SUSE Linux Enterprise Server 15 SP4
CSV information ?
Status | active |
---|---|
Valid from | 15.12.2023 |
Valid until | 14.12.2028 |
Scheme | 🇩🇪 DE |
Manufacturer | SUSE LLC |
Category | Operating Systems |
Security level | ALC_TSU_EXT.1, ALC_CMS.1, AVA_VAN.1, AGD_PRE.1, ASE_INT.1, ASE_REQ.2, ADV_FSP.1, ASE_SPD.1, ASE_CCL.1, AGD_OPE.1, ASE_TSS.1, ASE_ECD.1, ALC_CMC.1, ATE_IND.1 |
Protection profiles |
Heuristics summary ?
Certificate ?
Extracted keywords
Protocols
SSHSecurity level
EAL 4, EAL 2Security Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ALC_TSU_EXT.1, ALC_FLR, ATE_IND.1, AVA_VAN.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Certificates
BSI-DSZ-CC-1213-2023Standards
ISO/IEC 15408, ISO/IEC 18045File metadata
Title | Certification Report BSI-DSZ-CC-1213-2023 |
---|---|
Subject | Common Criteria, Certification, Zertifizierung, Operating System Protection Profile, Linux-based, General Purpose Operating System |
Keywords | "Common Criteria, Certification, Zertifizierung, Operating System Protection Profile, Linux-based, General Purpose Operating System" |
Author | Bundesamt fĂĽr Sicherheit in der Informationstechnik |
Pages | 1 |
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, AES-, HMAC, HMAC-SHA-384, HMAC-SHA-256, HMAC-SHA-512Asymmetric Algorithms
ECDH, ECDSA, ECC, DH, Diffie-Hellman, DSAHash functions
SHA-384, SHA-512, SHA-256, SHA-2, PBKDF2Schemes
Key Exchange, KEX, Key agreement, Key AgreementProtocols
SSH, TLSv1.2, TLS v1.2, TLS, IKEv2, IKE, IPsecRandomness
DRBG, RNGLibraries
OpenSSLElliptic Curves
P-256, P-384, P-521, NIST P-256, NIST P-521Block cipher modes
CBC, CTR, GCM, XTSSecurity level
EAL 4, EAL 2, EAL 1Claims
OE.PLATFORM, OE.PROPER_USER, OE.PROPER_ADMINSecurity Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ALC_TSU_EXT.1, ALC_FLR, ATE_IND.1, AVA_VAN.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FCS_RBG_EXT, FTP_ITC_EXT.1Certificates
BSI-DSZ-CC-1213-2023Evaluation facilities
atsecCertification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Report, Version 8, 2023-12-05, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [8] Protection Profile for General Purpose Operating Systems Version 4.2.1, 22 April 2019, and SUSE LLC [11] Configuration list for the TOE, 2023-11-03, Master Configuration List, SUSE LLC (confidential document) 7 specifically • AIS 20, Version 3, Funktionalitätsklassen und Evaluationsmethodologie fürStandards
FIPS180-4, FIPS186-4, FIPS197, FIPS 186-4, FIPS198-1, FIPS 180-4, PKCS#1, AIS 20, AIS 32, RFC8017, RFC4253, RFC4252, RFC5903, RFC5656, RFC4419, RFC8268, RFC 4253, RFC2104, RFC4251, RFC6668, RFC5647, RFC8332, RFC4306, RFC2898, RFC5246, RFC5288, RFC4868, RFC7919, RFC5996, RFC 5246, RFC3447, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065, X.509Technical reports
BSI TR-02102, BSI 7148File metadata
Title | Certification Report BSI-DSZ-CC-1213-2023 |
---|---|
Subject | Common Criteria, Certification, Zertifizierung, Operating System Protection Profile, Linux-based, General Purpose Operating System |
Keywords | "Common Criteria, Certification, Zertifizierung, Operating System Protection Profile, Linux-based, General Purpose Operating System" |
Author | Bundesamt fĂĽr Sicherheit in der Informationstechnik |
Pages | 31 |
Frontpage
Certificate ID | BSI-DSZ-CC-1213-2023 |
---|---|
Certified item | SUSE Linux Enterprise Server Version 15 SP4 |
Certification lab | BSI |
Developer | SUSE LLC |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, AES-256, HMAC, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512, CBC-MACAsymmetric Algorithms
ECDH, ECDHE, ECDSA, ECC, DH, Diffie-Hellman, DSAHash functions
SHA-1, SHA-256, SHA-384, SHA-512, PBKDFSchemes
MAC, Key AgreementProtocols
SSH, SSL, TLS, TLSv1.2, TLS v1.2, TLS 1.2, TLSv1.0, TLSv1.1, PGPRandomness
PRNG, DRBG, RNG, RBGLibraries
OpenSSL, libgcryptElliptic Curves
P-256, P-384, P-521, secp256r1, secp384r1, secp521r1Block cipher modes
CBC, CTR, GCM, CCM, XTSTLS cipher suites
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHAVendor
MicrosoftClaims
O.ACCOUNTABILITY, O.INTEGRITY, O.MANAGEMENT, O.PROTECTED_STORAGE, O.PROTECTED_COMMS, T.NETWORK_ATTACK, T.NETWORK_EAVESDROP, T.LOCAL_ATTACK, T.LIMITED_PHYSICAL_ACCESS, A.PLATFORM, A.PROPER_USER, A.PROPER_ADMIN, OE.PLATFORM, OE.PROPER_USER, OE.PROPER_ADMINSecurity Assurance Requirements (SAR)
ALC_TSU_EXT.1, ALC_TSU_EXTSecurity Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN, FCS_CKM.1, FCS_CKM.2, FCS_CKM_EXT.4, FCS_COP.1, FCS_RBG_EXT.1, FCS_STO_EXT.1, FCS_TLSC_EXT.1, FCS_TLSC_EXT.2, FCS_TLSC_EXT.4, FCS_SSH_EXT.1, FCS_SSHC_EXT.1, FCS_SSHS_EXT.1, FCS_SSHS_EXT.1.3, FCS_SSH_EXT, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM_EXT.4.1, FCS_CKM_EXT.4.2, FCS_COP.1.1, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_RNG.1, FCS_STO_EXT.1.1, FCS_TLSC_EXT, FCS_SSH_EXT.1.1, FCS_SSH_EXT.1.2, FCS_SSH_EXT.1.3, FCS_SSH_EXT.1.4, FCS_SSH_EXT.1.5, FCS_SSH_EXT.1.6, FCS_SSH_EXT.1.7, FCS_SSH_EXT.1.8, FCS_SSHC_EXT, FCS_SSHS_EXT, FCS_STO_EXT, FCS_RBG_EXT, FCS_CKM, FCS_CKM_EXT, FDP_ACF_EXT.1, FDP_ACF_EXT.1.1, FDP_ACF_EXT, FIA_AFL.1, FIA_UAU.5, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.5.1, FIA_UAU.5.2, FIA_AFL, FIA_UAU, FMT_MOF_EXT.1, FMT_SMF_EXT.1, FMT_SMF_EXT.1.1, FMT_MOF_EXT, FMT_SMF_EXT, FPT_ACF_EXT.1, FPT_ASLR_EXT.1, FPT_SBOP_EXT.1, FPT_TST_EXT.1, FPT_TUD_EXT.1, FPT_TUD_EXT.2, FPT_TUD_EXT, FPT_ACF_EXT.1.1, FPT_ACF_EXT.1.2, FPT_ASLR_EXT, FPT_SBOP_EXT, FPT_TST_EXT.1.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.2.1, FPT_TUD_EXT.2.2, FPT_ACF_EXT, FPT_TST_EXT, FTA_TAB.1, FTA_TAB.1.1, FTA_TAB, FTP_ITC_EXT.1, FTP_TRP.1, FTP_ITC_EXT.1.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3, FTP_ITC_EXT, FTP_TRPCertificates
BSI-DSZ-CC-1213Evaluation facilities
atsecCertification process
out of scope, The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER PP Origin: OSPP The user of the OS is not willfully negligent or hostileStandards
FIPS PUB 186-4, FIPS 140-2, NIST SP 800-38A, NIST SP 800-38E, NIST SP 800-38D, NIST SP 800-57, NIST SP 800-56A, PKCS #7, RFC 5246, RFC 5288, RFC 5289, RFC 6125, RFC 4252, RFC 8332, RFC 5656, RFC 4253, RFC 5647, RFC 6668, RFC 8268, RFC 4251, RFC 5280, RFC 8603, RFC 6066, RFC7919, RFC4253, RFC5656, RFC4252, RFC5280, RFC6066, RFC8603, X.509File metadata
Title | SUSE Linux Enterprise Server 15 SP4 Security Target (version 1.4 as of 2023-12-05) |
---|---|
Subject | SUSE Linux Enterprise Server |
Keywords | SLES, operating system |
Author | Stephan MĂĽller (generated by CCTool version 2.8.4.66) |
Pages | 72 |
Heuristics ?
Extracted SARs
AGD_OPE.1, ALC_TSU_EXT.1, ASE_ECD.1, ATE_IND.1, AVA_VAN.1, ASE_SPD.1, ADV_FSP.1, ALC_CMS.1, ASE_REQ.2, AGD_PRE.1, ASE_TSS.1, ASE_CCL.1, ALC_CMC.1, ASE_INT.1CPE matches
Related CVEs
ID | Links | Severity | CVSS Score | Published on | ||
---|---|---|---|---|---|---|
Base | Exploitability | Impact | ||||
CVE-2002-20001 | HIGH | 7.5 | 3.6 | 11.11.2021 19:15 | ||
CVE-2018-17962 | HIGH | 7.5 | 3.6 | 09.10.2018 22:29 | ||
CVE-2019-18897 | HIGH | 7.8 | 5.9 | 02.03.2020 16:15 | ||
CVE-2019-18901 | MEDIUM | 5.5 | 3.6 | 02.03.2020 16:15 | ||
CVE-2019-18902 | CRITICAL | 9.8 | 5.9 | 02.03.2020 17:15 | ||
CVE-2019-18903 | CRITICAL | 9.8 | 5.9 | 02.03.2020 17:15 | ||
CVE-2020-8013 | LOW | 2.5 | 1.4 | 02.03.2020 17:15 | ||
CVE-2022-27239 | HIGH | 7.8 | 5.9 | 27.04.2022 14:15 | ||
CVE-2023-23005 | MEDIUM | 5.5 | 3.6 | 01.03.2023 20:15 |
Scheme data ?
Cert Id | BSI-DSZ-CC-1213-2023 | |
---|---|---|
Product | SUSE Linux Enterprise Server 15 SP4 | |
Vendor | SUSE, LLC | |
Certification Date | 15.12.2023 | |
Category | Operating systems | |
Url | https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Betriebssysteme/1213.html | |
Enhanced | ||
Product | SUSE Linux Enterprise Server 15 SP4 | |
Applicant | SUSE, LLC 1221 S Valley Grove Way #500, Pleasant Grove UT 84062 United States | |
Evaluation Facility | atsec information security GmbH | |
Protection Profile | Protection Profile for General Purpose Operating Systems Version 4.2.1, 22 April 2019, CCEVS-VR-PP-0047, NIAP, Functional Package for Secure Shell (SSH), Version 1.0, 13 May 2021, CCEVS-VR-PP-0075, NIAP | |
Certification Date | 15.12.2023 | |
Expiration Date | 14.12.2028 | |
Report Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1213a_pdf.pdf?__blob=publicationFile&v=2 | |
Target Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1213b_pdf.pdf?__blob=publicationFile&v=2 | |
Cert Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1213c_pdf.pdf?__blob=publicationFile&v=2 | |
Description | SUSE Linux Enterprise Server is a highly-configurable Linux-based operating system which has been developed to provide a good level of security as required in commercial environments. It also meets all requirements of the General Purpose Operating System Protection Profile v4.2.1 together with the Functional Package for Secure Shell (SSH) v1.0. |
References ?
No references are available for this certificate.
Updates ?
-
17.10.2024 The certificate data changed.
Certificate changed
The Protection Profiles of the certificate were updated.
- The following values were removed:
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for General Purpose Operating Systems, Version 4.2.1', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_V4.2.1.pdf', 'pp_ids': None}]}
. - The following values were added:
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for General Purpose Operating Systems, Version 4.2.1', 'pp_eal': 'EAL1', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/PP_OS_V4.2.1.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PP_OS_V4.2.1']}}]}
.
- The following values were removed:
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2018-17962']}
values added.
- The related_cves property was updated, with the
-
30.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2002-20001']}
values added.
- The related_cves property was updated, with the
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '2d7bbf5eb4cc339ea562736fe4982d674d737e11c818ab18c1f1fe4f6e08183e', 'txt_hash': '713acf71b860340b25c5708c2eb8c3db4de423b0192efa202aff1d9bb7161f00'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '81276c89e9ef5d4d337ce7659a1afd5c54583258e0ed2051a43979bf66369f0e', 'txt_hash': 'cfd84622f7774cef92b9c7e18dcf3d1f260b38f084fa8b6337895e69774bdabd'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '0ec6dd3a0f16991f13d6c0b06a2d87fdf037c3629e9dc5d9b0c5ac9a5bff65e6', 'txt_hash': '89230004791abc4136e2936bc9ecdc9705c8464f55a91da6bee7802d27024907'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 446408, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 31, '/Author': 'Bundesamt fĂĽr Sicherheit in der Informationstechnik', '/Keywords': '"Common Criteria, Certification, Zertifizierung, Operating System Protection Profile, Linux-based, General Purpose Operating System"', '/Subject': 'Common Criteria, Certification, Zertifizierung, Operating System Protection Profile, Linux-based, General Purpose Operating System', '/Title': 'Certification Report BSI-DSZ-CC-1213-2023', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.sogis.eu/', 'https://www.bsi.bund.de/zertifizierung', 'http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/', 'http://www.commoncriteriaportal.org/cc/', 'https://www.bsi.bund.de/zertifizierungsreporte', 'https://www.bsi.bund.de/AIS', 'https://www.commoncriteriaportal.org/']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 880981, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 72, '/Author': 'Stephan MĂĽller (generated by CCTool version 2.8.4.66)', '/Keywords': 'SLES, operating system', '/Subject': 'SUSE Linux Enterprise Server', '/Title': 'SUSE Linux Enterprise Server 15 SP4 Security Target (version 1.4 as of 2023-12-05)', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0680', 'https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0695', 'https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0715', 'https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0777', 'https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0501', 'https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0365', 'http://tools.ietf.org/html/rfc5656', 'http://tools.ietf.org/html/rfc4252', 'https://www.suse.com/support/security/', 'http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R5.pdf', 'https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0732', 'https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0493', 'https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0578', 'https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0600', 'https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0463', 'https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0649', 'http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R5.pdf', 'https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0441', 'http://tools.ietf.org/html/rfc4253', 'https://www.suse.com/support/security/contact/', 'https://www.niap-ccevs.org/Profile/Info.cfm?PPID=459&id=459', 'https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0630', 'https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0386', 'https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0682', 'https://www.suse.com/support/update/', 'http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R5.pdf', 'https://www.niap-ccevs.org/Profile/Info.cfm?PPID=442&id=442']}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 238737, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Author': 'Bundesamt fĂĽr Sicherheit in der Informationstechnik', '/Keywords': '"Common Criteria, Certification, Zertifizierung, Operating System Protection Profile, Linux-based, General Purpose Operating System"', '/Subject': 'Common Criteria, Certification, Zertifizierung, Operating System Protection Profile, Linux-based, General Purpose Operating System', '/Title': 'Certification Report BSI-DSZ-CC-1213-2023', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-1213-2023', 'cert_item': 'SUSE Linux Enterprise Server Version 15 SP4', 'developer': 'SUSE LLC', 'cert_lab': 'BSI', 'ref_protection_profiles': 'Protection Profile for General Purpose Operating Systems Version 4.2.1, 22 April 2019, CCEVS-VR-PP- 0047, NIAP, Functional Package for Secure Shell (SSH), Version 1.0, 13 May 2021, CCEVS-VR-PP-0075, NIAP', 'cc_version': 'PP conformant Common Criteria Part 2 extended', 'cc_security_level': 'Common Criteria Part 3 extended ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_INT.1, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ALC_TSU_EXT.1, ATE_IND.1, AVA_VAN.1 valid until: 14 December 2028'}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-1213-2023': 17}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 3, 'EAL 2': 3, 'EAL 1': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.1': 2}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_CMC.1': 2, 'ALC_CMS.1': 2, 'ALC_TSU_EXT.1': 3, 'ALC_FLR': 3}, 'ATE': {'ATE_IND.1': 2}, 'AVA': {'AVA_VAN.1': 2}, 'ASE': {'ASE_CCL.1': 2, 'ASE_ECD.1': 2, 'ASE_INT.1': 4, 'ASE_REQ.2': 2, 'ASE_SPD.1': 2, 'ASE_TSS.1': 2}}, 'cc_sfr': {'FCS': {'FCS_RBG_EXT': 2}, 'FTP': {'FTP_ITC_EXT.1': 2}}, 'cc_claims': {'OE': {'OE.PLATFORM': 1, 'OE.PROPER_USER': 1, 'OE.PROPER_ADMIN': 1}}, 'vendor': {}, 'eval_facility': {'atsec': {'atsec': 4}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 11, 'AES-': 1}}, 'constructions': {'MAC': {'HMAC': 9, 'HMAC-SHA-384': 2, 'HMAC-SHA-256': 1, 'HMAC-SHA-512': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 3}, 'ECDSA': {'ECDSA': 9}, 'ECC': {'ECC': 1}}, 'FF': {'DH': {'DH': 6, 'Diffie-Hellman': 3}, 'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-384': 1, 'SHA-512': 2, 'SHA-256': 2, 'SHA-2': 7}}, 'PBKDF': {'PBKDF2': 2}}, 'crypto_scheme': {'KEX': {'Key Exchange': 3, 'KEX': 1}, 'KA': {'Key agreement': 1, 'Key Agreement': 1}}, 'crypto_protocol': {'SSH': {'SSH': 23}, 'TLS': {'TLS': {'TLSv1.2': 1, 'TLS v1.2': 2, 'TLS': 10}}, 'IKE': {'IKEv2': 3, 'IKE': 1}, 'IPsec': {'IPsec': 1}}, 'randomness': {'PRNG': {'DRBG': 1}, 'RNG': {'RNG': 3}}, 'cipher_mode': {'CBC': {'CBC': 4}, 'CTR': {'CTR': 1}, 'GCM': {'GCM': 8}, 'XTS': {'XTS': 2}}, 'ecc_curve': {'NIST': {'P-256': 8, 'P-384': 10, 'P-521': 9, 'NIST P-256': 2, 'NIST P-521': 1}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 1}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {'BSI': {'BSI TR-02102': 1, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS180-4': 9, 'FIPS186-4': 5, 'FIPS197': 3, 'FIPS 186-4': 3, 'FIPS198-1': 4, 'FIPS 180-4': 1}, 'PKCS': {'PKCS#1': 1}, 'BSI': {'AIS 20': 2, 'AIS 32': 1}, 'RFC': {'RFC8017': 2, 'RFC4253': 9, 'RFC4252': 4, 'RFC5903': 3, 'RFC5656': 3, 'RFC4419': 2, 'RFC8268': 4, 'RFC 4253': 1, 'RFC2104': 3, 'RFC4251': 3, 'RFC6668': 2, 'RFC5647': 2, 'RFC8332': 2, 'RFC4306': 2, 'RFC2898': 2, 'RFC5246': 6, 'RFC5288': 2, 'RFC4868': 2, 'RFC7919': 2, 'RFC5996': 2, 'RFC 5246': 1, 'RFC3447': 1}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2}, 'X509': {'X.509': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'Report, Version 8, 2023-12-05, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [8] Protection Profile for General Purpose Operating Systems Version 4.2.1, 22 April 2019': 1, 'and SUSE LLC [11] Configuration list for the TOE, 2023-11-03, Master Configuration List, SUSE LLC (confidential document) 7 specifically • AIS 20, Version 3, Funktionalitätsklassen und Evaluationsmethodologie für': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-1213': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {'ALC': {'ALC_TSU_EXT.1': 4, 'ALC_TSU_EXT': 5}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 8, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN': 1}, 'FCS': {'FCS_CKM.1': 9, 'FCS_CKM.2': 9, 'FCS_CKM_EXT.4': 9, 'FCS_COP.1': 49, 'FCS_RBG_EXT.1': 10, 'FCS_STO_EXT.1': 8, 'FCS_TLSC_EXT.1': 12, 'FCS_TLSC_EXT.2': 9, 'FCS_TLSC_EXT.4': 9, 'FCS_SSH_EXT.1': 14, 'FCS_SSHC_EXT.1': 8, 'FCS_SSHS_EXT.1': 9, 'FCS_SSHS_EXT.1.3': 1, 'FCS_SSH_EXT': 1, 'FCS_CKM.1.1': 1, 'FCS_CKM.2.1': 1, 'FCS_CKM_EXT.4.1': 2, 'FCS_CKM_EXT.4.2': 1, 'FCS_COP.1.1': 4, 'FCS_RBG_EXT.1.1': 1, 'FCS_RBG_EXT.1.2': 1, 'FCS_RNG.1': 2, 'FCS_STO_EXT.1.1': 1, 'FCS_TLSC_EXT': 5, 'FCS_SSH_EXT.1.1': 1, 'FCS_SSH_EXT.1.2': 1, 'FCS_SSH_EXT.1.3': 1, 'FCS_SSH_EXT.1.4': 1, 'FCS_SSH_EXT.1.5': 1, 'FCS_SSH_EXT.1.6': 1, 'FCS_SSH_EXT.1.7': 1, 'FCS_SSH_EXT.1.8': 1, 'FCS_SSHC_EXT': 1, 'FCS_SSHS_EXT': 1, 'FCS_STO_EXT': 1, 'FCS_RBG_EXT': 2, 'FCS_CKM': 2, 'FCS_CKM_EXT': 1}, 'FDP': {'FDP_ACF_EXT.1': 8, 'FDP_ACF_EXT.1.1': 1, 'FDP_ACF_EXT': 1}, 'FIA': {'FIA_AFL.1': 8, 'FIA_UAU.5': 8, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_AFL': 1, 'FIA_UAU': 1}, 'FMT': {'FMT_MOF_EXT.1': 8, 'FMT_SMF_EXT.1': 9, 'FMT_SMF_EXT.1.1': 2, 'FMT_MOF_EXT': 2, 'FMT_SMF_EXT': 1}, 'FPT': {'FPT_ACF_EXT.1': 8, 'FPT_ASLR_EXT.1': 8, 'FPT_SBOP_EXT.1': 9, 'FPT_TST_EXT.1': 8, 'FPT_TUD_EXT.1': 9, 'FPT_TUD_EXT.2': 8, 'FPT_TUD_EXT': 3, 'FPT_ACF_EXT.1.1': 1, 'FPT_ACF_EXT.1.2': 1, 'FPT_ASLR_EXT': 2, 'FPT_SBOP_EXT': 1, 'FPT_TST_EXT.1.1': 1, 'FPT_TUD_EXT.1.1': 1, 'FPT_TUD_EXT.1.2': 1, 'FPT_TUD_EXT.2.1': 1, 'FPT_TUD_EXT.2.2': 1, 'FPT_ACF_EXT': 1, 'FPT_TST_EXT': 1}, 'FTA': {'FTA_TAB.1': 8, 'FTA_TAB.1.1': 1, 'FTA_TAB': 1}, 'FTP': {'FTP_ITC_EXT.1': 8, 'FTP_TRP.1': 8, 'FTP_ITC_EXT.1.1': 1, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1, 'FTP_ITC_EXT': 3, 'FTP_TRP': 1}}, 'cc_claims': {'O': {'O.ACCOUNTABILITY': 7, 'O.INTEGRITY': 18, 'O.MANAGEMENT': 9, 'O.PROTECTED_STORAGE': 8, 'O.PROTECTED_COMMS': 22}, 'T': {'T.NETWORK_ATTACK': 10, 'T.NETWORK_EAVESDROP': 4, 'T.LOCAL_ATTACK': 2, 'T.LIMITED_PHYSICAL_ACCESS': 3}, 'A': {'A.PLATFORM': 4, 'A.PROPER_USER': 4, 'A.PROPER_ADMIN': 4}, 'OE': {'OE.PLATFORM': 3, 'OE.PROPER_USER': 3, 'OE.PROPER_ADMIN': 2}}, 'vendor': {'Microsoft': {'Microsoft': 2}}, 'eval_facility': {'atsec': {'atsec': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 6, 'AES-256': 1}}, 'constructions': {'MAC': {'HMAC': 4, 'HMAC-SHA-256': 2, 'HMAC-SHA-384': 2, 'HMAC-SHA-512': 2, 'CBC-MAC': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 2, 'ECDHE': 2}, 'ECDSA': {'ECDSA': 8}, 'ECC': {'ECC': 3}}, 'FF': {'DH': {'DH': 1, 'Diffie-Hellman': 2}, 'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}, 'SHA2': {'SHA-256': 6, 'SHA-384': 6, 'SHA-512': 6}}, 'PBKDF': {'PBKDF': 1}}, 'crypto_scheme': {'MAC': {'MAC': 2}, 'KA': {'Key Agreement': 1}}, 'crypto_protocol': {'SSH': {'SSH': 99}, 'TLS': {'SSL': {'SSL': 2}, 'TLS': {'TLS': 64, 'TLSv1.2': 3, 'TLS v1.2': 1, 'TLS 1.2': 3, 'TLSv1.0': 1, 'TLSv1.1': 1}}, 'PGP': {'PGP': 1}}, 'randomness': {'PRNG': {'PRNG': 1, 'DRBG': 6}, 'RNG': {'RNG': 4, 'RBG': 2}}, 'cipher_mode': {'CBC': {'CBC': 2}, 'CTR': {'CTR': 2}, 'GCM': {'GCM': 3}, 'CCM': {'CCM': 1}, 'XTS': {'XTS': 2}}, 'ecc_curve': {'NIST': {'P-256': 10, 'P-384': 16, 'P-521': 16, 'secp256r1': 2, 'secp384r1': 2, 'secp521r1': 2}}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_DHE_RSA_WITH_AES_128_CBC_SHA256': 2, 'TLS_DHE_RSA_WITH_AES_256_CBC_SHA256': 2, 'TLS_DHE_RSA_WITH_AES_128_GCM_SHA256': 2, 'TLS_DHE_RSA_WITH_AES_256_GCM_SHA384': 2, 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256': 2, 'TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256': 2, 'TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384': 2, 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256': 2, 'TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256': 2, 'TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384': 2, 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA': 1, 'TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA': 1, 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA': 1, 'TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA': 1}}, 'crypto_library': {'OpenSSL': {'OpenSSL': 9}, 'libgcrypt': {'libgcrypt': 2}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 186-4': 6, 'FIPS 140-2': 1}, 'NIST': {'NIST SP 800-38A': 3, 'NIST SP 800-38E': 2, 'NIST SP 800-38D': 2, 'NIST SP 800-57': 1, 'NIST SP 800-56A': 1}, 'PKCS': {'PKCS #7': 1}, 'RFC': {'RFC 5246': 11, 'RFC 5288': 4, 'RFC 5289': 12, 'RFC 6125': 2, 'RFC 4252': 6, 'RFC 8332': 6, 'RFC 5656': 10, 'RFC 4253': 7, 'RFC 5647': 2, 'RFC 6668': 2, 'RFC 8268': 3, 'RFC 4251': 1, 'RFC 5280': 3, 'RFC 8603': 1, 'RFC 6066': 1, 'RFC7919': 1, 'RFC4253': 4, 'RFC5656': 2, 'RFC4252': 4, 'RFC5280': 1, 'RFC6066': 1, 'RFC8603': 1}, 'X509': {'X.509': 14}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER PP Origin: OSPP The user of the OS is not willfully negligent or hostile': 1}}}
. - The cert_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-1213-2023': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 1, 'EAL 2': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.1': 1, 'ALC_CMS.1': 1, 'ALC_TSU_EXT.1': 1, 'ALC_FLR': 1}, 'ATE': {'ATE_IND.1': 1}, 'AVA': {'AVA_VAN.1': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 2, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 1}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
1213a_pdf.pdf
. - The st_filename property was set to
1213b_pdf.pdf
. - The cert_filename property was set to
1213c_pdf.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['BSI']
. - The cert_id property was set to
BSI-DSZ-CC-1213-2023
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1213a_pdf.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1213b_pdf.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The cert property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The cert_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The cert_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
. - The cert_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
.
- The new value is
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name SUSE Linux Enterprise Server 15 SP4 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Operating Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1213c_pdf.pdf",
"dgst": "b5ac8adc4980fd86",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-1213-2023",
"cert_lab": [
"BSI"
],
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:o:suse:linux_enterprise_server:15:sp4:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:15:sp5:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TSU_EXT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"15"
]
},
"indirect_transitive_cves": null,
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2002-20001",
"CVE-2022-27239",
"CVE-2019-18902",
"CVE-2019-18903",
"CVE-2018-17962",
"CVE-2020-8013",
"CVE-2019-18897",
"CVE-2023-23005",
"CVE-2019-18901"
]
},
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"category": "Operating systems",
"cert_id": "BSI-DSZ-CC-1213-2023",
"certification_date": "15.12.2023",
"enhanced": {
"applicant": "SUSE, LLC\n\n1221 S Valley Grove Way\n#500, Pleasant Grove\nUT 84062\nUnited States",
"cert_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1213c_pdf.pdf?__blob=publicationFile\u0026v=2",
"certification_date": "15.12.2023",
"description": "SUSE Linux Enterprise Server is a highly-configurable Linux-based operating system which has been developed to provide a good level of security as required in commercial environments. It also meets all requirements of the General Purpose Operating System Protection Profile v4.2.1 together with the Functional Package for Secure Shell (SSH) v1.0.",
"evaluation_facility": "atsec information security GmbH",
"expiration_date": "14.12.2028",
"product": "SUSE Linux Enterprise Server 15 SP4",
"protection_profile": "Protection Profile for General Purpose Operating Systems Version 4.2.1, 22 April 2019, CCEVS-VR-PP-0047, NIAP,\nFunctional Package for Secure Shell (SSH), Version 1.0, 13 May 2021, CCEVS-VR-PP-0075, NIAP",
"report_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1213a_pdf.pdf?__blob=publicationFile\u0026v=2",
"target_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1213b_pdf.pdf?__blob=publicationFile\u0026v=2"
},
"product": "SUSE Linux Enterprise Server 15 SP4",
"url": "https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Betriebssysteme/1213.html",
"vendor": "SUSE, LLC"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "SUSE LLC",
"manufacturer_web": "https://www.suse.com",
"name": "SUSE Linux Enterprise Server 15 SP4",
"not_valid_after": "2028-12-14",
"not_valid_before": "2023-12-15",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "1213c_pdf.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1213-2023": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.1": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.1": 1,
"ALC_CMS.1": 1,
"ALC_FLR": 1,
"ALC_TSU_EXT.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 2,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_IND.1": 1
},
"AVA": {
"AVA_VAN.1": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 4": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 1
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, Operating System Protection Profile, Linux-based, General Purpose Operating System\"",
"/Subject": "Common Criteria, Certification, Zertifizierung, Operating System Protection Profile, Linux-based, General Purpose Operating System",
"/Title": "Certification Report BSI-DSZ-CC-1213-2023",
"pdf_file_size_bytes": 238737,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "1213a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 extended ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_INT.1, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ALC_TSU_EXT.1, ATE_IND.1, AVA_VAN.1 valid until: 14 December 2028",
"cc_version": "PP conformant Common Criteria Part 2 extended",
"cert_id": "BSI-DSZ-CC-1213-2023",
"cert_item": "SUSE Linux Enterprise Server Version 15 SP4",
"cert_lab": "BSI",
"developer": "SUSE LLC",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "Protection Profile for General Purpose Operating Systems Version 4.2.1, 22 April 2019, CCEVS-VR-PP- 0047, NIAP, Functional Package for Secure Shell (SSH), Version 1.0, 13 May 2021, CCEVS-VR-PP-0075, NIAP"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
},
"ECDH": {
"ECDH": 3
},
"ECDSA": {
"ECDSA": 9
}
},
"FF": {
"DH": {
"DH": 6,
"Diffie-Hellman": 3
},
"DSA": {
"DSA": 1
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1213-2023": 17
}
},
"cc_claims": {
"OE": {
"OE.PLATFORM": 1,
"OE.PROPER_ADMIN": 1,
"OE.PROPER_USER": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.1": 2
},
"AGD": {
"AGD_OPE.1": 2,
"AGD_PRE.1": 2
},
"ALC": {
"ALC_CMC.1": 2,
"ALC_CMS.1": 2,
"ALC_FLR": 3,
"ALC_TSU_EXT.1": 3
},
"ASE": {
"ASE_CCL.1": 2,
"ASE_ECD.1": 2,
"ASE_INT.1": 4,
"ASE_REQ.2": 2,
"ASE_SPD.1": 2,
"ASE_TSS.1": 2
},
"ATE": {
"ATE_IND.1": 2
},
"AVA": {
"AVA_VAN.1": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 3,
"EAL 4": 3
}
},
"cc_sfr": {
"FCS": {
"FCS_RBG_EXT": 2
},
"FTP": {
"FTP_ITC_EXT.1": 2
}
},
"certification_process": {
"ConfidentialDocument": {
"Report, Version 8, 2023-12-05, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [8] Protection Profile for General Purpose Operating Systems Version 4.2.1, 22 April 2019": 1,
"and SUSE LLC [11] Configuration list for the TOE, 2023-11-03, Master Configuration List, SUSE LLC (confidential document) 7 specifically \u2022 AIS 20, Version 3, Funktionalit\u00e4tsklassen und Evaluationsmethodologie f\u00fcr": 1,
"being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 4
},
"CTR": {
"CTR": 1
},
"GCM": {
"GCM": 8
},
"XTS": {
"XTS": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 1
}
},
"crypto_protocol": {
"IKE": {
"IKE": 1,
"IKEv2": 3
},
"IPsec": {
"IPsec": 1
},
"SSH": {
"SSH": 23
},
"TLS": {
"TLS": {
"TLS": 10,
"TLS v1.2": 2,
"TLSv1.2": 1
}
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 1,
"Key agreement": 1
},
"KEX": {
"KEX": 1,
"Key Exchange": 3
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"NIST P-256": 2,
"NIST P-521": 1,
"P-256": 8,
"P-384": 10,
"P-521": 9
}
},
"eval_facility": {
"atsec": {
"atsec": 4
}
},
"hash_function": {
"PBKDF": {
"PBKDF2": 2
},
"SHA": {
"SHA2": {
"SHA-2": 7,
"SHA-256": 2,
"SHA-384": 1,
"SHA-512": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 1
},
"RNG": {
"RNG": 3
}
},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 20": 2,
"AIS 32": 1
},
"FIPS": {
"FIPS 180-4": 1,
"FIPS 186-4": 3,
"FIPS180-4": 9,
"FIPS186-4": 5,
"FIPS197": 3,
"FIPS198-1": 4
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
},
"PKCS": {
"PKCS#1": 1
},
"RFC": {
"RFC 4253": 1,
"RFC 5246": 1,
"RFC2104": 3,
"RFC2898": 2,
"RFC3447": 1,
"RFC4251": 3,
"RFC4252": 4,
"RFC4253": 9,
"RFC4306": 2,
"RFC4419": 2,
"RFC4868": 2,
"RFC5246": 6,
"RFC5288": 2,
"RFC5647": 2,
"RFC5656": 3,
"RFC5903": 3,
"RFC5996": 2,
"RFC6668": 2,
"RFC7919": 2,
"RFC8017": 2,
"RFC8268": 4,
"RFC8332": 2
},
"X509": {
"X.509": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 11,
"AES-": 1
}
},
"constructions": {
"MAC": {
"HMAC": 9,
"HMAC-SHA-256": 1,
"HMAC-SHA-384": 2,
"HMAC-SHA-512": 1
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7148": 1,
"BSI TR-02102": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, Operating System Protection Profile, Linux-based, General Purpose Operating System\"",
"/Subject": "Common Criteria, Certification, Zertifizierung, Operating System Protection Profile, Linux-based, General Purpose Operating System",
"/Title": "Certification Report BSI-DSZ-CC-1213-2023",
"pdf_file_size_bytes": 446408,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/zertifizierung",
"https://www.sogis.eu/",
"http://www.commoncriteriaportal.org/cc/",
"https://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/AIS",
"https://www.bsi.bund.de/",
"https://www.bsi.bund.de/zertifizierungsreporte"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 31
},
"st_filename": "1213b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 3
},
"ECDH": {
"ECDH": 2,
"ECDHE": 2
},
"ECDSA": {
"ECDSA": 8
}
},
"FF": {
"DH": {
"DH": 1,
"Diffie-Hellman": 2
},
"DSA": {
"DSA": 1
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1213": 1
}
},
"cc_claims": {
"A": {
"A.PLATFORM": 4,
"A.PROPER_ADMIN": 4,
"A.PROPER_USER": 4
},
"O": {
"O.ACCOUNTABILITY": 7,
"O.INTEGRITY": 18,
"O.MANAGEMENT": 9,
"O.PROTECTED_COMMS": 22,
"O.PROTECTED_STORAGE": 8
},
"OE": {
"OE.PLATFORM": 3,
"OE.PROPER_ADMIN": 2,
"OE.PROPER_USER": 3
},
"T": {
"T.LIMITED_PHYSICAL_ACCESS": 3,
"T.LOCAL_ATTACK": 2,
"T.NETWORK_ATTACK": 10,
"T.NETWORK_EAVESDROP": 4
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_TSU_EXT": 5,
"ALC_TSU_EXT.1": 4
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_GEN.1": 8,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1
},
"FCS": {
"FCS_CKM": 2,
"FCS_CKM.1": 9,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 9,
"FCS_CKM.2.1": 1,
"FCS_CKM_EXT": 1,
"FCS_CKM_EXT.4": 9,
"FCS_CKM_EXT.4.1": 2,
"FCS_CKM_EXT.4.2": 1,
"FCS_COP.1": 49,
"FCS_COP.1.1": 4,
"FCS_RBG_EXT": 2,
"FCS_RBG_EXT.1": 10,
"FCS_RBG_EXT.1.1": 1,
"FCS_RBG_EXT.1.2": 1,
"FCS_RNG.1": 2,
"FCS_SSHC_EXT": 1,
"FCS_SSHC_EXT.1": 8,
"FCS_SSHS_EXT": 1,
"FCS_SSHS_EXT.1": 9,
"FCS_SSHS_EXT.1.3": 1,
"FCS_SSH_EXT": 1,
"FCS_SSH_EXT.1": 14,
"FCS_SSH_EXT.1.1": 1,
"FCS_SSH_EXT.1.2": 1,
"FCS_SSH_EXT.1.3": 1,
"FCS_SSH_EXT.1.4": 1,
"FCS_SSH_EXT.1.5": 1,
"FCS_SSH_EXT.1.6": 1,
"FCS_SSH_EXT.1.7": 1,
"FCS_SSH_EXT.1.8": 1,
"FCS_STO_EXT": 1,
"FCS_STO_EXT.1": 8,
"FCS_STO_EXT.1.1": 1,
"FCS_TLSC_EXT": 5,
"FCS_TLSC_EXT.1": 12,
"FCS_TLSC_EXT.2": 9,
"FCS_TLSC_EXT.4": 9
},
"FDP": {
"FDP_ACF_EXT": 1,
"FDP_ACF_EXT.1": 8,
"FDP_ACF_EXT.1.1": 1
},
"FIA": {
"FIA_AFL": 1,
"FIA_AFL.1": 8,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_UAU": 1,
"FIA_UAU.5": 8,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1
},
"FMT": {
"FMT_MOF_EXT": 2,
"FMT_MOF_EXT.1": 8,
"FMT_SMF_EXT": 1,
"FMT_SMF_EXT.1": 9,
"FMT_SMF_EXT.1.1": 2
},
"FPT": {
"FPT_ACF_EXT": 1,
"FPT_ACF_EXT.1": 8,
"FPT_ACF_EXT.1.1": 1,
"FPT_ACF_EXT.1.2": 1,
"FPT_ASLR_EXT": 2,
"FPT_ASLR_EXT.1": 8,
"FPT_SBOP_EXT": 1,
"FPT_SBOP_EXT.1": 9,
"FPT_TST_EXT": 1,
"FPT_TST_EXT.1": 8,
"FPT_TST_EXT.1.1": 1,
"FPT_TUD_EXT": 3,
"FPT_TUD_EXT.1": 9,
"FPT_TUD_EXT.1.1": 1,
"FPT_TUD_EXT.1.2": 1,
"FPT_TUD_EXT.2": 8,
"FPT_TUD_EXT.2.1": 1,
"FPT_TUD_EXT.2.2": 1
},
"FTA": {
"FTA_TAB": 1,
"FTA_TAB.1": 8,
"FTA_TAB.1.1": 1
},
"FTP": {
"FTP_ITC_EXT": 3,
"FTP_ITC_EXT.1": 8,
"FTP_ITC_EXT.1.1": 1,
"FTP_TRP": 1,
"FTP_TRP.1": 8,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {
"OutOfScope": {
"The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER PP Origin: OSPP The user of the OS is not willfully negligent or hostile": 1,
"out of scope": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 2
},
"CCM": {
"CCM": 1
},
"CTR": {
"CTR": 2
},
"GCM": {
"GCM": 3
},
"XTS": {
"XTS": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 9
},
"libgcrypt": {
"libgcrypt": 2
}
},
"crypto_protocol": {
"PGP": {
"PGP": 1
},
"SSH": {
"SSH": 99
},
"TLS": {
"SSL": {
"SSL": 2
},
"TLS": {
"TLS": 64,
"TLS 1.2": 3,
"TLS v1.2": 1,
"TLSv1.0": 1,
"TLSv1.1": 1,
"TLSv1.2": 3
}
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
},
"MAC": {
"MAC": 2
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 10,
"P-384": 16,
"P-521": 16,
"secp256r1": 2,
"secp384r1": 2,
"secp521r1": 2
}
},
"eval_facility": {
"atsec": {
"atsec": 1
}
},
"hash_function": {
"PBKDF": {
"PBKDF": 1
},
"SHA": {
"SHA1": {
"SHA-1": 1
},
"SHA2": {
"SHA-256": 6,
"SHA-384": 6,
"SHA-512": 6
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 6,
"PRNG": 1
},
"RNG": {
"RBG": 2,
"RNG": 4
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 1,
"FIPS PUB 186-4": 6
},
"NIST": {
"NIST SP 800-38A": 3,
"NIST SP 800-38D": 2,
"NIST SP 800-38E": 2,
"NIST SP 800-56A": 1,
"NIST SP 800-57": 1
},
"PKCS": {
"PKCS #7": 1
},
"RFC": {
"RFC 4251": 1,
"RFC 4252": 6,
"RFC 4253": 7,
"RFC 5246": 11,
"RFC 5280": 3,
"RFC 5288": 4,
"RFC 5289": 12,
"RFC 5647": 2,
"RFC 5656": 10,
"RFC 6066": 1,
"RFC 6125": 2,
"RFC 6668": 2,
"RFC 8268": 3,
"RFC 8332": 6,
"RFC 8603": 1,
"RFC4252": 4,
"RFC4253": 4,
"RFC5280": 1,
"RFC5656": 2,
"RFC6066": 1,
"RFC7919": 1,
"RFC8603": 1
},
"X509": {
"X.509": 14
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 6,
"AES-256": 1
}
},
"constructions": {
"MAC": {
"CBC-MAC": 1,
"HMAC": 4,
"HMAC-SHA-256": 2,
"HMAC-SHA-384": 2,
"HMAC-SHA-512": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {
"TLS": {
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA256": 2,
"TLS_DHE_RSA_WITH_AES_128_GCM_SHA256": 2,
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA256": 2,
"TLS_DHE_RSA_WITH_AES_256_GCM_SHA384": 2,
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA": 1,
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256": 2,
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": 2,
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA": 1,
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 2,
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": 1,
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256": 2,
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": 2,
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": 1,
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384": 2
}
},
"vendor": {
"Microsoft": {
"Microsoft": 2
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Stephan M\u00fcller (generated by CCTool version 2.8.4.66)",
"/Keywords": "SLES, operating system",
"/Subject": "SUSE Linux Enterprise Server",
"/Title": "SUSE Linux Enterprise Server 15 SP4 Security Target (version 1.4 as of 2023-12-05)",
"pdf_file_size_bytes": 880981,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0578",
"http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R5.pdf",
"https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0682",
"https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0441",
"http://tools.ietf.org/html/rfc4252",
"http://tools.ietf.org/html/rfc5656",
"https://www.suse.com/support/security/",
"https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0501",
"http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R5.pdf",
"https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0732",
"https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0715",
"http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R5.pdf",
"https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0649",
"https://www.niap-ccevs.org/Profile/Info.cfm?PPID=459\u0026id=459",
"https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0680",
"https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0463",
"https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0695",
"https://www.suse.com/support/security/contact/",
"https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0600",
"https://www.suse.com/support/update/",
"https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0493",
"https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0386",
"https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0777",
"http://tools.ietf.org/html/rfc4253",
"https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0630",
"https://www.niap-ccevs.org/Profile/Info.cfm?PPID=442\u0026id=442",
"https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0365"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 72
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": "EAL1",
"pp_ids": {
"_type": "Set",
"elements": [
"PP_OS_V4.2.1"
]
},
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/PP_OS_V4.2.1.pdf",
"pp_name": "Protection Profile for General Purpose Operating Systems, Version 4.2.1"
},
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pkg_ssh_v1.0.pdf",
"pp_name": "Functional Package for SSH Version 1.0"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1213a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VAN.1",
"ASE_ECD.1",
"ASE_REQ.2",
"ASE_INT.1",
"AGD_OPE.1",
"ASE_CCL.1",
"ALC_TSU_EXT.1",
"ALC_CMC.1",
"ASE_TSS.1",
"ADV_FSP.1",
"ATE_IND.1",
"ASE_SPD.1",
"AGD_PRE.1",
"ALC_CMS.1"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1213b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "0ec6dd3a0f16991f13d6c0b06a2d87fdf037c3629e9dc5d9b0c5ac9a5bff65e6",
"txt_hash": "89230004791abc4136e2936bc9ecdc9705c8464f55a91da6bee7802d27024907"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "2d7bbf5eb4cc339ea562736fe4982d674d737e11c818ab18c1f1fe4f6e08183e",
"txt_hash": "713acf71b860340b25c5708c2eb8c3db4de423b0192efa202aff1d9bb7161f00"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "81276c89e9ef5d4d337ce7659a1afd5c54583258e0ed2051a43979bf66369f0e",
"txt_hash": "cfd84622f7774cef92b9c7e18dcf3d1f260b38f084fa8b6337895e69774bdabd"
}
},
"status": "active"
}