Citrix Presentation Server 4.5

CSV information ?

Status archived
Valid from 01.07.2007
Valid until 05.03.2013
Scheme 🇬🇧 UK
Manufacturer Citrix Systems, Inc.
Category Access Control Devices and Systems
Security level EAL2+, ALC_FLR.2

Heuristics summary ?

Certificate ID: CRP241

Certification report ?

Extracted keywords

Protocols
SSL, TLS, IPsec

Vendor
Broadcom, Microsoft

Security level
EAL2, EAL2 augmented
Security Assurance Requirements (SAR)
ALC_FLR.2
Security Functional Requirements (SFR)
FTP_ITC.2, FTP_ITC.1
Certificates
CRP241

Standards
FIPS 140-1, FIPS 140-2, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003, CCMB-2005-08-004

File metadata

Title: untitled
Creation date: D:20070802100755+01'00'
Modification date: D:20070802100755+01'00'
Pages: 22
Producer: Acrobat Distiller 6.0 (Windows)

References

Incoming
  • CRP257 - Citrix XenApp 6.0 for Windows Server 2008 R2 - Platinum Edition

Security target ?

Extracted keywords

Symmetric Algorithms
3DES, TripleDES
Schemes
Key Exchange
Protocols
SSL, TLS

Vendor
Microsoft

Security level
EAL2, EAL2+, EAL2 augmented
Claims
T.AUTHENTIC, T.MOD_CONF, T.MISDIRECT, T.AVAIL, T.MOD_HW_SERVER, T.MOD_HW_CLIENT, A.TRUSTADMIN, A.USER_, A.THIRD_PARTY_, A.PUBLISHED_, A.APP_, A.APP_CONFIG, A.SMARTCARD, OT.AUTHENTIC_, OT.CONF_CLIENT, OT.INTEG_CLIENT, OT.CONF, OT.INTEG, OT.CUT_PASTE, OT.DRIVES, OT.GATE_ALLOW, OT.SECURE_ENCRYP, OT.APPS_AVAIL, OT.AUTHENTIC_SERVER, OT.AUTHENTIC_CLIENT, OT.SECURE_ENCRYPTION, OT.CONF_, OT.INTEG_, OT.GATE_ALLO, OT.CUTPASTE, OT.SECURE_ENC, OT.APPS_, OE.OS_CONFIG_, OE.SERVER_THIRD_, OE.MALWARE_PROT, OE.SECURE_, OE.LIMIT_AUTH, OE.PASSWORD_, OE.IPSEC, OE.MEMORY, OE.TRUSTED_, OE.SERVER_, OE.CLIENT_, OE.CLIENT_TPSW, OE.CERTIFICATES, OE.OS_CONFIG_SERVER, OE.OS_CONFIG_CLIENT, OE.MALWARE_PROTECT, OE.SECURE_ENCRYPTION, OE.SESSION_KEYS, OE.PASSWORD_SETUP, OE.TRUSTED_OPS, OE.SERVER_PHYSICAL, OE.CLIENT_PHYSICAL, OE.SERVER_THIRD_PARTY_SW, OE.OS_CONFIG, OE.SERVER_TH, OE.MALWARE_, OE.SECURE_EN, OE.SESSION_K, OE.LIMIT_AUT, OE.PASSWORD, OSP.CRYPTO
Security Assurance Requirements (SAR)
ACM_CAP.2, ADO_DEL.1, ADO_IGS.1, ADV_FSP.1, ADV_HLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_FLR.2, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_SOF.1, AVA_VLA.1
Security Functional Requirements (SFR)
FCS_COP.1, FCS_COP.1.1, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM.2, FCS_CKM.2.1, FCS_CKM.4, FCS_CKM.4.1, FCS_ITC.2, FDP_ITT.1, FDP_ITT.1.1, FDP_ACC.1, FDP_ACF.1, FDP_RIP.1, FDP_RIP.1.1, FDP_ITC.1, FDP_ITC.2, FDP_IFC.1, FIA_ATD.1, FIA_ATD.1.1, FIA_UAU, FIA_UAU.2.1, FIA_UID.2, FIA_UID.2.1, FIA_UAU.2, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UID.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_MSA.1, FMT_MSA.1.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MOF.1, FMT_MOF.1.1, FMT_MSA.2, FMT_MSA.2.1, FPT_ITT.1, FPT_ITT.1.1, FPT_RVM.1, FPT_RVM.1.1, FPT_AMT.1, FPT_AMT.1.1, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_SEP.1, FPT_SEP.1.1, FPT_SEP.1.2, FTP_ITC.2, FTP_ITC.1, FTP_ITC, FTP_ITC.2.1, FTP_ITC.2.2, FTP_ITC.2.3
Certification process
out of scope, The TOE comprises the sample deployment as described below. All other configurations are out of scope of the evaluation. The deployment uses the Secure Gateway to provide TLS encryption between a TLS-, the TOE. Note: The Windows operating system provides the function that authenticates users. This is out of scope of the TOE, so there are no mechanisms requiring assessment. Page 36 of 58 Version 2.0 Ref

