StoneGate Firewall/VPN
CSV information ?
Status | archived |
---|---|
Valid from | 13.03.2009 |
Valid until | 13.03.2014 |
Scheme | 🇬🇧 UK |
Manufacturer | Stonesoft Corporation |
Category | Boundary Protection Devices and Systems |
Security level | EAL4+, ALC_FLR.1 |
Maintenance updates | Stonegate Firewall/VPN Version 4.2.2, Build 5708.cc.3.1 (23.03.2010) Certification report Security target |
Heuristics summary ?
Certification report ?
Extracted keywords
Hash functions
SHA-1, MD5Schemes
Key ExchangeProtocols
SSH, SSL, IKE, VPNLibraries
OpenSSLSecurity level
EAL4, EAL4 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.1Security Functional Requirements (SFR)
FAU_STGCertificates
CRP249Standards
FIPS PUB 140-2, FIPS 140-2, CCMB-2006-09-001, CCMB-2007-09-002, CCMB-2007-09-003, CCMB-2007-09-004File metadata
Title: | Microsoft Word - 090325 LFS T536 StoneGate CRP249 v1.0.doc |
---|---|
Author: | Bhavin |
Creation date: | D:20090325110143Z00'00' |
Modification date: | D:20090325110143Z00'00' |
Pages: | 22 |
Creator: | PScript5.dll Version 5.2.2 |
Producer: | GPL Ghostscript 8.63 |
Frontpage
Certified item: | • confirms that the certificate has been issued under the authority of a party to an international Mutual Recognition Agreement (MRA) 122-B March 2009 Issue 1.0 Page 1 of 22 CERTIFICATION REPORT No. CRP249 StoneGate Firewall/VPN Version 4.2.2 Build 5708.cc3.1 running on the StoneGate appliance models FW-310, FW-1020, FW-1050, FW-1200, FW-5000 and FW-5100 Issue 1.0 March 2009 © Crown Copyright 2009 – All Rights Reserved Reproduction is authorised, provided that this report is copied in its entirety. CESG Certification Body IACS Delivery Office, CESG Hubble Road, Cheltenham Gloucestershire, GL51 0EX United Kingdom CRP249 – StoneGate Firewall/VPN Version 4.2.2 Build 5708.cc3.1 Page 2 of 22 Issue 1.0 March 2009 CERTIFICATION STATEMENT The product detailed below has been evaluated under the terms of the UK IT Security Evaluation and Certification Scheme and has met the specified Common Criteria requirements. The scope of the evaluation and the assumed usage environment are specified in the body of this report |
---|---|
Developer: | Stonesoft Corporation |
References
No references.
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, 3DES, HMACAsymmetric Algorithms
Diffie-Hellman, DHHash functions
SHA-1Schemes
Key ExchangeProtocols
SSH, SSL, TLS, IKE, IPsec, VPNLibraries
OpenSSLBlock cipher modes
CBCSecurity level
EAL4, EAL4 augmentedClaims
O.E, O.AUDIT, O.MEDIAT, O.NETADDRHIDE, O.VPN, O.IDAUTH, O.HIGHAVAILABILITY, O.CRYPTOSERVICES, O.SECFUN, T.AUDIT_UNDETECTED, T.MEDIAT, T.NOAUTH, T.NODE_FAILURE, T.SECURE_CONNECTION_COMPROMISE, T.SELPRO, A.ADMINTRUSTED, A.SHAREDSECRETKEY, A.ADMIN_ACCESS, A.AUDITMAN, A.AUDIT_SUPPORT, A.MEDIAT_SUPPORT, A.MODEXP, A.OPERATING_ENVIRONMENT, A.USER_AUTH, A.TIMESecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_FLR.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_VAN.3Security Functional Requirements (SFR)
FAU_STG, FAU_GEN.1, FAU_SEL.1, FAU_STG.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SEL.1.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.4, FCS_COP, FCS_CKM, FCS_CKM.4, FCS_CKM.4.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.1, FDP_IFC.1, FDP_IFF.1, FDP_UCT.1, FDP_UIT.1, FDP_IFF.1.1, FDP_IFC.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.5, FDP_IFF.1.4, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ACC.1, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UID.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_FLS.1, FPT_FLS.1.1, FPT_STM.1, FRU_FLT.2, FRU_FLT.2.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3Certification process
out of scope, of Security Functions: administrators access the firewall engine through the Management Server (out of scope) which provides the interface for managing the security policy and authentication attributes, theSide-channel analysis
malfunctionCertification process
out of scope, of Security Functions: administrators access the firewall engine through the Management Server (out of scope) which provides the interface for managing the security policy and authentication attributes, theStandards
FIPS 140-2, FIPS PUB 140-2, FIPS 46-3, FIPS 197, FIPS 198, FIPS 180-2, PKCS#1, PKCS #1, RFC 2401, RFC 1631, RFC 2409, RFC 2406, RFC 959, RFC 821, RFC 2616File metadata
Title: | Microsoft Word - T536 ST version 1.0.doc |
---|---|
Author: | Bhavin |
Creation date: | D:20090325110253Z00'00' |
Modification date: | D:20090325110253Z00'00' |
Pages: | 50 |
Creator: | PScript5.dll Version 5.2.2 |
Producer: | GPL Ghostscript 8.63 |
References
No references.
Heuristics ?
Extracted SARs
ATE_IND.2, ALC_CMC.4, ALC_DVS.1, ATE_DPT.2, ADV_IMP.1, ADV_TDS.3, ALC_CMS.4, ATE_FUN.1, ALC_DEL.1, AVA_VAN.3, ALC_FLR.1, ALC_TAT.1, ALC_LCD.1, ADV_FSP.4, ATE_COV.2, AGD_PRE.1, AGD_OPE.1, ADV_ARC.1References ?
No references are available for this certificate.
Updates ?
-
26.04.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'scheme_data': None}
.
- The following values were inserted:
-
11.02.2023 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.cc.CCCertificate
.
The Maintenance Updates of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2010-03-23', 'maintenance_title': 'Stonegate Firewall/VPN Version 4.2.2, Build 5708.cc.3.1', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/CRP249-MR1.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/files/epfiles/CRP249-ST1.pdf'}]}
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.InternalState
. - The following properties were deleted:
['errors']
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.PdfData
.
The computed heuristics were updated.
- The following values were inserted:
{'direct_transitive_cves': None, 'indirect_transitive_cves': None}
. - The _type property was set to
sec_certs.sample.cc.CCCertificate.Heuristics
. - The following properties were deleted:
['direct_dependency_cves', 'indirect_dependency_cves']
.
- The new value is
-
25.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The st_convert_ok property was set to
True
. - The st_extract_ok property was set to
True
. - The errors property was set to
[]
. - The st_pdf_hash property was set to
9408740c0a82072bbf58c2bfb157a21c7aa337e1ea3be45f6ddcc3ec303f7f8f
. - The st_txt_hash property was set to
4c19b50970489756c31b717479e514754a76751b514794a3a97aa2b69a5fc522
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 321611, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 50, '/Producer': 'GPL Ghostscript 8.63', '/CreationDate': "D:20090325110253Z00'00'", '/ModDate': "D:20090325110253Z00'00'", '/Title': 'Microsoft Word - T536 ST version 1.0.doc', '/Creator': 'PScript5.dll Version 5.2.2', '/Author': 'Bhavin', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 8, 'EAL4 augmented': 4}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.1': 10, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.3': 1}}, 'cc_sfr': {'FAU': {'FAU_STG': 13, 'FAU_GEN.1': 8, 'FAU_SEL.1': 6, 'FAU_STG.1': 7, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SEL.1.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.4': 1}, 'FCS': {'FCS_COP': 33, 'FCS_CKM': 18, 'FCS_CKM.4': 15, 'FCS_CKM.4.1': 1, 'FCS_CKM.2': 3, 'FCS_COP.1': 3, 'FCS_CKM.1': 7}, 'FDP': {'FDP_IFC.1': 12, 'FDP_IFF.1': 9, 'FDP_UCT.1': 7, 'FDP_UIT.1': 6, 'FDP_IFF.1.1': 3, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.2': 5, 'FDP_IFF.1.3': 5, 'FDP_IFF.1.5': 5, 'FDP_IFF.1.4': 1, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_ACC.1': 1}, 'FIA': {'FIA_UAU.5': 7, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UID.1': 1}, 'FMT': {'FMT_MSA.1': 8, 'FMT_MSA.2': 16, 'FMT_MSA.3': 7, 'FMT_MTD.1': 8, 'FMT_SMF.1': 8, 'FMT_SMR.1': 8, 'FMT_MSA.1.1': 1, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_FLS.1': 8, 'FPT_FLS.1.1': 1, 'FPT_STM.1': 1}, 'FRU': {'FRU_FLT.2': 6, 'FRU_FLT.2.1': 1}, 'FTP': {'FTP_ITC.1': 9, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'O': {'O.E': 41, 'O.AUDIT': 9, 'O.MEDIAT': 9, 'O.NETADDRHIDE': 6, 'O.VPN': 9, 'O.IDAUTH': 5, 'O.HIGHAVAILABILITY': 6, 'O.CRYPTOSERVICES': 16, 'O.SECFUN': 10}, 'T': {'T.AUDIT_UNDETECTED': 4, 'T.MEDIAT': 6, 'T.NOAUTH': 2, 'T.NODE_FAILURE': 2, 'T.SECURE_CONNECTION_COMPROMISE': 4, 'T.SELPRO': 3}, 'A': {'A.ADMINTRUSTED': 3, 'A.SHAREDSECRETKEY': 4, 'A.ADMIN_ACCESS': 2, 'A.AUDITMAN': 2, 'A.AUDIT_SUPPORT': 2, 'A.MEDIAT_SUPPORT': 2, 'A.MODEXP': 2, 'A.OPERATING_ENVIRONMENT': 2, 'A.USER_AUTH': 2, 'A.TIME': 2}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 14}}, 'DES': {'DES': {'DES': 5}, '3DES': {'3DES': 15}}, 'constructions': {'MAC': {'HMAC': 1}}}, 'asymmetric_crypto': {'FF': {'DH': {'Diffie-Hellman': 13, 'DH': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 9}}}, 'crypto_scheme': {'KEX': {'Key Exchange': 5}}, 'crypto_protocol': {'SSH': {'SSH': 2}, 'TLS': {'SSL': {'SSL': 2}, 'TLS': {'TLS': 1}}, 'IKE': {'IKE': 35}, 'IPsec': {'IPsec': 16}, 'VPN': {'VPN': 70}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 3}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 1}}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 21, 'FIPS PUB 140-2': 4, 'FIPS 46-3': 2, 'FIPS 197': 2, 'FIPS 198': 2, 'FIPS 180-2': 1}, 'PKCS': {'PKCS#1': 2, 'PKCS #1': 1}, 'RFC': {'RFC 2401': 2, 'RFC 1631': 1, 'RFC 2409': 8, 'RFC 2406': 4, 'RFC 959': 3, 'RFC 821': 1, 'RFC 2616': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'of Security Functions: administrators access the firewall engine through the Management Server (out of scope) which provides the interface for managing the security policy and authentication attributes, the': 1}}}
. - The st_filename property was set to
lfs_t536_st.pdf
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}
values added.
- The st_download_ok property was set to
-
25.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_ok property was set to
False
. - The st_extract_ok property was set to
False
. - The errors property was set to
['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/lfs_t536_st.pdf, code: 408']
. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_frontpage property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}
values discarded.
- The st_download_ok property was set to
-
23.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The st_convert_ok property was set to
True
. - The st_extract_ok property was set to
True
. - The errors property was set to
[]
. - The st_pdf_hash property was set to
9408740c0a82072bbf58c2bfb157a21c7aa337e1ea3be45f6ddcc3ec303f7f8f
. - The st_txt_hash property was set to
4c19b50970489756c31b717479e514754a76751b514794a3a97aa2b69a5fc522
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 321611, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 50, '/Producer': 'GPL Ghostscript 8.63', '/CreationDate': "D:20090325110253Z00'00'", '/ModDate': "D:20090325110253Z00'00'", '/Title': 'Microsoft Word - T536 ST version 1.0.doc', '/Creator': 'PScript5.dll Version 5.2.2', '/Author': 'Bhavin', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 8, 'EAL4 augmented': 4}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.1': 10, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.3': 1}}, 'cc_sfr': {'FAU': {'FAU_STG': 13, 'FAU_GEN.1': 8, 'FAU_SEL.1': 6, 'FAU_STG.1': 7, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SEL.1.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.4': 1}, 'FCS': {'FCS_COP': 33, 'FCS_CKM': 18, 'FCS_CKM.4': 15, 'FCS_CKM.4.1': 1, 'FCS_CKM.2': 3, 'FCS_COP.1': 3, 'FCS_CKM.1': 7}, 'FDP': {'FDP_IFC.1': 12, 'FDP_IFF.1': 9, 'FDP_UCT.1': 7, 'FDP_UIT.1': 6, 'FDP_IFF.1.1': 3, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.2': 5, 'FDP_IFF.1.3': 5, 'FDP_IFF.1.5': 5, 'FDP_IFF.1.4': 1, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_ACC.1': 1}, 'FIA': {'FIA_UAU.5': 7, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UID.1': 1}, 'FMT': {'FMT_MSA.1': 8, 'FMT_MSA.2': 16, 'FMT_MSA.3': 7, 'FMT_MTD.1': 8, 'FMT_SMF.1': 8, 'FMT_SMR.1': 8, 'FMT_MSA.1.1': 1, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_FLS.1': 8, 'FPT_FLS.1.1': 1, 'FPT_STM.1': 1}, 'FRU': {'FRU_FLT.2': 6, 'FRU_FLT.2.1': 1}, 'FTP': {'FTP_ITC.1': 9, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'O': {'O.E': 41, 'O.AUDIT': 9, 'O.MEDIAT': 9, 'O.NETADDRHIDE': 6, 'O.VPN': 9, 'O.IDAUTH': 5, 'O.HIGHAVAILABILITY': 6, 'O.CRYPTOSERVICES': 16, 'O.SECFUN': 10}, 'T': {'T.AUDIT_UNDETECTED': 4, 'T.MEDIAT': 6, 'T.NOAUTH': 2, 'T.NODE_FAILURE': 2, 'T.SECURE_CONNECTION_COMPROMISE': 4, 'T.SELPRO': 3}, 'A': {'A.ADMINTRUSTED': 3, 'A.SHAREDSECRETKEY': 4, 'A.ADMIN_ACCESS': 2, 'A.AUDITMAN': 2, 'A.AUDIT_SUPPORT': 2, 'A.MEDIAT_SUPPORT': 2, 'A.MODEXP': 2, 'A.OPERATING_ENVIRONMENT': 2, 'A.USER_AUTH': 2, 'A.TIME': 2}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 14}}, 'DES': {'DES': {'DES': 5}, '3DES': {'3DES': 15}}, 'constructions': {'MAC': {'HMAC': 1}}}, 'asymmetric_crypto': {'FF': {'DH': {'Diffie-Hellman': 13, 'DH': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 9}}}, 'crypto_scheme': {'KEX': {'Key Exchange': 5}}, 'crypto_protocol': {'SSH': {'SSH': 2}, 'TLS': {'SSL': {'SSL': 2}, 'TLS': {'TLS': 1}}, 'IKE': {'IKE': 35}, 'IPsec': {'IPsec': 16}, 'VPN': {'VPN': 70}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 3}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 1}}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 21, 'FIPS PUB 140-2': 4, 'FIPS 46-3': 2, 'FIPS 197': 2, 'FIPS 198': 2, 'FIPS 180-2': 1}, 'PKCS': {'PKCS#1': 2, 'PKCS #1': 1}, 'RFC': {'RFC 2401': 2, 'RFC 1631': 1, 'RFC 2409': 8, 'RFC 2406': 4, 'RFC 959': 3, 'RFC 821': 1, 'RFC 2616': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'of Security Functions: administrators access the firewall engine through the Management Server (out of scope) which provides the interface for managing the security policy and authentication attributes, the': 1}}}
. - The st_filename property was set to
lfs_t536_st.pdf
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}
values added.
- The st_download_ok property was set to
-
23.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_ok property was set to
False
. - The st_extract_ok property was set to
False
. - The errors property was set to
['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/lfs_t536_st.pdf, code: nok']
. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_frontpage property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}
values discarded.
- The st_download_ok property was set to
-
22.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The errors property was set to
[]
.
- The errors property was set to
-
21.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The errors property was set to
['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/crp249.pdf, code: nok']
.
- The errors property was set to
-
05.10.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'st_convert_garbage': False, 'report_convert_garbage': False}
.
- The following values were inserted:
-
26.09.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'crypto_protocol': {'__insert__': {'VPN': {'VPN': 11}}}}
data. - The st_keywords property was updated, with the
{'crypto_protocol': {'__insert__': {'VPN': {'VPN': 70}}}}
data.
- The report_keywords property was updated, with the
-
24.09.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The following values were inserted:
{'report_filename': 'crp249.pdf', 'st_filename': 'lfs_t536_st.pdf'}
. - The report_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'UK': {'__update__': {'CRP249': 2}}}}, 'cc_sfr': {'FAU': {'FAU_STG': 2}}, 'crypto_protocol': {'__update__': {'SSH': {'__update__': {'SSH': 1}}, 'TLS': {'__update__': {'SSL': {'__update__': {'SSL': 1}}}}}}}
data. - The st_keywords property was updated, with the
{'cc_sfr': {'__update__': {'FAU': {'__insert__': {'FAU_STG': 13, 'FAU_STG.4': 1}}, 'FCS': {'__insert__': {'FCS_COP': 33, 'FCS_CKM': 18}}, 'FDP': {'__update__': {'FDP_IFC.1': 12, 'FDP_IFF.1': 9, 'FDP_UIT.1': 6, 'FDP_IFF.1.5': 5}}, 'FMT': {'__update__': {'FMT_SMF.1': 8, 'FMT_SMR.1': 8}}}}, 'cc_claims': {'__update__': {'O': {'__insert__': {'O.E': 41}, '__delete__': ['O.E.AUDIT_SUPPORT', 'O.E.AUDITMAN', 'O.E.MEDIAT_SUPPORT', 'O.E.USER_AUTH', 'O.E.ADMIN_ACCESS', 'O.E.ADMINTRUSTED', 'O.E.MODEXP', 'O.E.OPERATING_ENVIRONMENT', 'O.E.SHAREDSECRETKEY']}, 'T': {'__delete__': ['T']}}}, 'vendor': {}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 14}}}}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 5}}, '3DES': {'__update__': {'3DES': 15}}}}}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA1': {'__update__': {'SHA-1': 9}}}}}}, 'crypto_scheme': {'__delete__': ['MAC']}, 'crypto_protocol': {'__update__': {'SSH': {'__update__': {'SSH': 2}}, 'TLS': {'__update__': {'SSL': {'__update__': {'SSL': 2}}}}}}, 'cipher_mode': {'__update__': {'CBC': {'__update__': {'CBC': 3}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'RFC': {'__update__': {'RFC 2401': 2}}}}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {'of Security Functions: administrators access the firewall engine through the Management Server (out of scope) which provides the interface for managing the security policy and authentication attributes, the': 1}, '__delete__': ['ion of Security Functions: administrators access the firewall engine through the Management Server (out of scope) which provides the interface for managing the security policy and authentication attributes, the']}}}}
data.
- The following values were inserted:
-
18.07.2022 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.common_criteria.CommonCriteriaCert
.
The Maintenance Updates of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2010-03-23', 'maintenance_title': 'Stonegate Firewall/VPN Version 4.2.2, Build 5708.cc.3.1', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/CRP249-MR1.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/files/epfiles/CRP249-ST1.pdf'}]}
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData
.
The computed heuristics were updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics
. - The st_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The report_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}
.
- The new value is
-
17.07.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_metadata property was updated, with the
{'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
values inserted. - The st_metadata property was updated, with the
{'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
values inserted. - The report_keywords property was set to
{'cc_cert_id': {'UK': {'CRP249': 46}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 2, 'EAL4 augmented': 2}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 2}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}}, 'MD': {'MD5': {'MD5': 1}}}, 'crypto_scheme': {'KEX': {'Key Exchange': 2}}, 'crypto_protocol': {'SSH': {'SSH': 2}, 'TLS': {'SSL': {'SSL': 2}}, 'IKE': {'IKE': 2}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 1}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 140-2': 2, 'FIPS 140-2': 3}, 'CC': {'CCMB-2006-09-001': 1, 'CCMB-2007-09-002': 1, 'CCMB-2007-09-003': 1, 'CCMB-2007-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 8, 'EAL4 augmented': 4}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.1': 10, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.3': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 8, 'FAU_SEL.1': 6, 'FAU_STG.1': 7, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SEL.1.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1}, 'FCS': {'FCS_CKM.4': 15, 'FCS_CKM.4.1': 1, 'FCS_CKM.2': 3, 'FCS_COP.1': 3, 'FCS_CKM.1': 7}, 'FDP': {'FDP_IFC.1': 13, 'FDP_IFF.1': 10, 'FDP_UCT.1': 7, 'FDP_UIT.1': 7, 'FDP_IFF.1.1': 3, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.2': 5, 'FDP_IFF.1.3': 5, 'FDP_IFF.1.5': 4, 'FDP_IFF.1.4': 1, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_ACC.1': 1}, 'FIA': {'FIA_UAU.5': 7, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UID.1': 1}, 'FMT': {'FMT_MSA.1': 8, 'FMT_MSA.2': 16, 'FMT_MSA.3': 7, 'FMT_MTD.1': 8, 'FMT_SMF.1': 10, 'FMT_SMR.1': 10, 'FMT_MSA.1.1': 1, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_FLS.1': 8, 'FPT_FLS.1.1': 1, 'FPT_STM.1': 1}, 'FRU': {'FRU_FLT.2': 6, 'FRU_FLT.2.1': 1}, 'FTP': {'FTP_ITC.1': 9, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'O': {'O.AUDIT': 9, 'O.E.AUDIT_SUPPORT': 6, 'O.E.AUDITMAN': 4, 'O.MEDIAT': 9, 'O.NETADDRHIDE': 6, 'O.VPN': 9, 'O.E.MEDIAT_SUPPORT': 6, 'O.E.USER_AUTH': 4, 'O.IDAUTH': 5, 'O.HIGHAVAILABILITY': 6, 'O.CRYPTOSERVICES': 16, 'O.SECFUN': 10, 'O.E.ADMIN_ACCESS': 4, 'O.E.ADMINTRUSTED': 2, 'O.E.MODEXP': 2, 'O.E.OPERATING_ENVIRONMENT': 2, 'O.E.SHAREDSECRETKEY': 2}, 'T': {'T': 3, 'T.AUDIT_UNDETECTED': 4, 'T.MEDIAT': 6, 'T.NOAUTH': 2, 'T.NODE_FAILURE': 2, 'T.SECURE_CONNECTION_COMPROMISE': 4, 'T.SELPRO': 3}, 'A': {'A.ADMINTRUSTED': 3, 'A.SHAREDSECRETKEY': 4, 'A.ADMIN_ACCESS': 2, 'A.AUDITMAN': 2, 'A.AUDIT_SUPPORT': 2, 'A.MEDIAT_SUPPORT': 2, 'A.MODEXP': 2, 'A.OPERATING_ENVIRONMENT': 2, 'A.USER_AUTH': 2, 'A.TIME': 2}}, 'vendor': {'STMicroelectronics': {'STM': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 16}}, 'DES': {'DES': {'DES': 21}, '3DES': {'3DES': 16}}, 'constructions': {'MAC': {'HMAC': 1}}}, 'asymmetric_crypto': {'FF': {'DH': {'Diffie-Hellman': 13, 'DH': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 19}}}, 'crypto_scheme': {'MAC': {'MAC': 1}, 'KEX': {'Key Exchange': 5}}, 'crypto_protocol': {'SSH': {'SSH': 3}, 'TLS': {'SSL': {'SSL': 3}, 'TLS': {'TLS': 1}}, 'IKE': {'IKE': 35}, 'IPsec': {'IPsec': 16}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 5}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 1}}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 5}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 21, 'FIPS PUB 140-2': 4, 'FIPS 46-3': 2, 'FIPS 197': 2, 'FIPS 198': 2, 'FIPS 180-2': 1}, 'PKCS': {'PKCS#1': 2, 'PKCS #1': 1}, 'RFC': {'RFC 1631': 1, 'RFC 2409': 8, 'RFC 2406': 4, 'RFC 959': 3, 'RFC 821': 1, 'RFC 2616': 2, 'RFC 2401': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'ion of Security Functions: administrators access the firewall engine through the Management Server (out of scope) which provides the interface for managing the security policy and authentication attributes, the': 1}}}
.
The computed heuristics were updated.
- The _type property was set to
Heuristics
.
- The report_metadata property was updated, with the
-
14.06.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'report_pdf_hash': '8d6e4aae5e0d47c1c6b0d7976ac67458ef04e6a5a50e4fc52cd27465a9a8ed60', 'st_pdf_hash': '9408740c0a82072bbf58c2bfb157a21c7aa337e1ea3be45f6ddcc3ec303f7f8f', 'report_txt_hash': 'd3d7fb8f25f09d93953e3ac27cfecfbd9f9ba6356d49696c0f637ba0c20598c3', 'st_txt_hash': '4c19b50970489756c31b717479e514754a76751b514794a3a97aa2b69a5fc522'}
.
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-1': 1, 'MD5': 1}, 'rules_crypto_schemes': {'Key Exchange': 2, 'SSL': 2}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {}}
values inserted. - The st_keywords property was updated, with the
{'rules_symmetric_crypto': {'AES': 16, '3DES': 16, 'DES': 5, 'HMAC': 1}, 'rules_asymmetric_crypto': {'Diffie-Hellman': 13, 'DH': 1}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-1': 19}, 'rules_crypto_schemes': {'MAC': 1, 'Key Exchange': 5, 'SSL': 3, 'TLS': 1}, 'rules_randomness': {}, 'rules_tee': {'SE': 5}, 'rules_side_channels': {'malfunction': 3}}
values inserted.
- The following values were inserted:
-
13.05.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}]}}
.
- The following values were inserted:
-
24.04.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'direct_dependency_cves': None, 'indirect_dependency_cves': None}
.
- The following values were inserted:
-
08.03.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}
. - The cert_lab property was set to
['']
. - The following properties were deleted:
['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting']
.
- The following values were inserted:
-
18.02.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_frontpage property was updated, with the
{'nscib': {'cert_id': '', 'cert_item': '• confirms that the certificate has been issued under the authority of a party to an international Mutual Recognition Agreement (MRA) 122-B March 2009 Issue 1.0 Page 1 of 22 CERTIFICATION REPORT No. CRP249 StoneGate Firewall/VPN Version 4.2.2 Build 5708.cc3.1 running on the StoneGate appliance models FW-310, FW-1020, FW-1050, FW-1200, FW-5000 and FW-5100 Issue 1.0 March 2009 © Crown Copyright 2009 – All Rights Reserved Reproduction is authorised, provided that this report is copied in its entirety. CESG Certification Body IACS Delivery Office, CESG Hubble Road, Cheltenham Gloucestershire, GL51 0EX United Kingdom CRP249 – StoneGate Firewall/VPN Version 4.2.2 Build 5708.cc3.1 Page 2 of 22 Issue 1.0 March 2009 CERTIFICATION STATEMENT The product detailed below has been evaluated under the terms of the UK IT Security Evaluation and Certification Scheme and has met the specified Common Criteria requirements. The scope of the evaluation and the assumed usage environment are specified in the body of this report', 'developer': 'Stonesoft Corporation', 'cert_lab': ''}, 'niap': {}, 'canada': {}}
values inserted. - The st_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted.
The computed heuristics were updated.
- The extracted_versions property was set to
{'_type': 'Set', 'elements': ['-']}
.
- The report_frontpage property was updated, with the
-
28.01.2022 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name StoneGate Firewall/VPN was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Boundary Protection Devices and Systems",
"cert_link": null,
"dgst": "d670b489e240783a",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"cert_id": "CRP249",
"cert_lab": [
""
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2010-03-23",
"maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/CRP249-MR1.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/files/epfiles/CRP249-ST1.pdf",
"maintenance_title": "Stonegate Firewall/VPN Version 4.2.2, Build 5708.cc.3.1"
}
]
},
"manufacturer": "Stonesoft Corporation",
"manufacturer_web": "https://www.stonesoft.com/",
"name": "StoneGate Firewall/VPN",
"not_valid_after": "2014-03-13",
"not_valid_before": "2009-03-13",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"report_filename": "crp249.pdf",
"report_frontpage": {
"anssi": {},
"bsi": {},
"canada": {},
"niap": {},
"nscib": {
"cert_id": "",
"cert_item": "\u2022 confirms that the certificate has been issued under the authority of a party to an international Mutual Recognition Agreement (MRA) 122-B March 2009 Issue 1.0 Page 1 of 22 CERTIFICATION REPORT No. CRP249 StoneGate Firewall/VPN Version 4.2.2 Build 5708.cc3.1 running on the StoneGate appliance models FW-310, FW-1020, FW-1050, FW-1200, FW-5000 and FW-5100 Issue 1.0 March 2009 \u00a9 Crown Copyright 2009 \u2013 All Rights Reserved Reproduction is authorised, provided that this report is copied in its entirety. CESG Certification Body IACS Delivery Office, CESG Hubble Road, Cheltenham Gloucestershire, GL51 0EX United Kingdom CRP249 \u2013 StoneGate Firewall/VPN Version 4.2.2 Build 5708.cc3.1 Page 2 of 22 Issue 1.0 March 2009 CERTIFICATION STATEMENT The product detailed below has been evaluated under the terms of the UK IT Security Evaluation and Certification Scheme and has met the specified Common Criteria requirements. The scope of the evaluation and the assumed usage environment are specified in the body of this report",
"cert_lab": "",
"developer": "Stonesoft Corporation"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"UK": {
"CRP249": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.1": 2
}
},
"cc_security_level": {
"EAL": {
"EAL4": 2,
"EAL4 augmented": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_STG": 2
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 1
}
},
"crypto_protocol": {
"IKE": {
"IKE": 2
},
"SSH": {
"SSH": 1
},
"TLS": {
"SSL": {
"SSL": 1
}
},
"VPN": {
"VPN": 11
}
},
"crypto_scheme": {
"KEX": {
"Key Exchange": 2
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"MD": {
"MD5": {
"MD5": 1
}
},
"SHA": {
"SHA1": {
"SHA-1": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2006-09-001": 1,
"CCMB-2007-09-002": 1,
"CCMB-2007-09-003": 1,
"CCMB-2007-09-004": 1
},
"FIPS": {
"FIPS 140-2": 3,
"FIPS PUB 140-2": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bhavin",
"/CreationDate": "D:20090325110143Z00\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20090325110143Z00\u002700\u0027",
"/Producer": "GPL Ghostscript 8.63",
"/Title": "Microsoft Word - 090325 LFS T536 StoneGate CRP249 v1.0.doc",
"pdf_file_size_bytes": 836073,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 22
},
"st_filename": "lfs_t536_st.pdf",
"st_frontpage": {
"anssi": {},
"bsi": {},
"canada": {},
"niap": {},
"nscib": {}
},
"st_keywords": {
"asymmetric_crypto": {
"FF": {
"DH": {
"DH": 1,
"Diffie-Hellman": 13
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ADMINTRUSTED": 3,
"A.ADMIN_ACCESS": 2,
"A.AUDITMAN": 2,
"A.AUDIT_SUPPORT": 2,
"A.MEDIAT_SUPPORT": 2,
"A.MODEXP": 2,
"A.OPERATING_ENVIRONMENT": 2,
"A.SHAREDSECRETKEY": 4,
"A.TIME": 2,
"A.USER_AUTH": 2
},
"O": {
"O.AUDIT": 9,
"O.CRYPTOSERVICES": 16,
"O.E": 41,
"O.HIGHAVAILABILITY": 6,
"O.IDAUTH": 5,
"O.MEDIAT": 9,
"O.NETADDRHIDE": 6,
"O.SECFUN": 10,
"O.VPN": 9
},
"T": {
"T.AUDIT_UNDETECTED": 4,
"T.MEDIAT": 6,
"T.NOAUTH": 2,
"T.NODE_FAILURE": 2,
"T.SECURE_CONNECTION_COMPROMISE": 4,
"T.SELPRO": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_FLR.1": 10,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.2": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.3": 1
}
},
"cc_security_level": {
"EAL": {
"EAL4": 8,
"EAL4 augmented": 4
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 8,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_SEL.1": 6,
"FAU_SEL.1.1": 1,
"FAU_STG": 13,
"FAU_STG.1": 7,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1,
"FAU_STG.4": 1
},
"FCS": {
"FCS_CKM": 18,
"FCS_CKM.1": 7,
"FCS_CKM.2": 3,
"FCS_CKM.4": 15,
"FCS_CKM.4.1": 1,
"FCS_COP": 33,
"FCS_COP.1": 3
},
"FDP": {
"FDP_ACC.1": 1,
"FDP_IFC.1": 12,
"FDP_IFC.1.1": 1,
"FDP_IFF.1": 9,
"FDP_IFF.1.1": 3,
"FDP_IFF.1.2": 5,
"FDP_IFF.1.3": 5,
"FDP_IFF.1.4": 1,
"FDP_IFF.1.5": 5,
"FDP_UCT.1": 7,
"FDP_UCT.1.1": 1,
"FDP_UIT.1": 6,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_UAU.5": 7,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UID.1": 1
},
"FMT": {
"FMT_MSA.1": 8,
"FMT_MSA.1.1": 1,
"FMT_MSA.2": 16,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 7,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD.1": 8,
"FMT_MTD.1.1": 1,
"FMT_SMF.1": 8,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 8,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_FLS.1": 8,
"FPT_FLS.1.1": 1,
"FPT_STM.1": 1
},
"FRU": {
"FRU_FLT.2": 6,
"FRU_FLT.2.1": 1
},
"FTP": {
"FTP_ITC.1": 9,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1
}
},
"certification_process": {
"OutOfScope": {
"of Security Functions: administrators access the firewall engine through the Management Server (out of scope) which provides the interface for managing the security policy and authentication attributes, the": 1,
"out of scope": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 1
}
},
"crypto_protocol": {
"IKE": {
"IKE": 35
},
"IPsec": {
"IPsec": 16
},
"SSH": {
"SSH": 2
},
"TLS": {
"SSL": {
"SSL": 2
},
"TLS": {
"TLS": 1
}
},
"VPN": {
"VPN": 70
}
},
"crypto_scheme": {
"KEX": {
"Key Exchange": 5
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 9
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"malfunction": 3
}
},
"standard_id": {
"FIPS": {
"FIPS 140-2": 21,
"FIPS 180-2": 1,
"FIPS 197": 2,
"FIPS 198": 2,
"FIPS 46-3": 2,
"FIPS PUB 140-2": 4
},
"PKCS": {
"PKCS #1": 1,
"PKCS#1": 2
},
"RFC": {
"RFC 1631": 1,
"RFC 2401": 2,
"RFC 2406": 4,
"RFC 2409": 8,
"RFC 2616": 2,
"RFC 821": 1,
"RFC 959": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 14
}
},
"DES": {
"3DES": {
"3DES": 15
},
"DES": {
"DES": 5
}
},
"constructions": {
"MAC": {
"HMAC": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Bhavin",
"/CreationDate": "D:20090325110253Z00\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20090325110253Z00\u002700\u0027",
"/Producer": "GPL Ghostscript 8.63",
"/Title": "Microsoft Word - T536 ST version 1.0.doc",
"pdf_file_size_bytes": 321611,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 50
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/files/epfiles/crp249.pdf",
"scheme": "UK",
"security_level": {
"_type": "Set",
"elements": [
"EAL4+",
"ALC_FLR.1"
]
},
"st_link": "https://www.commoncriteriaportal.org/files/epfiles/lfs_t536_st.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"report_convert_garbage": false,
"report_convert_ok": true,
"report_download_ok": true,
"report_extract_ok": true,
"report_pdf_hash": "8d6e4aae5e0d47c1c6b0d7976ac67458ef04e6a5a50e4fc52cd27465a9a8ed60",
"report_txt_hash": "d3d7fb8f25f09d93953e3ac27cfecfbd9f9ba6356d49696c0f637ba0c20598c3",
"st_convert_garbage": false,
"st_convert_ok": true,
"st_download_ok": true,
"st_extract_ok": true,
"st_pdf_hash": "9408740c0a82072bbf58c2bfb157a21c7aa337e1ea3be45f6ddcc3ec303f7f8f",
"st_txt_hash": "4c19b50970489756c31b717479e514754a76751b514794a3a97aa2b69a5fc522"
},
"status": "archived"
}