Ericsson IPOS Release 15.2 software running on Smart Service Routers SSR 8020 and SSR 8010
CSV information ?
Status | archived |
---|---|
Valid from | 24.04.2018 |
Valid until | 23.04.2023 |
Scheme | 🇮🇳 IN |
Manufacturer | Ericsson India Global Services Pvt Ltd. |
Category | Network and Network-Related Devices and Systems |
Security level | EAL3 |
Heuristics summary ?
Certificate ?
Extracted keywords
Security level
EAL 3Evaluation facilities
Common Criteria Test Laboratory, ERTLFile metadata
Creation date | D:20181120161757+05'30' |
---|---|
Modification date | D:20181122170210+05'30' |
Pages | 2 |
Creator | Hewlett-Packard MFP |
Certification report ?
Extracted keywords
Protocols
SSHSecurity level
EAL3Claims
A.LOCATE, A.NOEVIL, A.EAUTH, A.TIMEEvaluation facilities
Common Criteria Test Laboratory, ERTLFile metadata
Title | LOGO |
---|---|
Author | Mitali Chatterjee |
Creation date | D:20181106103659+05'30' |
Modification date | D:20181106103659+05'30' |
Pages | 12 |
Creator | Microsoft® Word 2016 |
Producer | Microsoft® Word 2016 |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, 3DESAsymmetric Algorithms
DH, Diffie-Hellman, DSAHash functions
SHA-1Protocols
SSHBlock cipher modes
ECB, CBCSecurity level
EAL 3, EAL3Claims
O.FLOW, O.ACCESS, O.ROLBAK, O.AUDIT, O.ENCRYPT, O.ROLBACK, T.ROUTE, T.PRIVIL, T.INTERCEPT, T.CONFLOSS, T.NOAUDIT, T.PROTECT, A.LOCATE, A.NOEVIL, A.EAUTH, A.TIME, OE.PHYSICAL, OE.ADMIN, OE.TIME, OE.EAUTHSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, ADV_ARC, ADV_FSP, ADV_TDS, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_LCD, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.2, AVA_VAN, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSSecurity Functional Requirements (SFR)
FAU_GEN, FAU_ARP.1, FAU_SAR.1, FAU_GEN.1, FAU_GEN.2, FAU_SAA.1, FAU_STG.1, FAU_ARP.1.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAA.1.1, FAU_SAA.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG.1.1, FAU_STG.1.2, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP.1.1, FCS_CKM, FDP_IFC.1, FDP_IFF.1, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FIA_ATD.1, FIA_AFL.1, FIA_SOS.1, FIA_UAU.2, FIA_UAU.5, FIA_UID.2, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.2.1, FIA_UID.2.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.1, FIA_UID.1, FMT_MSA.3, FMT_MTD, FMT_SMF.1, FMT_SMR.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1.1, FMT_MSA.1, FPT_TST_EXT, FPT_TST, FPT_TST_EXT.1, FPT_TST_EXT.1.1, FPT_STM.1, FPT_RCV.2, FPT_FLS.1, FPT_STM.1.1, FPT_RCV.2.1, FPT_RCV.2.2, FPT_FLS.1.1, FTA_TSE.1, FTA_MCS.1, FTA_SSL.3, FTA_MCS.1.1, FTA_MCS.1.2, FTA_SSL.3.1Side-channel analysis
malfunctionStandards
FIPS PUB 197, FIPS 46-3, FIPS PUB 186-3, RFC 4253File metadata
Title | Security Target for Ericsson Smart Service Router SSR 8020, SSR 8010 running IPOS Software |
---|---|
Subject | Security Target for Ericsson Smart Service Router SSR 8020, SSR 8010 running IPOS Software |
Keywords | Security Target |
Author | ERAVDIV Ravi Ashvin Divecha |
Creation date | D:20181030135718+05'30' |
Modification date | D:20181030135718+05'30' |
Pages | 57 |
Creator | Microsoft® Word 2016 |
Producer | Microsoft® Word 2016 |
Heuristics ?
No heuristics are available for this certificate.
Extracted SARs
ALC_LCD.1, ASE_SPD.1, ASE_REQ.2, ALC_CMC.3, ASE_INT.1, ADV_FSP.3, ASE_CCL.1, AGD_OPE.1, ALC_DVS.1, ALC_DEL.1, ASE_TSS.1, ATE_DPT.1, ATE_FUN.1, ATE_COV.2, ADV_ARC.1, ADV_TDS.2, AVA_VAN.2, AGD_PRE.1, ATE_IND.2, ASE_OBJ.2, ALC_CMS.3, ASE_ECD.1References ?