Certification process
out of scope, The TOE comprises the sample deployment as described below. All other configurations are out of scope of the evaluation. The deployment uses the Secure Gateway to provide TLS encryption between a TLS-, the TOE. Note: The Windows operating system provides the function that authenticates users. This is out of scope of the TOE, so there are no mechanisms requiring assessment. Page 36 of 58 Version 2.0 Ref

Standards
FIPS 140, FIPS 140-1, FIPS 140-2, FIPS140, FIPS140-1, FIPS 186-2, RFC 2246, RFC 2412, RFC 2451

File metadata

Title: Microsoft Word - 056 Citrix ST V2.0 - 24-07-07.doc
Author: Administrator
Creation date: D:20070725145948Z
Modification date: D:20070802101448+01'00'
Pages: 58
Creator: PScript5.dll Version 5.2
Producer: GPL Ghostscript 8.15

References

Incoming

Heuristics ?

Certificate ID: CRP241

Extracted SARs

AVA_VLA.1, AGD_ADM.1, ADV_HLD.1, ADV_FSP.1, ATE_COV.1, ADV_SPM.1, ATE_FUN.1, AGD_USR.1, ALC_FLR.2, ATE_IND.2, ADV_RCR.1, AVA_SOF.1

References ?

Updates ?

  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Citrix Presentation Server 4.5 was processed.

