name |
Remote Communication Gate A Version: Machine Code (First 4 characters): D459, Firmware Version: A1.18-C1.14-P1.12-K1.04 |
IBM AIX 7.2.5, Service Pack 3 (SP3) Standard Edition (SE) |
category |
Network and Network-Related Devices and Systems |
Operating Systems |
scheme |
JP |
DE |
status |
archived |
active |
not_valid_after |
01.11.2015 |
07.07.2027 |
not_valid_before |
22.10.2010 |
08.07.2022 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1165c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0277_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1165a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0277_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1165b_pdf.pdf |
manufacturer |
Ricoh Company, Ltd. |
IBM Corporation |
manufacturer_web |
https://www.ricoh.com/ |
https://www.ibm.com |
security_level |
EAL3 |
ASE_SPD.1, ATE_IND.1, ALC_CMS.1, ASE_INT.1, ALC_TSU_EXT.1, ASE_TSS.1, ALC_CMC.1, AGD_OPE.1, ASE_ECD.1, ADV_FSP.1, ASE_OBJ.2, ASE_REQ.2, ASE_CCL.1, AGD_PRE.1, AVA_VAN.1 |
dgst |
abdd4db80056ee35 |
bf493412d5058337 |
heuristics/cert_id |
JISEC-CC-CRP-C0277 |
BSI-DSZ-CC-1165-2022 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_OBJ.2, ASE_REQ.2, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1 |
heuristics/extracted_versions |
1.04, 1.18, 1.12, 1.14 |
7.2.5 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0277
- certification_date: 01.10.2010
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0277_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE This TOE is a communication device that enables digital MFPs and printers (hereafter "devices") to be connected to the communication server (hereafter "CS") in the maintenance center. Functions this TOE can provide include notification of device troubles (service call function), automatic counter checking of prints (device counter collection function), automatic ordering of supplies such as toner (supply call function), and device firmware updating. It also provides Web-based user interface functions for TOE operations. TOE security functionality The major security functions this TOE can provide are as follows: - Communication data protection function between the TOE and the device for the service This function is used for communication between the TOE and devices for the service if the service call function, the device counter collection function, and the supply call function are enabled. The communication data between the TOE and the Ricoh device will be secured, and the data tampering will be detected by using a SSL protocol. - Communication data protection function between the TOE and the CS The TOE specifies only the CS as the communication destination via Internet. The communication data between the TOE and the CS will be secured, and the data tampering will be detected by using a SSL protocol. - Communication data protection function between the TOE and computers This function is applied to data communication between the TOE and computers if Web-based functions are enabled. The communication data will be secured by using a SSL protocol. - User identification and authentication function The TOE identifies and authenticates users who access Web-based user interface functions. - Access control function This function restricts user access according to specified user roles. - RC Gate firmware verification function This function enables the TOE to check that the firmware (applications, shared parts of firmware, platforms, and the operating system) is genuine. - Security management function This function provides TOE management methods for the Administrator only.
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
- product: Remote Communication Gate A
- product_type: Appliance for remote service
- report_link: https://www.ipa.go.jp/en/security/c0277_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0277_est.pdf
- toe_version: Machine Code (First 4 characters) :D459 Firmware Version :A1.18-C1.14-P1.12-K1.04
- vendor: RICOH COMPANY, LTD.
- expiration_date: 01.11.2015
- supplier: RICOH COMPANY, LTD.
- toe_japan_name: Remote Communication Gate A Machine Code (First 4 characters) :D459 Firmware Version :A1.18-C1.14-P1.12-K1.04
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0277_it0287.html
- toe_overseas_name: Remote Communication Gate A Machine Code (First 4 characters) :D459 Firmware Version :A1.18-C1.14-P1.12-K1.04
|
- category: Operating systems
- cert_id: BSI-DSZ-CC-1165-2022
- certification_date: 08.07.2022
- enhanced:
- applicant: IBM Corporation 11400 Burnet Road Austin, TX 78758 USA
- assurance_level: ADV_FSP.1,AGD_OPE.1,AGD_PRE.1,ALC_CMC.1,ALC_CMS.1,ALC_TSU_EXT.1,ASE_CCL.1,ASE_ECD.1,ASE_INT.1,ASE_OBJ.2,ASE_REQ.2,ASE_SPD.1,ASE_TSS.1,ATE_IND.1,AVA_VAN.1
- cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1165c_pdf.pdf?__blob=publicationFile&v=2
- certification_date: 08.07.2022
- description: The AIX operating system is a general purpose, multi-user, multi-tasking operating system. It is compliant with major international standards for UNIX systems, such as the Portable Operating System Interface (POSIX) standards, X/Open Portability Guide (XPG) 4, and Spec 1170. It provides a platform for a variety of applications in the governmental and commercial environment. AIX is available on a broad range of computer systems from IBM, ranging from departmental Servers to multi-processor enterprise servers, and is capable of running in a Logical Partition (LPAR) environment.
- evaluation_facility: atsec information security GmbH
- expiration_date: 07.07.2027
- product: IBM AIX 7.2.5, Service Pack 3 (SP3) Standard Edition (SE)
- protection_profile: Protection Profile for General Purpose Operating Systems Version 4.2.1, 22 April 2019, CCEVS-VR-PP-0047, NIAP Extended Package for Secure Shell (SSH), Version 1.0, 19 February 2016, CCEVS-VR-PP-0039, NIAP
- report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1165a_pdf.pdf?__blob=publicationFile&v=2
- target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1165b_pdf.pdf?__blob=publicationFile&v=3
- product: IBM AIX 7.2.5, Service Pack 3 (SP3) Standard Edition (SE)
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Betriebssysteme/1165.html
- vendor: IBM Corporation
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
|
1165c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ALC_FLR: 1
- ALC_TSU_EXT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20220718070622+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, IBM Corporation, IBM AIX 7.2.5, Certification Report, BSI-DSZ-CC-1165-2022"
- /ModDate: D:20220719073246+02'00'
- /Producer: LibreOffice 6.3
- /Subject: IBM Corporation, IBM AIX 7.2.5,
- /Title: Certification Report BSI-DSZ-CC-1165-2022
- pdf_file_size_bytes: 366167
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
c0277_erpt.pdf |
1165a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 extended ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ALC_TSU_EXT.1, ATE_IND.1, AVA_VAN.1
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1165-2022
- cert_item: IBM AIX 7.2.5 Service Pack 3 (SP3) Standard Edition (SE
- cert_lab: BSI
- developer: IBM Corporation
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Protection Profile for General Purpose Operating Systems Version 4.2.1, 22 April 2019, CCEVS-VR- PP-0047, NIAP, Extended Package for Secure Shell (SSH), Version 1.0, 19 February 2016, CCEVS-VR-PP-0039, NIAP
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0277-01: 1
- Certification No. C0277: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 4: 3
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 2
- ALC_FLR: 3
- ALC_TSU_EXT.1: 3
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 2
- ASE_INT.1: 2
- ASE_OBJ.2: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 2
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ADMINSHIP: 2
- A.CE: 1
- A.DEVICE: 1
- A.NETWORK: 2
- A.TOE_ADMIN: 1
- T:
- T.ACCESS: 2
- T.FAKE_CS: 2
- T.INTERNET: 2
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
- MAC:
- HMAC: 7
- HMAC-SHA-256: 3
- HMAC-SHA-512: 1
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 9
- SHA-256: 3
- SHA-384: 1
- SHA-512: 2
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
- NIST:
- NIST P-256: 6
- NIST P-521: 1
- P-256: 6
- P-384: 4
- P-521: 7
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
|
- BSI:
- AIS 20: 2
- AIS 31: 2
- AIS 32: 1
- FIPS:
- FIPS 180-4: 6
- FIPS 186-4: 15
- FIPS 197: 4
- FIPS 198: 2
- FIPS140-2: 1
- FIPS140-3: 1
- FIPS180-4: 3
- FIPS198-1: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- PKCS:
- RFC:
- RFC 5246: 2
- RFC 5656: 1
- RFC0793: 1
- RFC1321: 2
- RFC2104: 1
- RFC3447: 3
- RFC4251: 1
- RFC4252: 3
- RFC4253: 9
- RFC4254: 1
- RFC4306: 1
- RFC4344: 1
- RFC5246: 7
- RFC5288: 3
- RFC5289: 4
- RFC5647: 1
- RFC5656: 2
- RFC6668: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Report, Version 7, 2022-06-28, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [8] Protection Profile for General Purpose Operating Systems Version 4.2.1, 22 April 2019: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
pdf_data/report_metadata |
- /Author: IPA/JISEC
- /Company: IPA
- /CreationDate: D:20110411121028+09'00'
- /Creator: Word 用 Acrobat PDFMaker 8.1
- /Manager: IPA
- /ModDate: D:20110411121032+09'00'
- /Producer: Acrobat Distiller 8.2.3 (Windows)
- /Title: CRP-e
- pdf_file_size_bytes: 213268
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 36
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20220718070622+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, IBM Corporation, IBM AIX 7.2.5, Certification Report, BSI-DSZ-CC-1165-2022"
- /ModDate: D:20220718130447+02'00'
- /Producer: LibreOffice 6.3
- /Subject: IBM Corporation, IBM AIX 7.2.5,
- /Title: Certification Report BSI-DSZ-CC-1165-2022
- pdf_file_size_bytes: 1182707
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 33
|
pdf_data/st_filename |
c0277_est.pdf |
1165b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ALC_TSU_EXT.1: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_ACC.1: 8
- FDP_ACC.1.1: 1
- FDP_ACF.1: 9
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FIA:
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_UAU.1: 2
- FIA_UAU.2: 7
- FIA_UAU.2.1: 1
- FIA_UAU.6: 6
- FIA_UAU.6.1: 1
- FIA_UID.1: 4
- FIA_UID.2: 7
- FIA_UID.2.1: 1
- FIA_USB.1: 6
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA.3: 5
- FMT_MTD.1: 6
- FMT_MTD.1.1: 1
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR.1: 9
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 1
- FPT_STM.1.1: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 14
- FTP_ITC.1.1: 2
- FTP_ITC.1.2: 2
- FTP_ITC.1.3: 2
- FTP_TRP.1: 6
- FTP_TRP.1.1: 1
|
- FAU:
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FCS:
- FCS_CKM.1: 8
- FCS_CKM.1.1: 2
- FCS_CKM.2: 8
- FCS_CKM.2.1: 1
- FCS_CKM_EXT.4: 9
- FCS_CKM_EXT.4.1: 3
- FCS_CKM_EXT.4.2: 1
- FCS_COP: 2
- FCS_COP.1: 43
- FCS_COP.1.1: 7
- FCS_RBG_EXT.1: 7
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_RNG.1: 7
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 3
- FCS_SSHC_EXT: 8
- FCS_SSHC_EXT.1: 15
- FCS_SSHC_EXT.1.1: 2
- FCS_SSHC_EXT.1.4: 1
- FCS_SSHS_EXT: 7
- FCS_SSHS_EXT.1: 16
- FCS_SSHS_EXT.1.1: 2
- FCS_SSHS_EXT.1.4: 1
- FCS_SSH_EXT.1: 7
- FCS_SSH_EXT.1.1: 1
- FCS_STO_EXT.1: 6
- FCS_STO_EXT.1.1: 1
- FCS_TLSC_EXT: 4
- FCS_TLSC_EXT.1: 8
- FCS_TLSC_EXT.2: 6
- FDP:
- FDP_ACF_EXT.1: 9
- FDP_ACF_EXT.1.1: 1
- FIA:
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_UAU.5: 8
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FMT:
- FMT_MOF_EXT: 1
- FMT_MOF_EXT.1: 6
- FMT_SMF_EXT.1: 7
- FMT_SMF_EXT.1.1: 2
- FPT:
- FPT_ACF_EXT.1: 6
- FPT_ACF_EXT.1.1: 1
- FPT_ACF_EXT.1.2: 1
- FPT_ASLR_EXT: 1
- FPT_ASLR_EXT.1: 6
- FPT_SBOP_EXT: 1
- FPT_SBOP_EXT.1: 6
- FPT_TST_EXT.1: 7
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT: 2
- FPT_TUD_EXT.1: 9
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.2: 7
- FPT_TUD_EXT.2.1: 1
- FPT_TUD_EXT.2.2: 1
- FTA:
- FTA_TAB.1: 6
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC_EXT.1: 6
- FTP_ITC_EXT.1.1: 1
- FTP_TRP.1: 6
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMINSHIP: 3
- A.CE: 3
- A.DEVICE: 3
- A.NETWORK: 3
- A.TOE_ADMIN: 3
- O:
- O.ACCESS: 9
- O.COM_ATR_DEVICE: 10
- O.COM_CS: 8
- O.COM_OPERATOR: 7
- O.GENUINE: 6
- OE:
- OE.ADMIN: 3
- OE.CE: 3
- OE.DEVICE: 3
- OE.NETWORK: 4
- OE.SUPER: 4
- T:
- T.ACCESS: 2
- T.FAKE_CS: 2
- T.INTERNET: 2
|
- A:
- A.PLATFORM: 4
- A.PROPER_ADMIN: 4
- A.PROPER_USER: 4
- O:
- O.ACCOUNTABILITY: 3
- O.INTEGRITY: 3
- O.MANAGEMENT: 4
- O.PROTECTED_COMMS: 5
- O.PROTECTED_STORAGE: 2
- OE:
- OE.PLATFORM: 3
- OE.PROPER_AD: 1
- OE.PROPER_ADMIN: 2
- OE.PROPER_US: 1
- OE.PROPER_USER: 2
- T:
- T.LIMITED_PHYSICAL_ACCESS: 2
- T.LOCAL_ATTACK: 3
- T.NETWORK_ATTACK: 7
- T.NETWORK_EAVESDROP: 5
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-256: 2
- SHA-384: 2
- SHA-512: 2
- SHA2: 2
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- P-256: 12
- P-384: 12
- P-521: 12
- secp256r1: 2
- secp384r1: 2
- secp521r1: 2
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
- TLS_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_RSA_WITH_AES_128_GCM_SHA256: 4
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_RSA_WITH_AES_256_CBC_SHA256: 2
- TLS_RSA_WITH_AES_256_GCM_SHA384: 4
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
|
- BSI:
- FIPS:
- FIPS PUB 186-4: 4
- FIPS140-2: 2
- FIPS140-3: 2
- FIPS180-4: 6
- FIPS186-4: 13
- FIPS198-1: 7
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-38D: 1
- NIST SP 800-57: 1
- PKCS:
- RFC:
- RFC 4251: 2
- RFC 4253: 4
- RFC 5246: 9
- RFC 5280: 2
- RFC 5288: 8
- RFC 5289: 16
- RFC 5759: 1
- RFC 6125: 1
- RFC 6960: 1
- RFC 8017: 1
- RFC4252: 3
- RFC4253: 5
- RFC5280: 4
- RFC5759: 2
- RFC6668: 3
- RFC6960: 2
- RFC8017: 5
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
- kernel. Software loaded for execution directly by the platform (e.g. first-stage bootloaders) is out of scope. For each additional category of executable code verified before execution, the evaluator will: 1
- out of scope: 2
|
pdf_data/st_metadata |
- /Author: ui
- /Company:
- /CreationDate: D:20110411120858+09'00'
- /Creator: Word 用 Acrobat PDFMaker 8.1
- /ModDate: D:20110411120902+09'00'
- /Producer: Acrobat Distiller 8.2.3 (Windows)
- /Title:
- pdf_file_size_bytes: 203391
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 41
|
- /Author: Scott Chapman (generated by CCTool version 2.8.4.61)
- /CreationDate: D:20220621132447Z
- /Creator: Unknown
- /Keywords: AIX, OS, operating system
- /ModDate: D:20220621132447Z
- /Producer: XEP 4.18 build 20100322
- /Subject: the IBM AIX
- /Title: IBM AIX 7.2 Technology Level 5 Service Pack 3 Standard Edition Operating System Security Target (version 1.3 as of 2022-06-21)
- /Trapped: /False
- /application: CCTool version x.y
- pdf_file_size_bytes: 902061
- pdf_hyperlinks: https://hackerone.com/IBM, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0332, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0493, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0600, https://csrc.nist.gov/publications/detail/fips/198/1/final, https://csrc.nist.gov/publications/detail/sp/800-38a/final, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0496, https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/PROTOCOL?rev=1.31, http://www.ietf.org/rfc/rfc5759.txt, http://www.ietf.org/rfc/rfc8017.txt, https://csrc.nist.gov/publications/detail/fips/140/2/final, http://www.ietf.org/rfc/rfc5280.txt, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0446, https://csrc.nist.gov/publications/detail/fips/140/3/final, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0331, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0386, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0420, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0365, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0441, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0598, http://www.ietf.org/rfc/rfc6668.txt, http://www.ietf.org/rfc/rfc6960.txt, https://csrc.nist.gov/publications/detail/fips/186/4/final, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0525, https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Interpretationen/AIS_20_pdf.pdf?__blob=publicationFile, http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R5.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R5.pdf, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0463, https://www.niap-ccevs.org/MMO/pp/pp_ssh_ep_v1.0.pdf, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0578, https://aix.software.ibm.com/aix/efixes/cc/, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0240, http://www.ietf.org/rfc/rfc4252.txt, https://www.niap-ccevs.org/MMO/PP/PP_OS_V4.2.1.pdf, https://csrc.nist.gov/publications/detail/fips/180/4/final, https://supportcontent.ibm.com/support/pages/common-criteria-administration-guidance-aix-7253, https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Interpretationen/AIS_31_pdf.pdf?__blob=publicationFile, http://www.ietf.org/rfc/rfc4253.txt, https://csrc.nist.gov/publications/detail/sp/800-56a/rev-3/final, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0501, https://csrc.nist.gov/publications/detail/sp/800-38d/final, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R5.pdf, https://aix.software.ibm.com/aix/efixes/security/
- pdf_is_encrypted: False
- pdf_number_of_pages: 80
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |