name |
Ubuntu LTS 16.04.4 with KVM and QEMU 2.5 |
Microsoft Exchange Server 2003 Enterprise Edition, Version/Build 6.5.7226.0 and Hotfix MS05-021 |
category |
Operating Systems |
Operating Systems |
scheme |
SE |
DE |
status |
archived |
archived |
not_valid_after |
04.07.2023 |
01.09.2019 |
not_valid_before |
04.07.2018 |
09.11.2005 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CCRA%20Certificate%20Ubuntu.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20Ubuntu%20LTS%2016.04.4.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0284a.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST-Ubuntu_16.04_LTS-1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0284b.pdf |
manufacturer |
Canonical Group Limited |
Microsoft Corporation |
manufacturer_web |
https://www.canonical.com/ |
https://www.microsoft.com |
security_level |
EAL2, ALC_FLR.3 |
EAL4+, ALC_FLR.3 |
dgst |
13c72eba73efe67d |
bbe326d5bfbd5036 |
heuristics/cert_id |
CSEC2016011 |
BSI-DSZ-CC-0284-2005 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
ASE_ENV.1, ADV_RCR.1, AVA_VLA.2, ASE_INT.1, ADV_HLD.2, AGD_USR.1, ADV_IGS.1, ASE_REQ.1, ASE_PPC.1, ASE_DES.1, ADV_FSP.2, AVA_SOF.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, ALC_FLR.3, ADV_FUN.1, ATE_FUN.1, ATE_DPT.1, ALC_DVS.1, ASE_SRE.1, ASE_OBJ.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1 |
heuristics/extracted_versions |
2.5, 16.04.4 |
6.5.7226.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
CCRA Certificate Ubuntu.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20180705084810+02'00'
- /ModDate: D:20180730084901+02'00'
- pdf_file_size_bytes: 1416660
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
Certification Report Ubuntu LTS 16.04.4.pdf |
0284a.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0284-2005
- cert_item: Microsoft Exchange Server 2003 Enterprise Edition, Version/Build 6.5.7226.0 and Hotfix MS05-021
- cert_lab: BSI
- developer: Microsoft Corporation
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 4: 1
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 9
- EAL4 augmented: 2
- EAL4+: 1
- EAL5: 6
- EAL6: 3
- EAL7: 4
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR: 1
- ALC_FLR.3: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 1
- ACM_CAP: 2
- ACM_CAP.4: 1
- ACM_SCP: 2
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_FSP.2: 1
- ADV_HLD: 2
- ADV_HLD.2: 1
- ADV_IMP: 2
- ADV_IMP.1: 1
- ADV_INT: 2
- ADV_LLD: 2
- ADV_LLD.1: 1
- ADV_RCR: 2
- ADV_RCR.1: 1
- ADV_SPM: 2
- ADV_SPM.1: 1
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 1
- AGD_USR: 2
- AGD_USR.1: 1
- ALC:
- ALC_DVS: 2
- ALC_DVS.1: 1
- ALC_FLR: 2
- ALC_FLR.3: 3
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 2
- ALC_TAT.1: 1
- ASE:
- ASE_DES.1: 1
- ASE_ENV.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_PPC.1: 1
- ASE_REQ.1: 1
- ASE_SRE.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 2
- ATE_COV.2: 1
- ATE_DPT: 2
- ATE_DPT.1: 1
- ATE_FUN: 2
- ATE_FUN.1: 1
- ATE_IND: 2
- ATE_IND.2: 1
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.2: 1
- AVA_SOF: 4
- AVA_SOF.1: 1
- AVA_VLA: 4
- AVA_VLA.2: 2
- AVA_VLA.3: 1
- AVA_VLA.4: 1
|
pdf_data/report_keywords/cc_sfr |
|
- FDP:
- FDP_ACC.1: 2
- FDP_ACF.1: 2
- FDP_IFC.1: 1
- FDP_IFF.1: 1
- FMT:
- FMT_MSA.1: 1
- FMT_MSA.3: 3
- FMT_SMF.1: 1
- FMT_SMR.1: 1
|
pdf_data/report_keywords/cc_claims |
- A:
- A.AUTHUSER: 1
- A.CONNECT: 1
- A.DETECT: 1
- A.IT: 1
- A.KEYS: 1
- A.MANAGE: 1
- A.PEER: 2
- A.PHYSICAL: 1
- A.TRAINEDUSER: 1
- T:
- T.ACCESS: 6
- T.COMM: 1
- T.IA: 2
- T.INFOFLOW: 1
- T.RESTRICT: 1
|
- A:
- A.ACCESS_CONTROL: 2
- A.COM_PROT: 2
- A.CORRECT_HW: 2
- A.INSTALL: 2
- A.MANAGE: 2
- A.NO_EVIL_ADM: 2
- A.PHYS_PROTECT: 2
- T:
- T.AUTH_DAC: 1
- T.DL_MISUSE: 1
- T.OVERFLOW: 1
- T.SPAM: 1
- T.UNAUTHUSE: 1
- T.UNAUTH_DAC: 1
|
pdf_data/report_keywords/vendor |
|
- Microsoft:
- Microsoft: 17
- Microsoft Corporation: 6
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 5
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
- CVE:
- CVE-2017-0861: 1
- CVE-2017-15129: 1
- CVE-2017-16808: 1
- CVE-2017-17805: 1
- CVE-2017-17806: 1
- CVE-2018-3639: 1
- CVE-2018-9056: 1
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- ISO:
- RFC:
- RFC 2460: 1
- RFC 3484: 1
- RFC 3542: 1
- RFC 4213: 1
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Technical Report, BSI-DSZ-CC-0284-2005, Version 1, Datum 2005-09-16, TÜV Informationstechnik GmbH (confidential document) [7] Exchange Server 2003 Administration Guide and Exchange Server 2003 product help (part of the: 1
- OutOfScope:
- disabled in the default configuration of Exchange, such as the IMAP4, POP3, and X.400 protocol, are out of scope of the evaluation, too. B-11 BSI-DSZ-CC-0284-2005 Certification Report 5 Architectural Information: 1
- disabled in the default configuration of Exchange, such as the IMAP4, POP3, and X.400 protocol, are out of scope of the evaluation. The relevant Guidance Documentation is delivered together with the software on: 1
- disabled in the default configuration of Exchange, such as the IMAP4, POP3, and X.400 protocol, are out of scope of the evaluation. The security functionality of the TOE comprises access control for mailboxes and: 1
- of Exchange 2003 the components IMAP4, POP3, and X.400 protocol are disabled and therefore out of scope of the evaluation. The TOE runs on the platform Windows Server 2003 operating system (exact: 1
- out of scope: 4
|
pdf_data/report_metadata |
- /Ansvarigt Område/enhet: CSEC
- /Author: Jerry Johansson
- /C-datum: 2008
- /CSEC ID:
- /CSECID:
- /Company: FMV/CSEC
- /ContentTypeId: 0x010100209C0526C7C5A44683868ABD684765F80200B916D1351C38174AA524317F62806230
- /Copy: 0
- /CreationDate: D:20190131103138+01'00'
- /Creator: Acrobat PDFMaker 11 för Word
- /Current Version: 0.9
- /DDocBinder: Scheme (CB)
- /DDocCabinet: QMS
- /DDocID: 2005-03-05-64D6-T9YR
- /DDocLastModDate: 2006-03-16 10:56:39
- /DDocLibrary: https://haddock.fmv.se/domdoc/CSECLib.nsf
- /DDocRevision: 3,7
- /DDocTitle: 035 CB General Document - Template
- /Datum, skapat: -
- /Deluppdragsbenämning:
- /Dokument Status: Aktiv
- /Dokumentansvarig: Jerry Johansson
- /Dokumentansvarigs enhet: KC Ledsyst
- /Dokumentbeteckning:
- /Dokumentdatum: 2018-Jul-04
- /Dokumenttitel: Certification Report Canonical Ubuntu LTS 16.04.4
- /Dokumenttyp: CB
- /FMV_beteckning: 16FMV12482-52:1
- /Fast_Roll:
- /Fast_av:
- /Fast_den: 2014-01-27T19:05:45Z
- /Fastställarens roll: Lead Certifier
- /Fastställd den: 2016-06-10T19:05:00Z
- /Fastställt av: Jerry Johansson
- /Fastställt av1: Jerry Johansson
- /Giltigt från: -
- /Infoklass: Öppen
- /Informationsklass:
- /Keywords:
- /Klassificeringsnr: 25 550
- /MallVersion: 7.0
- /ModDate: D:20190201073718+01'00'
- /Paragraf:
- /Platina: 1
- /Producer: Adobe PDF Library 11.0
- /Referens ID: FMVID-297-738
- /Sekr. gäller tom.: -
- /SourceModified:
- /Status: Aktivt
- /Stämpel: 0
- /Subject: 16FMV12482-52:1
- /Title: Certification Report Canonical Ubuntu LTS 16.04.4
- /Uncontrolled: 0.000000
- /Uppdragsbenämning:
- /Utgåva: 1.0
- /_dlc_DocId: CSEC-37-1650
- /_dlc_DocIdItemGuid: cfa7e571-175c-4889-bd10-378edb70609a
- /_dlc_DocIdUrl: http://sp.fmv.se/sites/CSEC/_layouts/15/DocIdRedir.aspx?ID=CSEC-37-1650, CSEC-37-1650
- /Ärendetyp: 6
- pdf_file_size_bytes: 166835
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
- /Author: Federal Office for Information Security (BSI)
- /Company: BSI, Postfach 200363, 53133 Bonn
- /CreationDate: D:20051220074356+01'00'
- /Creator: Acrobat PDFMaker 7.0.5 für Word
- /ModDate: D:20051220075600+01'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /SourceModified: D:20051220064348
- /Subject: BSI-DSZ-CC-0284-2005
- /Title: Certification Report
- pdf_file_size_bytes: 399534
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 39
|
pdf_data/st_filename |
ST-Ubuntu_16.04_LTS-1.0.pdf |
0284b.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL2: 4
- EAL2 augmented: 1
- EAL4: 1
|
- EAL:
- EAL4: 10
- EAL4 augmented: 5
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.3: 5
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ACM:
- ACM_AUT.1: 2
- ACM_CAP.3: 3
- ACM_SCP.1: 1
- ACM_SCP.2: 2
- ADO:
- ADO_DEL.2: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.1: 9
- ADV_FSP.2: 2
- ADV_FUN.1: 1
- ADV_HLD.1: 2
- ADV_HLD.2: 3
- ADV_IGS.1: 1
- ADV_IMP.1: 3
- ADV_LLD.1: 4
- ADV_RCR.1: 5
- ADV_SPM.1: 2
- AGD:
- AGD_ADM.1: 3
- AGD_USR.1: 4
- ALC:
- ALC_DVS.1: 3
- ALC_FLR.3: 9
- ALC_LCD.1: 2
- ALC_TAT.1: 3
- ASE:
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 1
- ATE_FUN.1: 3
- ATE_IND.2: 2
- AVA:
- AVA_MSU.2: 2
- AVA_SOF.1: 2
- AVA_VLA.2: 3
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR.1: 8
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 6
- FAU_SAR.2.1: 1
- FAU_SEL.1: 8
- FAU_SEL.1.1: 1
- FAU_STG.1: 10
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 7
- FAU_STG.3.1: 1
- FAU_STG.4: 8
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 34
- FCS_CKM.1.1: 3
- FCS_CKM.2: 13
- FCS_CKM.2.1: 1
- FCS_CKM.4: 13
- FCS_CKM.4.1: 1
- FCS_COP.1: 26
- FCS_COP.1.1: 6
- FCS_RNG: 2
- FCS_RNG.1: 33
- FCS_RNG.1.1: 4
- FCS_RNG.1.2: 5
- FDP:
- FDP_ACC.1: 38
- FDP_ACC.1.1: 3
- FDP_ACC.2: 19
- FDP_ACC.2.1: 2
- FDP_ACC.2.2: 2
- FDP_ACF.1: 42
- FDP_ACF.1.1: 5
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 5
- FDP_ACF.1.4: 5
- FDP_CDP: 5
- FDP_CDP.1: 14
- FDP_CDP.1.1: 2
- FDP_ETC.2: 8
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_IFC.1: 14
- FDP_IFC.2: 20
- FDP_IFC.2.1: 2
- FDP_IFC.2.2: 2
- FDP_IFF.1: 26
- FDP_IFF.1.1: 3
- FDP_IFF.1.2: 3
- FDP_IFF.1.3: 3
- FDP_IFF.1.4: 3
- FDP_IFF.1.5: 3
- FDP_ITC.1: 4
- FDP_ITC.2: 22
- FDP_ITC.2.1: 2
- FDP_ITC.2.2: 2
- FDP_ITC.2.3: 2
- FDP_ITC.2.4: 2
- FDP_ITC.2.5: 2
- FDP_RIP.2: 13
- FDP_RIP.2.1: 1
- FDP_UCT: 1
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 19
- FIA_ATD.1.1: 2
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU.1: 12
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5: 10
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.7: 6
- FIA_UAU.7.1: 1
- FIA_UID.1: 14
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UID.2: 8
- FIA_UID.2.1: 1
- FIA_USB.1: 8
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA.1: 50
- FMT_MSA.1.1: 5
- FMT_MSA.3: 51
- FMT_MSA.3.1: 7
- FMT_MSA.3.2: 7
- FMT_MSA.4: 6
- FMT_MSA.4.1: 1
- FMT_MTD.1: 91
- FMT_MTD.1.1: 13
- FMT_REV.1: 15
- FMT_REV.1.1: 2
- FMT_REV.1.2: 2
- FMT_SMF.1: 25
- FMT_SMF.1.1: 1
- FMT_SMR.1: 35
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 8
- FPT_STM.1.1: 1
- FPT_TDC.1: 22
- FPT_TDC.1.1: 2
- FPT_TDC.1.2: 2
- FTA:
- FTA_SSL.1: 7
- FTA_SSL.1.1: 1
- FTA_SSL.1.2: 1
- FTA_SSL.2: 7
- FTA_SSL.2.1: 1
- FTA_SSL.2.2: 1
- FTP:
- FTP_ITC.1: 11
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 2
|
- FDP:
- FDP_ACC.1: 42
- FDP_ACC.1.1: 4
- FDP_ACF.1: 40
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 3
- FDP_ACF.1.4: 3
- FDP_IFC.1: 25
- FDP_IFC.1.1: 1
- FDP_IFF.1: 20
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 2
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_IFF.1.6: 1
- FIA:
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 7
- FIA_UAU.2.1: 1
- FIA_UID.1: 5
- FIA_UID.2: 8
- FIA_UID.2.1: 1
- FMT:
- FMT_ACC.1: 1
- FMT_MOF.1: 9
- FMT_MOF.1.1: 1
- FMT_MSA.1: 28
- FMT_MSA.1.1: 3
- FMT_MSA.3: 52
- FMT_MSA.3.1: 3
- FMT_MSA.3.2: 3
- FMT_SMF.1: 21
- FMT_SMF.1.1: 1
- FMT_SMR.1: 34
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FRU:
- FRU_RSA.1: 18
- FRU_RSA.1.1: 2
- FTP:
- FTP_TRP.1: 7
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.AUTHUSER: 3
- A.CONNECT: 5
- A.DETECT: 3
- A.IT: 2
- A.KEYS: 3
- A.MANAGE: 5
- A.PEER: 6
- A.PHYSICAL: 4
- A.TRAINEDUSER: 3
- O:
- O.AUDITING: 14
- O.COMP: 32
- O.CP: 17
- O.CRYPTO: 15
- O.DISCRETIONARY: 10
- O.MANAGE: 26
- O.NETWORK: 12
- O.SUBJECT: 10
- O.TRUSTED_CHANNEL: 4
- OE:
- OE.ADMIN: 6
- OE.INFO_PROTECT: 8
- OE.INSTALL: 4
- OE.IT: 4
- OE.MAINTENANCE: 3
- OE.PHYSICAL: 3
- OE.RECOVER: 4
- OE.REMOTE: 4
- OE.TRUSTED: 5
- T:
- T.ACCESS: 24
- T.COMM: 4
- T.IA: 6
- T.INFOFLOW: 4
- T.RESTRICT: 3
|
- A:
- A.ACCESS_CONTROL: 3
- A.COM_PROT: 3
- A.CORRECT_HW: 3
- A.INSTALL: 4
- A.MANAGE: 4
- A.NO_EVIL_ADM: 2
- A.NO_EVIL_ADMIN: 1
- A.PHYS_PROTECT: 4
- O:
- O.CONBLK: 13
- O.DAC: 16
- O.FILTER_EMAIL: 10
- O.QUOTA: 12
- O.RESTDIST: 11
- OE:
- OE.COM_PROT: 5
- OE.DAC: 12
- OE.INSTALL: 3
- OE.PHYSICAL: 3
- OE.PLATFORM_: 1
- OE.PLATFORM_SUPPORT: 4
- T:
- T.AUTH_DAC: 4
- T.DL_MISUSE: 4
- T.OVERFLOW: 4
- T.SPAM: 9
- T.UNAUTHUSE: 3
- T.UNAUTH_DAC: 3
|
pdf_data/st_keywords/vendor |
|
- Microsoft:
- Microsoft: 20
- Microsoft Corporation: 2
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-224: 1
- SHA-256: 4
- SHA-384: 4
- SHA-512: 4
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 1
- P-384: 1
- P-521: 1
- curve P-256: 1
- curve P-384: 1
- curve P-521: 1
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- FIPS:
- FIPS 140-2: 7
- FIPS 180-4: 6
- FIPS 186-4: 1
- FIPS 197: 5
- FIPS 198-1: 2
- FIPS 46-3: 1
- FIPS PUB 186-4: 4
- FIPS180-4: 2
- FIPS197: 2
- PKCS:
- RFC:
- RFC 2460: 1
- RFC 3484: 1
- RFC 3542: 1
- RFC 4213: 1
- RFC 4252: 4
- RFC 4253: 3
- RFC 768: 1
- RFC 791: 2
- RFC 792: 1
- RFC 793: 1
- RFC3526: 2
- RFC4252: 6
- RFC4253: 13
- RFC4419: 3
- RFC5656: 4
- RFC6668: 2
|
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 1
- CCIMB-99-033: 1
- RFC:
- RFC1725: 1
- RFC1730: 1
- RFC821: 11
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- DAC mechanism but may be supplemented by further restrictions. These additional restrictions are out of scope for this evaluation. Examples of objects which are accessible to users that cannot be used to store: 1
- PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation: 1
- as Port Address Translation (PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation. Furthermore, packet mangling support is provided with IPTables which is also: 1
- out of scope: 3
|
- OutOfScope:
- disabled in the default configuration of Exchange, such as the IMAP4, POP3, and X.400 protocol, are out of scope of the evaluation. The security functionality of the TOE comprises access control for mailboxes and: 1
- out of scope: 2
- the TOE is Exchange in its default configuration, IMAP4, POP3, and X.400 protocols are disabled and out of scope in the evaluation. Security Target Page 9/64 1. Admin component, which includes the following: 1
|
pdf_data/st_metadata |
- /Author: Stephan Mueller (generated by CCTool version 2.8.4.6)
- /CreationDate: D:20180627092838Z
- /Creator: Unknown
- /Keywords: Security Target, Common Criteria, Linux Distribution
- /ModDate: D:20180730084951+02'00'
- /Producer: XEP 4.18 build 20100322
- /Subject: Ubuntu
- /Title: Security Target for Ubuntu 16.04 LTS (version 1.0 as of 2018-06-27)
- /Trapped: /False
- /application: CCTool version x.y
- pdf_file_size_bytes: 1143627
- pdf_hyperlinks: http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R4.pdf, http://tools.ietf.org/html/rfc4252, http://tools.ietf.org/html/rfc5656, http://tools.ietf.org/html/rfc4253, http://tools.ietf.org/html/rfc3526, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R4.pdf, http://tools.ietf.org/html/rfc6668, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R4.pdf, http://csrc.nist.gov/publications/fips/fips180-4/fips-180-4.pdf, http://tools.ietf.org/html/rfc4419
- pdf_is_encrypted: False
- pdf_number_of_pages: 114
|
- /Author: slabihou
- /CreationDate: D:20050713145508+02'00'
- /Creator: pdfFactory Pro www.pdffactory.com
- /Producer: pdfFactory Pro 2.41 (Windows 2000 Professional German)
- /Title: MS_EX_ST_1.9.doc
- pdf_file_size_bytes: 285736
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 64
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |