name |
BorderWare MXtreme Mail Firewall Version 3.1 |
EnterpriseDB Postgres Plus Advanced Server 8.4 |
category |
Boundary Protection Devices and Systems |
Databases |
scheme |
UK |
US |
status |
archived |
archived |
not_valid_after |
05.03.2013 |
01.11.2014 |
not_valid_before |
30.07.2004 |
29.07.2011 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP204.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10412-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/borderware_3.0Final.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10412-st.pdf |
manufacturer |
Borderware Technologies |
EnterpriseDB Corporation |
manufacturer_web |
https://www.borderware.com/ |
https://www.enterprisedb.com/ |
security_level |
AVA_VLA.3, EAL4+, ALC_FLR.1 |
EAL2+, ALC_FLR.2 |
dgst |
02140ad16c37fee4 |
711c094f140cc311 |
heuristics/cert_id |
CRP204 |
CCEVS-VR-VID-10412-2011 |
heuristics/cert_lab |
[] |
US |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_RCR.1, ADV_HLD.2, AGD_USR.1, AVA_SOF.1, ADV_FSP.2, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ATE_DPT.1, AVA_VLA.3, ALC_DVS.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1 |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
3.1 |
8.4 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- category: DBMS
- certification_date: 29.07.2011
- evaluation_facility: CygnaCom Solutions, Inc
- expiration_date: 01.11.2014
- id: CCEVS-VR-VID10412
- product: EnterpriseDB Postgres Plus Advanced Server 8.4
- scheme: US
- url: https://www.niap-ccevs.org/product/10412
- vendor: EnterpriseDB Corporation
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
110f0820b080edc2 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_DBMS_BR_V1.2.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
CRP204.pdf |
st_vid10412-vr.pdf |
pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-VID10412-2011
- cert_item: Postgres Plus Advanced Server v8.4
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
- UK:
- CERTIFICATION REPORT No. P204: 1
|
- US:
- CCEVS-VR-VID10412-2011: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL1: 1
- EAL4: 25
- EAL4 augmented: 18
- EAL7: 1
|
- EAL:
- EAL 2: 3
- EAL 2 augmented: 2
- EAL2: 2
|
pdf_data/report_keywords/cc_sar |
- ALC:
- AVA:
- AVA_VLA.2: 1
- AVA_VLA.3: 42
|
- ALC:
- ATE:
- ATE_FUN.1: 1
- ATE_IND.2: 2
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FDP:
- FPT:
- FPT_RIP.1: 1
- FPT_RVM.1: 1
- FPT_SEP.1: 1
- FPT_STM.1: 1
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.NO_EVIL: 1
- A.NO_GENERAL_PURPOSE: 1
- A.OS_PP_VALIDATED: 1
- A.PHYSICAL: 1
- T:
- T.DENIAL_OF_SERVICE: 1
- T.MASQUERADE: 1
- T.POOR_DESIGN: 1
- T.POOR_IMPLEMENTATION: 1
- T.POOR_TEST: 1
- T.RESIDUAL_DATA: 1
- T.TSF_COMPROMISE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNIDENTIFIED_ACTIONS: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-2004-01-004: 1
- CCIMB-99-031: 1
- CCIMB-99-032: 1
- CCIMB-99-033: 1
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- The SMTP server accepts clear text and TLS encrypted connections on port 25, although the latter is out of scope of the evaluation. ii. The MCS may be configured to accept connections on ports 80 and 443: 1
- of the firewall via the MCS and allows users to access their mailboxes, although the latter is out of scope. v. The Authentication server authenticates administrators before they are able to access the MCS: 1
- out of scope: 2
|
- OutOfScope:
- TOE within its Operational Environment. 5.2. Clarification of Scope Configuration Options that are Out of Scope: “Trust” authentication option (not in TOE) When the trust authentication option is specified: 1
|
pdf_data/report_metadata |
- /Author: racook
- /CreationDate: D:20040804100821Z
- /Creator: Borderware MXtreme Mail Firewall CR1.0 - Microsoft Word
- /ModDate: D:20131119171800Z
- /Producer: Acrobat PDFWriter 5.0 for Windows NT
- /Title: Borderware MXtreme Mail Firewall CR1.0.doc
- pdf_file_size_bytes: 186048
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 36
|
|
pdf_data/st_filename |
borderware_3.0Final.pdf |
st_vid10412-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL2: 3
- EAL2 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 1
- ACM_CAP.4: 1
- ACM_SCP.2: 1
- ADO:
- ADO_DEL.2: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.2: 1
- ADV_HLD.2: 1
- ADV_IMP.1: 1
- ADV_LLD.1: 1
- ADV_RCR.1: 1
- ADV_SPM.1: 2
- AGD:
- AGD_ADM.1: 1
- AGD_USR.1: 1
- ALC:
- ALC_DVS.1: 1
- ALC_FLR.1: 7
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_MSU.2: 1
- AVA_SOF: 1
- AVA_SOF.1: 1
- AVA_VLA.3: 7
|
- ADV:
- ADV_ARC.1: 7
- ADV_FSP.1: 2
- ADV_FSP.2: 6
- ADV_TDS.1: 7
- AGD:
- AGD_OPE.1: 10
- AGD_PRE: 1
- AGD_PRE.1: 8
- ALC:
- ALC_CMC.2: 2
- ALC_CMS.2: 4
- ALC_DEL.1: 4
- ALC_FLR.2: 9
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 5
- ATE_FUN.1: 6
- ATE_IND.2: 4
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG.1: 6
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FDP:
- FDP_ACC.1: 7
- FDP_ACC.1.1: 1
- FDP_ACF.1: 5
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 1
- FDP_IFC.1: 7
- FDP_IFC.1.1: 1
- FDP_IFF.1: 9
- FDP_IFF.1.1: 2
- FDP_IFF.1.2: 3
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 2
- FDP_IFF.1.5: 2
- FDP_IFF.1.6: 1
- FDP_RIP.1: 5
- FDP_RIP.1.1: 1
- FDP_RVM.1: 2
- FDP_SEP.1: 2
- FIA:
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_UAU.1: 2
- FIA_UAU.2: 9
- FIA_UAU.2.1: 1
- FIA_UID.1: 3
- FIA_UID.2: 11
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 10
- FMT_MSA.1.1: 1
- FMT_MSA.2: 4
- FMT_MSA.2.1: 1
- FMT_MSA.3: 9
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 6
- FMT_SMF.1.1: 1
- FMT_SMR.1: 7
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_RVM.1: 7
- FPT_RVM.1.1: 1
- FPT_SEP.1: 7
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_STM.1: 6
- FPT_STM.1.1: 1
|
- FAU:
- FAU_GEN: 12
- FAU_GEN.1: 4
- FAU_GEN.2: 1
- FAU_SEL: 10
- FAU_SEL.1: 2
- FDP:
- FDP_ACC.1: 14
- FDP_ACC.1.1: 1
- FDP_ACF: 7
- FDP_ACF.1: 5
- FDP_ITC: 1
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FIA:
- FIA_ATD.1: 14
- FIA_ATD.1.1: 1
- FIA_UAU.2: 1
- FIA_UAU.5: 10
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1: 6
- FIA_UID.2: 1
- FIA_UID_EXT: 2
- FMT:
- FMT_MOF.1: 9
- FMT_MOF.1.1: 1
- FMT_MSA: 1
- FMT_MSA.1: 8
- FMT_MSA.1.1: 2
- FMT_MSA.3: 3
- FMT_MSA.3.2: 1
- FMT_MTD.1: 11
- FMT_MTD.1.1: 1
- FMT_REV.1: 19
- FMT_REV.1.1: 2
- FMT_REV.1.2: 2
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 20
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITA.1: 2
- FPT_ITT.1: 2
- FPT_OVR_EXT.1: 1
- FPT_STM.1: 2
- FPT_TRC.1.1: 1
- FPT_TRC.1.2: 1
- FTA:
- FTA_MCS.1: 8
- FTA_MCS.1.1: 1
- FTA_MCS.1.2: 1
- FTA_TSE.1: 8
- FTA_TSE.1.1: 2
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.PHYSICAL: 2
- A.TRANSFER: 2
- A.TRUSTED: 2
- A.USEAGE: 2
- O:
- O.ADDRESS: 10
- O.ADMIN: 7
- O.ATTEMPT: 4
- O.AUDREC: 4
- O.DIRECT: 5
- O.GW: 4
- O.LIMEXT: 4
- O.MAILCTL: 6
- O.MEDIATE: 10
- O.NOREP: 3
- O.PORT: 1
- O.PORTS: 10
- O.SELPRO: 5
- T:
- T.CONFIG: 2
- T.CONN: 1
- T.DETECT: 2
- T.MEDIAT: 2
- T.OLDINF: 2
- T.OPEN_RELAY: 2
- T.OS_FAC: 2
- T.REM_CONN: 2
- T.REPEAT: 2
- T.SELPRO: 2
- T.SOURCE: 2
- T.UNSOLICITED: 2
|
- A:
- A.NO_EVIL: 3
- A.NO_GENERAL_: 1
- A.NO_GENERAL_PURPOSE: 2
- A.OS_PP_VALIDA: 1
- A.OS_PP_VALIDATED: 2
- A.PHYSICAL: 3
- O:
- O.ACCESS_: 2
- O.ACCESS_HISTORY: 4
- O.ADMIN_: 3
- O.ADMIN_GUIDANCE: 11
- O.ADMIN_ROLE: 3
- O.AUDIT_: 4
- O.AUDIT_GENERATION: 4
- O.AUTH: 8
- O.AVAIL: 7
- O.CONFIGURATION_IDEN: 1
- O.CONFIGURATION_IDENTIFICATI: 4
- O.CONFIGURATION_IDENTIFICATION: 4
- O.DOCUMENTED_DESIGN: 9
- O.INTERNAL_: 2
- O.INTERNAL_TOE_DOMAINS: 4
- O.MANAGE: 15
- O.MEDIATE: 8
- O.PARTIAL_: 5
- O.PARTIAL_FUNCTIONAL_TEST: 6
- O.PARTIAL_SELF_PROTECTION: 6
- O.PROTCOMM: 7
- O.RESIDUAL_INFORMATIO: 1
- O.RESIDUAL_INFORMATION: 7
- O.TOE_ACCESS: 10
- O.VULNERABILITY_ANALY: 1
- O.VULNERABILITY_ANALYSIS: 9
- OE:
- OE.AUTH: 7
- OE.NO_EVIL: 4
- OE.NO_GENERAL_: 2
- OE.NO_GENERAL_PURPOSE: 2
- OE.OS_PP_VALIDATED: 5
- OE.PHYSICAL: 4
- OE.PROTCOMM: 8
- T:
- T.ACCIDENTAL_ADMIN_ERR: 1
- T.DENIAL_OF_SERVICE: 5
- T.MASQUERADE: 3
- T.POOR_DESIGN: 5
- T.POOR_IMPLEMENTATION: 3
- T.POOR_TEST: 3
- T.RESIDUAL_DATA: 3
- T.TSF_COMPROMISE: 7
- T.UNAUTHORIZED_ACCESS: 4
- T.UNIDENTIFIED_ACTIONS: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- RFC:
- RFC 1321: 4
- RFC 1413: 2
- RFC 1964: 1
- RFC 2743: 1
- RFC 4510: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- PostGIS Spatial Extensions EDB*Plus Slony Replication PG Agent Update Monitor 1.4.7.2 Out of Scope The following components of the PPAS 8.4 product are not included in the TOE: Infinite Cache: 1
- Bouncer Procedural Language Debugger StackBuilder Plus 1.4.7.3 Configuration Options that are Out of Scope. 1.4.7.3.1 “Trust” authentication option (not in TOE) When the trust authentication option is: 1
- Out of Scope: 2
- out of scope: 1
- platforms are included in the TOE. In addition, the following components in the IT environment are out of scope. Postgres Plus Advanced Server v8.4 Security Target 15 Authenticator servers, if configured : 1
|
pdf_data/st_metadata |
- /Author: BorderWare Technologies Inc
- /CreationDate: D:20040804110458Z
- /Creator: SecurityTarget3.0Final - Microsoft Word
- /ModDate: D:20040804134352+02'00'
- /Producer: Acrobat PDFWriter 5.0 for Windows NT
- /Title: MXtreme V3.0 Security Target
- pdf_file_size_bytes: 165061
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 54
|
- /CreationDate: D:20110812120756
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20110812120756
- /Producer: Microsoft® Office Word 2007
- pdf_file_size_bytes: 1153309
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 94
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |