, FPT_AMT.1
Certification process
out of scope, genugate 400, genugate 600 and genugate 800 in the fead eith haideaie ievision 6 and 7 ehich aie out of scope foi the cuiient ceitifcation. The genugate fieeaaa 9.0 iuns on this haideaie eith the same

Side-channel analysis
side channel
Certification process
out of scope, genugate 400, genugate 600 and genugate 800 in the fead eith haideaie ievision 6 and 7 ehich aie out of scope foi the cuiient ceitifcation. The genugate fieeaaa 9.0 iuns on this haideaie eith the same

File metadata

Title: genugate firewall 9.0 Security Target
Subject: Common Criteria
Keywords: CC 3.1
Author: Roland Meister
Creation date: D:20171213100427+01'00'
Pages: 68
Creator: Writer
Producer: LibreOffice 5.4

References

Outgoing
Incoming

Heuristics ?

Certificate ID: BSI-DSZ-CC-1039-2017

Extracted SARs

ALC_FLR.2, ALC_DVS.1, AGD_PRE.1, ASE_TSS.2, ASE_REQ.2, ASE_OBJ.2, AGD_OPE.1, ALC_CMC.4, ASE_CCL.1, ASE_INT.1, AVA_VAN.5, ALC_DEL.1, ASE_ECD.1, ALC_LCD.1, ALC_TAT.1, ATE_FUN.1, ATE_DPT.1, ADV_FSP.4, ADV_TDS.3, ASE_SPD.1, ALC_CMS.4, ATE_COV.2, ATE_IND.2, ADV_IMP.1, ADV_ARC.1, ADV_TAT.1

References ?

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '18d7214debc29943f09dcceb69d7bb5a7171563a52809530b2711c89c34f26b2', 'txt_hash': '95756da5c032142b81e20f2b90ba8b31eb62ccef1e6636c5f626179659d3187f'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '2c3317a2cfeea7aca4fc8e21644e79debda9fbc08cf71855404cb14eac68e9f8', 'txt_hash': '40f0d5a2a98927a3420f6085dc39fb93f262aaf46bbf2f8dc490e0b9676c2058'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': None, 'cert_frontpage': None, 'cert_keywords': None, 'cert_filename': None}.
    • The report_frontpage property was set to {'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-1039-2017', 'cert_item': 'genugate 9.0 Firewall Software', 'developer': 'genua gmbh', 'cert_lab': 'BSI', 'ref_protection_profiles': 'None', 'cc_version': 'Product specific Security Target Common Criteria Part 2 extended', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.2, ASE_TSS.2 and AVA_VAN.5'}}.
    • The st_frontpage property was set to None.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-01039': 1}, '__update__': {'BSI-DSZ-CC-1039-2017': 15, 'BSI-DSZ-CC-0890-2013': 3}}}}} data.
  • 13.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1039-2017': 30, 'BSI-DSZ-CC-0890-2013': 6}, '__delete__': ['BSI-DSZ-CC-01039']}}}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The st_keywords property was updated, with the {'cc_cert_id': {}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-01039': 1}, '__update__': {'BSI-DSZ-CC-1039-2017': 15, 'BSI-DSZ-CC-0890-2013': 3}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'CA': {'1 9 3': 2, '1 9 4': 1, '3 9 6': 1, '4 9 6': 1, '5 9 7': 2, '5 9 13': 1, '68 4 13': 1, '2017 1 9': 1, '2017 2 9': 1, '2017 3 9': 1, '1 1-3': 1, '1 2-3': 1, '1 1-2': 4, '1 1-4': 2, '1 1-7': 1, '2-1-1': 2, '2-2-1': 1, '2-2-2': 2, '2-2-3': 2, '2-2-4': 2, '2-2-5': 2, '2-1-2': 1, '2-1-3': 1, '2-1-4': 2, '2-1-5': 4, '1 3-1': 1, '1 3-4': 2, '1 3-3': 1, '1 3-7': 2, '6 3-7': 1, '4-1-1': 1, '1 4-5': 5, '4-1-2': 1, '4-1-3': 1, '4-2-1': 2, '4-2-2': 1, '4-2-3': 3, '4-2-4': 1, '4-3-1': 1, '4-3-2': 1, '4-3-3': 1, '4-4-1': 1, '4-4-2': 1, '1 4-6': 2, '17 5-2': 1, '1 5-3': 1, '2017 4 9': 1, '2017 5 9': 1}}} data.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': None}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The Maintenance Updates of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2021-02-18', 'maintenance_title': 'genugate 9.0 Firewall Software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/1039MA1a_pdf.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/files/epfiles/1039ma1b_pdf.pdf'}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 05.02.2023 The certificate data changed.
    Certificate changed

    The Status was updated.

    • The new value is archived.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 2c3317a2cfeea7aca4fc8e21644e79debda9fbc08cf71855404cb14eac68e9f8.
    • The st_txt_hash property was set to 40f0d5a2a98927a3420f6085dc39fb93f262aaf46bbf2f8dc490e0b9676c2058.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1187252, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 68, '/Title': 'genugate firewall 9.0 Security Target', '/Author': 'Roland Meister', '/Subject': 'Common Criteria', '/Keywords': 'CC 3.1', '/Creator': 'Writer', '/Producer': 'LibreOffice 5.4', '/CreationDate': "D:20171213100427+01'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://en.wikipedia.org/wiki/Secure_Sockets_Layer', 'http://www.openbsd.org/']}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 4, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_INT': 2, 'ADV_SPM': 2, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_TDS': 1, 'ADV_ARC.1': 4, 'ADV_TDS.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 3, 'ADV_TAT.1': 1, 'ADV_TDS.3': 2, 'ADV_FSP.1': 1, 'ADV_FSP.2': 3, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1, 'AGD_OPE.1': 4, 'AGD_PRE.1': 3}, 'ALC': {'ALC_FLR.2': 4, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_LCD': 1, 'ALC_TAT': 1, 'ALC_CMC.4': 1, 'ALC_DVS.1': 2, 'ALC_LCD.1': 2, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1, 'ATE_COV.2': 1, 'ATE_FUN.1': 4, 'ATE_DPT.1': 1, 'ATE_IND.2': 1, 'ATE_COV.1': 1}, 'AVA': {'AVA_VAN.5': 4, 'AVA_VAN': 1}, 'ASE': {'ASE_TSS.2': 4, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1, 'ASE_CCL.1': 1, 'ASE_ECD.1': 3, 'ASE_REQ.1': 2, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 28, 'FAU_GEN.1': 12, 'FAU_GEN.2': 1, 'FAU_ARP': 2, 'FAU_ARP.1': 5, 'FAU_ARP.1.1': 1, 'FAU_SAA': 2, 'FAU_SAA.1': 6, 'FAU_SAA.1.1': 1, 'FAU_SAA.1.2': 1, 'FAU_SAR': 4, 'FAU_SAR.1': 5, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2': 5, 'FAU_SAR.2.1': 1, 'FAU_SAR.3': 5, 'FAU_SAR.3.1': 1, 'FAU_STG': 29, 'FAU_STG.1': 7, 'FAU_STG.4': 2}, 'FDP': {'FDP_IFC': 60, 'FDP_IFC.1': 5, 'FDP_IFF': 55, 'FDP_IFF.1': 25}, 'FIA': {'FIA_UAU': 27, 'FIA_UAU.5': 8, 'FIA_UAU.1': 1, 'FIA_UAU.2': 7, 'FIA_UAU.3': 1, 'FIA_UAU.4': 1, 'FIA_UAU.6': 6, 'FIA_UAU.7': 1, 'FIA_AFL': 2, 'FIA_AFL.1': 5, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD': 2, 'FIA_ATD.1': 5, 'FIA_ATD.1.1': 1, 'FIA_SOS': 2, 'FIA_SOS.1': 5, 'FIA_SOS.1.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UAU.6.1': 1, 'FIA_UID': 3, 'FIA_UID.2': 7, 'FIA_UID.2.1': 1, 'FIA_UID.1': 3}, 'FMT': {'FMT_MOF': 21, 'FMT_MOF.1': 3, 'FMT_MSA': 68, 'FMT_MSA.1': 4, 'FMT_MSA.3': 3, 'FMT_MTD': 16, 'FMT_MTD.1': 2, 'FMT_SMF': 2, 'FMT_SMF.1': 23, 'FMT_SMF.1.1': 1, 'FMT_SMR': 4, 'FMT_SMR.2': 20, 'FMT_SMR.2.1': 1, 'FMT_SMR.2.2': 1, 'FMT_SMR.2.3': 1, 'FMT_SMR.3': 6, 'FMT_SMR.3.1': 1, 'FMT_SMR.1': 16, 'FMT_IFF': 2, 'FMT_MOF.1.3': 1}, 'FPT': {'FPT_SST': 7, 'FPT_STM.1': 8, 'FPT_SST.1': 9, 'FPT_SST.1.1': 2, 'FPT_SST.1.2': 2, 'FPT_RCV': 2, 'FPT_RCV.2': 6, 'FPT_RCV.2.1': 1, 'FPT_RCV.2.2': 1, 'FPT_TRC': 2, 'FPT_TRC.1': 6, 'FPT_TRC.1.1': 1, 'FPT_TRC.1.2': 1, 'FPT_STM': 2, 'FPT_STM.1.1': 1, 'FPT_ITT.1': 1, 'FPT_TST.1': 2, 'FPT_AMT.1': 1}}, 'cc_claims': {'O': {'O.IDAUTH': 17, 'O.MEDIAT': 14, 'O.SECSTA': 7, 'O.SELPRO': 5, 'O.AUDREC': 16, 'O.ACCOUN': 7, 'O.SECFUN': 22, 'O.AVAIL': 5, 'O.MISUSESSH': 10}, 'T': {'T.NOAUTH': 2, 'T.SPOOF': 2, 'T.MEDIAT': 2, 'T.SELPRO': 2, 'T.MISUSESSH': 2}, 'A': {'A.PHYSEC': 2, 'A.NOEVIL': 2, 'A.ADMIN': 2, 'A.SINGEN': 3, 'A.POLICY': 2, 'A.TIMESTMP': 2, 'A.HANET': 2, 'A.USER': 2, 'A.TRUSTK': 2, 'A.TRUSTU': 2, 'A.LEGACY': 2, 'A.REMOTE_AUTH': 2, 'A.OSPF': 2}, 'OE': {'OE.PHYSEC': 2, 'OE.NOEVIL': 2, 'OE.ADMIN': 2, 'OE.SINGEN': 2, 'OE.POLICY': 2, 'OE.TIMESTMP': 3, 'OE.RTCLOCK': 2, 'OE.HANET': 4, 'OE.USER': 2, 'OE.TRUSTK': 4, 'OE.TRUSTU': 2, 'OE.LEGACY': 2, 'OE.REMOTE_AUTH': 2, 'OE.PASSWD': 3, 'OE.OSPF': 2}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 26}, 'TLS': {'SSL': {'SSL': 3}, 'TLS': {'TLS': 6}}, 'IPsec': {'IPsec': 4}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side channel': 13}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'genugate 400, genugate 600 and genugate 800 in the fead eith haideaie ievision 6 and 7 ehich aie out of scope foi the cuiient ceitifcation. The genugate fieeaaa 9.0 iuns on this haideaie eith the same': 1}}}.
    • The st_filename property was set to 1039b_pdf.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TAT', 'level': 1}]} values added.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/1039a_pdf.pdf, code: nok', 'failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/1039b_pdf.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TAT', 'level': 1}]} values discarded.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The manufacturer_web was updated.

    • The new value is https://www.genua.de/.

    The state of the certificate object was updated.

    • The errors property was set to [].
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The manufacturer_web was updated.

    • The new value is None.

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/1039a_pdf.pdf, code: nok'].
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 04.10.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was set to None.
    • The related_cves property was set to None.
  • 26.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'crypto_protocol': {'__insert__': {'VPN': {'VPN': 1}}}} data.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': '1039a_pdf.pdf', 'st_filename': '1039b_pdf.pdf'}.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1039-2017': 30, 'BSI-DSZ-CC-0890-2013': 6}}}}, 'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL 4': 9}}}}, 'cc_sar': {'__update__': {'AVA': {'__update__': {'AVA_VAN.5': 5}}}}, 'vendor': {}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA2': {'__update__': {'SHA256': 1, 'SHA512': 1}}}, '__delete__': ['SHA1']}}}, 'tee_name': {}, 'standard_id': {'__update__': {'ISO': {'__insert__': {'ISO/IEC 18045': 4}, '__update__': {'ISO/IEC 15408': 4}}}}, 'certification_process': {'__update__': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'Report BSI-DSZ-CC-01039 for genugate firewall 9.0, Version 1, Date 15.12.2017, secuvera Gmbh (confidential document) [8] genugate Installationshandbuch, Version 9.0 Z, Ausgabe November 2017, Revision gg.90.D021 [9': 1}}}} data.
    • The st_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL4': 4}}}}, 'cc_sar': {'__update__': {'ADV': {'__update__': {'ADV_ARC.1': 4, 'ADV_FSP.4': 1, 'ADV_IMP.1': 3, 'ADV_TDS.3': 2, 'ADV_FSP.1': 1, 'ADV_TDS.1': 1}}, 'AGD': {'__update__': {'AGD_OPE.1': 4, 'AGD_PRE.1': 3}}, 'ALC': {'__update__': {'ALC_FLR.2': 4, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 2, 'ALC_LCD.1': 2, 'ALC_TAT.1': 1}, '__delete__': ['ALC_CMS.1']}, 'ATE': {'__update__': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 4, 'ATE_IND.2': 1, 'ATE_COV.1': 1}}, 'ASE': {'__update__': {'ASE_CCL.1': 1, 'ASE_ECD.1': 3, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1}}}}, 'cc_sfr': {'__update__': {'FAU': {'__insert__': {'FAU_STG.4': 2}, '__update__': {'FAU_GEN': 28, 'FAU_GEN.1': 12, 'FAU_ARP': 2, 'FAU_SAA': 2, 'FAU_SAA.1': 6, 'FAU_SAR': 4, 'FAU_SAR.1': 5, 'FAU_STG': 29, 'FAU_STG.1': 7}}, 'FDP': {'__insert__': {'FDP_IFC.1': 5, 'FDP_IFF.1': 25}, '__update__': {'FDP_IFC': 60, 'FDP_IFF': 55}}, 'FIA': {'__update__': {'FIA_UAU': 27, 'FIA_UAU.5': 8, 'FIA_UAU.1': 1, 'FIA_AFL': 2, 'FIA_ATD': 2, 'FIA_SOS': 2, 'FIA_UID': 3, 'FIA_UID.1': 3}}, 'FMT': {'__insert__': {'FMT_MOF.1': 3, 'FMT_MSA.1': 4, 'FMT_MSA.3': 3, 'FMT_MTD.1': 2, 'FMT_IFF': 2}, '__update__': {'FMT_MOF': 21, 'FMT_MSA': 68, 'FMT_MTD': 16, 'FMT_SMF': 2, 'FMT_SMF.1': 23, 'FMT_SMR': 4, 'FMT_SMR.1': 16}}, 'FPT': {'__insert__': {'FPT_AMT.1': 1}, '__update__': {'FPT_SST': 7, 'FPT_RCV': 2, 'FPT_TRC': 2, 'FPT_STM': 2, 'FPT_ITT.1': 1, 'FPT_TST.1': 2}}}}, 'cc_claims': {'__update__': {'O': {'__update__': {'O.MEDIAT': 14, 'O.SECSTA': 7, 'O.AUDREC': 16, 'O.ACCOUN': 7, 'O.SECFUN': 22, 'O.AVAIL': 5}, '__delete__': ['O.SELFPRO']}, 'OE': {'__update__': {'OE.RTCLOCK': 2}}}}, 'vendor': {}, 'crypto_protocol': {'__update__': {'SSH': {'__update__': {'SSH': 26}}, 'TLS': {'__update__': {'SSL': {'__update__': {'SSL': 3}}}}}}, 'side_channel_analysis': {'__update__': {'SCA': {'__delete__': ['SPA']}}}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {'genugate 400, genugate 600 and genugate 800 in the fead eith haideaie ievision 6 and 7 ehich aie out of scope foi the cuiient ceitifcation. The genugate fieeaaa 9.0 iuns on this haideaie eith the same': 1}, '__delete__': ['0, genugate 400, genugate 600 and genugate 800 in the fead eith haideaie ievision 6 and 7 ehich aie out of scope foi the cuiient ceitifcation. The genugate fieeaaa 9.0 iuns on this haideaie eith the same']}}}} data.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Maintenance Updates of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2021-02-18', 'maintenance_title': 'genugate 9.0 Firewall Software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/1039MA1a_pdf.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/files/epfiles/1039ma1b_pdf.pdf'}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TAT', 'level': 1}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/zertifizierungsreporte', 'http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/', 'http://www.commoncriteriaportal.org/cc/', 'https://www.bsi.bund.de/zertifizierung', 'http://www.sogisportal.eu/', 'https://www.bsi.bund.de/AIS']}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://en.wikipedia.org/wiki/Secure_Sockets_Layer', 'http://www.openbsd.org/']}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1039-2017': 56, 'BSI-DSZ-CC-0890-2013': 4}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 8, 'EAL 5': 3, 'EAL 2': 2, 'EAL 1': 1, 'EAL 2+': 1, 'EAL 5+': 1, 'EAL 6': 1, 'EAL 4 augmented': 3}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 4, 'ALC_FLR': 3}, 'AVA': {'AVA_VAN.5': 3, 'AVA_VAN': 1}, 'ASE': {'ASE_TSS.2': 4}}, 'cc_sfr': {}, 'cc_claims': {'A': {'A.PHYSEC': 2, 'A.NOEVIL': 2, 'A.ADMIN': 2, 'A.SINGEN': 2, 'A.POLICY': 4, 'A.TIMESTMP': 2, 'A.HANET': 2, 'A.USER': 2, 'A.TRUSTK': 2, 'A.TRUSTU': 2, 'A.LEGACY': 2, 'A.REMOTE_AUTH': 1, 'A.OSPF': 2, 'A.SERVER': 1}, 'OE': {'OE.PHYSEC': 1}}, 'vendor': {'STMicroelectronics': {'STM': 2}}, 'eval_facility': {'secuvera': {'secuvera': 3}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 2}, 'SHA2': {'SHA-256': 1, 'SHA-512': 1, 'SHA256': 3, 'SHA512': 3}}}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 1}, 'TLS': {'SSL': {'SSL': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {'BSI': {'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 34': 2, 'AIS 32': 1}, 'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 17065': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'identiality being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'nical Report BSI-DSZ-CC-01039 for genugate firewall 9.0, Version 1, Date 15.12.2017, secuvera Gmbh (confidential document) [8] genugate Installationshandbuch, Version 9.0 Z, Ausgabe November 2017, Revision gg.90.D021 [9': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 2, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_INT': 2, 'ADV_SPM': 2, 'ADV_ARC': 1, 'ADV_ARC.1': 5, 'ADV_FSP': 1, 'ADV_FSP.4': 3, 'ADV_IMP': 1, 'ADV_IMP.1': 4, 'ADV_TDS': 1, 'ADV_TDS.3': 4, 'ADV_FSP.1': 2, 'ADV_TDS.1': 2, 'ADV_TAT.1': 1, 'ADV_FSP.2': 3, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_OPE.1': 5, 'AGD_PRE': 1, 'AGD_PRE.1': 4}, 'ALC': {'ALC_FLR.2': 5, 'ALC_CMC': 1, 'ALC_CMC.4': 2, 'ALC_CMS': 1, 'ALC_CMS.4': 2, 'ALC_DEL': 1, 'ALC_DEL.1': 2, 'ALC_DVS': 1, 'ALC_DVS.1': 3, 'ALC_FLR': 1, 'ALC_LCD': 1, 'ALC_LCD.1': 3, 'ALC_TAT': 1, 'ALC_TAT.1': 2, 'ALC_CMS.1': 1}, 'ATE': {'ATE_COV': 1, 'ATE_COV.2': 2, 'ATE_DPT': 1, 'ATE_DPT.1': 2, 'ATE_FUN': 1, 'ATE_FUN.1': 5, 'ATE_IND': 1, 'ATE_IND.2': 2, 'ATE_COV.1': 2}, 'AVA': {'AVA_VAN.5': 4, 'AVA_VAN': 1}, 'ASE': {'ASE_TSS.2': 4, 'ASE_CCL': 1, 'ASE_CCL.1': 2, 'ASE_ECD': 1, 'ASE_ECD.1': 4, 'ASE_INT': 1, 'ASE_INT.1': 4, 'ASE_OBJ': 1, 'ASE_OBJ.2': 3, 'ASE_REQ': 1, 'ASE_REQ.2': 2, 'ASE_SPD': 1, 'ASE_SPD.1': 3, 'ASE_TSS': 1, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN': 6, 'FAU_GEN.1': 11, 'FAU_GEN.2': 1, 'FAU_ARP': 1, 'FAU_ARP.1': 5, 'FAU_ARP.1.1': 1, 'FAU_SAA': 1, 'FAU_SAA.1': 7, 'FAU_SAA.1.1': 1, 'FAU_SAA.1.2': 1, 'FAU_SAR': 1, 'FAU_SAR.1': 7, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2': 5, 'FAU_SAR.2.1': 1, 'FAU_SAR.3': 5, 'FAU_SAR.3.1': 1, 'FAU_STG': 1, 'FAU_STG.1': 2}, 'FDP': {'FDP_IFC': 1, 'FDP_IFF': 1}, 'FIA': {'FIA_UAU': 3, 'FIA_UAU.5': 7, 'FIA_UAU.1': 2, 'FIA_UAU.2': 7, 'FIA_UAU.3': 1, 'FIA_UAU.4': 1, 'FIA_UAU.6': 6, 'FIA_UAU.7': 1, 'FIA_AFL': 1, 'FIA_AFL.1': 5, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD': 1, 'FIA_ATD.1': 5, 'FIA_ATD.1.1': 1, 'FIA_SOS': 1, 'FIA_SOS.1': 5, 'FIA_SOS.1.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UAU.6.1': 1, 'FIA_UID': 1, 'FIA_UID.2': 7, 'FIA_UID.2.1': 1, 'FIA_UID.1': 4}, 'FMT': {'FMT_MOF': 1, 'FMT_MSA': 1, 'FMT_MTD': 1, 'FMT_SMF': 1, 'FMT_SMF.1': 14, 'FMT_SMF.1.1': 1, 'FMT_SMR': 1, 'FMT_SMR.2': 20, 'FMT_SMR.2.1': 1, 'FMT_SMR.2.2': 1, 'FMT_SMR.2.3': 1, 'FMT_SMR.3': 6, 'FMT_SMR.3.1': 1, 'FMT_SMR.1': 13, 'FMT_MOF.1.3': 1}, 'FPT': {'FPT_SST': 5, 'FPT_STM.1': 8, 'FPT_SST.1': 9, 'FPT_SST.1.1': 2, 'FPT_SST.1.2': 2, 'FPT_RCV': 1, 'FPT_RCV.2': 6, 'FPT_RCV.2.1': 1, 'FPT_RCV.2.2': 1, 'FPT_TRC': 1, 'FPT_TRC.1': 6, 'FPT_TRC.1.1': 1, 'FPT_TRC.1.2': 1, 'FPT_STM': 1, 'FPT_STM.1.1': 1, 'FPT_ITT.1': 2, 'FPT_TST.1': 1}}, 'cc_claims': {'O': {'O.IDAUTH': 17, 'O.MEDIAT': 16, 'O.SECSTA': 9, 'O.SELPRO': 5, 'O.AUDREC': 17, 'O.ACCOUN': 9, 'O.SECFUN': 23, 'O.AVAIL': 7, 'O.MISUSESSH': 10, 'O.SELFPRO': 2}, 'T': {'T.NOAUTH': 2, 'T.SPOOF': 2, 'T.MEDIAT': 2, 'T.SELPRO': 2, 'T.MISUSESSH': 2}, 'A': {'A.PHYSEC': 2, 'A.NOEVIL': 2, 'A.ADMIN': 2, 'A.SINGEN': 3, 'A.POLICY': 2, 'A.TIMESTMP': 2, 'A.HANET': 2, 'A.USER': 2, 'A.TRUSTK': 2, 'A.TRUSTU': 2, 'A.LEGACY': 2, 'A.REMOTE_AUTH': 2, 'A.OSPF': 2}, 'OE': {'OE.PHYSEC': 2, 'OE.NOEVIL': 2, 'OE.ADMIN': 2, 'OE.SINGEN': 2, 'OE.POLICY': 2, 'OE.TIMESTMP': 3, 'OE.RTCLOCK': 3, 'OE.HANET': 4, 'OE.USER': 2, 'OE.TRUSTK': 4, 'OE.TRUSTU': 2, 'OE.LEGACY': 2, 'OE.REMOTE_AUTH': 2, 'OE.PASSWD': 3, 'OE.OSPF': 2}}, 'vendor': {'STMicroelectronics': {'STM': 16}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 32}, 'TLS': {'SSL': {'SSL': 4}, 'TLS': {'TLS': 6}}, 'IPsec': {'IPsec': 4}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side channel': 13, 'SPA': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, '0, genugate 400, genugate 600 and genugate 800 in the fead eith haideaie ievision 6 and 7 ehich aie out of scope foi the cuiient ceitifcation. The genugate fieeaaa 9.0 iuns on this haideaie eith the same': 1}}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '18d7214debc29943f09dcceb69d7bb5a7171563a52809530b2711c89c34f26b2', 'st_pdf_hash': '2c3317a2cfeea7aca4fc8e21644e79debda9fbc08cf71855404cb14eac68e9f8', 'report_txt_hash': '95756da5c032142b81e20f2b90ba8b31eb62ccef1e6636c5f626179659d3187f', 'st_txt_hash': '40f0d5a2a98927a3420f6085dc39fb93f262aaf46bbf2f8dc490e0b9676c2058'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA1': 2, 'SHA-256': 1, 'SHA-512': 1, 'SHA256': 3, 'SHA512': 3}, 'rules_crypto_schemes': {'SSL': 1}, 'rules_randomness': {}, 'rules_tee': {'SE': 2}, 'rules_side_channels': {}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'TLS': 6, 'SSL': 4}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {'side channel': 13}} values inserted.
  • 21.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was set to {'_type': 'Set', 'elements': ['cpe:2.3:a:genua:genuagate:9.0:p17:*:*:*:*:*:*', 'cpe:2.3:a:genua:genuagate:9.0:p7:*:*:*:*:*:*', 'cpe:2.3:a:genua:genuagate:9.0:p15:*:*:*:*:*:*', 'cpe:2.3:a:genua:genuagate:9.0:p10:*:*:*:*:*:*', 'cpe:2.3:a:genua:genuagate:9.0:p18:*:*:*:*:*:*', 'cpe:2.3:a:genua:genuagate:9.0:p12:*:*:*:*:*:*', 'cpe:2.3:a:genua:genuagate:9.0:p14:*:*:*:*:*:*', 'cpe:2.3:a:genua:genuagate:9.0:p16:*:*:*:*:*:*', 'cpe:2.3:a:genua:genuagate:9.0:p2:*:*:*:*:*:*', 'cpe:2.3:a:genua:genuagate:9.0:p1:*:*:*:*:*:*', 'cpe:2.3:a:genua:genuagate:9.0:-:*:*:*:*:*:*', 'cpe:2.3:a:genua:genuagate:9.0:p4:*:*:*:*:*:*', 'cpe:2.3:a:genua:genuagate:9.0:p9:*:*:*:*:*:*', 'cpe:2.3:a:genua:genuagate:9.0:p6:*:*:*:*:*:*', 'cpe:2.3:a:genua:genuagate:9.0:p5:*:*:*:*:*:*', 'cpe:2.3:a:genua:genuagate:9.0:p3:*:*:*:*:*:*', 'cpe:2.3:a:genua:genuagate:9.0:p13:*:*:*:*:*:*', 'cpe:2.3:a:genua:genuagate:9.0:p11:*:*:*:*:*:*', 'cpe:2.3:a:genua:genuagate:9.0:p8:*:*:*:*:*:*']}.
    • The related_cves property was set to {'_type': 'Set', 'elements': ['CVE-2021-27215']}.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_TAT', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 4}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1154-2021']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1154-2021']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0890-2013']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0890-2013', 'BSI-DSZ-CC-0718-2012']}}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['9.0']}.
    • The directly_affected_by property was set to {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1154-2021']}.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name genugate 9.0 Firewall Software was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Network and Network-Related Devices and Systems",
  "cert_link": null,
  "dgst": "bd1a21ea3d047c14",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-1039-2017",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "9.0"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1154-2021"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0890-2013"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1154-2021"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0890-2013",
          "BSI-DSZ-CC-0718-2012"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2021-02-18",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/1039MA1a_pdf.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/files/epfiles/1039ma1b_pdf.pdf",
        "maintenance_title": "genugate 9.0 Firewall Software"
      }
    ]
  },
  "manufacturer": "GeNUA mbH",
  "manufacturer_web": "https://www.genua.de/",
  "name": "genugate 9.0 Firewall Software",
  "not_valid_after": "2022-12-29",
  "not_valid_before": "2017-12-29",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "1039a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cc_security_level": "Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.2, ASE_TSS.2 and AVA_VAN.5",
        "cc_version": "Product specific Security Target Common Criteria Part 2 extended",
        "cert_id": "BSI-DSZ-CC-1039-2017",
        "cert_item": "genugate 9.0 Firewall Software",
        "cert_lab": "BSI",
        "developer": "genua gmbh",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "None"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-01039": 1,
          "BSI-DSZ-CC-0890-2013": 3,
          "BSI-DSZ-CC-1039-2017": 15
        }
      },
      "cc_claims": {
        "A": {
          "A.ADMIN": 2,
          "A.HANET": 2,
          "A.LEGACY": 2,
          "A.NOEVIL": 2,
          "A.OSPF": 2,
          "A.PHYSEC": 2,
          "A.POLICY": 4,
          "A.REMOTE_AUTH": 1,
          "A.SERVER": 1,
          "A.SINGEN": 2,
          "A.TIMESTMP": 2,
          "A.TRUSTK": 2,
          "A.TRUSTU": 2,
          "A.USER": 2
        },
        "OE": {
          "OE.PHYSEC": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 3,
          "ALC_FLR.2": 4
        },
        "ASE": {
          "ASE_TSS.2": 4
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 2,
          "EAL 2+": 1,
          "EAL 4": 9,
          "EAL 4 augmented": 3,
          "EAL 5": 3,
          "EAL 5+": 1,
          "EAL 6": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "Report BSI-DSZ-CC-01039 for genugate firewall 9.0, Version 1, Date 15.12.2017, secuvera Gmbh (confidential document) [8] genugate Installationshandbuch, Version 9.0 Z, Ausgabe November 2017, Revision gg.90.D021 [9": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 1
        },
        "TLS": {
          "SSL": {
            "SSL": 1
          }
        },
        "VPN": {
          "VPN": 1
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "secuvera": {
          "secuvera": 3
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 1,
            "SHA-512": 1,
            "SHA256": 1,
            "SHA512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "BSI": {
          "AIS 32": 1,
          "AIS 34": 2
        },
        "ISO": {
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {
        "BSI": {
          "BSI 7148": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20180126142805+01\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, \"",
      "/ModDate": "D:20180126152155+01\u002700\u0027",
      "/Producer": "LibreOffice 5.2",
      "/Subject": "Zertifizierung Firewall Software",
      "/Title": "Certification Report BSI-DSZ-CC-1039-2017",
      "pdf_file_size_bytes": 1121966,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.bsi.bund.de/zertifizierung",
          "https://www.bsi.bund.de/zertifizierungsreporte",
          "http://www.commoncriteriaportal.org/cc/",
          "http://www.sogisportal.eu/",
          "https://www.bsi.bund.de/AIS",
          "http://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 28
    },
    "st_filename": "1039b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ADMIN": 2,
          "A.HANET": 2,
          "A.LEGACY": 2,
          "A.NOEVIL": 2,
          "A.OSPF": 2,
          "A.PHYSEC": 2,
          "A.POLICY": 2,
          "A.REMOTE_AUTH": 2,
          "A.SINGEN": 3,
          "A.TIMESTMP": 2,
          "A.TRUSTK": 2,
          "A.TRUSTU": 2,
          "A.USER": 2
        },
        "O": {
          "O.ACCOUN": 7,
          "O.AUDREC": 16,
          "O.AVAIL": 5,
          "O.IDAUTH": 17,
          "O.MEDIAT": 14,
          "O.MISUSESSH": 10,
          "O.SECFUN": 22,
          "O.SECSTA": 7,
          "O.SELPRO": 5
        },
        "OE": {
          "OE.ADMIN": 2,
          "OE.HANET": 4,
          "OE.LEGACY": 2,
          "OE.NOEVIL": 2,
          "OE.OSPF": 2,
          "OE.PASSWD": 3,
          "OE.PHYSEC": 2,
          "OE.POLICY": 2,
          "OE.REMOTE_AUTH": 2,
          "OE.RTCLOCK": 2,
          "OE.SINGEN": 2,
          "OE.TIMESTMP": 3,
          "OE.TRUSTK": 4,
          "OE.TRUSTU": 2,
          "OE.USER": 2
        },
        "T": {
          "T.MEDIAT": 2,
          "T.MISUSESSH": 2,
          "T.NOAUTH": 2,
          "T.SELPRO": 2,
          "T.SPOOF": 2
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 4,
          "ADV_FSP": 1,
          "ADV_FSP.1": 1,
          "ADV_FSP.2": 3,
          "ADV_FSP.4": 1,
          "ADV_IMP": 1,
          "ADV_IMP.1": 3,
          "ADV_INT": 2,
          "ADV_SPM": 2,
          "ADV_TAT.1": 1,
          "ADV_TDS": 1,
          "ADV_TDS.1": 1,
          "ADV_TDS.2": 1,
          "ADV_TDS.3": 2
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 4,
          "AGD_PRE": 1,
          "AGD_PRE.1": 3
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.4": 1,
          "ALC_CMS": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS": 1,
          "ALC_DVS.1": 2,
          "ALC_FLR": 1,
          "ALC_FLR.2": 4,
          "ALC_LCD": 1,
          "ALC_LCD.1": 2,
          "ALC_TAT": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_CCL.1": 1,
          "ASE_ECD": 1,
          "ASE_ECD.1": 3,
          "ASE_INT": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ": 1,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 1,
          "ASE_SPD": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS": 1,
          "ASE_TSS.2": 4
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.1": 1,
          "ATE_COV.2": 1,
          "ATE_DPT": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN": 1,
          "ATE_FUN.1": 4,
          "ATE_IND": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 4,
          "EAL4 augmented": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP": 2,
          "FAU_ARP.1": 5,
          "FAU_ARP.1.1": 1,
          "FAU_GEN": 28,
          "FAU_GEN.1": 12,
          "FAU_GEN.2": 1,
          "FAU_SAA": 2,
          "FAU_SAA.1": 6,
          "FAU_SAA.1.1": 1,
          "FAU_SAA.1.2": 1,
          "FAU_SAR": 4,
          "FAU_SAR.1": 5,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.2": 5,
          "FAU_SAR.2.1": 1,
          "FAU_SAR.3": 5,
          "FAU_SAR.3.1": 1,
          "FAU_STG": 29,
          "FAU_STG.1": 7,
          "FAU_STG.4": 2
        },
        "FDP": {
          "FDP_IFC": 60,
          "FDP_IFC.1": 5,
          "FDP_IFF": 55,
          "FDP_IFF.1": 25
        },
        "FIA": {
          "FIA_AFL": 2,
          "FIA_AFL.1": 5,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD": 2,
          "FIA_ATD.1": 5,
          "FIA_ATD.1.1": 1,
          "FIA_SOS": 2,
          "FIA_SOS.1": 5,
          "FIA_SOS.1.1": 1,
          "FIA_UAU": 27,
          "FIA_UAU.1": 1,
          "FIA_UAU.2": 7,
          "FIA_UAU.2.1": 1,
          "FIA_UAU.3": 1,
          "FIA_UAU.4": 1,
          "FIA_UAU.5": 8,
          "FIA_UAU.6": 6,
          "FIA_UAU.6.1": 1,
          "FIA_UAU.7": 1,
          "FIA_UID": 3,
          "FIA_UID.1": 3,
          "FIA_UID.2": 7,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_IFF": 2,
          "FMT_MOF": 21,
          "FMT_MOF.1": 3,
          "FMT_MOF.1.3": 1,
          "FMT_MSA": 68,
          "FMT_MSA.1": 4,
          "FMT_MSA.3": 3,
          "FMT_MTD": 16,
          "FMT_MTD.1": 2,
          "FMT_SMF": 2,
          "FMT_SMF.1": 23,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 4,
          "FMT_SMR.1": 16,
          "FMT_SMR.2": 20,
          "FMT_SMR.2.1": 1,
          "FMT_SMR.2.2": 1,
          "FMT_SMR.2.3": 1,
          "FMT_SMR.3": 6,
          "FMT_SMR.3.1": 1
        },
        "FPT": {
          "FPT_AMT.1": 1,
          "FPT_ITT.1": 1,
          "FPT_RCV": 2,
          "FPT_RCV.2": 6,
          "FPT_RCV.2.1": 1,
          "FPT_RCV.2.2": 1,
          "FPT_SST": 7,
          "FPT_SST.1": 9,
          "FPT_SST.1.1": 2,
          "FPT_SST.1.2": 2,
          "FPT_STM": 2,
          "FPT_STM.1": 8,
          "FPT_STM.1.1": 1,
          "FPT_TRC": 2,
          "FPT_TRC.1": 6,
          "FPT_TRC.1.1": 1,
          "FPT_TRC.1.2": 1,
          "FPT_TST.1": 2
        }
      },
      "certification_process": {
        "OutOfScope": {
          "genugate 400, genugate 600 and genugate 800 in the fead eith haideaie ievision 6 and 7 ehich aie out of scope foi the cuiient ceitifcation. The genugate fieeaaa 9.0 iuns on this haideaie eith the same": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IPsec": {
          "IPsec": 4
        },
        "SSH": {
          "SSH": 26
        },
        "TLS": {
          "SSL": {
            "SSL": 3
          },
          "TLS": {
            "TLS": 6
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "SCA": {
          "side channel": 13
        }
      },
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Roland Meister",
      "/CreationDate": "D:20171213100427+01\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "CC 3.1",
      "/Producer": "LibreOffice 5.4",
      "/Subject": "Common Criteria",
      "/Title": "genugate firewall 9.0 Security Target",
      "pdf_file_size_bytes": 1187252,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.openbsd.org/",
          "https://en.wikipedia.org/wiki/Secure_Sockets_Layer"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 68
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/1039a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "AVA_VAN.5",
      "ASE_TSS.2",
      "ALC_FLR.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/1039b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "18d7214debc29943f09dcceb69d7bb5a7171563a52809530b2711c89c34f26b2",
      "txt_hash": "95756da5c032142b81e20f2b90ba8b31eb62ccef1e6636c5f626179659d3187f"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "2c3317a2cfeea7aca4fc8e21644e79debda9fbc08cf71855404cb14eac68e9f8",
      "txt_hash": "40f0d5a2a98927a3420f6085dc39fb93f262aaf46bbf2f8dc490e0b9676c2058"
    }
  },
  "status": "archived"
}