Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
RioRey Perimeter Protection Platform RE500, RE1500, RX1800, RX2300, RX4400 and RG Series
None
Juniper Networks Odyssey Access Client (FIPS Edition), Version 4.56
CCEVS-VR-VID-10245-2008
name RioRey Perimeter Protection Platform RE500, RE1500, RX1800, RX2300, RX4400 and RG Series Juniper Networks Odyssey Access Client (FIPS Edition), Version 4.56
category Boundary Protection Devices and Systems Network and Network-Related Devices and Systems
scheme TR US
not_valid_after 27.03.2017 20.07.2012
not_valid_before 15.03.2013 23.09.2008
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/RioRey%20CERTIFICATION%20REPORT.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10245-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/RioRey%20ST-%20v0.9.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10245-st.pdf
manufacturer RIOREY Incorporated Juniper Networks, Inc.
manufacturer_web https://www.riorey.com/ https://www.juniper.net/
security_level EAL4+, ALC_FLR.1 EAL3+, ALC_FLR.2
dgst 53265b9d283d6074 c974eb48324fee97
heuristics/cert_id CCEVS-VR-VID-10245-2008
heuristics/cert_lab [] US
heuristics/extracted_sars ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, AVA_MSU.1, AGD_ADM.1, ATE_IND.2, ATE_DPT.1, AVA_SOF.1, ALC_FLR.2
heuristics/extracted_versions - 4.56
heuristics/scheme_data
  • category: Wireless LAN
  • certification_date: 23.09.2008
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • expiration_date:
  • id: CCEVS-VR-VID10245
  • product: Juniper Networks Odyssey Access Client (FIPS Edition), Version 4.56
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10245
  • vendor: Juniper Networks, Inc.
pdf_data/report_filename RioRey CERTIFICATION REPORT.pdf st_vid10245-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VR-VID10245-2008
    • cert_item: Odyssey Access Client (FIPS Edition), Version 4.56
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10245-2008: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 2
    • EAL 4+: 5
    • EAL4: 1
    • EAL4+: 1
  • EAL:
    • EAL 3: 1
    • EAL3: 6
    • EAL3 augmented: 2
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.1: 8
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 2
  • ALC:
    • ALC_FLR.2: 3
pdf_data/report_keywords/cc_sfr
  • FRU:
    • FRU_DDOS_EXT.1: 1
  • FAU:
    • FAU_GEN.2: 1
    • FAU_GEN_EXP.1: 1
    • FAU_SAA.1: 1
    • FAU_SAR.1: 1
    • FAU_SAR.2: 1
    • FAU_SAR.3: 1
    • FAU_SEL.1: 1
    • FAU_STG.1: 1
    • FAU_STG.3: 1
  • FCS:
    • FCS_BCM_EXP.1: 1
    • FCS_CKM.1: 3
    • FCS_CKM.4: 1
    • FCS_CKM_EXP.2: 1
    • FCS_COP_EXP.1: 1
    • FCS_COP_EXP.2: 10
  • FDP:
    • FDP_IFC.1: 1
    • FDP_IFF.1: 1
    • FDP_RIP.1: 2
  • FIA:
    • FIA_USB.1: 1
  • FMT:
    • FMT_MOF.1: 1
    • FMT_MSA.2: 1
    • FMT_MSA.3: 1
    • FMT_MTD.1: 1
    • FMT_SMF.1: 3
    • FMT_SMR.1: 1
  • FPT:
    • FPT_RVM.1: 1
    • FPT_SEP.1: 1
    • FPT_STM.1: 1
    • FPT_TST_EXP.1: 1
    • FPT_TST_EXP.2: 1
  • FTP:
    • FTP_ITC.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.BACKUP: 1
    • A.CONNECT: 1
    • A.NOEVIL: 1
    • A.PHYSICAL: 1
  • A:
    • A.BASIC_ROBUSTNESS_IT_: 1
    • A.NO_EVIL: 1
    • A.PHYSICAL: 1
pdf_data/report_keywords/vendor
  • Cisco:
    • Cisco: 4
  • Microsoft:
    • Microsoft: 6
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
  • constructions:
    • MAC:
      • HMAC: 2
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DH:
      • Diffie-Hellman: 2
    • DSA:
      • DSA: 4
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
      • SHA1: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 2
  • KA:
    • Key Agreement: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 3
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • CCM:
    • CCM: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • ISO:
    • ISO/IEC 17025: 2
  • FIPS:
    • FIPS 140: 1
    • FIPS 140-2: 5
pdf_data/report_keywords/javacard_packages
  • org:
    • org.tr: 1
pdf_data/report_metadata
  • /Author: Tse
  • /CreationDate: D:20130318153433-04'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20130318153433-04'00'
  • /Producer: Microsoft® Word 2010
  • /Title: 1
  • pdf_file_size_bytes: 511380
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 15
pdf_data/st_filename RioRey ST- v0.9.pdf st_vid10245-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4+: 6
  • EAL:
    • EAL 3: 2
    • EAL2: 1
    • EAL2 augmented: 1
    • EAL3: 4
    • EAL3 augmented: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.1: 3
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 2
  • ACM:
    • ACM_CAP.2: 1
    • ACM_CAP.3: 20
    • ACM_SCP.1: 7
  • ADO:
    • ADO_DEL.1: 7
    • ADO_IGS.1: 7
  • ADV:
    • ADV_FSP.1: 12
    • ADV_HLD.1: 2
    • ADV_HLD.2: 18
    • ADV_RCR.1: 8
  • AGD:
    • AGD_ADM.1: 13
    • AGD_USR.1: 11
  • ALC:
    • ALC_DVS.1: 11
    • ALC_FLR.2: 20
  • ATE:
    • ATE_COV.1: 1
    • ATE_COV.2: 9
    • ATE_DPT.1: 7
    • ATE_FUN.1: 15
    • ATE_IND.1: 1
    • ATE_IND.2: 8
  • AVA:
    • AVA_MSU.1: 12
    • AVA_SOF.1: 8
    • AVA_VLA.1: 10
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 17
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 8
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_UAU_EXT.2: 1
  • FIA:
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_UAU: 3
    • FIA_UAU.1: 2
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU_EXT.2: 13
    • FIA_UAU_EXT.2.1: 3
    • FIA_UID: 1
    • FIA_UID.1: 8
    • FIA_UID.2: 7
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MTD.1: 14
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 11
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 8
    • FPT_ITT.1.1: 1
    • FPT_STM.1: 2
  • FRU:
    • FRU_DDOS: 2
    • FRU_DDOS_EXT.1: 12
    • FRU_DDOS_EXT.1.1: 3
    • FRU_DDOS_EXT.1.2: 3
    • FRU_DDOS_EXT.1.3: 3
  • FAU:
    • FAU_GEN.2: 2
    • FAU_GEN.2.1: 1
    • FAU_GEN_EXP: 2
    • FAU_GEN_EXP.1: 5
    • FAU_GEN_EXP.1.1: 1
    • FAU_GEN_EXP.1.2: 1
    • FAU_SAA.1: 2
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
    • FAU_SAR.1: 2
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 2
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 2
    • FAU_SAR.3.1: 1
    • FAU_SEL: 3
    • FAU_SEL.1: 4
    • FAU_SEL.1.1: 1
    • FAU_STG: 1
    • FAU_STG.1: 2
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 2
    • FAU_STG.3.1: 1
  • FCS:
    • FCS_BCM_EXP: 1
    • FCS_BCM_EXP.1: 4
    • FCS_BCM_EXP.1.1: 1
    • FCS_BCM_EXP.1.2: 1
    • FCS_BCM_EXP.1.3: 1
    • FCS_CKM: 1
    • FCS_CKM.1: 35
    • FCS_CKM.2: 3
    • FCS_CKM.4: 21
    • FCS_CKM.4.1: 1
    • FCS_CKM_EXP: 1
    • FCS_CKM_EXP.2: 4
    • FCS_CKM_EXP.2.1: 1
    • FCS_COP.1: 3
    • FCS_COP_EXP: 1
    • FCS_COP_EXP.1: 3
    • FCS_COP_EXP.1.1: 1
    • FCS_COP_EXP.2: 66
    • FCS_COP_EXP.2.1: 2
  • FDP:
    • FDP_IFC.1: 7
    • FDP_IFC.1.1: 1
    • FDP_IFF: 1
    • FDP_IFF.1: 4
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF.1.6: 1
    • FDP_ITC.1: 8
    • FDP_ITC.2: 8
    • FDP_RIP: 1
    • FDP_RIP.1: 13
  • FIA:
    • FIA_USB.1: 2
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 2
    • FMT_MOF.1.1: 1
    • FMT_MSA: 2
    • FMT_MSA.2: 20
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 3
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 5
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 20
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 2
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_RVM.1: 2
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 2
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_STM.1: 3
    • FPT_STM.1.1: 1
    • FPT_TST: 1
    • FPT_TST_EXP: 2
    • FPT_TST_EXP.1: 7
    • FPT_TST_EXP.1.1: 1
    • FPT_TST_EXP.1.2: 1
    • FPT_TST_EXP.1.3: 1
    • FPT_TST_EXP.2: 4
    • FPT_TST_EXP.2.1: 1
    • FPT_TST_EXP.2.2: 1
  • FTP:
    • FTP_ITC: 2
    • FTP_ITC.1: 5
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.BACKUP: 3
    • A.CONNECT: 3
    • A.NOEVIL: 3
    • A.PHYSICAL: 3
  • O:
    • O.AUDIT: 10
    • O.DDOSALERT: 5
    • O.DDOSMITIGATE: 6
    • O.FAILSAFE: 6
    • O.IDAUTH: 9
    • O.MANAGE: 8
    • O.PROCOM: 6
  • OE:
    • OE.AUDIT: 4
    • OE.BACKUP: 3
    • OE.CONNECT: 3
    • OE.NOEVIL: 3
    • OE.PHYSICAL: 3
    • OE.TIME: 5
  • T:
    • T.AUDIT: 4
    • T.DDOSATTACK: 3
    • T.FAILURE: 3
    • T.MANAGE: 3
    • T.NOAUTH: 3
    • T.PROCOM: 3
  • A:
    • A.BASIC_ROBUSTNESS_IT_ENVIRONMENT: 2
    • A.NO_EVIL: 1
    • A.PHYSICAL: 1
  • O:
    • O.ADMIN_GUIDANCE: 1
    • O.AUDIT_GENERATION: 1
    • O.CONFIGURATION_: 1
    • O.CORRECT_: 1
    • O.CORRECT_TSF_OPERATION: 1
    • O.CRYPTOGRAPHY: 4
    • O.DOCUMENTED_: 1
    • O.MANAGE: 1
    • O.PARTIAL_: 1
    • O.RESIDUAL_: 1
    • O.VULNERABILITY_: 1
  • OE:
    • OE.BASIC_ROBUSTNESS_OS: 2
    • OE.CRYPTOGRAPHY: 3
    • OE.MANAGE: 1
    • OE.NO_EVIL: 1
    • OE.PHYSICAL: 1
    • OE.RESIDUAL_: 1
    • OE.SELF_: 1
    • OE.TIME_STAMPS: 1
    • OE.TOE_ACCESS: 1
  • T:
    • T.ACCIDENTAL_ADMIN_: 1
    • T.CRYPTO_COMPROMISE: 1
    • T.POOR_DESIGN: 1
    • T.POOR_IMPLEMENTATION: 1
    • T.POOR_TEST: 1
    • T.RESIDUAL_DATA: 1
    • T.TSF_COMPROMISE: 1
pdf_data/st_keywords/vendor
  • Cisco:
    • Cisco: 1
  • Microsoft:
    • Microsoft: 7
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • AES_competition:
    • AES:
      • AES: 15
  • constructions:
    • MAC:
      • HMAC: 6
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • Diffie-Hellman: 6
    • DSA:
      • DSA: 14
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 2
  • SHA:
    • SHA1:
      • SHA-1: 6
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 3
  • KA:
    • Key Agreement: 4
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 2
  • TLS:
    • TLS:
      • TLS: 5
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • CTR:
    • CTR: 1
  • CBC:
    • CBC: 3
  • CCM:
    • CCM: 4
  • CTR:
    • CTR: 2
pdf_data/st_keywords/vulnerability
  • CVE:
    • CVE-2008-5161: 1
pdf_data/st_keywords/standard_id
  • RFC:
    • RFC 1858: 2
    • RFC 1918: 1
    • RFC1858: 1
  • FIPS:
    • FIPS 140: 4
    • FIPS 140-1: 8
    • FIPS 140-2: 20
    • FIPS 180-2: 1
    • FIPS 186-2: 8
    • FIPS 197: 1
    • FIPS 198: 1
    • FIPS PUB 140-1: 1
  • PKCS:
    • PKCS #1: 1
  • RFC:
    • RFC 2631: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • software which controls the serial port, such as HyperTerminal, must be used. This interface is out of scope as it should only be used for setup or recovery of the TOE. RioRey Security Target 18 WebUI: 1
pdf_data/st_metadata
  • /CreationDate: D:20130328162641+02'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20130328162641+02'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 1068348
  • pdf_hyperlinks: https://tools.ietf.org/html/rfc6151
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 62
  • /Author: SAIC
  • /Company: SAIC
  • /CreationDate: D:20080926111130-04'00'
  • /Creator: Acrobat PDFMaker 7.0 for Word
  • /Manager: Rick O'Donnel
  • /ModDate: D:20080926124308-04'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /SourceModified: D:20080811191258
  • /Subject: Security Target
  • /Title: Juniper OAC Security Target
  • pdf_file_size_bytes: 449660
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 47
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different