  • 01.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the [[0, 'cpe:2.3:a:citrix:presentation_server_for_windows:4.5.8:*:*:*:*:*:*:*'], [1, 'cpe:2.3:a:citrix:presentation_server_document_center:4.5.1:*:*:*:*:*:*:*'], [2, 'cpe:2.3:a:citrix:management_console_for_citrix_presentation_server:4.5.1:*:*:*:*:*:*:*'], [3, 'cpe:2.3:a:citrix:presentation_server_for_windows:4.5.6:*:*:*:*:*:*:*'], [4, 'cpe:2.3:a:citrix:presentation_server_for_windows:4.5.7:*:*:*:*:*:*:*'], [8, 'cpe:2.3:a:citrix:presentation_server_for_windows:4.5.2:*:*:*:*:*:*:*'], [9, 'cpe:2.3:a:citrix:management_console_for_citrix_presentation_server:4.5.2:*:*:*:*:*:*:*'], [12, 'cpe:2.3:a:citrix:metaframe_presentation_server:4.5:*:*:*:*:*:*:*']] values inserted.
  • 02.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the [[5, 'cpe:2.3:a:citrix:presentation_server_document_center:4.5.0:*:*:*:*:*:*:*'], [9, 'cpe:2.3:a:citrix:presentation_server_for_windows:4.5.8:*:*:*:*:*:*:*'], [10, 'cpe:2.3:a:citrix:presentation_server_presentation_server_reports:4.5.0.0:*:*:*:*:*:*:*'], [11, 'cpe:2.3:a:citrix:presentation_server_administration_snap-in:4.5.0.0:*:*:*:*:*:*:*'], [12, 'cpe:2.3:a:citrix:presentation_server_for_windows:4.5.6:*:*:*:*:*:*:*']] values inserted.
  • 03.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the [[0, 'cpe:2.3:a:citrix:presentation_server:4.5:*:*:*:*:*:*:*'], [1, 'cpe:2.3:a:citrix:edgesight_for_presentation_server:4.5:*:*:*:*:*:*:*'], [2, 'cpe:2.3:a:citrix:metaframe_presentation_server:4.5:*:*:*:*:*:*:*'], [6, 'cpe:2.3:a:citrix:presentation_server_for_windows:4.5.6:*:*:*:*:*:*:*'], [7, 'cpe:2.3:a:citrix:presentation_server_document_center:4.5.1:*:*:*:*:*:*:*'], [8, 'cpe:2.3:a:citrix:management_console_for_citrix_presentation_server:4.5.1:*:*:*:*:*:*:*'], [12, 'cpe:2.3:a:citrix:presentation_server_for_windows:4.5.8:*:*:*:*:*:*:*']] values inserted.
  • 11.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the [[2, 'cpe:2.3:a:citrix:presentation_server_document_center:4.5.1:*:*:*:*:*:*:*'], [3, 'cpe:2.3:a:citrix:management_console_for_citrix_presentation_server:4.5.2:*:*:*:*:*:*:*'], [4, 'cpe:2.3:a:citrix:presentation_server_for_windows:4.5.2:*:*:*:*:*:*:*'], [5, 'cpe:2.3:a:citrix:presentation_server_for_windows:4.5.8:*:*:*:*:*:*:*'], [8, 'cpe:2.3:a:citrix:presentation_server_presentation_server_reports:4.5.0.0:*:*:*:*:*:*:*'], [9, 'cpe:2.3:a:citrix:metaframe_presentation_server:4.5:*:*:*:*:*:*:*'], [10, 'cpe:2.3:a:citrix:edgesight_for_presentation_server:4.5:*:*:*:*:*:*:*'], [11, 'cpe:2.3:a:citrix:presentation_server:4.5:*:*:*:*:*:*:*'], [12, 'cpe:2.3:a:citrix:presentation_server_for_windows:4.5.7:*:*:*:*:*:*:*']] values inserted.
  • 12.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the [[1, 'cpe:2.3:a:citrix:presentation_server_for_windows:4.5.2:*:*:*:*:*:*:*'], [2, 'cpe:2.3:a:citrix:management_console_for_citrix_presentation_server:4.5.2:*:*:*:*:*:*:*'], [4, 'cpe:2.3:a:citrix:metaframe_presentation_server:4.5:*:*:*:*:*:*:*'], [6, 'cpe:2.3:a:citrix:presentation_server_for_windows:4.5.8:*:*:*:*:*:*:*'], [7, 'cpe:2.3:a:citrix:presentation_server_for_windows:4.5.6:*:*:*:*:*:*:*'], [8, 'cpe:2.3:a:citrix:presentation_server_document_center:4.5.1:*:*:*:*:*:*:*'], [9, 'cpe:2.3:a:citrix:management_console_for_citrix_presentation_server:4.5.1:*:*:*:*:*:*:*'], [11, 'cpe:2.3:a:citrix:presentation_server_presentation_server_reports:4.5.0.0:*:*:*:*:*:*:*'], [12, 'cpe:2.3:a:citrix:presentation_server_administration_snap-in:4.5.0.0:*:*:*:*:*:*:*']] values inserted.
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['4.5']}.
    • The cpe_matches property was set to {'_type': 'Set', 'elements': ['cpe:2.3:a:citrix:presentation_server_document_center:4.5.1:*:*:*:*:*:*:*', 'cpe:2.3:a:citrix:edgesight_for_presentation_server:4.5:*:*:*:*:*:*:*', 'cpe:2.3:a:citrix:management_console_for_citrix_presentation_server:4.5.1:*:*:*:*:*:*:*', 'cpe:2.3:a:citrix:presentation_server_for_windows:4.5.8:*:*:*:*:*:*:*', 'cpe:2.3:a:citrix:presentation_server_for_windows:4.5.2:*:*:*:*:*:*:*', 'cpe:2.3:a:citrix:presentation_server_administration_snap-in:4.5.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:citrix:presentation_server_document_center:4.5.0:*:*:*:*:*:*:*', 'cpe:2.3:a:citrix:presentation_server:4.5:*:*:*:*:*:*:*', 'cpe:2.3:a:citrix:management_console_for_citrix_presentation_server:4.5.2:*:*:*:*:*:*:*', 'cpe:2.3:a:citrix:metaframe_presentation_server:4.5:*:*:*:*:*:*:*', 'cpe:2.3:a:citrix:presentation_server_presentation_server_reports:4.5.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:citrix:presentation_server_for_windows:4.5.7:*:*:*:*:*:*:*', 'cpe:2.3:a:citrix:presentation_server_for_windows:4.5.6:*:*:*:*:*:*:*']}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 28.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was set to None.
  • 29.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was set to {'_type': 'Set', 'elements': ['CVE-2008-2299', 'CVE-2002-2426', 'CVE-2008-0356', 'CVE-2008-5107', 'CVE-2007-6267']}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VLA', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_HLD', 'level': 1}, {'_type': 'SAR', 'family': 'ACM_CAP', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'SAR', 'family': 'ADO_IGS', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ADO_DEL', 'level': 1}]}}.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '16691899b854c527c2a69352258c1c59312352a34a4680ae079f9a9182d1878e', 'st_pdf_hash': 'ef3b0ca0ed6a677cb57772ab58fd7e001cb0dc657f32e7cbd220f6422f9ca17d', 'report_txt_hash': '894e446ffe8dd09587de55e3603ae8890c178b15d13da2b7f54cc3296972876c', 'st_txt_hash': '209b60cf5802a2324a0307a7e137d70da6e56f080dc34d2e3e52014a89775bc6'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_vendor': {'Broadcom': 1}} data.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'3DES': 3, 'DES': 4}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'Key Exchange': 3, 'TLS': 28, 'SSL': 3}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {}} values inserted.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'UK': {'CRP241': 44}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 4, 'EAL2 augmented': 3}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 3}}, 'cc_sfr': {'FTP': {'FTP_ITC.2': 1, 'FTP_ITC.1': 1}}, 'cc_claims': {}, 'vendor': {'Broadcom': {'Broadcom': 1}, 'Microsoft': {'Microsoft': 29}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 1}, 'TLS': {'TLS': 7}}, 'IPsec': {'IPsec': 3}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-1': 1, 'FIPS 140-2': 1}, 'CC': {'CCMB-2005-08-001': 1, 'CCMB-2005-08-002': 1, 'CCMB-2005-08-003': 1, 'CCMB-2005-08-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 8, 'EAL2+': 1, 'EAL2 augmented': 2}}, 'cc_sar': {'ACM': {'ACM_CAP.2': 2}, 'ADO': {'ADO_DEL.1': 2, 'ADO_IGS.1': 2}, 'ADV': {'ADV_FSP.1': 2, 'ADV_HLD.1': 2, 'ADV_RCR.1': 2, 'ADV_SPM.1': 2}, 'AGD': {'AGD_ADM.1': 2, 'AGD_USR.1': 2}, 'ALC': {'ALC_FLR.2': 7}, 'ATE': {'ATE_COV.1': 2, 'ATE_FUN.1': 2, 'ATE_IND.2': 2, 'ATE_ALLO': 1}, 'AVA': {'AVA_SOF.1': 2, 'AVA_VLA.1': 3}}, 'cc_sfr': {'FCS': {'FCS_COP.1': 21, 'FCS_COP.1.1': 3, 'FCS_CKM.1': 12, 'FCS_CKM.1.1': 1, 'FCS_CKM.2': 13, 'FCS_CKM.2.1': 2, 'FCS_CKM.4': 25, 'FCS_CKM.4.1': 3, 'FCS_ITC.1': 2, 'FCS_ITC.2': 1}, 'FDP': {'FDP_ITT.1': 14, 'FDP_ITT.1.1': 2, 'FDP_ACC.1': 22, 'FDP_ACF.1': 18, 'FDP_RIP.1': 5, 'FDP_RIP.1.1': 1, 'FDP_ITC.1': 2, 'FDP_ITC.2': 2, 'FDP_IFC.1': 3}, 'FIA': {'FIA_ATD.1': 10, 'FIA_ATD.1.1': 1, 'FIA_UAU.2.1': 2, 'FIA_UID.2': 14, 'FIA_UID.2.1': 2, 'FIA_UAU.2': 12, 'FIA_AFL.1': 4, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UID.1': 3, 'FIA_UAU.1': 1}, 'FMT': {'FMT_SMR.1': 19, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1': 19, 'FMT_SMF.1.1': 1, 'FMT_MSA.1': 12, 'FMT_MSA.1.1': 1, 'FMT_MSA.3': 11, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MOF.1': 14, 'FMT_MOF.1.1': 2, 'FMT_MSA.2': 12, 'FMT_MSA.2.1': 1}, 'FPT': {'FPT_ITT.1': 17, 'FPT_ITT.1.1': 2, 'FPT_RVM.1': 12, 'FPT_RVM.1.1': 1, 'FPT_AMT.1': 7, 'FPT_AMT.1.1': 1, 'FPT_TST.1': 5, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_SEP.1': 4, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1}, 'FTP': {'FTP_ITC.2': 9, 'FTP_ITC.2.1': 1, 'FTP_ITC.2.2': 1, 'FTP_ITC.2.3': 1}}, 'cc_claims': {'T': {'T.AUTHENTIC': 4, 'T.MOD_CONF': 4, 'T.MISDIRECT': 4, 'T.AVAIL': 4, 'T.MOD_HW_SERVER': 1, 'T.MOD_HW_CLIENT': 1, 'T.AUTHENTIC_': 4, 'T.CONF_CLIENT': 2, 'T.INTEG_CLIENT': 2, 'T.CONF': 3, 'T.INTEG': 3, 'T.CUT_PASTE': 2, 'T.DRIVES': 3, 'T.GATE_ALLOW': 2, 'T.SECURE_ENCRYP': 1, 'T.APPS_AVAIL': 2, 'T.AUTHENTIC_SERVER': 1, 'T.AUTHENTIC_CLIENT': 1, 'T.SECURE_ENCRYPTION': 2, 'T.CONF_': 1, 'T.INTEG_': 1, 'T.GATE_ALLO': 1, 'T.CUTPASTE': 1, 'T.SECURE_ENC': 1, 'T.APPS_': 1}, 'A': {'A.TRUSTADMIN': 1, 'A.USER_': 1, 'A.THIRD_PARTY_': 1, 'A.PUBLISHED_': 1, 'A.APP_': 1, 'A.APP_CONFIG': 1, 'A.SMARTCARD': 1}, 'OT': {'OT.AUTHENTIC_': 4, 'OT.CONF_CLIENT': 2, 'OT.INTEG_CLIENT': 2, 'OT.CONF': 3, 'OT.INTEG': 3, 'OT.CUT_PASTE': 2, 'OT.DRIVES': 3, 'OT.GATE_ALLOW': 2, 'OT.SECURE_ENCRYP': 1, 'OT.APPS_AVAIL': 2, 'OT.AUTHENTIC_SERVER': 1, 'OT.AUTHENTIC_CLIENT': 1, 'OT.SECURE_ENCRYPTION': 2, 'OT.CONF_': 1, 'OT.INTEG_': 1, 'OT.GATE_ALLO': 1, 'OT.CUTPASTE': 1, 'OT.SECURE_ENC': 1, 'OT.APPS_': 1}, 'OE': {'OE.OS_CONFIG_': 2, 'OE.SERVER_THIRD_': 1, 'OE.MALWARE_PROT': 1, 'OE.SECURE_': 1, 'OE.LIMIT_AUTH': 2, 'OE.PASSWORD_': 1, 'OE.IPSEC': 8, 'OE.MEMORY': 4, 'OE.TRUSTED_': 1, 'OE.SERVER_': 1, 'OE.CLIENT_': 1, 'OE.CLIENT_TPSW': 3, 'OE.CERTIFICATES': 3, 'OE.OS_CONFIG_SERVER': 2, 'OE.OS_CONFIG_CLIENT': 2, 'OE.MALWARE_PROTECT': 2, 'OE.SECURE_ENCRYPTION': 2, 'OE.SESSION_KEYS': 2, 'OE.PASSWORD_SETUP': 1, 'OE.TRUSTED_OPS': 2, 'OE.SERVER_PHYSICAL': 2, 'OE.CLIENT_PHYSICAL': 1, 'OE.SERVER_THIRD_PARTY_SW': 1, 'OE.OS_CONFIG': 2, 'OE.SERVER_TH': 1, 'OE.MALWARE_': 1, 'OE.SECURE_EN': 1, 'OE.SESSION_K': 1, 'OE.LIMIT_AUT': 1, 'OE.PASSWORD': 1}, 'OSP': {'OSP.CRYPTO': 4}}, 'vendor': {'Microsoft': {'Microsoft': 22}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 7}, '3DES': {'3DES': 3, 'TripleDES': 4}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'KEX': {'Key Exchange': 3}}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 3}, 'TLS': {'TLS': 28}}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 7}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140': 3, 'FIPS 140-1': 1, 'FIPS 140-2': 3, 'FIPS140': 13, 'FIPS140-1': 2, 'FIPS 186-2': 1}, 'RFC': {'RFC 2246': 3, 'RFC 2412': 1, 'RFC 2451': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 2, '. The TOE comprises the sample deployment as described below. All other configurations are out of scope of the evaluation': 1, '. Note: The Windows operating system provides the function that authenticates users. This is out of scope of the TOE, so there are no mechanisms requiring assessment': 1, 'omponents. The TOE comprises the sample deployment as described below. All other configurations are out of scope of the evaluation. The deployment uses the Secure Gateway to provide TLS encryption between a TLS-': 1, 'the TOE. Note: The Windows operating system provides the function that authenticates users. This is out of scope of the TOE, so there are no mechanisms requiring assessment. Page 36 of 58 Version 2.0 Ref': 1}}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ACM_CAP', 'level': 2}, {'_type': 'SAR', 'family': 'ADO_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ADO_IGS', 'level': 1}]} values discarded.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}]}.
  • 27.07.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2008-2299']} values discarded.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'CRP241.pdf', 'st_filename': 'LFS-T528_citrix_ST v2.0.pdf'}.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'UK': {'__update__': {'CRP241': 1}}}}, 'crypto_protocol': {'__update__': {'TLS': {'__update__': {'TLS': {'__update__': {'TLS': 8}}}}}}} data.
    • The st_keywords property was updated, with the {'cc_sar': {'__update__': {'ATE': {'__delete__': ['ATE_ALLO']}}}, 'cc_sfr': {'__update__': {'FCS': {'__update__': {'FCS_CKM.2': 10}, '__delete__': ['FCS_ITC.1']}, 'FDP': {'__update__': {'FDP_ITT.1': 17, 'FDP_ACC.1': 23, 'FDP_ACF.1': 16, 'FDP_RIP.1': 6}}, 'FIA': {'__insert__': {'FIA_UAU': 1}, '__update__': {'FIA_ATD.1': 12, 'FIA_UID.2': 10, 'FIA_UAU.2': 11, 'FIA_AFL.1': 5, 'FIA_UID.1': 1}, '__delete__': ['FIA_UAU.1']}, 'FMT': {'__update__': {'FMT_SMR.1': 21, 'FMT_SMF.1': 17, 'FMT_MSA.1': 11, 'FMT_MSA.3': 9}}, 'FPT': {'__update__': {'FPT_ITT.1': 15, 'FPT_AMT.1': 6, 'FPT_TST.1': 6, 'FPT_SEP.1': 2}}, 'FTP': {'__insert__': {'FTP_ITC.1': 1, 'FTP_ITC': 1}}}}, 'cc_claims': {'__update__': {'T': {'__update__': {'T.MISDIRECT': 2}, '__delete__': ['T.AUTHENTIC_', 'T.CONF_CLIENT', 'T.INTEG_CLIENT', 'T.CONF', 'T.INTEG', 'T.CUT_PASTE', 'T.DRIVES', 'T.GATE_ALLOW', 'T.SECURE_ENCRYP', 'T.APPS_AVAIL', 'T.AUTHENTIC_SERVER', 'T.AUTHENTIC_CLIENT', 'T.SECURE_ENCRYPTION', 'T.CONF_', 'T.INTEG_', 'T.GATE_ALLO', 'T.CUTPASTE', 'T.SECURE_ENC', 'T.APPS_']}}}, 'symmetric_crypto': {'__update__': {'DES': {'__delete__': ['DES']}}}, 'crypto_protocol': {'__update__': {'TLS': {'__update__': {'TLS': {'__update__': {'TLS': 29}}}}}}, 'cipher_mode': {}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {'The TOE comprises the sample deployment as described below. All other configurations are out of scope of the evaluation. The deployment uses the Secure Gateway to provide TLS encryption between a TLS-': 1}, '__delete__': ['. The TOE comprises the sample deployment as described below. All other configurations are out of scope of the evaluation', '. Note: The Windows operating system provides the function that authenticates users. This is out of scope of the TOE, so there are no mechanisms requiring assessment', 'omponents. The TOE comprises the sample deployment as described below. All other configurations are out of scope of the evaluation. The deployment uses the Secure Gateway to provide TLS encryption between a TLS-']}}}} data.

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['CRP257']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['CRP282', 'CRP257', 'CRP281']}} data.
    • The direct_dependency_cves property was set to {'_type': 'Set', 'elements': ['CVE-2016-6493']}.
    • The indirect_dependency_cves property was set to {'_type': 'Set', 'elements': ['CVE-2014-4700', 'CVE-2016-4810', 'CVE-2016-6493']}.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 10.10.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was set to None.
    • The related_cves property was set to None.
    • The direct_dependency_cves property was set to None.

Raw data

{
  "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert",
  "category": "Access Control Devices and Systems",
  "cert_link": null,
  "dgst": "f3d1f7d2a741549a",
  "heuristics": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics",
    "cert_id": "CRP241",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_dependency_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "4.5"
      ]
    },
    "indirect_dependency_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2016-6493",
        "CVE-2016-4810",
        "CVE-2014-4700"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "CRP257"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "CRP282",
          "CRP257",
          "CRP281"
        ]
      },
      "indirectly_referencing": null
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Citrix Systems, Inc.",
  "manufacturer_web": "https://www.citrix.com",
  "name": "Citrix Presentation Server 4.5",
  "not_valid_after": "2013-03-05",
  "not_valid_before": "2007-07-01",
  "pdf_data": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData",
    "report_filename": "CRP241.pdf",
    "report_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "UK": {
          "CRP241": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.2": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 4,
          "EAL2 augmented": 3
        }
      },
      "cc_sfr": {
        "FTP": {
          "FTP_ITC.1": 1,
          "FTP_ITC.2": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IPsec": {
          "IPsec": 3
        },
        "TLS": {
          "SSL": {
            "SSL": 1
          },
          "TLS": {
            "TLS": 8
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2005-08-001": 1,
          "CCMB-2005-08-002": 1,
          "CCMB-2005-08-003": 1,
          "CCMB-2005-08-004": 1
        },
        "FIPS": {
          "FIPS 140-1": 1,
          "FIPS 140-2": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Broadcom": {
          "Broadcom": 1
        },
        "Microsoft": {
          "Microsoft": 29
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20070802100755+01\u002700\u0027",
      "/ModDate": "D:20070802100755+01\u002700\u0027",
      "/Producer": "Acrobat Distiller 6.0 (Windows)",
      "/Title": "untitled",
      "pdf_file_size_bytes": 411222,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 22
    },
    "st_filename": "LFS-T528_citrix_ST v2.0.pdf",
    "st_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.APP_": 1,
          "A.APP_CONFIG": 1,
          "A.PUBLISHED_": 1,
          "A.SMARTCARD": 1,
          "A.THIRD_PARTY_": 1,
          "A.TRUSTADMIN": 1,
          "A.USER_": 1
        },
        "OE": {
          "OE.CERTIFICATES": 3,
          "OE.CLIENT_": 1,
          "OE.CLIENT_PHYSICAL": 1,
          "OE.CLIENT_TPSW": 3,
          "OE.IPSEC": 8,
          "OE.LIMIT_AUT": 1,
          "OE.LIMIT_AUTH": 2,
          "OE.MALWARE_": 1,
          "OE.MALWARE_PROT": 1,
          "OE.MALWARE_PROTECT": 2,
          "OE.MEMORY": 4,
          "OE.OS_CONFIG": 2,
          "OE.OS_CONFIG_": 2,
          "OE.OS_CONFIG_CLIENT": 2,
          "OE.OS_CONFIG_SERVER": 2,
          "OE.PASSWORD": 1,
          "OE.PASSWORD_": 1,
          "OE.PASSWORD_SETUP": 1,
          "OE.SECURE_": 1,
          "OE.SECURE_EN": 1,
          "OE.SECURE_ENCRYPTION": 2,
          "OE.SERVER_": 1,
          "OE.SERVER_PHYSICAL": 2,
          "OE.SERVER_TH": 1,
          "OE.SERVER_THIRD_": 1,
          "OE.SERVER_THIRD_PARTY_SW": 1,
          "OE.SESSION_K": 1,
          "OE.SESSION_KEYS": 2,
          "OE.TRUSTED_": 1,
          "OE.TRUSTED_OPS": 2
        },
        "OSP": {
          "OSP.CRYPTO": 4
        },
        "OT": {
          "OT.APPS_": 1,
          "OT.APPS_AVAIL": 2,
          "OT.AUTHENTIC_": 4,
          "OT.AUTHENTIC_CLIENT": 1,
          "OT.AUTHENTIC_SERVER": 1,
          "OT.CONF": 3,
          "OT.CONF_": 1,
          "OT.CONF_CLIENT": 2,
          "OT.CUTPASTE": 1,
          "OT.CUT_PASTE": 2,
          "OT.DRIVES": 3,
          "OT.GATE_ALLO": 1,
          "OT.GATE_ALLOW": 2,
          "OT.INTEG": 3,
          "OT.INTEG_": 1,
          "OT.INTEG_CLIENT": 2,
          "OT.SECURE_ENC": 1,
          "OT.SECURE_ENCRYP": 1,
          "OT.SECURE_ENCRYPTION": 2
        },
        "T": {
          "T.AUTHENTIC": 4,
          "T.AVAIL": 4,
          "T.MISDIRECT": 2,
          "T.MOD_CONF": 4,
          "T.MOD_HW_CLIENT": 1,
          "T.MOD_HW_SERVER": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_CAP.2": 2
        },
        "ADO": {
          "ADO_DEL.1": 2,
          "ADO_IGS.1": 2
        },
        "ADV": {
          "ADV_FSP.1": 2,
          "ADV_HLD.1": 2,
          "ADV_RCR.1": 2,
          "ADV_SPM.1": 2
        },
        "AGD": {
          "AGD_ADM.1": 2,
          "AGD_USR.1": 2
        },
        "ALC": {
          "ALC_FLR.2": 7
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_FUN.1": 2,
          "ATE_IND.2": 2
        },
        "AVA": {
          "AVA_SOF.1": 2,
          "AVA_VLA.1": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 8,
          "EAL2 augmented": 2,
          "EAL2+": 1
        }
      },
      "cc_sfr": {
        "FCS": {
          "FCS_CKM.1": 12,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 10,
          "FCS_CKM.2.1": 2,
          "FCS_CKM.4": 25,
          "FCS_CKM.4.1": 3,
          "FCS_COP.1": 21,
          "FCS_COP.1.1": 3,
          "FCS_ITC.2": 1
        },
        "FDP": {
          "FDP_ACC.1": 23,
          "FDP_ACF.1": 16,
          "FDP_IFC.1": 3,
          "FDP_ITC.1": 2,
          "FDP_ITC.2": 2,
          "FDP_ITT.1": 17,
          "FDP_ITT.1.1": 2,
          "FDP_RIP.1": 6,
          "FDP_RIP.1.1": 1
        },
        "FIA": {
          "FIA_AFL.1": 5,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD.1": 12,
          "FIA_ATD.1.1": 1,
          "FIA_UAU": 1,
          "FIA_UAU.2": 11,
          "FIA_UAU.2.1": 2,
          "FIA_UID.1": 1,
          "FIA_UID.2": 10,
          "FIA_UID.2.1": 2
        },
        "FMT": {
          "FMT_MOF.1": 14,
          "FMT_MOF.1.1": 2,
          "FMT_MSA.1": 11,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.2": 12,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 9,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_SMF.1": 17,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 21,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_AMT.1": 6,
          "FPT_AMT.1.1": 1,
          "FPT_ITT.1": 15,
          "FPT_ITT.1.1": 2,
          "FPT_RVM.1": 12,
          "FPT_RVM.1.1": 1,
          "FPT_SEP.1": 2,
          "FPT_SEP.1.1": 1,
          "FPT_SEP.1.2": 1,
          "FPT_TST.1": 6,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ITC": 1,
          "FTP_ITC.1": 1,
          "FTP_ITC.2": 9,
          "FTP_ITC.2.1": 1,
          "FTP_ITC.2.2": 1,
          "FTP_ITC.2.3": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          "The TOE comprises the sample deployment as described below. All other configurations are out of scope of the evaluation. The deployment uses the Secure Gateway to provide TLS encryption between a TLS-": 1,
          "out of scope": 2,
          "the TOE. Note: The Windows operating system provides the function that authenticates users. This is out of scope of the TOE, so there are no mechanisms requiring assessment. Page 36 of 58 Version 2.0 Ref": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 3
          },
          "TLS": {
            "TLS": 29
          }
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 3
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140": 3,
          "FIPS 140-1": 1,
          "FIPS 140-2": 3,
          "FIPS 186-2": 1,
          "FIPS140": 13,
          "FIPS140-1": 2
        },
        "RFC": {
          "RFC 2246": 3,
          "RFC 2412": 1,
          "RFC 2451": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "3DES": {
            "3DES": 3,
            "TripleDES": 4
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 22
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Administrator",
      "/CreationDate": "D:20070725145948Z",
      "/Creator": "PScript5.dll Version 5.2",
      "/ModDate": "D:20070802101448+01\u002700\u0027",
      "/Producer": "GPL Ghostscript 8.15",
      "/Title": "Microsoft Word - 056 Citrix ST V2.0 - 24-07-07.doc",
      "pdf_file_size_bytes": 273312,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 58
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/CRP241.pdf",
  "scheme": "UK",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL2+",
      "ALC_FLR.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/LFS-T528_citrix_ST%20v2.0.pdf",
  "state": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState",
    "errors": [],
    "report_convert_garbage": false,
    "report_convert_ok": true,
    "report_download_ok": true,
    "report_extract_ok": true,
    "report_pdf_hash": "16691899b854c527c2a69352258c1c59312352a34a4680ae079f9a9182d1878e",
    "report_txt_hash": "894e446ffe8dd09587de55e3603ae8890c178b15d13da2b7f54cc3296972876c",
    "st_convert_garbage": false,
    "st_convert_ok": true,
    "st_download_ok": true,
    "st_extract_ok": true,
    "st_pdf_hash": "ef3b0ca0ed6a677cb57772ab58fd7e001cb0dc657f32e7cbd220f6422f9ca17d",
    "st_txt_hash": "209b60cf5802a2324a0307a7e137d70da6e56f080dc34d2e3e52014a89775bc6"
  },
  "status": "archived"
}