Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Junos OS 22.2R1 for MX10003
None
Certes TNM v3.4 Software with CEP 10 VSE, CEP 100 VSE, CEP 1000 VSE, and CEP 10G VSE Running CEP v2.1.1 Firmware
383-4-165
name Junos OS 22.2R1 for MX10003 Certes TNM v3.4 Software with CEP 10 VSE, CEP 100 VSE, CEP 1000 VSE, and CEP 10G VSE Running CEP v2.1.1 Firmware
scheme AU CA
status active archived
not_valid_after 22.12.2027 19.04.2018
not_valid_before 22.12.2022 14.12.2012
report_link https://www.commoncriteriaportal.org/files/epfiles/AISEP-CC-CR-2022-EFT-T024-22.2R1_MX10003-CR-V1.0_20231010.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certes-v34-cert-eng.pdf
st_link https://www.commoncriteriaportal.org/files/epfiles/Juniper%20Junos%2022.2R1%20for%20MX10003%20%20Security%20Target%20v1.3.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certes-v34-sec-eng.pdf
manufacturer Juniper Networks, Inc. Certes Network, Inc.
manufacturer_web https://www.certesnetworks.com/
security_level {} EAL4+, ALC_FLR.3
dgst 34b85005f7f4ed15 2176819e07cf12a3
heuristics/cert_id 383-4-165
heuristics/cert_lab [] CANADA
heuristics/extracted_sars ALC_CMS.1, ASE_CCL.1, ASE_INT.1, ADV_FSP.1, AGD_PRE.1, AVA_VAN.1, ASE_OBJ.1, ASE_ECD.1, ASE_SPD.1, ATE_IND.1, ASE_TSS.1, ASE_REQ.1, ALC_CMC.1, AGD_OPE.1 ADV_ARC.1, ATE_COV.2, ASE_TSS.1, AGD_OPE.1, ATE_DPT.1, ADV_IMP.1, ALC_FLR.3, ALC_DVS.1, ASE_REQ.2, ALC_TAT.1, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ALC_CMS.4, ASE_ECD.1, ADV_TDS.3, ALC_DEL.1, ASE_OBJ.2, AVA_VAN.3, ADV_FSP.4, ASE_INT.1, ASE_SPD.1, ATE_FUN.1, ALC_CMC.4, ALC_LCD.1
heuristics/extracted_versions 22.2 2.1.1, 3.4
protection_profile_links {} {}
pdf_data/report_filename AISEP-CC-CR-2022-EFT-T024-22.2R1_MX10003-CR-V1.0_20231010.pdf certes-v34-cert-eng.pdf
pdf_data/report_frontpage
  • CA:
  • CA:
    • cert_id: 383-4-165-CR
    • cert_lab: CANADA
pdf_data/report_keywords/cc_cert_id
  • CA:
    • 383-4-165-CR: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 4
    • EAL 4 augmented: 2
    • EAL 4+: 2
    • EAL4+: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.3: 2
pdf_data/report_keywords/eval_facility
  • Teron:
    • Teron Labs: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • 3DES:
      • 3DES: 2
      • Triple-DES: 1
  • constructions:
    • MAC:
      • HMAC: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 3
    • SSHv2: 2
  • SSH:
    • SSH: 2
pdf_data/report_keywords/randomness
  • RNG:
    • RBG: 1
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 180-2: 1
    • FIPS 186-2: 1
    • FIPS 197: 1
    • FIPS 198: 1
    • FIPS 46-3: 1
  • ISO:
    • ISO/IEC 17025:2005: 1
pdf_data/report_metadata
  • /Author: User
  • /CCEF: CGI Security Evaluation and Test Facility
  • /CR date: dd month yyyy
  • /CR version: 0.9
  • /Certificate date: dd month yyyy
  • /Company:
  • /CreationDate: D:20130122090600-05'00'
  • /Creator: Acrobat PDFMaker 10.0 for Word
  • /Developer name: Certes Networks, Inc
  • /Document number: 383-4-165-CR
  • /ETR title, version, date: Certes Networks, Inc TNM v3.4 Software with CEP 10 VSE, CEP 100 VSE, CEP 1000 VSE, and CEP 10G VSE running CEP v2.1.1 Firmware Common Criteria EAL4+ Evaluation Technical Report version 1.3, 14 December 2012
  • /Evaluation completion date: 22 November 2012
  • /Manager:
  • /ModDate: D:20130122090713-05'00'
  • /Producer: Acrobat Distiller 10.0.0 (Windows)
  • /ST Title: Certes Networks, Inc. TNM v3.4 Software with CEP 10 VSE, CEP 100 VSE, CEP 1000 VSE, and CEP 10G VSE running CEP v2.1.1 Firmware
  • /ST date: 21 November 2012
  • /ST version: 1.3
  • /Sponsor: Certes Networks, Inc
  • /Subject:
  • /TOE Version: 5.0
  • /TOE name and version: TNM v3.4 Software with CEP 10 VSE, CEP 100 VSE, CEP 1000 VSE, and CEP 10G VSE running CEP v2.1.1 Firmware
  • /TOE short name: Certes TNM v3.4 and CEP v2.1.1
  • /Title: EAL 4+ Evaluation of TNM v3.4 Software with CEP 10 VSE, CEP 100 VSE, CEP 1000 VSE, and CEP 10G VSE running CEP v2.1.1 Firmware
  • pdf_file_size_bytes: 61059
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 15
pdf_data/st_filename Juniper Junos 22.2R1 for MX10003 Security Target v1.3.pdf certes-v34-sec-eng.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 1
    • EAL4 augmented: 1
    • EAL4+: 5
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.3: 4
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 6
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 4
    • FAU_GEN.2.1: 1
    • FAU_STG_EXT: 2
    • FAU_STG_EXT.1: 3
    • FAU_STG_EXT.1.1: 1
    • FAU_STG_EXT.1.2: 1
    • FAU_STG_EXT.1.3: 1
  • FCS:
    • FCS_CKM: 3
    • FCS_CKM.1: 5
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 4
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 4
    • FCS_CKM.4.1: 1
    • FCS_COP: 22
    • FCS_COP.1: 10
    • FCS_COP.1.1: 3
    • FCS_MKA: 2
    • FCS_MKA_EXT.1: 5
    • FCS_MKA_EXT.1.1: 1
    • FCS_MKA_EXT.1.2: 1
    • FCS_MKA_EXT.1.3: 1
    • FCS_MKA_EXT.1.4: 1
    • FCS_MKA_EXT.1.5: 1
    • FCS_MKA_EXT.1.6: 1
    • FCS_MKA_EXT.1.7: 1
    • FCS_MKA_EXT.1.8: 1
    • FCS_NTP_EXT.1.4: 2
    • FCS_RBG_EXT.1: 7
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 1
    • FCS_SSHS_EXT: 2
    • FCS_SSHS_EXT.1: 7
    • FCS_SSHS_EXT.1.1: 1
    • FCS_SSHS_EXT.1.2: 1
    • FCS_SSHS_EXT.1.3: 1
    • FCS_SSHS_EXT.1.4: 1
    • FCS_SSHS_EXT.1.5: 1
    • FCS_SSHS_EXT.1.6: 1
    • FCS_SSHS_EXT.1.7: 1
    • FCS_SSHS_EXT.1.8: 1
    • FCS_TLSC_EXT.2.3: 1
  • FIA:
    • FIA_AFL: 2
    • FIA_AFL.1: 10
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_PMG_EXT: 2
    • FIA_PMG_EXT.1: 4
    • FIA_PMG_EXT.1.1: 1
    • FIA_PSK_EXT.1: 3
    • FIA_UAU: 2
    • FIA_UAU.7: 4
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 2
    • FIA_UAU_EXT.2: 4
    • FIA_UAU_EXT.2.1: 1
    • FIA_UIA_EXT: 2
    • FIA_UIA_EXT.1: 5
    • FIA_UIA_EXT.1.1: 1
    • FIA_UIA_EXT.1.2: 1
  • FMT:
    • FMT_MOF: 17
    • FMT_MOF.1: 3
    • FMT_MTD: 13
    • FMT_MTD.1: 2
    • FMT_SMF: 2
    • FMT_SMF.1: 11
    • FMT_SMF.1.1: 1
    • FMT_SMR: 2
    • FMT_SMR.2: 6
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT: 2
    • FPT_APW_EXT.1: 5
    • FPT_APW_EXT.1.1: 1
    • FPT_APW_EXT.1.2: 1
    • FPT_CAK_EXT.1: 6
    • FPT_CAK_EXT.1.1: 1
    • FPT_FLS: 3
    • FPT_FLS.1: 4
    • FPT_FLS.1.1: 1
    • FPT_RPL.1: 7
    • FPT_RPL.1.1: 1
    • FPT_RPL.1.2: 1
    • FPT_SKP_EXT: 2
    • FPT_SKP_EXT.1: 4
    • FPT_SKP_EXT.1.1: 1
    • FPT_STM.1: 1
    • FPT_STM_EXT: 2
    • FPT_STM_EXT.1: 5
    • FPT_STM_EXT.1.1: 1
    • FPT_STM_EXT.1.2: 1
    • FPT_TST_EXT: 2
    • FPT_TST_EXT.1: 5
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT: 2
    • FPT_TUD_EXT.1: 9
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
  • FTA:
    • FTA_SSL: 2
    • FTA_SSL.3: 6
    • FTA_SSL.4: 5
    • FTA_SSL_EXT: 2
    • FTA_SSL_EXT.1: 5
    • FTA_SSL_EXT.1.1: 1
    • FTA_TAB: 2
    • FTA_TAB.1: 7
  • FTP:
    • FTP_ITC: 2
    • FTP_ITC.1: 9
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP: 7
    • FTP_TRP.1: 4
  • FAU:
    • FAU_GEN.1: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 7
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
  • FCS:
    • FCS_CKM.1: 9
    • FCS_CKM.1.1: 1
    • FCS_CKM.4: 11
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_IFC.1: 12
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 7
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_UCT.1: 6
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 6
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 7
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 8
    • FIA_UID.2: 9
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.1: 7
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 9
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 7
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 12
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 8
    • FPT_STM.1.1: 1
  • FTA:
    • FTA_SSL.3: 6
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 11
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN_CREDENTIALS_SECURE: 1
    • A.LIMITED_FUNCTIONALITY: 1
    • A.NO_THRU_TRAFFIC_PROTECTION: 1
    • A.PHYSICAL_PROTECTION: 1
    • A.REGULAR_UPDATES: 1
    • A.RESIDUAL_INFORMATION: 1
    • A.TRUSTED_ADMINSTRATOR: 1
  • O:
    • O.AUTHENTICATION: 2
    • O.AUTHORIZED_ADMINIS: 1
    • O.AUTHORIZED_ADMINISTRATION: 1
    • O.CRYPTOGRAPHIC_FUN: 1
    • O.CRYPTOGRAPHIC_FUNCTIONS: 1
    • O.PORT_FILTERING: 2
    • O.REPLAY_DETECTION: 2
    • O.SYSTEM_MONITORING: 2
    • O.TSF_INTEGRITY: 2
    • O.VERIFIABLE_UPDATES: 1
  • OE:
    • OE.ADMIN_CREDENTIALS_SECURE: 1
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.NO_THRU_TRAFFIC_PROTECTION: 2
    • OE.PHYSICAL: 1
    • OE.RESIDUAL_INFORMATION: 1
    • OE.TRUSTED_ADMIN: 1
    • OE.UPDATES: 1
  • T:
    • T.DATA_INTEGRITY: 1
    • T.NETWORK_ACCESS: 1
    • T.PASSWORD_CRACKING: 1
    • T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
    • T.SECURITY_FUNCTIONALITY_FAILURE: 1
    • T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
    • T.UNDETECTED_ACTIVITY: 1
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 2
    • T.UPDATE_COMPROMISE: 1
    • T.WEAK_AUTHENTICATION_ENDPOINTS: 1
    • T.WEAK_CRYPTOGRAPHY: 1
  • A:
    • A.INSTALL: 2
    • A.LOCATE: 2
    • A.MANAGE: 2
    • A.NETCON: 2
    • A.NOEVIL: 2
    • A.TIMESTAMP: 2
  • O:
    • O.ADMIN: 4
    • O.AUDIT: 7
    • O.AUTHENTICATE: 6
    • O.ENCRYPT: 4
    • O.INTEGRITY: 6
    • O.KEYMAN: 4
    • O.SECURE_COMM: 8
  • OE:
    • OE.PHYCAL: 1
    • OE.PHYSICAL: 2
    • OE.SECURE_NETWORK: 3
    • OE.TIMESTAMP: 3
    • OE.TRAFFIC: 3
    • OE.TRUSTED_ADMIN: 7
  • T:
    • T.DISCLOSE: 2
    • T.MODIFY: 2
    • T.NO_AUDIT: 2
    • T.SPOOF: 2
    • T.UNATH: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 29
      • AES-: 4
  • constructions:
    • MAC:
      • CMAC: 8
      • HMAC: 2
      • HMAC-SHA-256: 4
      • HMAC-SHA-512: 1
  • AES_competition:
    • AES:
      • AES: 6
      • AES-: 1
      • AES-128: 2
      • AES-192: 2
      • AES-256: 1
  • DES:
    • 3DES:
      • Triple-DES: 6
    • DES:
      • DES: 2
  • constructions:
    • MAC:
      • HMAC: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 5
  • FF:
    • DH:
      • DH: 2
      • Diffie-Hellman: 2
  • FF:
    • DSA:
      • DSA: 2
  • RSA:
    • RSA 1024: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
      • SHA1: 3
    • SHA2:
      • SHA-256: 5
      • SHA-384: 2
      • SHA-512: 4
  • SHA:
    • SHA1:
      • SHA-1: 3
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 10
  • KEX:
    • Key Exchange: 2
    • Key exchange: 1
  • MAC:
    • MAC: 11
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 2
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 1
  • SSH:
    • SSH: 107
    • SSHv2: 11
  • TLS:
    • DTLS:
      • DTLS: 3
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 8
  • IKE:
    • IKE: 2
  • SSH:
    • SSH: 8
  • TLS:
    • SSL:
      • SSL: 2
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 1
  • RNG:
    • RBG: 1
    • RNG: 4
  • PRNG:
    • PRNG: 2
  • RNG:
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • CCM:
    • CCM: 1
  • CTR:
    • CTR: 4
  • GCM:
    • GCM: 6
  • CBC:
    • CBC: 5
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 14
    • P-384: 12
    • P-521: 10
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 4
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS PUB 186-4: 5
  • ISO:
    • ISO/IEC 14888-3: 1
    • ISO/IEC 18031:2011: 2
    • ISO/IEC 9796-2: 1
  • NIST:
    • NIST SP 800-38F: 1
  • PKCS:
    • PKCS #1: 1
  • RFC:
    • RFC 3526: 2
    • RFC 4251: 2
    • RFC 4252: 1
    • RFC 4253: 3
    • RFC 4254: 1
    • RFC 5077: 1
    • RFC 5656: 1
    • RFC 6668: 1
    • RFC3526: 1
    • RFC4344: 1
    • RFC5656: 1
  • FIPS:
    • FIPS 140-2: 9
    • FIPS 180-3: 1
    • FIPS 186-2: 2
    • FIPS 186-3: 2
    • FIPS 197: 1
    • FIPS 198: 1
    • FIPS 46-3: 1
    • FIPS PUB 140-2: 3
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • 10 1.6.5 Summary of out of scope items: 1
    • 10 1.6.5 Summary of out of scope items....................................................................................10 2: 1
    • for remote administration; • Serial connection client for local administration. 1.6.5 Summary of out of scope items • Use of telnet, since it violates the Trusted Path requirement set (see Section 5.7.2) • Use: 1
    • out of scope: 2
pdf_data/st_metadata
  • /Author: Ian Hall
  • /CreationDate: D:20121121113155-05'00'
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20130102114301-05'00'
  • /Producer: Microsoft® Office Word 2007
  • /Subject: TNM v3.4 with CEP 10, CEP 100, CEP 1000, and CEP 10G VSEs Running CEP v2.1.1 Firmware
  • /Title: Security Target Certes Networks, Inc. TNM v3.4 with CEP 10, CEP 100, CEP 1000, and CEP 10G VSEs Running CEP v2.1.1 Firmware
  • pdf_file_size_bytes: 989970
  • pdf_hyperlinks: http://www.corsec.com/, mailto:info@certesnetworks.com, mailto:info@corsec.com, http://www.cipheroptics.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 55
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different