No references are available for this certificate as its ID was not successfully extracted.
Updates ?
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '53ce17b56263d2d00a258e0141e6d80ca5305fc93405da2caaaa07a4078454c8', 'txt_hash': '332cdcb752151c35729563df93b962fcf3c92f1d067722c09540759196d154ca'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '4958f0fd948b4048da1c2245e492cc1fd1d96a5c9ed71627bc5f04d58281adda', 'txt_hash': '952590337dde1c2d4c865d6faa6e898b98ebfa62f44973c776929aaef19b8e8b'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'eed222f5574f9d30dc7c7d945ff2fcd10311c9c4402395e82eddd43204ba33b6', 'txt_hash': '08a413ad90ddb8c730bfe177ce8e36839583a5986924bbd52008fa22c4c9e4f5'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 698299, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 12, '/Title': 'LOGO', '/Author': 'Mitali Chatterjee', '/Creator': 'Microsoft® Word 2016', '/CreationDate': "D:20181106103659+05'30'", '/ModDate': "D:20181106103659+05'30'", '/Producer': 'Microsoft® Word 2016', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.commoncriteria-india.gov.in/']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1304330, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 57, '/Title': 'Security Target for Ericsson Smart Service Router SSR 8020, SSR 8010 running IPOS Software', '/Author': 'ERAVDIV Ravi Ashvin Divecha', '/Subject': 'Security Target for Ericsson Smart Service Router SSR 8020, SSR 8010 running IPOS Software', '/Keywords': 'Security Target', '/Creator': 'Microsoft® Word 2016', '/CreationDate': "D:20181030135718+05'30'", '/ModDate': "D:20181030135718+05'30'", '/Producer': 'Microsoft® Word 2016', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 447043, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/CreationDate': "D:20181120161757+05'30'", '/Creator': 'Hewlett-Packard MFP', '/ModDate': "D:20181122170210+05'30'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 7}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {'A': {'A.LOCATE': 1, 'A.NOEVIL': 1, 'A.EAUTH': 1, 'A.TIME': 1}}, 'vendor': {}, 'eval_facility': {'ERTL': {'Common Criteria Test Laboratory, ERTL': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 3}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 3': 1, 'EAL3': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.3': 1, 'ADV_TDS.2': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 2, 'AGD_PRE': 2, 'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_LCD': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.2': 1, 'AVA_VAN': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1, 'FAU_ARP.1': 6, 'FAU_SAR.1': 5, 'FAU_GEN.1': 6, 'FAU_GEN.2': 6, 'FAU_SAA.1': 6, 'FAU_STG.1': 6, 'FAU_ARP.1.1': 1, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAA.1.1': 1, 'FAU_SAA.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1}, 'FCS': {'FCS_CKM.1': 5, 'FCS_CKM.4': 4, 'FCS_COP.1': 4, 'FCS_CKM.1.1': 2, 'FCS_CKM.4.1': 2, 'FCS_COP.1.1': 3, 'FCS_CKM': 1}, 'FDP': {'FDP_IFC.1': 6, 'FDP_IFF.1': 6, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.1': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1}, 'FIA': {'FIA_ATD.1': 6, 'FIA_AFL.1': 6, 'FIA_SOS.1': 6, 'FIA_UAU.2': 7, 'FIA_UAU.5': 6, 'FIA_UID.2': 8, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UID.2.1': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.1': 1, 'FIA_UID.1': 2}, 'FMT': {'FMT_MSA.3': 10, 'FMT_MTD': 32, 'FMT_SMF.1': 6, 'FMT_SMR.1': 6, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1': 5, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1.1': 1, 'FMT_MSA.1': 3}, 'FPT': {'FPT_TST_EXT': 2, 'FPT_TST': 1, 'FPT_TST_EXT.1': 8, 'FPT_TST_EXT.1.1': 2, 'FPT_STM.1': 6, 'FPT_RCV.2': 6, 'FPT_FLS.1': 6, 'FPT_STM.1.1': 1, 'FPT_RCV.2.1': 1, 'FPT_RCV.2.2': 1, 'FPT_FLS.1.1': 1}, 'FTA': {'FTA_TSE.1': 6, 'FTA_MCS.1': 6, 'FTA_SSL.3': 6, 'FTA_MCS.1.1': 1, 'FTA_MCS.1.2': 1, 'FTA_SSL.3.1': 1}}, 'cc_claims': {'O': {'O.FLOW': 6, 'O.ACCESS': 16, 'O.ROLBAK': 6, 'O.AUDIT': 14, 'O.ENCRYPT': 5, 'O.ROLBACK': 1}, 'T': {'T.ROUTE': 3, 'T.PRIVIL': 2, 'T.INTERCEPT': 3, 'T.CONFLOSS': 2, 'T.NOAUDIT': 3, 'T.PROTECT': 1}, 'A': {'A.LOCATE': 3, 'A.NOEVIL': 2, 'A.EAUTH': 2, 'A.TIME': 3}, 'OE': {'OE.PHYSICAL': 1, 'OE.ADMIN': 1, 'OE.TIME': 1, 'OE.EAUTH': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 3}}, 'DES': {'3DES': {'3DES': 1}}}, 'asymmetric_crypto': {'FF': {'DH': {'DH': 1, 'Diffie-Hellman': 5}, 'DSA': {'DSA': 10}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 2}}}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 17}}, 'randomness': {}, 'cipher_mode': {'ECB': {'ECB': 1}, 'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 1, 'FIPS 46-3': 1, 'FIPS PUB 186-3': 1}, 'RFC': {'RFC 4253': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The cert_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 3': 1}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'ERTL': {'Common Criteria Test Laboratory, ERTL': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
CR-IPOS_EAL3 version 1.0.pdf
. - The st_filename property was set to
Ericsson-SSR-Security-Target-07112016.pdf
. - The cert_filename property was set to
Ericsson Certificate.pdf
.
The computed heuristics were updated.
- The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}]}
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CR-IPOS_EAL3%20version%201.0.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Ericsson-SSR-Security-Target-07112016.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The cert property was updated, with the
{'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The cert_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The cert_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
. - The cert_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was set to
None
.
- The new value is
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Ericsson IPOS Release 15.2 software running on Smart Service Routers SSR 8020 and SSR 8010 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Network and Network-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Ericsson%20Certificate.pdf",
"dgst": "19f7f5081c5fa564",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": null,
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"15.2"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Ericsson India Global Services Pvt Ltd.",
"manufacturer_web": "https://www.ericsson.com/in",
"name": "Ericsson IPOS Release 15.2 software running on Smart Service Routers SSR 8020 and SSR 8010",
"not_valid_after": "2023-04-23",
"not_valid_before": "2018-04-24",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "Ericsson Certificate.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL 3": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"ERTL": {
"Common Criteria Test Laboratory, ERTL": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20181120161757+05\u002730\u0027",
"/Creator": "Hewlett-Packard MFP",
"/ModDate": "D:20181122170210+05\u002730\u0027",
"pdf_file_size_bytes": 447043,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 2
},
"report_filename": "CR-IPOS_EAL3 version 1.0.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.EAUTH": 1,
"A.LOCATE": 1,
"A.NOEVIL": 1,
"A.TIME": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL3": 7
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 3
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"ERTL": {
"Common Criteria Test Laboratory, ERTL": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Mitali Chatterjee",
"/CreationDate": "D:20181106103659+05\u002730\u0027",
"/Creator": "Microsoft\u00ae Word 2016",
"/ModDate": "D:20181106103659+05\u002730\u0027",
"/Producer": "Microsoft\u00ae Word 2016",
"/Title": "LOGO",
"pdf_file_size_bytes": 698299,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteria-india.gov.in/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 12
},
"st_filename": "Ericsson-SSR-Security-Target-07112016.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"FF": {
"DH": {
"DH": 1,
"Diffie-Hellman": 5
},
"DSA": {
"DSA": 10
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.EAUTH": 2,
"A.LOCATE": 3,
"A.NOEVIL": 2,
"A.TIME": 3
},
"O": {
"O.ACCESS": 16,
"O.AUDIT": 14,
"O.ENCRYPT": 5,
"O.FLOW": 6,
"O.ROLBACK": 1,
"O.ROLBAK": 6
},
"OE": {
"OE.ADMIN": 1,
"OE.EAUTH": 1,
"OE.PHYSICAL": 1,
"OE.TIME": 1
},
"T": {
"T.CONFLOSS": 2,
"T.INTERCEPT": 3,
"T.NOAUDIT": 3,
"T.PRIVIL": 2,
"T.PROTECT": 1,
"T.ROUTE": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 1,
"ADV_FSP.3": 1,
"ADV_TDS": 1,
"ADV_TDS.2": 1
},
"AGD": {
"AGD_OPE": 2,
"AGD_OPE.1": 1,
"AGD_PRE": 2,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.3": 1,
"ALC_CMS": 1,
"ALC_CMS.3": 1,
"ALC_DEL": 1,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.1": 1,
"ALC_LCD": 1,
"ALC_LCD.1": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 1,
"ASE_ECD": 1,
"ASE_ECD.1": 1,
"ASE_INT": 1,
"ASE_INT.1": 1,
"ASE_OBJ": 1,
"ASE_OBJ.2": 1,
"ASE_REQ": 1,
"ASE_REQ.2": 1,
"ASE_SPD": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.2": 1,
"ATE_DPT": 1,
"ATE_DPT.1": 1,
"ATE_FUN": 1,
"ATE_FUN.1": 1,
"ATE_IND": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 3": 1,
"EAL3": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 6,
"FAU_ARP.1.1": 1,
"FAU_GEN": 1,
"FAU_GEN.1": 6,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 6,
"FAU_GEN.2.1": 1,
"FAU_SAA.1": 6,
"FAU_SAA.1.1": 1,
"FAU_SAA.1.2": 1,
"FAU_SAR.1": 5,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_STG.1": 6,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1
},
"FCS": {
"FCS_CKM": 1,
"FCS_CKM.1": 5,
"FCS_CKM.1.1": 2,
"FCS_CKM.4": 4,
"FCS_CKM.4.1": 2,
"FCS_COP.1": 4,
"FCS_COP.1.1": 3
},
"FDP": {
"FDP_IFC.1": 6,
"FDP_IFC.1.1": 1,
"FDP_IFF.1": 6,
"FDP_IFF.1.1": 1,
"FDP_IFF.1.2": 1,
"FDP_IFF.1.3": 1,
"FDP_IFF.1.4": 1,
"FDP_IFF.1.5": 1
},
"FIA": {
"FIA_AFL.1": 6,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 6,
"FIA_ATD.1.1": 1,
"FIA_SOS.1": 6,
"FIA_SOS.1.1": 1,
"FIA_UAU.1": 1,
"FIA_UAU.2": 7,
"FIA_UAU.2.1": 1,
"FIA_UAU.5": 6,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UID.1": 2,
"FIA_UID.2": 8,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MSA.1": 3,
"FMT_MSA.3": 10,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD": 32,
"FMT_MTD.1": 5,
"FMT_SMF.1": 6,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 6,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_FLS.1": 6,
"FPT_FLS.1.1": 1,
"FPT_RCV.2": 6,
"FPT_RCV.2.1": 1,
"FPT_RCV.2.2": 1,
"FPT_STM.1": 6,
"FPT_STM.1.1": 1,
"FPT_TST": 1,
"FPT_TST_EXT": 2,
"FPT_TST_EXT.1": 8,
"FPT_TST_EXT.1.1": 2
},
"FTA": {
"FTA_MCS.1": 6,
"FTA_MCS.1.1": 1,
"FTA_MCS.1.2": 1,
"FTA_SSL.3": 6,
"FTA_SSL.3.1": 1,
"FTA_TSE.1": 6
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 1
},
"ECB": {
"ECB": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 17
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"malfunction": 2
}
},
"standard_id": {
"FIPS": {
"FIPS 46-3": 1,
"FIPS PUB 186-3": 1,
"FIPS PUB 197": 1
},
"RFC": {
"RFC 4253": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 3
}
},
"DES": {
"3DES": {
"3DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "ERAVDIV Ravi Ashvin Divecha",
"/CreationDate": "D:20181030135718+05\u002730\u0027",
"/Creator": "Microsoft\u00ae Word 2016",
"/Keywords": "Security Target",
"/ModDate": "D:20181030135718+05\u002730\u0027",
"/Producer": "Microsoft\u00ae Word 2016",
"/Subject": "Security Target for Ericsson Smart Service Router SSR 8020, SSR 8010 running IPOS Software",
"/Title": "Security Target for Ericsson Smart Service Router SSR 8020, SSR 8010 running IPOS Software",
"pdf_file_size_bytes": 1304330,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 57
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CR-IPOS_EAL3%20version%201.0.pdf",
"scheme": "IN",
"security_level": {
"_type": "Set",
"elements": [
"EAL3"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Ericsson-SSR-Security-Target-07112016.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": true,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "eed222f5574f9d30dc7c7d945ff2fcd10311c9c4402395e82eddd43204ba33b6",
"txt_hash": "08a413ad90ddb8c730bfe177ce8e36839583a5986924bbd52008fa22c4c9e4f5"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "53ce17b56263d2d00a258e0141e6d80ca5305fc93405da2caaaa07a4078454c8",
"txt_hash": "332cdcb752151c35729563df93b962fcf3c92f1d067722c09540759196d154ca"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "4958f0fd948b4048da1c2245e492cc1fd1d96a5c9ed71627bc5f04d58281adda",
"txt_hash": "952590337dde1c2d4c865d6faa6e898b98ebfa62f44973c776929aaef19b8e8b"
}
},
"status": "archived"
}