This page was not yet optimized for use on mobile
devices.
SuSE Linux Enterprise Server Version 9 with certification-sles-ibm-eal4 package
Known vulnerabilities detected
Our automated heuristics have identified vulnerabilities that may be associated with this certificate. See the CVEs section for details.CSV information
| Status | archived |
|---|---|
| Valid from | 09.03.2005 |
| Valid until | 01.09.2019 |
| Scheme | 🇩🇪 DE |
| Manufacturer | SUSE Linux Products Gmbh |
| Category | Operating Systems |
| Security level | ALC_FLR.3, EAL4+ |
Heuristics summary
Certificate ID: BSI-DSZ-CC-0256-2005
Certificate
certificate could not be downloaded, no link is available.
Certification report
Extracted keywords
Protocols
SSH, SSLSecurity level
EAL4, EAL 1, EAL 7, EAL 4, EAL4+, EAL1, EAL3, EAL5, EAL7, EAL2, EAL6, EAL4 augmentedClaims
T.UAUSER, T.UAACCESS, T.COMPROT, A.LOCATE, A.PROTECT, A.MANAGE, A.NO_EVIL_ADMIN, A.COOP, A.UTRAIN, A.UTRUST, A.NET_COMP, A.PEER, A.CONNECT, OE.ADMIN, OE.CREDEN, OE.INSTALL, OE.PHYSICAL, OE.INFO_PROTECT, OE.MAINTENANCE, OE.RECOVER, OE.SOFTWARE_IN, OE.SERIAL_LOGIN, OE.HW_SEPSecurity Assurance Requirements (SAR)
ACM_CAP.4, ACM_SCP.2, ACM_AUT.1, ACM_AUT, ACM_CAP, ACM_SCP, ADO_DEL.2, ADO_IGS.1, ADO_DEL, ADO_IGS, ADV_FSP.2, ADV_HLD.2, ADV_LLD.1, ADV_IMP.1, ADV_SPM.1, ADV_RCR.1, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM.1, AGD_USR.1, AGD_ADM, AGD_USR, ALC_FLR.3, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_MSU.2, AVA_SOF.1, AVA_VLA.3, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLA, AVA_VLA.2, AVA_VLA.4, ASE_DES.1, ASE_ENV.1, ASE_INT.1, ASE_OBJ.1, ASE_PPC.1, ASE_REQ.1, ASE_SRE.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_SEL.1, FAU_STG.1, FAU_STG.3, FAU_STG.4, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FDP_ACC.1, FDP_ACF.1, FDP_RIP.2, FDP_UCT.1, FDP_UIT.1, FIA_ATD.1, FIA_SOS.1, FIA_UAU.7, FIA_USB.1, FIA_UAU.2, FIA_UID.2, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_REV.1, FMT_SMR.1, FMT_SMF, FMT_MSA.2, FPT_AMT.1, FPT_RVM.1, FPT_SEP.1, FPT_STM.1, FTP_ITC.1Certificates
BSI-DSZ-CC-0256-2005, BSI-DSZ-CC-0234-2004, BSI-DSZ-CC-0256Evaluation facilities
atsecSide-channel analysis
malfunctionCertification process
9] Evaluation Technical Report BSI-DSZ-CC-0256, 1.4, 2005-02-10, atsec Information Security GmbH (confidential document) [10] Controlled Access Protection Profile (CAPP), Version 1.d National Security Agency, 1999-10-08Standards
AIS 32, AIS32, AIS 20, AIS33, ISO/IEC 15408:1999Technical reports
BSI 7125, BSI 7148, BSI 7149File metadata
| Title | Certification report BSI-DSZ-CC-0256-2005 |
|---|---|
| Subject | Common Criteria Certification |
| Keywords | CC, certification, Novell, SUSE, Linux, IBM |
| Author | German Federal Office for Information Security / BSI |
| Creation date | D:20050311105958 |
| Modification date | D:20050311121731+01'00' |
| Pages | 49 |
| Creator | Microsoft Word - 0256_Report_CC_engl_draft10.doc |
| Producer | Acrobat PDFWriter 4.0 für Windows NT |
Frontpage
| Certificate ID | BSI-DSZ-CC-0256-2005 |
|---|---|
| Certified item | SUSE Linux Enterprise Server Version 9 with certification-sles-ibm-eal4 package |
| Certification lab | BSI |
| Developer | Novell - SUSE LINUX AG sponsored by IBM Corporation |
References
Outgoing- BSI-DSZ-CC-0234-2004 - archived - SuSE Linux Enterprise Server V8, Service Pack 3, RC4, with certification-sles-eal3 package
Security target
Extracted keywords
Symmetric Algorithms
AES, RC4, DES, Triple-DES, TDES, SM4Asymmetric Algorithms
Diffie-HellmanHash functions
SHA-1, MD5Protocols
SSHv2, SSH, SSL, TLSLibraries
OpenSSLBlock cipher modes
CBCTLS cipher suites
TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHAJavaCard API constants
SM2Security level
EAL4, EAL3, EAL4+, EAL3+, EAL 4, EAL4 augmented, EAL3 augmented, EAL 4 augmentedClaims
O.AUTHORIZATION, O.DISCRETIONARY_ACCESS, O.AUDITING, O.RESIDUAL_INFO, O.MANAGE, O.ENFORCEMENT, O.COMPROT, O.RESIDUAL_INFORMATION, T.UAUSER, T.UAACCESS, T.COMPROT, A.LOCATE, A.PROTECT, A.MANAGE, A.NO_EVIL_ADMIN, A.COOP, A.UTRAIN, A.UTRUST, A.NET_COMP, A.PEER, A.CONNECT, OE.ADMIN, OE.CREDEN, OE.INSTALL, OE.PHYSICAL, OE.INFO_PROTECT, OE.MAINTENANCE, OE.RECOVER, OE.SOFTWARE_IN, OE.SERIAL_LOGIN, OE.HW_SEP, OE.PROTECTSecurity Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ADO_DEL.2, ADO_IGS.1, ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_FLR.3, ALC_FLR.2, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_SOF.1, AVA_MSU.2, AVA_VLA.2, ASE_REQ.1Security Functional Requirements (SFR)
FAU_GEN.1.1, FAU_STG.3, FAU_GEN.1, FAU_GEN.1.2, FAU_GEN.2, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_SEL.1, FAU_STG.1, FAU_STG.4, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FAU_SEL.1.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3.1, FAU_STG.4.1, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.1.1, FCS_CKM.2.1, FCS_COP.1.1, FCS_CKM.4, FDP_UCT.1, FDP_UIT.1, FDP_ACC.1, FDP_ACF.1, FDP_RIP.2, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_RIP.2.1, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_MSA.3, FDP_ACF.2, FDP_ITC.1, FDP_IFC.1, FIA_UID, FIA_ATD.1, FIA_SOS.1, FIA_UAU.2, FIA_UAU.7, FIA_UID.2, FIA_USB.1, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.2.1, FIA_UAU.7.1, FIA_UID.2.1, FIA_USB.1.1, FIA_UAU.1, FIA_UID.1, FIA_USB, FMT_SMF.1, FMT_MSA.2, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_REV.1, FMT_SMR.1, FMT_MOF.1, FMT_MSA.1.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_REV.1.1, FMT_REV.1.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF, FPT_AMT.1, FPT_RVM.1, FPT_SEP.1, FPT_STM.1, FPT_AMT.1.1, FPT_RVM.1.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_STM.1.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1Evaluation facilities
atsecSide-channel analysis
malfunctionStandards
PKCS#1, AIS 32, AIS20, RFC3268, RFC 3268, RFC2104, X.509, CCIMB-99-031File metadata
| Title | Microsoft Word - SLES_security_target_eal4_v3-10.doc |
|---|---|
| Author | smueller |
| Creation date | D:20050118091924-08'00' |
| Modification date | D:20050118091924-08'00' |
| Pages | 89 |
| Creator | PScript5.dll Version 5.2 |
| Producer | Acrobat Distiller 5.0 (Windows) |
References
Incoming- BSI-DSZ-CC-0402-2008 - archived - Oracle Label Security for Oracle Database 10g Release 2 (10.2.0.3) Enterprise Edition with Critical Patch Update July 2007
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
BSI-DSZ-CC-0256-2005Extracted SARs
ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ALC_FLR.3, ALC_LCD.1, ALC_TAT.1, ASE_DES.1, ASE_ENV.1, ASE_INT.1, ASE_OBJ.1, ASE_PPC.1, ASE_REQ.1, ASE_SRE.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.2, AVA_SOF.1, AVA_VLA.2Related CVEs
| ID | Links | Severity | CVSS Score | Published on | ||
|---|---|---|---|---|---|---|
| Base | Exploitability | Impact | ||||
| CVE-2007-5000 | MEDIUM | 4.3 | 2.9 | 13.12.2007 | ||
| CVE-2007-6427 | HIGH | 9.3 | 10.0 | 18.01.2008 | ||
| CVE-2008-1375 | MEDIUM | 6.9 | 10.0 | 02.05.2008 | ||
| CVE-2008-5021 | HIGH | 9.3 | 10.0 | 13.11.2008 | ||
| CVE-2009-0115 | HIGH | 7.8 | 5.9 | 30.03.2009 | ||
| CVE-2009-1955 | HIGH | 7.5 | 3.6 | 08.06.2009 | ||
| CVE-2009-2408 | MEDIUM | 5.9 | 3.6 | 30.07.2009 | ||
| CVE-2009-2416 | MEDIUM | 6.5 | 3.6 | 11.08.2009 | ||
| CVE-2009-2625 | MEDIUM | 5.0 | 2.9 | 06.08.2009 | ||
| CVE-2009-2698 | HIGH | 7.8 | 5.9 | 27.08.2009 | ||
| CVE-2009-2848 | MEDIUM | 5.9 | 8.5 | 18.08.2009 | ||
| CVE-2009-2903 | HIGH | 7.1 | 6.9 | 15.09.2009 | ||
| CVE-2009-2910 | LOW | 2.1 | 2.9 | 20.10.2009 | ||
| CVE-2009-3095 | MEDIUM | 5.0 | 2.9 | 08.09.2009 | ||
| CVE-2009-3231 | MEDIUM | 6.8 | 6.4 | 17.09.2009 | ||
| CVE-2010-0205 | MEDIUM | 4.3 | 2.9 | 03.03.2010 | ||
| CVE-2010-1205 | CRITICAL | 9.8 | 5.9 | 30.06.2010 | ||
| CVE-2010-2249 | MEDIUM | 6.5 | 3.6 | 30.06.2010 | ||
| CVE-2010-2941 | CRITICAL | 9.8 | 5.9 | 05.11.2010 | ||
| CVE-2010-3067 | MEDIUM | 4.9 | 6.9 | 21.09.2010 | ||
| CVE-2010-3437 | MEDIUM | 6.6 | 9.2 | 04.10.2010 | ||
| CVE-2010-3442 | MEDIUM | 4.7 | 6.9 | 04.10.2010 | ||
| CVE-2010-3702 | HIGH | 7.5 | 6.4 | 05.11.2010 | ||
| CVE-2010-3848 | MEDIUM | 6.9 | 10.0 | 30.12.2010 | ||
| CVE-2010-3849 | MEDIUM | 4.7 | 6.9 | 30.12.2010 | ||
| CVE-2010-3850 | LOW | 2.1 | 2.9 | 30.12.2010 | ||
| CVE-2010-3873 | MEDIUM | 5.0 | 2.9 | 03.01.2011 | ||
| CVE-2010-3876 | LOW | 1.9 | 2.9 | 03.01.2011 | ||
| CVE-2010-4072 | LOW | 1.9 | 2.9 | 29.11.2010 | ||
| CVE-2010-4073 | LOW | 1.9 | 2.9 | 29.11.2010 | ||
| CVE-2010-4081 | LOW | 1.9 | 2.9 | 30.11.2010 | ||
| CVE-2010-4083 | LOW | 1.9 | 2.9 | 30.11.2010 | ||
| CVE-2010-4157 | MEDIUM | 6.2 | 10.0 | 10.12.2010 | ||
| CVE-2010-4158 | LOW | 2.1 | 2.9 | 30.12.2010 | ||
| CVE-2010-4160 | MEDIUM | 6.9 | 10.0 | 07.01.2011 | ||
| CVE-2010-4164 | HIGH | 7.8 | 6.9 | 03.01.2011 | ||
| CVE-2010-4180 | MEDIUM | 4.3 | 2.9 | 06.12.2010 | ||
| CVE-2010-4258 | MEDIUM | 6.2 | 10.0 | 30.12.2010 | ||
| CVE-2010-4342 | HIGH | 7.1 | 6.9 | 30.12.2010 | ||
| CVE-2011-0762 | MEDIUM | 4.0 | 2.9 | 02.03.2011 | ||
| CVE-2011-4862 | HIGH | 10.0 | 10.0 | 25.12.2011 | ||
| CVE-2013-4002 | HIGH | 7.1 | 6.9 | 23.07.2013 | ||
Showing 5 out of 42.
Similar certificates
| Name | Certificate ID | |
|---|---|---|
| SUSE Linux Enterprise Server Version 9 with Service Pack 2, ProPack 4 for Service Pack 2 and certification-sles-sgi-e... | BSI-DSZ-CC-0292-2005 | Compare |
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Operating Systems",
"cert_link": null,
"dgst": "98a279de6cd2cb64",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0256-2005",
"cert_lab": [
"BSI"
],
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_PPC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_DES",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_SOF",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ENV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_LLD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"9"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2010-4081",
"CVE-2011-4862",
"CVE-2009-2698",
"CVE-2010-3702",
"CVE-2010-4180",
"CVE-2010-3876",
"CVE-2010-0205",
"CVE-2013-4002",
"CVE-2008-1375",
"CVE-2009-2848",
"CVE-2010-4258",
"CVE-2009-3095",
"CVE-2010-1205",
"CVE-2007-6427",
"CVE-2010-4158",
"CVE-2010-3873",
"CVE-2010-4072",
"CVE-2010-4073",
"CVE-2010-4164",
"CVE-2011-0762",
"CVE-2010-4160",
"CVE-2009-2625",
"CVE-2007-5000",
"CVE-2009-1955",
"CVE-2010-2941",
"CVE-2008-5021",
"CVE-2009-3231",
"CVE-2009-2416",
"CVE-2010-3437",
"CVE-2010-4342",
"CVE-2010-3067",
"CVE-2009-2408",
"CVE-2010-3848",
"CVE-2009-0115",
"CVE-2010-2249",
"CVE-2009-2903",
"CVE-2010-4157",
"CVE-2010-3442",
"CVE-2010-3850",
"CVE-2010-3849",
"CVE-2010-4083",
"CVE-2009-2910"
]
},
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0234-2004"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0234-2004"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0402-2008"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0402-2008"
]
},
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "SUSE Linux Products Gmbh",
"manufacturer_web": "https://www.suse.com/",
"name": "SuSE Linux Enterprise Server Version 9 with certification-sles-ibm-eal4 package",
"not_valid_after": "2019-09-01",
"not_valid_before": "2005-03-09",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "0256a.pdf",
"report_frontpage": {
"DE": {
"cert_id": "BSI-DSZ-CC-0256-2005",
"cert_item": "SUSE Linux Enterprise Server Version 9 with certification-sles-ibm-eal4 package",
"cert_lab": "BSI",
"developer": "Novell - SUSE LINUX AG sponsored by IBM Corporation",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
]
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0234-2004": 3,
"BSI-DSZ-CC-0256": 1,
"BSI-DSZ-CC-0256-2005": 24
}
},
"cc_claims": {
"A": {
"A.CONNECT": 2,
"A.COOP": 2,
"A.LOCATE": 2,
"A.MANAGE": 2,
"A.NET_COMP": 2,
"A.NO_EVIL_ADMIN": 2,
"A.PEER": 2,
"A.PROTECT": 2,
"A.UTRAIN": 2,
"A.UTRUST": 2
},
"OE": {
"OE.ADMIN": 1,
"OE.CREDEN": 1,
"OE.HW_SEP": 1,
"OE.INFO_PROTECT": 1,
"OE.INSTALL": 1,
"OE.MAINTENANCE": 1,
"OE.PHYSICAL": 1,
"OE.RECOVER": 1,
"OE.SERIAL_LOGIN": 1,
"OE.SOFTWARE_IN": 1
},
"T": {
"T.COMPROT": 1,
"T.UAACCESS": 1,
"T.UAUSER": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_AUT": 2,
"ACM_AUT.1": 1,
"ACM_CAP": 2,
"ACM_CAP.4": 1,
"ACM_SCP": 2,
"ACM_SCP.2": 1
},
"ADO": {
"ADO_DEL": 2,
"ADO_DEL.2": 1,
"ADO_IGS": 2,
"ADO_IGS.1": 1
},
"ADV": {
"ADV_FSP": 2,
"ADV_FSP.2": 1,
"ADV_HLD": 2,
"ADV_HLD.2": 1,
"ADV_IMP": 2,
"ADV_IMP.1": 1,
"ADV_INT": 2,
"ADV_LLD": 2,
"ADV_LLD.1": 1,
"ADV_RCR": 2,
"ADV_RCR.1": 1,
"ADV_SPM": 2,
"ADV_SPM.1": 1
},
"AGD": {
"AGD_ADM": 2,
"AGD_ADM.1": 1,
"AGD_USR": 2,
"AGD_USR.1": 1
},
"ALC": {
"ALC_DVS": 2,
"ALC_DVS.1": 1,
"ALC_FLR": 2,
"ALC_FLR.3": 5,
"ALC_LCD": 1,
"ALC_LCD.1": 1,
"ALC_TAT": 2,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_DES.1": 1,
"ASE_ENV.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.1": 1,
"ASE_PPC.1": 1,
"ASE_REQ.1": 1,
"ASE_SRE.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV": 2,
"ATE_COV.2": 1,
"ATE_DPT": 2,
"ATE_DPT.1": 1,
"ATE_FUN": 2,
"ATE_FUN.1": 1,
"ATE_IND": 2,
"ATE_IND.2": 1
},
"AVA": {
"AVA_CCA": 2,
"AVA_MSU": 2,
"AVA_MSU.2": 1,
"AVA_SOF": 4,
"AVA_SOF.1": 1,
"AVA_VLA": 4,
"AVA_VLA.2": 1,
"AVA_VLA.3": 2,
"AVA_VLA.4": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 4": 1,
"EAL 7": 1,
"EAL1": 5,
"EAL2": 3,
"EAL3": 4,
"EAL4": 6,
"EAL4 augmented": 2,
"EAL4+": 4,
"EAL5": 6,
"EAL6": 3,
"EAL7": 4
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 1,
"FAU_GEN.2": 1,
"FAU_SAR.1": 1,
"FAU_SAR.2": 1,
"FAU_SAR.3": 1,
"FAU_SEL.1": 1,
"FAU_STG.1": 1,
"FAU_STG.3": 1,
"FAU_STG.4": 1
},
"FCS": {
"FCS_CKM.1": 1,
"FCS_CKM.2": 1,
"FCS_COP.1": 1
},
"FDP": {
"FDP_ACC.1": 1,
"FDP_ACF.1": 1,
"FDP_RIP.2": 1,
"FDP_UCT.1": 1,
"FDP_UIT.1": 1
},
"FIA": {
"FIA_ATD.1": 1,
"FIA_SOS.1": 1,
"FIA_UAU.2": 1,
"FIA_UAU.7": 1,
"FIA_UID.2": 1,
"FIA_USB.1": 1
},
"FMT": {
"FMT_MSA.1": 1,
"FMT_MSA.2": 1,
"FMT_MSA.3": 1,
"FMT_MTD.1": 1,
"FMT_REV.1": 1,
"FMT_SMF": 1,
"FMT_SMR.1": 1
},
"FPT": {
"FPT_AMT.1": 1,
"FPT_RVM.1": 1,
"FPT_SEP.1": 1,
"FPT_STM.1": 1
},
"FTP": {
"FTP_ITC.1": 1
}
},
"certification_process": {
"ConfidentialDocument": {
"9] Evaluation Technical Report BSI-DSZ-CC-0256, 1.4, 2005-02-10, atsec Information Security GmbH (confidential document) [10] Controlled Access Protection Profile (CAPP), Version 1.d National Security Agency, 1999-10-08": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 8
},
"TLS": {
"SSL": {
"SSL": 7
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"atsec": {
"atsec": 5
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"malfunction": 1
}
},
"standard_id": {
"BSI": {
"AIS 20": 2,
"AIS 32": 1,
"AIS32": 1,
"AIS33": 1
},
"ISO": {
"ISO/IEC 15408:1999": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {
"BSI": {
"BSI 7125": 2,
"BSI 7148": 1,
"BSI 7149": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "German Federal Office for Information Security / BSI",
"/CreationDate": "D:20050311105958",
"/Creator": "Microsoft Word - 0256_Report_CC_engl_draft10.doc",
"/Keywords": "CC, certification, Novell, SUSE, Linux, IBM",
"/ModDate": "D:20050311121731+01\u002700\u0027",
"/Producer": "Acrobat PDFWriter 4.0 f\u00fcr Windows NT",
"/Subject": "Common Criteria Certification",
"/Title": "Certification report BSI-DSZ-CC-0256-2005",
"pdf_file_size_bytes": 188841,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 49
},
"st_filename": "0256b.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"FF": {
"DH": {
"Diffie-Hellman": 4
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CONNECT": 7,
"A.COOP": 3,
"A.LOCATE": 3,
"A.MANAGE": 5,
"A.NET_COMP": 5,
"A.NO_EVIL_ADMIN": 4,
"A.PEER": 3,
"A.PROTECT": 5,
"A.UTRAIN": 3,
"A.UTRUST": 3
},
"O": {
"O.AUDITING": 30,
"O.AUTHORIZATION": 22,
"O.COMPROT": 24,
"O.DISCRETIONARY_ACCESS": 23,
"O.ENFORCEMENT": 13,
"O.MANAGE": 31,
"O.RESIDUAL_INFO": 9,
"O.RESIDUAL_INFORMATION": 3
},
"OE": {
"OE.ADMIN": 7,
"OE.CREDEN": 4,
"OE.HW_SEP": 8,
"OE.INFO_PROTECT": 10,
"OE.INSTALL": 12,
"OE.MAINTENANCE": 5,
"OE.PHYSICAL": 8,
"OE.PROTECT": 10,
"OE.RECOVER": 8,
"OE.SERIAL_LOGIN": 4,
"OE.SOFTWARE_IN": 5
},
"T": {
"T.COMPROT": 3,
"T.UAACCESS": 4,
"T.UAUSER": 4
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_AUT.1": 1,
"ACM_CAP.4": 1,
"ACM_SCP.2": 1
},
"ADO": {
"ADO_DEL.2": 1,
"ADO_IGS.1": 1
},
"ADV": {
"ADV_FSP.2": 1,
"ADV_HLD.2": 1,
"ADV_IMP.1": 1,
"ADV_LLD.1": 1,
"ADV_RCR.1": 1,
"ADV_SPM.1": 1
},
"AGD": {
"AGD_ADM.1": 1,
"AGD_USR.1": 1
},
"ALC": {
"ALC_DVS.1": 1,
"ALC_FLR.2": 1,
"ALC_FLR.3": 9,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_REQ.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_MSU.2": 1,
"AVA_SOF.1": 2,
"AVA_VLA.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL 4 augmented": 1,
"EAL3": 3,
"EAL3 augmented": 1,
"EAL3+": 1,
"EAL4": 8,
"EAL4 augmented": 4,
"EAL4+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 13,
"FAU_GEN.1.1": 2,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 9,
"FAU_GEN.2.1": 1,
"FAU_SAR.1": 13,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2": 12,
"FAU_SAR.2.1": 1,
"FAU_SAR.3": 11,
"FAU_SAR.3.1": 1,
"FAU_SEL.1": 12,
"FAU_SEL.1.1": 1,
"FAU_STG.1": 12,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1,
"FAU_STG.3": 13,
"FAU_STG.3.1": 1,
"FAU_STG.4": 11,
"FAU_STG.4.1": 1
},
"FCS": {
"FCS_CKM.1": 25,
"FCS_CKM.1.1": 3,
"FCS_CKM.2": 26,
"FCS_CKM.2.1": 4,
"FCS_CKM.4": 4,
"FCS_COP.1": 24,
"FCS_COP.1.1": 3
},
"FDP": {
"FDP_ACC.1": 25,
"FDP_ACC.1.1": 2,
"FDP_ACF.1": 19,
"FDP_ACF.1.1": 2,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 5,
"FDP_ACF.1.4": 3,
"FDP_ACF.2": 1,
"FDP_IFC.1": 3,
"FDP_ITC.1": 2,
"FDP_MSA.3": 1,
"FDP_RIP.2": 14,
"FDP_RIP.2.1": 1,
"FDP_UCT.1": 13,
"FDP_UCT.1.1": 1,
"FDP_UIT.1": 13,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_ATD.1": 13,
"FIA_ATD.1.1": 1,
"FIA_SOS.1": 14,
"FIA_SOS.1.1": 1,
"FIA_UAU.1": 2,
"FIA_UAU.2": 15,
"FIA_UAU.2.1": 1,
"FIA_UAU.7": 12,
"FIA_UAU.7.1": 1,
"FIA_UID": 1,
"FIA_UID.1": 6,
"FIA_UID.2": 15,
"FIA_UID.2.1": 1,
"FIA_USB": 1,
"FIA_USB.1": 15,
"FIA_USB.1.1": 2
},
"FMT": {
"FMT_MOF.1": 1,
"FMT_MSA.1": 25,
"FMT_MSA.1.1": 1,
"FMT_MSA.2": 16,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 22,
"FMT_MSA.3.1": 3,
"FMT_MSA.3.2": 2,
"FMT_MTD.1": 55,
"FMT_MTD.1.1": 5,
"FMT_REV.1": 27,
"FMT_REV.1.1": 2,
"FMT_REV.1.2": 2,
"FMT_SMF": 2,
"FMT_SMF.1": 26,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 23,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_AMT.1": 11,
"FPT_AMT.1.1": 1,
"FPT_RVM.1": 12,
"FPT_RVM.1.1": 1,
"FPT_SEP.1": 18,
"FPT_SEP.1.1": 1,
"FPT_SEP.1.2": 1,
"FPT_STM.1": 10,
"FPT_STM.1.1": 1
},
"FTP": {
"FTP_ITC.1": 17,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 2
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 3
}
},
"crypto_protocol": {
"SSH": {
"SSH": 35,
"SSHv2": 1
},
"TLS": {
"SSL": {
"SSL": 48
},
"TLS": {
"TLS": 1
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"atsec": {
"atsec": 207
}
},
"hash_function": {
"MD": {
"MD5": {
"MD5": 5
}
},
"SHA": {
"SHA1": {
"SHA-1": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {
"curves": {
"SM2": 4
}
},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"malfunction": 8
}
},
"standard_id": {
"BSI": {
"AIS 32": 9,
"AIS20": 1
},
"CC": {
"CCIMB-99-031": 1
},
"PKCS": {
"PKCS#1": 1
},
"RFC": {
"RFC 3268": 1,
"RFC2104": 1,
"RFC3268": 2
},
"X509": {
"X.509": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 8
},
"RC": {
"RC4": 6
}
},
"DES": {
"3DES": {
"TDES": 6,
"Triple-DES": 1
},
"DES": {
"DES": 2
}
},
"miscellaneous": {
"SM4": {
"SM4": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {
"TLS": {
"TLS_RSA_WITH_AES_128_CBC_SHA": 2,
"TLS_RSA_WITH_AES_256_CBC_SHA": 1
}
},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "smueller",
"/CreationDate": "D:20050118091924-08\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2",
"/ModDate": "D:20050118091924-08\u002700\u0027",
"/Producer": "Acrobat Distiller 5.0 (Windows)",
"/Title": "Microsoft Word - SLES_security_target_eal4_v3-10.doc",
"pdf_file_size_bytes": 727919,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 89
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0256a.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"EAL4+",
"ALC_FLR.3"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0256b.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "f13fbe60d6a1f4e116d56efd3c2741027cdd004045c4e5eb8e2cdba78365cce6",
"txt_hash": "7c8bf596bf10d2b2ed2b115c38e5fc3f6ad5e757633f1f6bb4899b57cf8c3320"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "afdb55197378897cb2d0028579626a1ca3480c033ac4aeb20881002e7a58a14c",
"txt_hash": "5cec92f2bda49889e968c3353d55b66cf063bc6aedb699bc56289ebc8d68dab5"
}
},
"status": "archived"
}