Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Sourcefire 3D Sensors (v. 3.2.3): 3D500, 3D1000, 3D2000, 3D2100, 3D3000; Sourcefire Defense Centers: (v. 3.2.3): DC1000, DC3000 (formerly Sourcefire Intrusion Detection Sensors (v. 3.2.3): NS500, NS1000, NS2000, NS2100, NS3000; Sourcefire Management Consoles (v. 3.2.3): MC1000, MC3000)
CCEVS-VR-0102-2005
SecureVue v3.6.3 CP1
CCEVS-VR-VID-10379-2013
name Sourcefire 3D Sensors (v. 3.2.3): 3D500, 3D1000, 3D2000, 3D2100, 3D3000; Sourcefire Defense Centers: (v. 3.2.3): DC1000, DC3000 (formerly Sourcefire Intrusion Detection Sensors (v. 3.2.3): NS500, NS1000, NS2000, NS2100, NS3000; Sourcefire Management Consoles (v. 3.2.3): MC1000, MC3000) SecureVue v3.6.3 CP1
not_valid_after 07.09.2012 20.05.2015
not_valid_before 03.05.2005 20.05.2013
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_VID4017-VR.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10379-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_VID4017-ST.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10379-st.pdf
manufacturer Sourcefire Inc. EiQ Networks, Inc.
manufacturer_web https://www.sourcefire.com/ https://www.EiQNetworks.com/
security_level EAL2 EAL2+, ALC_FLR.2
dgst e53cc6b38f5c1c8c 78bafa65426e3c35
heuristics/cert_id CCEVS-VR-0102-2005 CCEVS-VR-VID-10379-2013
heuristics/extracted_sars ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ADV_HLD.1, AVA_SOF.1 ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 3.2.3 3.6.3
heuristics/scheme_data
  • category: Wireless Monitoring
  • certification_date: 03.06.2005
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • expiration_date:
  • id: CCEVS-VR-VID4017
  • product: Sourcefire 3D Sensors (v. 3.2.3): 3D500, 3D1000, 3D2000, 3D2100, 3D3000; Sourcefire Defense Centers: (v. 3.2.3): DC1000, DC3000 (formerly Sourcefire Intrusion Detection Sensors (v. 3.2.3): NS500, NS1000, NS2000, NS2100, NS3000; Sourcefire Management Consoles (v. 3.2.3): MC1000, MC3000)
  • scheme: US
  • url: https://www.niap-ccevs.org/product/4017
  • vendor: Sourcefire, Inc.
  • category: Enterprise Security Management, Network Management
  • certification_date: 20.05.2013
  • evaluation_facility: CygnaCom Solutions, Inc
  • expiration_date: 20.05.2015
  • id: CCEVS-VR-VID10379
  • product: SecureVue v3.6.3 CP1
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10379
  • vendor: EiQ Networks, Inc.
heuristics/protection_profiles 809ce30fff5c61f3 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_ids_sys_v1.4.pdf {}
pdf_data/report_filename ST_VID4017-VR.pdf st_vid10379-vr.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-05-0102
    • cert_item: Sourcefire, Incorporated Sourcefire Intrusion Detection System (NS 500, NS 1000, NS 2000, NS 2100, NS 3000, MC 1000, and MC 3000
    • cert_lab: US NIAP
  • US:
    • cert_id: CCEVS-VR-VID10379-2013
    • cert_item: SecureVue, Version 3.6.3 CP1
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-05-0102: 1
  • US:
    • CCEVS-VR-VID10379-2013: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 3
  • EAL:
    • EAL 2: 8
    • EAL 2 augmented: 2
    • EAL 3: 1
    • EAL2: 1
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_CAP.2: 1
  • ADO:
    • ADO_IGS: 1
    • ADO_IGS.1: 1
  • ASE:
    • ASE_OBJ: 1
    • ASE_REQ: 2
  • AVA:
    • AVA_VLA: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 2
    • ALC_FLR.2: 4
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_FUN.1: 1
    • ATE_IND.2: 5
  • AVA:
    • AVA_VAN.2: 2
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
    • FAU_GEN.2: 1
    • FAU_SAR.1: 3
    • FAU_SAR.3: 1
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.4: 1
    • FCS_COP.1: 1
  • FIA:
    • FIA_AFL.1: 1
    • FIA_ATD.1: 1
    • FIA_SOS.1: 1
    • FIA_UAU.5: 1
    • FIA_UAU.7: 1
    • FIA_UAU_EXP.2: 1
    • FIA_UID.2: 1
  • FMT:
    • FMT_MTD.1: 1
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_ITT_EXP.1: 3
    • FPT_TST_EXP.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ASCOPE: 1
    • A.DYNMIC: 1
    • A.LOCATE: 1
    • A.MANAGE: 1
    • A.NOEVIL: 1
    • A.NOTRST: 1
    • A.PROTCT: 1
  • T:
    • T.COMDIS: 1
    • T.COMINT: 1
    • T.EXPOSE: 1
    • T.FACCNT: 1
    • T.FALACT: 1
    • T.FALASC: 1
    • T.FALREC: 1
    • T.IMPCON: 1
    • T.INADVE: 1
    • T.INFLUX: 1
    • T.LOSSOF: 1
    • T.MISACT: 1
    • T.MISUSE: 1
    • T.NOHALT: 1
    • T.PRIVIL: 1
    • T.SCNCFG: 1
    • T.SCNMLC: 1
    • T.SCNVUL: 1
pdf_data/report_keywords/vendor
  • Cisco:
    • Cisco: 2
  • Microsoft:
    • Microsoft: 8
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • constructions:
    • MAC:
      • HMAC-SHA-256: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 3
  • TLS:
    • SSL:
      • SSL: 5
    • TLS:
      • TLS: 3
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 3
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 15408-2: 2
  • FIPS:
    • FIPS 140-2: 1
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • both of which are out of scope: 1
    • operating environment between the browser and the Apache/Microsoft IIS server (both of which are out of scope). 8 of 40 The TOE employs password masking during input, and a password policy that controls the: 1
    • out of scope: 2
    • resources. 4. The following are not included in the Evaluation Scope: TOE functionality considered out of scope High availability option Data Collector Configuration (DCConf.exe) Distributed and tiered: 1
pdf_data/report_metadata
  • /Author: Vicky Ashby
  • /CreationDate: D:20050526141546-04'00'
  • /Creator: Acrobat PDFMaker 5.0 for Word
  • /ModDate: D:20050526141623-03'00'
  • /Producer: Acrobat Distiller 5.0.5 (Windows)
  • /Title: Validation Report for Sourcefire
  • pdf_file_size_bytes: 384618
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 19
pdf_data/st_filename ST_VID4017-ST.pdf st_vid10379-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL2: 5
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL 4: 1
    • EAL1: 1
    • EAL2: 6
    • EAL2 augmented: 4
    • EAL3: 1
    • EAL5: 1
    • EAL7: 1
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.2: 15
  • ADO:
    • ADO_DEL.1: 7
    • ADO_IGS.1: 8
  • ADV:
    • ADV_FSP.1: 10
    • ADV_HLD.1: 13
    • ADV_RCR.1: 6
  • AGD:
    • AGD_ADM.1: 13
    • AGD_USR.1: 11
  • ATE:
    • ATE_COV.1: 6
    • ATE_FUN.1: 11
    • ATE_IND.2: 9
  • AVA:
    • AVA_SOF.1: 8
    • AVA_VLA.1: 11
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_FLR: 2
    • ALC_FLR.2: 4
    • ALC_LCD: 1
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 10
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR: 2
    • FAU_SAR.1: 6
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 9
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 7
    • FAU_SAR.3.1: 1
    • FAU_SEL.1: 9
    • FAU_SEL.1.1: 1
    • FAU_STG.2: 11
    • FAU_STG.2.1: 1
    • FAU_STG.2.2: 1
    • FAU_STG.2.3: 1
    • FAU_STG.4: 9
    • FAU_STG.4.1: 1
  • FDP:
    • FDP_ACC.1: 3
  • FIA:
    • FIA_AFL.1: 1
    • FIA_ATD.1: 6
    • FIA_ATD.1.1: 1
    • FIA_UAU: 1
    • FIA_UAU.1: 9
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 9
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF.1: 11
    • FMT_MOF.1.1: 1
    • FMT_MSA: 1
    • FMT_MTD.1: 13
    • FMT_MTD.1.1: 1
    • FMT_SMF: 1
    • FMT_SMR.1: 13
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITA.1: 1
    • FPT_ITC.1: 1
    • FPT_ITI.2: 1
    • FPT_ITT.1: 8
    • FPT_ITT.1.1: 1
    • FPT_RVM.1: 10
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 10
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_STM.1: 7
    • FPT_STM.1.1: 1
  • FAU:
    • FAU_GEN: 6
    • FAU_GEN.1: 14
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 8
    • FAU_SAR.3.1: 1
  • FCS:
    • FCS_CKM.1: 13
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 12
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 14
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ITC.1: 4
    • FDP_ITC.2: 4
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 10
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 9
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 9
    • FIA_SOS.1.1: 1
    • FIA_UAU: 2
    • FIA_UAU.1: 6
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.7: 10
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXP.2: 17
    • FIA_UAU_EXP.2.1: 2
    • FIA_UID.1: 8
    • FIA_UID.2: 9
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MTD.1: 11
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 12
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITT: 1
    • FPT_ITT_EXP.1: 14
    • FPT_ITT_EXP.1.1: 2
    • FPT_ITT_EXP.1.2: 2
    • FPT_STM.1: 2
    • FPT_TST: 2
    • FPT_TST_EXP.1: 13
    • FPT_TST_EXP.1.1: 2
    • FPT_TST_EXP.1.2: 2
    • FPT_TST_EXP.1.3: 2
  • FTP:
    • FTP_ITC: 1
    • FTP_ITT.1: 1
    • FTP_ITT_EXP.1: 1
    • FTP_TST_EXP.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 3
    • A.ASCOPE: 3
    • A.DYNMIC: 3
    • A.ITNET: 1
    • A.LOCATE: 3
    • A.MANAGE: 2
    • A.NOEVIL: 3
    • A.NOTRST: 2
    • A.NOTRUST: 1
    • A.PROTCT: 3
  • O:
    • O.ACCESS: 10
    • O.AU: 1
    • O.AUDITS: 10
    • O.CREDEN: 4
    • O.E: 2
    • O.EADMIN: 6
    • O.EXPORT: 4
    • O.I: 2
    • O.IDANLZ: 7
    • O.IDAUTH: 21
    • O.IDSCAN: 7
    • O.IDSENS: 7
    • O.INSTAL: 5
    • O.INTEGR: 5
    • O.INTROP: 4
    • O.OFLOWS: 4
    • O.PERSON: 6
    • O.PHYCAL: 8
    • O.PR: 1
    • O.PROTCT: 10
    • O.RESPON: 3
  • T:
    • T.COMDIS: 3
    • T.COMINT: 3
    • T.EXPOSE: 4
    • T.FACCNT: 3
    • T.FALACT: 3
    • T.FALASC: 3
    • T.FALREC: 3
    • T.IMPCON: 3
    • T.INADVE: 3
    • T.INFLUX: 3
    • T.LOSSOF: 3
    • T.MISACT: 3
    • T.MISUSE: 3
    • T.NOHALT: 3
    • T.PRIVIL: 3
    • T.SCNCFG: 3
    • T.SCNMLC: 3
    • T.SCNVUL: 3
pdf_data/st_keywords/vendor
  • Cisco:
    • Cisco: 3
  • Microsoft:
    • Microsoft: 5
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • AES_competition:
    • AES:
      • AES: 12
  • constructions:
    • MAC:
      • HMAC: 1
      • HMAC-SHA-256: 3
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
pdf_data/st_keywords/crypto_protocol
  • PGP:
    • PGP: 1
  • TLS:
    • SSL:
      • SSL: 2
  • SSH:
    • SSH: 9
  • TLS:
    • SSL:
      • SSL: 5
    • TLS:
      • TLS: 3
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 9
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 2
pdf_data/st_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 15408-2: 1
    • ISO/IEC 15408-3: 1
  • FIPS:
    • FIPS 140-2: 9
  • RFC:
    • RFC 2865: 1
    • RFC 3080: 1
    • RFC 4251: 2
    • RFC 5424: 2
    • RFC 959: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Data Collector Host OS Agents (UNIX, Windows) 1.4.8.2 Out-of-Scope TOE functionality considered out of scope High availability option Data Collector Configuration (DCConf.exe) Distributed and tiered: 1
    • A: SecureVue v3.6 Data Collector is supported to run on VMWare ESX 4.x and ESXi platform but is out of scope of this evaluation. SecureVue Version 3.6.3 CP1 Security Target SecureVue Version 3.6.3 CP1: 1
    • Server. Therefore, for the purpose of this evaluation this executable was not tested and considered out of scope. 1.4.4 Trusted Channel between TOE components The TSF includes a trusted communication: 1
    • UNIX, Windows) 1.4.8.2 Out-of-Scope TOE functionality considered out of scope High availability option Data Collector Configuration (DCConf.exe: 1
    • both of which are out of scope: 1
    • operating environment between the browser and the Apache/Microsoft IIS server (both of which are out of scope). Each user has the type of authentication assigned to it (AD, RADIUS, or Native). If a user is: 1
    • out of scope: 4
pdf_data/st_metadata
  • /Author: CCTL
  • /CreationDate: D:20050525111943-04'00'
  • /Creator: Acrobat PDFMaker 5.0 for Word
  • /ModDate: D:20050525112204-03'00'
  • /Producer: Acrobat Distiller 5.0.5 (Windows)
  • /Title: Sourcefire Security Target
  • pdf_file_size_bytes: 1670374
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 51
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different