Citrix MetaFrame Presentation Server 4.0
CSV information ?
Status | archived |
---|---|
Valid from | 01.08.2005 |
Valid until | 05.03.2013 |
Scheme | 🇬🇧 UK |
Manufacturer | Citrix Systems, Inc. |
Category | Access Control Devices and Systems |
Security level | EAL2 |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Protocols
SSL, TLS, IPsecLibraries
OpenSSLVendor
MicrosoftSecurity level
EAL2, EAL2 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.2Security Functional Requirements (SFR)
FTP_ITC.2, FTP_ITC.1Certificates
CERTIFICATION REPORT No. P219Standards
CCIMB-2004-01-001, CCIMB-2004-01-002, CCIMB-2004-01-003, CCIMB-2004-01-004File metadata
Title | LFS T488 CITRIX_V40_CertRep_P219_10.doc |
---|---|
Author | racook |
Creation date | D:20050906112345Z |
Modification date | D:20131119172038Z |
Pages | 20 |
Creator | LFS T488 CITRIX_V40_CertRep_P219_10 - Microsoft Word |
Producer | Acrobat PDFWriter 5.0 for Windows NT |
Security target ?
Extracted keywords
Symmetric Algorithms
3DES, TripleDESSchemes
MAC, Key ExchangeProtocols
SSL, TLSVendor
MicrosoftSecurity level
EAL2, EAL2+, EAL2 augmentedClaims
T.AUTHENTIC, T.MOD_CONF, T.MISDIRECT, T.AVAIL, T.MOD_HW_SERVER, T.MOD_HW_CLIENT, A.TRUSTADMIN, A.USER_, A.THIRD_PARTY_, A.PUBLISHED_, A.APP_, A.APP_CONFIG, A.SMARTCARD, OT.AUTHENTIC_, OT.CONF_CLIENT, OT.INTEG_CLIENT, OT.CONF, OT.INTEG, OT.CUT_PASTE, OT.DRIVES, OT.GATE_ALLOW, OT.SECURE_ENCRYP, OT.APPS_AVAIL, OT.AUTHENTIC_SERVER, OT.AUTHENTIC_CLIENT, OT.SECURE_ENCRYPTION, OT.CONF_, OT.INTEG_, OT.GATE_ALLO, OT.CUTPASTE, OT.SECURE_ENC, OT.APPS_, OE.OS_CONFIG_, OE.SERVER_THIRD_, OE.MALWARE_PROT, OE.SECURE_, OE.SESSION_KEYS, OE.LIMIT_AUTH, OE.PASSWORD_, OE.IPSEC, OE.MEMORY, OE.TRUSTED_, OE.SERVER_, OE.CLIENT_, OE.CLIENT_TPSW, OE.CERTIFICATES, OE.OS_CONFIG_SERVER, OE.OS_CONFIG_CLIENT, OE.MALWARE_PROTECT, OE.SECURE_ENCRYPTION, OE.PASSWORD_SETUP, OE.TRUSTED_OPS, OE.SERVER_PHYSICAL, OE.CLIENT_PHYSICAL, OE.SERVER_THIRD_PARTY_SW, OE.OS_CONFIG, OE.SERVER_TH, OE.MALWARE_, OE.SECURE_EN, OE.SESSION_K, OE.LIMIT_AUT, OE.PASSWORD, OSP.CRYPTOSecurity Assurance Requirements (SAR)
ACM_CAP.2, ADO_DEL.1, ADO_IGS.1, ADV_FSP.1, ADV_HLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_FLR.2, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_SOF.1, AVA_VLA.1Security Functional Requirements (SFR)
FCS_COP.1, FCS_COP.1.1, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM.2, FCS_CKM.2.1, FCS_CKM.4, FCS_CKM.4.1, FDP_ITT.1, FDP_ITT.1.1, FDP_ACC.1, FDP_ACF.1, FDP_RIP.1, FDP_RIP.1.1, FDP_IFC.1, FIA_ATD.1, FIA_ATD.1.1, FIA_UAU, FIA_UAU.2.1, FIA_UID.2, FIA_UID.2.1, FIA_UAU.2, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UID.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF, FMT_SMF.1.1, FMT_MSA.1, FMT_MSA.1.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MOF.1, FMT_MOF.1.1, FMT_MSA.2, FMT_MSA.2.1, FMT_SMF.1, FPT_ITT.1, FPT_ITT.1.1, FPT_RVM.1, FPT_RVM.1.1, FPT_AMT.1, FPT_AMT.1.1, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_SEP.1, FPT_SEP.1.1, FPT_SEP.1.2, FTP_ITC.2, FTP_ITC.1, FTP_ITC, FTP_ITC.2.1, FTP_ITC.2.2, FTP_ITC.2.3Certification process
out of scope, The TOE comprises the sample deployment as described below. All other configurations are out of scope of the evaluation. The deployment uses the Secure Gateway to provide TLS encryption between a TLS-, the TOE. Note: The Windows operating system provides the function that authenticates users. This is out of scope of the TOE, so there are no mechanisms requiring assessment. Version 1.0 Page 35 of 56 July 2005Standards
FIPS 140, FIPS 140-1, FIPS 140-2, FIPS140, FIPS140-1, FIPS 186-2, FIPS140-2, RFC 2246, RFC 2412, RFC 2451File metadata
Title | Untitled Document |
---|---|
Creation date | 9:9 7/25/2005 |
Pages | 56 |
Creator | Windows NT 4.0 |
Producer | GNU Ghostscript 7.05 |
Heuristics ?
Extracted SARs
ADV_FSP.1, ADV_HLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_FLR.2, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_SOF.1, AVA_VLA.1References ?
No references are available for this certificate.
Updates ?
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '9e3e08d19805fb3df19ca29bc55875adbbfa964f9e38709827661141172b45a0', 'txt_hash': '2cf50fc623d7102349b44fef99998ec1f2174e672c6cad1128c98b64bf3c5ed2'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '800d74df75d66489b40b68ae3aad11c67501b2010cb5e6b40b309531daa3864e', 'txt_hash': '22c988f1093bcdceb6dbdc6c4d071b9d6c1fd13c9b2c84bf2ee824c8d35b25cc'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 1021419, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 20, '/Author': 'racook', '/CreationDate': 'D:20050906112345Z', '/Creator': 'LFS T488 CITRIX_V40_CertRep_P219_10 - Microsoft Word', '/ModDate': 'D:20131119172038Z', '/Producer': 'Acrobat PDFWriter 5.0 for Windows NT', '/Title': 'LFS T488 CITRIX_V40_CertRep_P219_10.doc', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 328607, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 56, '/Producer': 'GNU Ghostscript 7.05', '/Title': 'Untitled Document', '/Creator': 'Windows NT 4.0', '/CreationDate': '9:9 7/25/2005', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'UK': {'CERTIFICATION REPORT No. P219': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 4, 'EAL2 augmented': 3}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 3}}, 'cc_sfr': {'FTP': {'FTP_ITC.2': 1, 'FTP_ITC.1': 1}}, 'cc_claims': {}, 'vendor': {'Microsoft': {'Microsoft': 16}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 2}, 'TLS': {'TLS': 8}}, 'IPsec': {'IPsec': 3}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 1}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCIMB-2004-01-001': 1, 'CCIMB-2004-01-002': 1, 'CCIMB-2004-01-003': 1, 'CCIMB-2004-01-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 8, 'EAL2+': 1, 'EAL2 augmented': 2}}, 'cc_sar': {'ACM': {'ACM_CAP.2': 2}, 'ADO': {'ADO_DEL.1': 2, 'ADO_IGS.1': 2}, 'ADV': {'ADV_FSP.1': 2, 'ADV_HLD.1': 2, 'ADV_RCR.1': 2, 'ADV_SPM.1': 2}, 'AGD': {'AGD_ADM.1': 2, 'AGD_USR.1': 2}, 'ALC': {'ALC_FLR.2': 7}, 'ATE': {'ATE_COV.1': 2, 'ATE_FUN.1': 2, 'ATE_IND.2': 2}, 'AVA': {'AVA_SOF.1': 2, 'AVA_VLA.1': 3}}, 'cc_sfr': {'FCS': {'FCS_COP.1': 21, 'FCS_COP.1.1': 3, 'FCS_CKM.1': 11, 'FCS_CKM.1.1': 1, 'FCS_CKM.2': 9, 'FCS_CKM.2.1': 2, 'FCS_CKM.4': 16, 'FCS_CKM.4.1': 2}, 'FDP': {'FDP_ITT.1': 17, 'FDP_ITT.1.1': 2, 'FDP_ACC.1': 23, 'FDP_ACF.1': 16, 'FDP_RIP.1': 6, 'FDP_RIP.1.1': 1, 'FDP_IFC.1': 3}, 'FIA': {'FIA_ATD.1': 12, 'FIA_ATD.1.1': 1, 'FIA_UAU': 1, 'FIA_UAU.2.1': 2, 'FIA_UID.2': 10, 'FIA_UID.2.1': 2, 'FIA_UAU.2': 11, 'FIA_AFL.1': 5, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UID.1': 1}, 'FMT': {'FMT_SMR.1': 21, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF': 1, 'FMT_SMF.1.1': 1, 'FMT_MSA.1': 11, 'FMT_MSA.1.1': 1, 'FMT_MSA.3': 9, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MOF.1': 14, 'FMT_MOF.1.1': 2, 'FMT_MSA.2': 12, 'FMT_MSA.2.1': 1, 'FMT_SMF.1': 16}, 'FPT': {'FPT_ITT.1': 15, 'FPT_ITT.1.1': 2, 'FPT_RVM.1': 12, 'FPT_RVM.1.1': 1, 'FPT_AMT.1': 6, 'FPT_AMT.1.1': 1, 'FPT_TST.1': 6, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_SEP.1': 2, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1}, 'FTP': {'FTP_ITC.2': 9, 'FTP_ITC.1': 1, 'FTP_ITC': 1, 'FTP_ITC.2.1': 1, 'FTP_ITC.2.2': 1, 'FTP_ITC.2.3': 1}}, 'cc_claims': {'T': {'T.AUTHENTIC': 4, 'T.MOD_CONF': 4, 'T.MISDIRECT': 2, 'T.AVAIL': 4, 'T.MOD_HW_SERVER': 1, 'T.MOD_HW_CLIENT': 1}, 'A': {'A.TRUSTADMIN': 1, 'A.USER_': 1, 'A.THIRD_PARTY_': 1, 'A.PUBLISHED_': 1, 'A.APP_': 1, 'A.APP_CONFIG': 1, 'A.SMARTCARD': 1}, 'OT': {'OT.AUTHENTIC_': 4, 'OT.CONF_CLIENT': 2, 'OT.INTEG_CLIENT': 2, 'OT.CONF': 3, 'OT.INTEG': 3, 'OT.CUT_PASTE': 2, 'OT.DRIVES': 3, 'OT.GATE_ALLOW': 2, 'OT.SECURE_ENCRYP': 1, 'OT.APPS_AVAIL': 2, 'OT.AUTHENTIC_SERVER': 1, 'OT.AUTHENTIC_CLIENT': 1, 'OT.SECURE_ENCRYPTION': 2, 'OT.CONF_': 1, 'OT.INTEG_': 1, 'OT.GATE_ALLO': 1, 'OT.CUTPASTE': 1, 'OT.SECURE_ENC': 1, 'OT.APPS_': 1}, 'OE': {'OE.OS_CONFIG_': 2, 'OE.SERVER_THIRD_': 1, 'OE.MALWARE_PROT': 1, 'OE.SECURE_': 1, 'OE.SESSION_KEYS': 3, 'OE.LIMIT_AUTH': 2, 'OE.PASSWORD_': 1, 'OE.IPSEC': 8, 'OE.MEMORY': 4, 'OE.TRUSTED_': 1, 'OE.SERVER_': 1, 'OE.CLIENT_': 1, 'OE.CLIENT_TPSW': 3, 'OE.CERTIFICATES': 3, 'OE.OS_CONFIG_SERVER': 2, 'OE.OS_CONFIG_CLIENT': 2, 'OE.MALWARE_PROTECT': 2, 'OE.SECURE_ENCRYPTION': 2, 'OE.PASSWORD_SETUP': 1, 'OE.TRUSTED_OPS': 2, 'OE.SERVER_PHYSICAL': 2, 'OE.CLIENT_PHYSICAL': 1, 'OE.SERVER_THIRD_PARTY_SW': 1, 'OE.OS_CONFIG': 2, 'OE.SERVER_TH': 1, 'OE.MALWARE_': 1, 'OE.SECURE_EN': 1, 'OE.SESSION_K': 1, 'OE.LIMIT_AUT': 1, 'OE.PASSWORD': 1}, 'OSP': {'OSP.CRYPTO': 4}}, 'vendor': {'Microsoft': {'Microsoft': 19}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'3DES': {'3DES': 6, 'TripleDES': 4}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 1}, 'KEX': {'Key Exchange': 3}}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 6}, 'TLS': {'TLS': 34}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140': 3, 'FIPS 140-1': 1, 'FIPS 140-2': 3, 'FIPS140': 10, 'FIPS140-1': 2, 'FIPS 186-2': 1, 'FIPS140-2': 2}, 'RFC': {'RFC 2246': 3, 'RFC 2412': 1, 'RFC 2451': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 2, 'The TOE comprises the sample deployment as described below. All other configurations are out of scope of the evaluation. The deployment uses the Secure Gateway to provide TLS encryption between a TLS-': 1, 'the TOE. Note: The Windows operating system provides the function that authenticates users. This is out of scope of the TOE, so there are no mechanisms requiring assessment. Version 1.0 Page 35 of 56 July 2005': 1}}}
. - The report_filename property was set to
CRP219.pdf
. - The st_filename property was set to
LFS_T488_Citrix_ST_V10.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
CRP219
. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}]}
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP219.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/LFS_T488_Citrix_ST_V10.pdf
.
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was set to
None
.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
.
- The report property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Citrix MetaFrame Presentation Server 4.0 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Access Control Devices and Systems",
"cert_link": null,
"dgst": "7da57a5dc5ab73a9",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "CRP219",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_SOF",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"4.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Citrix Systems, Inc.",
"manufacturer_web": "https://www.citrix.com",
"name": "Citrix MetaFrame Presentation Server 4.0",
"not_valid_after": "2013-03-05",
"not_valid_before": "2005-08-01",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "CRP219.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"UK": {
"CERTIFICATION REPORT No. P219": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.2": 3
}
},
"cc_security_level": {
"EAL": {
"EAL2": 4,
"EAL2 augmented": 3
}
},
"cc_sfr": {
"FTP": {
"FTP_ITC.1": 1,
"FTP_ITC.2": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 1
}
},
"crypto_protocol": {
"IPsec": {
"IPsec": 3
},
"TLS": {
"SSL": {
"SSL": 2
},
"TLS": {
"TLS": 8
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCIMB-2004-01-001": 1,
"CCIMB-2004-01-002": 1,
"CCIMB-2004-01-003": 1,
"CCIMB-2004-01-004": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 16
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "racook",
"/CreationDate": "D:20050906112345Z",
"/Creator": "LFS T488 CITRIX_V40_CertRep_P219_10 - Microsoft Word",
"/ModDate": "D:20131119172038Z",
"/Producer": "Acrobat PDFWriter 5.0 for Windows NT",
"/Title": "LFS T488 CITRIX_V40_CertRep_P219_10.doc",
"pdf_file_size_bytes": 1021419,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 20
},
"st_filename": "LFS_T488_Citrix_ST_V10.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.APP_": 1,
"A.APP_CONFIG": 1,
"A.PUBLISHED_": 1,
"A.SMARTCARD": 1,
"A.THIRD_PARTY_": 1,
"A.TRUSTADMIN": 1,
"A.USER_": 1
},
"OE": {
"OE.CERTIFICATES": 3,
"OE.CLIENT_": 1,
"OE.CLIENT_PHYSICAL": 1,
"OE.CLIENT_TPSW": 3,
"OE.IPSEC": 8,
"OE.LIMIT_AUT": 1,
"OE.LIMIT_AUTH": 2,
"OE.MALWARE_": 1,
"OE.MALWARE_PROT": 1,
"OE.MALWARE_PROTECT": 2,
"OE.MEMORY": 4,
"OE.OS_CONFIG": 2,
"OE.OS_CONFIG_": 2,
"OE.OS_CONFIG_CLIENT": 2,
"OE.OS_CONFIG_SERVER": 2,
"OE.PASSWORD": 1,
"OE.PASSWORD_": 1,
"OE.PASSWORD_SETUP": 1,
"OE.SECURE_": 1,
"OE.SECURE_EN": 1,
"OE.SECURE_ENCRYPTION": 2,
"OE.SERVER_": 1,
"OE.SERVER_PHYSICAL": 2,
"OE.SERVER_TH": 1,
"OE.SERVER_THIRD_": 1,
"OE.SERVER_THIRD_PARTY_SW": 1,
"OE.SESSION_K": 1,
"OE.SESSION_KEYS": 3,
"OE.TRUSTED_": 1,
"OE.TRUSTED_OPS": 2
},
"OSP": {
"OSP.CRYPTO": 4
},
"OT": {
"OT.APPS_": 1,
"OT.APPS_AVAIL": 2,
"OT.AUTHENTIC_": 4,
"OT.AUTHENTIC_CLIENT": 1,
"OT.AUTHENTIC_SERVER": 1,
"OT.CONF": 3,
"OT.CONF_": 1,
"OT.CONF_CLIENT": 2,
"OT.CUTPASTE": 1,
"OT.CUT_PASTE": 2,
"OT.DRIVES": 3,
"OT.GATE_ALLO": 1,
"OT.GATE_ALLOW": 2,
"OT.INTEG": 3,
"OT.INTEG_": 1,
"OT.INTEG_CLIENT": 2,
"OT.SECURE_ENC": 1,
"OT.SECURE_ENCRYP": 1,
"OT.SECURE_ENCRYPTION": 2
},
"T": {
"T.AUTHENTIC": 4,
"T.AVAIL": 4,
"T.MISDIRECT": 2,
"T.MOD_CONF": 4,
"T.MOD_HW_CLIENT": 1,
"T.MOD_HW_SERVER": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_CAP.2": 2
},
"ADO": {
"ADO_DEL.1": 2,
"ADO_IGS.1": 2
},
"ADV": {
"ADV_FSP.1": 2,
"ADV_HLD.1": 2,
"ADV_RCR.1": 2,
"ADV_SPM.1": 2
},
"AGD": {
"AGD_ADM.1": 2,
"AGD_USR.1": 2
},
"ALC": {
"ALC_FLR.2": 7
},
"ATE": {
"ATE_COV.1": 2,
"ATE_FUN.1": 2,
"ATE_IND.2": 2
},
"AVA": {
"AVA_SOF.1": 2,
"AVA_VLA.1": 3
}
},
"cc_security_level": {
"EAL": {
"EAL2": 8,
"EAL2 augmented": 2,
"EAL2+": 1
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM.1": 11,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 9,
"FCS_CKM.2.1": 2,
"FCS_CKM.4": 16,
"FCS_CKM.4.1": 2,
"FCS_COP.1": 21,
"FCS_COP.1.1": 3
},
"FDP": {
"FDP_ACC.1": 23,
"FDP_ACF.1": 16,
"FDP_IFC.1": 3,
"FDP_ITT.1": 17,
"FDP_ITT.1.1": 2,
"FDP_RIP.1": 6,
"FDP_RIP.1.1": 1
},
"FIA": {
"FIA_AFL.1": 5,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 12,
"FIA_ATD.1.1": 1,
"FIA_UAU": 1,
"FIA_UAU.2": 11,
"FIA_UAU.2.1": 2,
"FIA_UID.1": 1,
"FIA_UID.2": 10,
"FIA_UID.2.1": 2
},
"FMT": {
"FMT_MOF.1": 14,
"FMT_MOF.1.1": 2,
"FMT_MSA.1": 11,
"FMT_MSA.1.1": 1,
"FMT_MSA.2": 12,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 9,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_SMF": 1,
"FMT_SMF.1": 16,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 21,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_AMT.1": 6,
"FPT_AMT.1.1": 1,
"FPT_ITT.1": 15,
"FPT_ITT.1.1": 2,
"FPT_RVM.1": 12,
"FPT_RVM.1.1": 1,
"FPT_SEP.1": 2,
"FPT_SEP.1.1": 1,
"FPT_SEP.1.2": 1,
"FPT_TST.1": 6,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTP": {
"FTP_ITC": 1,
"FTP_ITC.1": 1,
"FTP_ITC.2": 9,
"FTP_ITC.2.1": 1,
"FTP_ITC.2.2": 1,
"FTP_ITC.2.3": 1
}
},
"certification_process": {
"OutOfScope": {
"The TOE comprises the sample deployment as described below. All other configurations are out of scope of the evaluation. The deployment uses the Secure Gateway to provide TLS encryption between a TLS-": 1,
"out of scope": 2,
"the TOE. Note: The Windows operating system provides the function that authenticates users. This is out of scope of the TOE, so there are no mechanisms requiring assessment. Version 1.0 Page 35 of 56 July 2005": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 6
},
"TLS": {
"TLS": 34
}
}
},
"crypto_scheme": {
"KEX": {
"Key Exchange": 3
},
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140": 3,
"FIPS 140-1": 1,
"FIPS 140-2": 3,
"FIPS 186-2": 1,
"FIPS140": 10,
"FIPS140-1": 2,
"FIPS140-2": 2
},
"RFC": {
"RFC 2246": 3,
"RFC 2412": 1,
"RFC 2451": 1
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"3DES": 6,
"TripleDES": 4
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 19
}
},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "9:9 7/25/2005",
"/Creator": "Windows NT 4.0",
"/Producer": "GNU Ghostscript 7.05",
"/Title": "Untitled Document",
"pdf_file_size_bytes": 328607,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 56
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP219.pdf",
"scheme": "UK",
"security_level": {
"_type": "Set",
"elements": [
"EAL2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/LFS_T488_Citrix_ST_V10.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "9e3e08d19805fb3df19ca29bc55875adbbfa964f9e38709827661141172b45a0",
"txt_hash": "2cf50fc623d7102349b44fef99998ec1f2174e672c6cad1128c98b64bf3c5ed2"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "800d74df75d66489b40b68ae3aad11c67501b2010cb5e6b40b309531daa3864e",
"txt_hash": "22c988f1093bcdceb6dbdc6c4d071b9d6c1fd13c9b2c84bf2ee824c8d35b25cc"
}
},
"status": "archived"
}