Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
RioRey Perimeter Protection Platform RE500, RE1500, RX1800, RX2300, RX4400 and RG Series
None
Red Hat Enterprise Linux Ver. 5.3 on Dell 11G Family Servers
CCEVS-VR-VID-10338-2009
name RioRey Perimeter Protection Platform RE500, RE1500, RX1800, RX2300, RX4400 and RG Series Red Hat Enterprise Linux Ver. 5.3 on Dell 11G Family Servers
category Boundary Protection Devices and Systems Operating Systems
scheme TR US
not_valid_after 27.03.2017 15.01.2015
not_valid_before 15.03.2013 23.12.2009
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/RioRey%20CERTIFICATION%20REPORT.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10338-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/RioRey%20ST-%20v0.9.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10338-st.pdf
manufacturer RIOREY Incorporated Dell, Inc.
manufacturer_web https://www.riorey.com/ https://www.dell.com
security_level EAL4+, ALC_FLR.1 EAL4+, ALC_FLR.3
dgst 53265b9d283d6074 7600914e4a2387a5
heuristics/cert_id CCEVS-VR-VID-10338-2009
heuristics/cert_lab [] US
heuristics/extracted_sars ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 AGD_OPE.1, ADV_ARC.1, ALC_FLR.3
heuristics/extracted_versions - 5.3
heuristics/scheme_data
  • category: Operating System
  • certification_date: 23.12.2009
  • evaluation_facility: atsec information security corporation
  • expiration_date: 25.02.2015
  • id: CCEVS-VR-VID10338
  • product: Red Hat Enterprise Linux Ver. 5.3 on Dell 11G Family Servers
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10338
  • vendor: Dell Technologies, Inc
heuristics/protection_profiles {} 540269ad0d7bcfe0
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_CA_V1.d.pdf
pdf_data/report_filename RioRey CERTIFICATION REPORT.pdf st_vid10338-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VR-VID10338-2009
    • cert_item: Dell 11th Generation PowerEdge Servers running Red Hat Enterprise Linux 5.3
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10338-2009: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 2
    • EAL 4+: 5
    • EAL4: 1
    • EAL4+: 1
  • EAL:
    • EAL 4: 3
    • EAL 4 augmented: 2
    • EAL4: 2
    • EAL4 augmented: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.1: 8
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 2
  • ADV:
    • ADV_ARC.1: 2
  • ALC:
    • ALC_FLR.3: 3
  • ATE:
    • ATE_FUN: 1
pdf_data/report_keywords/cc_sfr
  • FRU:
    • FRU_DDOS_EXT.1: 1
  • FPT:
    • FPT_RVM: 1
    • FPT_RVM.1: 1
    • FPT_SEP: 1
    • FPT_SEP.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.BACKUP: 1
    • A.CONNECT: 1
    • A.NOEVIL: 1
    • A.PHYSICAL: 1
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 4
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA512: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 2
  • MAC:
    • MAC: 4
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 2
    • SSHv2: 2
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • ISO:
    • ISO/IEC 17025: 2
pdf_data/report_keywords/javacard_packages
  • org:
    • org.tr: 1
pdf_data/report_metadata
  • /Author: Tse
  • /CreationDate: D:20130318153433-04'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20130318153433-04'00'
  • /Producer: Microsoft® Word 2010
  • /Title: 1
  • pdf_file_size_bytes: 511380
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 15
  • /Author: Don Phillips
  • /CreationDate: D:20100129130318
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20100129130318
  • /Producer: Microsoft® Office Word 2007
  • /Title: Validators Report
  • pdf_file_size_bytes: 365994
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
pdf_data/st_filename RioRey ST- v0.9.pdf st_vid10338-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4+: 6
  • EAL:
    • EAL3: 1
    • EAL4: 6
    • EAL4 augmented: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.1: 3
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 2
  • ADV:
    • ADV_ARC.1: 8
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_FLR.3: 5
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 17
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 8
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_UAU_EXT.2: 1
  • FIA:
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_UAU: 3
    • FIA_UAU.1: 2
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU_EXT.2: 13
    • FIA_UAU_EXT.2.1: 3
    • FIA_UID: 1
    • FIA_UID.1: 8
    • FIA_UID.2: 7
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MTD.1: 14
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 11
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 8
    • FPT_ITT.1.1: 1
    • FPT_STM.1: 2
  • FRU:
    • FRU_DDOS: 2
    • FRU_DDOS_EXT.1: 12
    • FRU_DDOS_EXT.1.1: 3
    • FRU_DDOS_EXT.1.2: 3
    • FRU_DDOS_EXT.1.3: 3
  • FAU:
    • FAU_GEN.1: 10
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 7
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 10
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 10
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 9
    • FAU_SAR.3.1: 1
    • FAU_SEL.1: 10
    • FAU_SEL.1.1: 1
    • FAU_STG.1: 9
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 9
    • FAU_STG.3.1: 1
    • FAU_STG.4: 9
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 20
    • FCS_CKM.1.1: 3
    • FCS_CKM.2: 22
    • FCS_CKM.2.1: 4
    • FCS_CKM.4: 4
    • FCS_COP.1: 19
    • FCS_COP.1.1: 3
  • FDP:
    • FDP_ACC.1: 29
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 21
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_ETC: 1
    • FDP_ETC.1: 7
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_ETC.2: 9
    • FDP_ETC.2.1: 1
    • FDP_ETC.2.2: 1
    • FDP_ETC.2.3: 1
    • FDP_ETC.2.4: 1
    • FDP_IFC.1: 13
    • FDP_IFC.1.1: 1
    • FDP_IFC.2: 1
    • FDP_IFF.1: 4
    • FDP_IFF.2: 7
    • FDP_IFF.2.1: 1
    • FDP_IFF.2.2: 1
    • FDP_IFF.2.3: 1
    • FDP_IFF.2.4: 1
    • FDP_IFF.2.5: 1
    • FDP_IFF.2.6: 1
    • FDP_ITC.1: 10
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 9
    • FDP_ITC.2.1: 1
    • FDP_ITC.2.2: 1
    • FDP_ITC.2.3: 1
    • FDP_ITC.2.4: 1
    • FDP_ITC.2.5: 1
    • FDP_RIP.2: 12
    • FDP_RIP.2.1: 1
    • FDP_UCT.1: 9
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 9
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_ATD.1: 12
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 9
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 12
    • FIA_UAU.2.1: 1
    • FIA_UAU.7: 9
    • FIA_UAU.7.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 5
    • FIA_UID.2: 13
    • FIA_UID.2.1: 1
    • FIA_USB.1: 20
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 36
    • FMT_MSA.1.1: 6
    • FMT_MSA.2: 13
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 30
    • FMT_MSA.3.1: 4
    • FMT_MSA.3.2: 3
    • FMT_MTD.1: 60
    • FMT_MTD.1.1: 6
    • FMT_MTD.3: 10
    • FMT_MTD.3.1: 1
    • FMT_REV.1: 21
    • FMT_REV.1.1: 2
    • FMT_REV.1.2: 2
    • FMT_SMF: 1
    • FMT_SMF.1: 26
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 14
    • FMT_SMR.2: 19
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_AMT.1: 2
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_RCV.1: 9
    • FPT_RCV.1.1: 1
    • FPT_RCV.4: 8
    • FPT_RCV.4.1: 1
    • FPT_RVM.1: 1
    • FPT_SEP.1: 1
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TDC.1: 9
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TEE.1: 10
    • FPT_TEE.1.1: 1
    • FPT_TEE.1.2: 1
    • FPT_TST.1: 8
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_LSA.1: 8
    • FTA_LSA.1.1: 1
    • FTA_TSE.1: 8
    • FTA_TSE.1.1: 1
  • FTP:
    • FTP_ITC.1: 14
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.BACKUP: 3
    • A.CONNECT: 3
    • A.NOEVIL: 3
    • A.PHYSICAL: 3
  • O:
    • O.AUDIT: 10
    • O.DDOSALERT: 5
    • O.DDOSMITIGATE: 6
    • O.FAILSAFE: 6
    • O.IDAUTH: 9
    • O.MANAGE: 8
    • O.PROCOM: 6
  • OE:
    • OE.AUDIT: 4
    • OE.BACKUP: 3
    • OE.CONNECT: 3
    • OE.NOEVIL: 3
    • OE.PHYSICAL: 3
    • OE.TIME: 5
  • T:
    • T.AUDIT: 4
    • T.DDOSATTACK: 3
    • T.FAILURE: 3
    • T.MANAGE: 3
    • T.NOAUTH: 3
    • T.PROCOM: 3
  • A:
    • A.ACCESS: 2
    • A.ASSET: 2
    • A.CLEARANCE: 2
    • A.CONNECT: 6
    • A.COOP: 2
    • A.LOCATE: 2
    • A.MANAGE: 4
    • A.NET_COMP: 3
    • A.NO_EVIL_ADMIN: 3
    • A.OWNER: 2
    • A.PEER: 2
    • A.PROTECT: 4
    • A.SENSITIVITY: 2
    • A.UTRAIN: 2
    • A.UTRUST: 2
  • O:
    • O.AUDITING: 17
    • O.AUTHORIZATION: 15
    • O.COMPROT: 20
    • O.DISCRETIONARY_ACCESS: 12
    • O.DUTY: 5
    • O.ENFORCEMENT: 7
    • O.HIERARCHICAL: 5
    • O.MANAGE: 28
    • O.MANDATORY_ACCESS: 16
    • O.RESIDUAL_INFO: 7
    • O.ROLE: 16
  • OE:
    • OE.ADMIN: 5
    • OE.CREDEN: 3
    • OE.INFO_PROTECT: 11
    • OE.INSTALL: 7
    • OE.MAINTENANCE: 4
    • OE.PHYSICAL: 5
    • OE.PROTECT: 6
    • OE.RECOVER: 5
    • OE.SERIAL_LOGIN: 3
    • OE.SOFTWARE_IN: 4
  • T:
    • T.ACCESS: 3
    • T.COMPROT: 2
    • T.OPERATE: 2
    • T.ROLEDEV: 4
    • T.UAUSER: 3
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 75
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • AES_competition:
    • AES:
      • AES: 2
    • CAST:
      • CAST: 1
  • DES:
    • 3DES:
      • 3DES: 1
  • constructions:
    • MAC:
      • HMAC: 1
  • miscellaneous:
    • Blowfish:
      • Blowfish: 1
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • Diffie-Hellman: 5
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 3
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 24
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 2
  • IKE:
    • IKE: 2
  • IPsec:
    • IPsec: 6
  • SSH:
    • SSH: 19
    • SSHv2: 5
  • TLS:
    • SSL:
      • SSL: 15
    • TLS:
      • TLS: 2
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • CTR:
    • CTR: 1
  • CBC:
    • CBC: 5
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 6
pdf_data/st_keywords/vulnerability
  • CVE:
    • CVE-2008-5161: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 8
pdf_data/st_keywords/standard_id
  • RFC:
    • RFC 1858: 2
    • RFC 1918: 1
    • RFC1858: 1
  • CC:
    • CCIMB-2006-09-001: 1
    • CCIMB-2006-09-003: 1
    • CCIMB-2006-09-004: 1
  • FIPS:
    • FIPS 140-2: 1
  • PKCS:
    • PKCS #1: 2
    • PKCS#1: 1
  • RFC:
    • RFC 2246: 1
  • X509:
    • X.509: 3
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • software which controls the serial port, such as HyperTerminal, must be used. This interface is out of scope as it should only be used for setup or recovery of the TOE. RioRey Security Target 18 WebUI: 1
  • OutOfScope:
    • out of scope: 1
    • outside of the TOE, such as the hypervisor’s enforcement of separation between guest VMs, is out of scope for this Security Target. 1.5.3.3 TOE Environment Several TOE systems may be interlinked in a: 1
pdf_data/st_metadata
  • /CreationDate: D:20130328162641+02'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20130328162641+02'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 1068348
  • pdf_hyperlinks: https://tools.ietf.org/html/rfc6151
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 62
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different