This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
FortiMail Appliances running FortiMail Firmware Version 5.2.6 383-4-314 |
HaltDos Mitigation Platform version 1.1 comprising of hdInspector version 1.0, hdDeviceUI version 2.0, hdDetectionService version 1.0 and hdCLI version 2.0. IC3S/BG01/HALTDOS/EAL2/0317/0008 |
|
---|---|---|
name | FortiMail Appliances running FortiMail Firmware Version 5.2.6 | HaltDos Mitigation Platform version 1.1 comprising of hdInspector version 1.0, hdDeviceUI version 2.0, hdDetectionService version 1.0 and hdCLI version 2.0. |
category | Network and Network-Related Devices and Systems | Boundary Protection Devices and Systems |
scheme | CA | IN |
not_valid_after | 15.01.2021 | 02.06.2024 |
not_valid_before | 15.01.2016 | 03.06.2019 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-314%20CTv1.0e.docx | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/HaltDoS%20Certificate.pdf |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-314%20CR%20v1.0e.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CR-%20HaltDOS_EAL2.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/FortiMail%20ST%20v113a.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST-version1.4.pdf |
manufacturer | Fortinet, Inc. | Haltdos.com Private Limited E – 52, Sector -3, Noida, UP, 201301, India |
manufacturer_web | https://www.fortinet.com/ | https://www.haltdos.com/ |
security_level | {} | ALC_CMC.3, EAL2, ALC_CMS.3 |
dgst | 724c444f4597f835 | 0f265653766dcb0c |
heuristics/cert_id | 383-4-314 | IC3S/BG01/HALTDOS/EAL2/0317/0008 |
heuristics/cert_lab | CANADA | [] |
heuristics/cpe_matches | cpe:2.3:a:fortinet:fortimail:5.2:*:*:*:*:*:*:*, cpe:2.3:a:fortinet:fortimail:5.2.6:*:*:*:*:*:*:* | {} |
heuristics/related_cves | CVE-2015-3293, CVE-2022-26114, CVE-2019-15707, CVE-2017-7732, CVE-2014-8617, CVE-2020-15933, CVE-2021-32591, CVE-2021-26099, CVE-2020-9294, CVE-2017-3125, CVE-2021-26100, CVE-2021-36166, CVE-2021-32586, CVE-2019-15712, CVE-2021-22129, CVE-2021-24007 | {} |
heuristics/extracted_sars | ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 | ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions | 5.2.6 | 1.1, 1.0, 2.0 |
heuristics/scheme_data |
|
|
heuristics/protection_profiles | ac9abe3d5c5a31f0 | {} |
protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf | {} |
pdf_data/cert_filename | 383-4-314 CTv1.0e.docx | HaltDoS Certificate.pdf |
pdf_data/cert_keywords/cc_cert_id | ||
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar | ||
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility | ||
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | 383-4-314 CR v1.0e.pdf | CR- HaltDOS_EAL2.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | FortiMail ST v113a.pdf | ST-version1.4.pdf |
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | True | False |
state/cert/convert_ok | False | True |
state/cert/extract_ok | False | True |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |