genugate 10.0 Firewall Software
CSV information ?
Status | active |
---|---|
Valid from | 22.06.2021 |
Valid until | 21.06.2026 |
Scheme | 🇩🇪 DE |
Manufacturer | genua GmbH |
Category | Network and Network-Related Devices and Systems |
Security level | AVA_VAN.5, ASE_TSS.2, ALC_FLR.2, EAL4+ |
Maintenance updates | genugate 10.0 p14 Firewall Software (Assurance Continuity Maintenance Report with partial re-evaluation applying ALC_PAM for patch management) (25.09.2023) Certification report Security target |
Heuristics summary ?
Certificate ?
Extracted keywords
Security level
EAL 4, EAL 5, EAL 2, EAL 4 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.2, ALC_PAM.1, ALC_FLR, AVA_VAN.5, ASE_TSS.2Certificates
BSI-DSZ-CC-1154-2021Standards
ISO/IEC 15408, ISO/IEC 18045File metadata
Title | Urkunde BSI-DSZ-CC-1154-2021 |
---|---|
Subject | Zertifikat, Certificate, Urkunde |
Keywords | "Zertifizierung, Certification, genugate 10.0 Firewall Software from genua GmbH", Urkunde |
Author | Bundesamt für Sicherheit in der Informationstechnik |
Creation date | D:20210630131150+02'00' |
Modification date | D:20210630132300+02'00' |
Pages | 1 |
Creator | Writer |
Producer | LibreOffice 6.3 |
Certification report ?
Extracted keywords
Hash functions
SHA-256, SHA-512, SHA256, SHA512, SHA-384Protocols
SSH, SSL, TLS, IPsec, VPNSecurity level
EAL 4, EAL 5, EAL 2, EAL 1, EAL 2+, EAL 5+, EAL 6, EAL 4 augmentedClaims
A.PHYSEC, A.NOEVIL, A.ADMIN, A.LOCAL, A.REST, A.SINGEN, A.POLICY, A.TIMESTMP, A.HANET, A.USER, A.TRUSTK, A.TRUSTU, A.LEGACY, A.REMOTE_AUTH, A.OSPF, OE.PHYSECSecurity Assurance Requirements (SAR)
ALC_FLR.2, ALC_PAM.1, ALC_FLR, ALC_PAM, AVA_VAN.5, ASE_TSS.2Certificates
BSI-DSZ-CC-1154-2021, BSI-DSZ-CC-1039-2017, BSI-DSZ-CC-01154Evaluation facilities
secuveraCertification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Report BSI-DSZ-CC-01154 for genugate firewall 10.0, Version 2, Date 11.06.2021, secuvera Gmbh (confidential document) [8] genugate 10.0 Z Installationshandbuch, Version 10.0 Z Patch 000, Ausgabe März 2021, Revision, v10.0-RC3 [10] Archiv von Konfigurationslisten, 1154-ALC_CMS-RC3-20210331.tgz, Date 31.03.2021 (confidential document) 7 specifically • AIS 32, Version 7, CC-Interpretationen im deutschen Zertifizierungsschema • AISStandards
FIPS PUB 180-4, PKCS#1, AIS 34, AIS 32, AIS 38, RFC 3447, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065Technical reports
BSI TR-02102, BSI 7148File metadata
Title | Zertifizierungsreport BSI-DSZ-CC-1154-2021 |
---|---|
Subject | BSI-DSZ-CC-1154-2021 for genugate 10.0 Firewall Software from genua GmbH |
Keywords | "Zertifizierung, Certification, genugate 10.0 Firewall Software from genua GmbH" |
Author | Bundesamt für Sicherheit in der Informationstechnik |
Creation date | D:20210630113008+02'00' |
Modification date | D:20210701114458+02'00' |
Pages | 29 |
Creator | Writer |
Producer | LibreOffice 6.3 |
Frontpage
Certificate ID | BSI-DSZ-CC-1154-2021 |
---|---|
Certified item | genugate 10.0 Firewall Software |
Certification lab | BSI |
Developer | genua GmbH |
References
Outgoing- BSI-DSZ-CC-1039-2017 - archived - genugate 9.0 Firewall Software
Security target ?
Extracted keywords
Hash functions
SHA-384, SHA-256, SHA-512Protocols
SSH, SSL, TLS, IPsecVendor
MicrosoftSecurity level
EAL4, EAL4 augmentedClaims
O.IDAUTH, O.MEDIAT, O.SECSTA, O.SELPRO, O.SECFUN, O.MISUSESSH, O.AUDREC, O.ACCOUN, O.AVAIL, O.PATCH, T.NOAUTH, T.SPOOF, T.MEDIAT, T.SELPRO, T.MISUSESSH, T.PATCH, A.PHYSEC, A.NOEVIL, A.ADMIN, A.LOCAL, A.REST, A.SINGEN, A.POLICY, A.TIMESTMP, A.HANET, A.USER, A.TRUSTK, A.TRUSTU, A.LEGACY, A.REMOTE_AUTH, A.OSPF, OE.PHYSEC, OE.NOEVIL, OE.ADMIN, OE.LOCAL, OE.REST, OE.SINGEN, OE.POLICY, OE.TIMESTMP, OE.RTCLOCK, OE.HANET, OE.USER, OE.TRUSTK, OE.TRUSTU, OE.LEGACY, OE.REMOTE_AUTH, OE.OSPF, OE.PASSWDSecurity Assurance Requirements (SAR)
ADV_INT, ADV_SPM, ADV_ARC, ADV_FSP, ADV_IMP, ADV_TDS, ADV_ARC.1, ADV_TDS.1, ADV_FSP.4, ADV_IMP.1, ADV_TAT.1, ADV_TDS.3, ADV_FSP.1, ADV_FSP.2, ADV_TDS.2, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_PAM, ALC_PAM.1, ALC_FLR.2, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ALC_CMC.4, ALC_DVS.1, ALC_LCD.1, ALC_CMS.4, ALC_DEL.1, ALC_TAT.1, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, ATE_COV.2, ATE_FUN.1, ATE_DPT.1, ATE_IND.2, ATE_COV.1, AVA_VAN.5, AVA_VAN, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_REQ.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1Security Functional Requirements (SFR)
FAU_GEN, FAU_GEN.1, FAU_GEN.2, FAU_UPD, FAU_ARP, FAU_ARP.1, FAU_ARP.1.1, FAU_SAA, FAU_SAA.1, FAU_SAA.1.1, FAU_SAA.1.2, FAU_SAR, FAU_SAR.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2, FAU_SAR.2.1, FAU_SAR.3, FAU_SAR.3.1, FAU_STG, FAU_STG.1, FAU_STG.4, FCS_COP.1, FCS_COP, FCS_COP.1.1, FCS_CKM.4, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_ITC.1, FIA_UAU, FIA_UAU.5, FIA_UAU.1, FIA_UAU.2, FIA_UAU.3, FIA_UAU.4, FIA_UAU.6, FIA_UAU.7, FIA_AFL, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS, FIA_SOS.1, FIA_SOS.1.1, FIA_UAU.2.1, FIA_UAU.6.1, FIA_UID, FIA_UID.2, FIA_UID.2.1, FIA_UID.1, FMT_MOF, FMT_MOF.1, FMT_MSA, FMT_MSA.1, FMT_MSA.3, FMT_MTD, FMT_MTD.1, FMT_SMF, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR, FMT_SMR.2, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FMT_SMR.3, FMT_SMR.3.1, FMT_SMR.1, FMT_IFF, FMT_MOF.1.3, FPT_SST, FPT_UPD, FPT_STM.1, FPT_RCV, FPT_RCV.2, FPT_RCV.2.1, FPT_RCV.2.2, FPT_STM, FPT_STM.1.1, FPT_TRC, FPT_TRC.1, FPT_TRC.1.1, FPT_TRC.1.2, FPT_ITT.1, FPT_TST.1, FPT_AMT.1Side-channel analysis
side channelCertification process
out of scope, genugate 400, genugate 600 and genugate 800 in the field with hardware revision 6 and 7 which are out of scope for the current certification. The genugate firewall 10.0 runs on this hardware with the sameStandards
FIPS PUB 180-4, PKCS#1, RFC 4251, ISO/IEC 18045, CCMB-2017-04-002File metadata
Title | genugate 10.0 Security Target |
---|---|
Subject | Common Criteria certification |
Keywords | firewall, application level gateway, packet filter |
Author | genua GmbH |
Creation date | D:20210616140218+02'00' |
Modification date | D:20210616140218+02'00' |
Pages | 81 |
Creator | LaTeX with hyperref |
Producer | GPL Ghostscript 9.53.3 |
Heuristics ?
Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TAT.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.2, ALC_LCD.1, ALC_PAM.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.2, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5Scheme data ?
Cert Id | BSI-DSZ-CC-1154-2021 | |
---|---|---|
Product | genugate 10.0 p14 Firewall Software | |
Vendor | genua GmbH | |
Certification Date | 22.06.2021 | |
Category | Network and Network related Devices and Systems | |
Url | https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Netzwerk_und_Kommunikationsprodukte/1154.html | |
Enhanced | ||
Product | genugate 10.0 p14 Firewall Software | |
Applicant | genua GmbH Domagkstrasse 7 85551 Kirchheim | |
Evaluation Facility | secuvera GmbH | |
Assurance Level | EAL4+,ALC_FLR.2,ALC_PAM.1,ASE_TSS.2,AVA_VAN.5 | |
Certification Date | 22.06.2021 | |
Expiration Date | 21.06.2026 | |
Entries | [frozendict({'id': 'BSI-DSZ-CC-1154-2023-MA-01 (Ausstellungsdatum / Certification Date 25.09.2023) Assurance Continuity Maintenance Report with partial re-evaluation applying ALC_PAM for patch management Assurance Continuity Maintanance Report', 'description': 'patchlevel is p14'}), frozendict({'id': 'BSI-DSZ-CC-1154-2021', 'description': 'Certificate'})] | |
Report Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1154a_pdf.pdf?__blob=publicationFile&v=2 | |
Target Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1154b_pdf.pdf?__blob=publicationFile&v=2 | |
Cert Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1154c_pdf.pdf?__blob=publicationFile&v=2 | |
Description | The TOE genugate 10.0 Z is a combination of an application level gateway (ALG) and a packet filter (PFL), which are implemented on two different systems. It is part of a larger product. The firewall genugate 10.0 Z consists of hardware and software. The TOE is part of the shipped software. The operating system is a modified OpenBSD. |
References ?
Updates ?
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'certification_date': '2021-06-22', 'enhanced': {'__update__': {'applicant': 'genua GmbH Domagkstrasse 7 85551 Kirchheim', 'certification_date': '2021-06-22', 'expiration_date': '2026-06-21', 'entries': {'0': {'__update__': {'id': 'BSI-DSZ-CC-1154-2023-MA-01 (Ausstellungsdatum / Certification Date 25.09.2023) Assurance Continuity Maintenance Report with partial re-evaluation applying ALC_PAM for patch management Assurance Continuity Maintanance Report'}}}, 'description': 'The TOE genugate 10.0 Z is a combination of an application level gateway (ALG) and a packet filter (PFL), which are implemented on two different systems. It is part of a larger product. The firewall genugate 10.0 Z consists of hardware and software. The TOE is part of the shipped software. The operating system is a modified OpenBSD.'}}}
data.
- The scheme_data property was updated, with the
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '96c4c9f54d244ab966c01f45fcb1397efdf08aa2e9a2ed78a23f60f03b8d901a', 'txt_hash': '9e20dc50bb971bc87293f3d8def7cf419800b5d3b0abc4d5b8717c0589596495'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'f6490f4bd3755b5ab3f32cd34a07501e045fc8ddc32ad5987b5966a41eed50da', 'txt_hash': '50af03dfddd87de76ca33b6444f5af10f1cfde18c9794963f3114b29f0b170b4'}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 460773, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 81, '/Producer': 'GPL Ghostscript 9.53.3', '/CreationDate': "D:20210616140218+02'00'", '/ModDate': "D:20210616140218+02'00'", '/Author': 'genua GmbH', '/Creator': 'LaTeX with hyperref', '/Title': 'genugate 10.0 Security Target', '/Subject': 'Common Criteria certification', '/Keywords': 'firewall, application level gateway, packet filter', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.ietf.org/rfc/rfc4251.txt', 'http://www.openssh.org']}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 263084, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20210630131150+02'00'", '/Creator': 'Writer', '/Keywords': '"Zertifizierung, Certification, genugate 10.0 Firewall Software from genua GmbH", Urkunde', '/ModDate': "D:20210630132300+02'00'", '/Producer': 'LibreOffice 6.3', '/Subject': 'Zertifikat, Certificate, Urkunde', '/Title': 'Urkunde BSI-DSZ-CC-1154-2021', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 4, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_INT': 2, 'ADV_SPM': 2, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_TDS': 1, 'ADV_ARC.1': 4, 'ADV_TDS.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 3, 'ADV_TAT.1': 1, 'ADV_TDS.3': 2, 'ADV_FSP.1': 1, 'ADV_FSP.2': 3, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1, 'AGD_OPE.1': 5, 'AGD_PRE.1': 3}, 'ALC': {'ALC_PAM': 32, 'ALC_PAM.1': 48, 'ALC_FLR.2': 5, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 3, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_LCD': 1, 'ALC_TAT': 1, 'ALC_CMC.4': 1, 'ALC_DVS.1': 2, 'ALC_LCD.1': 2, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1, 'ATE_COV.2': 1, 'ATE_FUN.1': 4, 'ATE_DPT.1': 1, 'ATE_IND.2': 1, 'ATE_COV.1': 1}, 'AVA': {'AVA_VAN.5': 4, 'AVA_VAN': 1}, 'ASE': {'ASE_TSS.2': 4, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1, 'ASE_CCL.1': 1, 'ASE_ECD.1': 3, 'ASE_REQ.1': 2, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 33, 'FAU_GEN.1': 16, 'FAU_GEN.2': 1, 'FAU_UPD': 1, 'FAU_ARP': 2, 'FAU_ARP.1': 6, 'FAU_ARP.1.1': 1, 'FAU_SAA': 2, 'FAU_SAA.1': 7, 'FAU_SAA.1.1': 1, 'FAU_SAA.1.2': 1, 'FAU_SAR': 4, 'FAU_SAR.1': 8, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2': 6, 'FAU_SAR.2.1': 1, 'FAU_SAR.3': 6, 'FAU_SAR.3.1': 1, 'FAU_STG': 31, 'FAU_STG.1': 7, 'FAU_STG.4': 2}, 'FCS': {'FCS_COP.1': 11, 'FCS_COP': 2, 'FCS_COP.1.1': 1, 'FCS_CKM.4': 2}, 'FDP': {'FDP_IFC': 60, 'FDP_IFC.1': 5, 'FDP_IFF': 52, 'FDP_IFF.1': 25, 'FDP_ITC.1': 2}, 'FIA': {'FIA_UAU': 28, 'FIA_UAU.5': 8, 'FIA_UAU.1': 2, 'FIA_UAU.2': 8, 'FIA_UAU.3': 1, 'FIA_UAU.4': 1, 'FIA_UAU.6': 7, 'FIA_UAU.7': 1, 'FIA_AFL': 2, 'FIA_AFL.1': 6, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD': 2, 'FIA_ATD.1': 6, 'FIA_ATD.1.1': 1, 'FIA_SOS': 2, 'FIA_SOS.1': 6, 'FIA_SOS.1.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UAU.6.1': 1, 'FIA_UID': 3, 'FIA_UID.2': 7, 'FIA_UID.2.1': 1, 'FIA_UID.1': 3}, 'FMT': {'FMT_MOF': 21, 'FMT_MOF.1': 3, 'FMT_MSA': 68, 'FMT_MSA.1': 4, 'FMT_MSA.3': 3, 'FMT_MTD': 15, 'FMT_MTD.1': 2, 'FMT_SMF': 2, 'FMT_SMF.1': 24, 'FMT_SMF.1.1': 1, 'FMT_SMR': 5, 'FMT_SMR.2': 19, 'FMT_SMR.2.1': 1, 'FMT_SMR.2.2': 1, 'FMT_SMR.2.3': 1, 'FMT_SMR.3': 6, 'FMT_SMR.3.1': 1, 'FMT_SMR.1': 25, 'FMT_IFF': 2, 'FMT_MOF.1.3': 1}, 'FPT': {'FPT_SST': 22, 'FPT_UPD': 42, 'FPT_STM.1': 9, 'FPT_RCV': 2, 'FPT_RCV.2': 6, 'FPT_RCV.2.1': 1, 'FPT_RCV.2.2': 1, 'FPT_STM': 2, 'FPT_STM.1.1': 1, 'FPT_TRC': 3, 'FPT_TRC.1': 5, 'FPT_TRC.1.1': 1, 'FPT_TRC.1.2': 1, 'FPT_ITT.1': 1, 'FPT_TST.1': 2, 'FPT_AMT.1': 1}}, 'cc_claims': {'O': {'O.IDAUTH': 15, 'O.MEDIAT': 13, 'O.SECSTA': 8, 'O.SELPRO': 4, 'O.SECFUN': 22, 'O.MISUSESSH': 7, 'O.AUDREC': 17, 'O.ACCOUN': 6, 'O.AVAIL': 8, 'O.PATCH': 5}, 'T': {'T.NOAUTH': 2, 'T.SPOOF': 2, 'T.MEDIAT': 2, 'T.SELPRO': 2, 'T.MISUSESSH': 2, 'T.PATCH': 2}, 'A': {'A.PHYSEC': 2, 'A.NOEVIL': 2, 'A.ADMIN': 2, 'A.LOCAL': 3, 'A.REST': 2, 'A.SINGEN': 3, 'A.POLICY': 2, 'A.TIMESTMP': 2, 'A.HANET': 2, 'A.USER': 2, 'A.TRUSTK': 2, 'A.TRUSTU': 2, 'A.LEGACY': 2, 'A.REMOTE_AUTH': 2, 'A.OSPF': 2}, 'OE': {'OE.PHYSEC': 2, 'OE.NOEVIL': 1, 'OE.ADMIN': 2, 'OE.LOCAL': 1, 'OE.REST': 2, 'OE.SINGEN': 1, 'OE.POLICY': 2, 'OE.TIMESTMP': 2, 'OE.RTCLOCK': 3, 'OE.HANET': 3, 'OE.USER': 2, 'OE.TRUSTK': 3, 'OE.TRUSTU': 2, 'OE.LEGACY': 1, 'OE.REMOTE_AUTH': 2, 'OE.OSPF': 1, 'OE.PASSWD': 3}}, 'vendor': {'Microsoft': {'Microsoft': 1}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-384': 3, 'SHA-256': 3, 'SHA-512': 2}}}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 26}, 'TLS': {'SSL': {'SSL': 3}, 'TLS': {'TLS': 5}}, 'IPsec': {'IPsec': 2}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side channel': 31}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 180-4': 3}, 'PKCS': {'PKCS#1': 3}, 'RFC': {'RFC 4251': 1}, 'ISO': {'ISO/IEC 18045': 4}, 'CC': {'CCMB-2017-04-002': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'genugate 400, genugate 600 and genugate 800 in the field with hardware revision 6 and 7 which are out of scope for the current certification. The genugate firewall 10.0 runs on this hardware with the same': 1}}}
. - The cert_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-1154-2021': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 2, 'EAL 5': 1, 'EAL 2': 1, 'EAL 4 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 1, 'ALC_PAM.1': 1, 'ALC_FLR': 1}, 'AVA': {'AVA_VAN.5': 1}, 'ASE': {'ASE_TSS.2': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
1154b_pdf.pdf
. - The cert_filename property was set to
1154c_pdf.pdf
.
The computed heuristics were updated.
- The report_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1039-2017']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0718-2012', 'BSI-DSZ-CC-0890-2013', 'BSI-DSZ-CC-1039-2017']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]}
values added.
- The st property was updated, with the
-
19.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '86f2e0bcc7b11465da147358585db0557864c6ee3cc3c4b8f66697ed4f81f005', 'txt_hash': '9fac66d6037ff7ad36d6794c98da55311ba1c1ab1cc70583ddce0f44e8d49817'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 637521, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 29, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20210630113008+02'00'", '/Creator': 'Writer', '/Keywords': '"Zertifizierung, Certification, genugate 10.0 Firewall Software from genua GmbH"', '/ModDate': "D:20210701114458+02'00'", '/Producer': 'LibreOffice 6.3', '/Subject': 'BSI-DSZ-CC-1154-2021 for genugate 10.0 Firewall Software from genua GmbH', '/Title': 'Zertifizierungsreport BSI-DSZ-CC-1154-2021', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/', 'https://www.sogis.eu/', 'https://www.bsi.bund.de/zertifizierung', 'http://www.commoncriteriaportal.org/cc/', 'https://www.bsi.bund.de/zertifizierungsreporte', 'http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/AIS']}}
. - The report_frontpage property was set to
{'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-1154-2021', 'cert_item': 'genugate 10.0 Firewall Software', 'developer': 'genua GmbH', 'cert_lab': 'BSI', 'ref_protection_profiles': 'None', 'cc_version': 'Product specific Security Target Common Criteria Part 2 extended', 'cc_security_level': 'Common Criteria Part 3 extended EAL 4 augmented by ASE_TSS.2, ALC_FLR.2, ALC_PAM.1, AVA_VAN.5'}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-1154-2021': 15, 'BSI-DSZ-CC-1039-2017': 3, 'BSI-DSZ-CC-01154': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 8, 'EAL 5': 3, 'EAL 2': 2, 'EAL 1': 1, 'EAL 2+': 1, 'EAL 5+': 1, 'EAL 6': 1, 'EAL 4 augmented': 3}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 4, 'ALC_PAM.1': 13, 'ALC_FLR': 3, 'ALC_PAM': 3}, 'AVA': {'AVA_VAN.5': 5}, 'ASE': {'ASE_TSS.2': 5}}, 'cc_sfr': {}, 'cc_claims': {'A': {'A.PHYSEC': 2, 'A.NOEVIL': 2, 'A.ADMIN': 2, 'A.LOCAL': 2, 'A.REST': 2, 'A.SINGEN': 2, 'A.POLICY': 3, 'A.TIMESTMP': 2, 'A.HANET': 2, 'A.USER': 2, 'A.TRUSTK': 2, 'A.TRUSTU': 2, 'A.LEGACY': 2, 'A.REMOTE_AUTH': 2, 'A.OSPF': 2}, 'OE': {'OE.PHYSEC': 1}}, 'vendor': {}, 'eval_facility': {'secuvera': {'secuvera': 3}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 2, 'SHA-512': 2, 'SHA256': 36, 'SHA512': 36, 'SHA-384': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 5}, 'TLS': {'SSL': {'SSL': 1}, 'TLS': {'TLS': 1}}, 'IPsec': {'IPsec': 1}, 'VPN': {'VPN': 1}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {'BSI': {'BSI TR-02102': 1, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 180-4': 4}, 'PKCS': {'PKCS#1': 2}, 'BSI': {'AIS 34': 2, 'AIS 32': 1, 'AIS 38': 1}, 'RFC': {'RFC 3447': 1}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'Report BSI-DSZ-CC-01154 for genugate firewall 10.0, Version 2, Date 11.06.2021, secuvera Gmbh (confidential document) [8] genugate 10.0 Z Installationshandbuch, Version 10.0 Z Patch 000, Ausgabe März 2021, Revision': 1, 'v10.0-RC3 [10] Archiv von Konfigurationslisten, 1154-ALC_CMS-RC3-20210331.tgz, Date 31.03.2021 (confidential document) 7 specifically • AIS 32, Version 7, CC-Interpretationen im deutschen Zertifizierungsschema • AIS': 1}}}
. - The report_filename property was set to
1154a_pdf.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['BSI']
. - The cert_id property was set to
BSI-DSZ-CC-1154-2021
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_PAM', 'level': 1}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1154a_pdf.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1154b_pdf.pdf
.
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The cert property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The cert_metadata property was set to
None
. - The st_keywords property was set to
None
. - The cert_keywords property was set to
None
. - The st_filename property was set to
None
. - The cert_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_PAM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The report_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data.
- The report property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name genugate 10.0 Firewall Software was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Network and Network-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1154c_pdf.pdf",
"dgst": "b60615a415b67af8",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-1154-2021",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_PAM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"10.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1039-2017"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0718-2012",
"BSI-DSZ-CC-0890-2013",
"BSI-DSZ-CC-1039-2017"
]
}
},
"scheme_data": {
"category": "Network and Network related Devices and Systems",
"cert_id": "BSI-DSZ-CC-1154-2021",
"certification_date": "2021-06-22",
"enhanced": {
"applicant": "genua GmbH Domagkstrasse 7 85551 Kirchheim",
"assurance_level": "EAL4+,ALC_FLR.2,ALC_PAM.1,ASE_TSS.2,AVA_VAN.5",
"cert_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1154c_pdf.pdf?__blob=publicationFile\u0026v=2",
"certification_date": "2021-06-22",
"description": "The TOE genugate 10.0 Z is a combination of an application level gateway (ALG) and a packet filter (PFL), which are implemented on two different systems. It is part of a larger product. The firewall genugate 10.0 Z consists of hardware and software. The TOE is part of the shipped software. The operating system is a modified OpenBSD.",
"entries": [
{
"description": "patchlevel is p14",
"id": "BSI-DSZ-CC-1154-2023-MA-01 (Ausstellungsdatum / Certification Date 25.09.2023) Assurance Continuity Maintenance Report with partial re-evaluation applying ALC_PAM for patch management Assurance Continuity Maintanance Report"
},
{
"description": "Certificate",
"id": "BSI-DSZ-CC-1154-2021"
}
],
"evaluation_facility": "secuvera GmbH",
"expiration_date": "2026-06-21",
"product": "genugate 10.0 p14 Firewall Software",
"report_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1154a_pdf.pdf?__blob=publicationFile\u0026v=2",
"target_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1154b_pdf.pdf?__blob=publicationFile\u0026v=2"
},
"product": "genugate 10.0 p14 Firewall Software",
"url": "https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Netzwerk_und_Kommunikationsprodukte/1154.html",
"vendor": "genua GmbH"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2023-09-25",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1154MA01a_pdf.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1154MA01b_pdf.pdf",
"maintenance_title": "genugate 10.0 p14 Firewall Software (Assurance Continuity Maintenance Report with partial re-evaluation applying ALC_PAM for patch management)"
}
]
},
"manufacturer": "genua GmbH",
"manufacturer_web": "https://www.genua.de",
"name": "genugate 10.0 Firewall Software",
"not_valid_after": "2026-06-21",
"not_valid_before": "2021-06-22",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "1154c_pdf.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1154-2021": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR": 1,
"ALC_FLR.2": 1,
"ALC_PAM.1": 1
},
"ASE": {
"ASE_TSS.2": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 4": 2,
"EAL 4 augmented": 1,
"EAL 5": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20210630131150+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Zertifizierung, Certification, genugate 10.0 Firewall Software from genua GmbH\", Urkunde",
"/ModDate": "D:20210630132300+02\u002700\u0027",
"/Producer": "LibreOffice 6.3",
"/Subject": "Zertifikat, Certificate, Urkunde",
"/Title": "Urkunde BSI-DSZ-CC-1154-2021",
"pdf_file_size_bytes": 263084,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "1154a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 extended EAL 4 augmented by ASE_TSS.2, ALC_FLR.2, ALC_PAM.1, AVA_VAN.5",
"cc_version": "Product specific Security Target Common Criteria Part 2 extended",
"cert_id": "BSI-DSZ-CC-1154-2021",
"cert_item": "genugate 10.0 Firewall Software",
"cert_lab": "BSI",
"developer": "genua GmbH",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "None"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-01154": 1,
"BSI-DSZ-CC-1039-2017": 3,
"BSI-DSZ-CC-1154-2021": 15
}
},
"cc_claims": {
"A": {
"A.ADMIN": 2,
"A.HANET": 2,
"A.LEGACY": 2,
"A.LOCAL": 2,
"A.NOEVIL": 2,
"A.OSPF": 2,
"A.PHYSEC": 2,
"A.POLICY": 3,
"A.REMOTE_AUTH": 2,
"A.REST": 2,
"A.SINGEN": 2,
"A.TIMESTMP": 2,
"A.TRUSTK": 2,
"A.TRUSTU": 2,
"A.USER": 2
},
"OE": {
"OE.PHYSEC": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR": 3,
"ALC_FLR.2": 4,
"ALC_PAM": 3,
"ALC_PAM.1": 13
},
"ASE": {
"ASE_TSS.2": 5
},
"AVA": {
"AVA_VAN.5": 5
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 2,
"EAL 2+": 1,
"EAL 4": 8,
"EAL 4 augmented": 3,
"EAL 5": 3,
"EAL 5+": 1,
"EAL 6": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"Report BSI-DSZ-CC-01154 for genugate firewall 10.0, Version 2, Date 11.06.2021, secuvera Gmbh (confidential document) [8] genugate 10.0 Z Installationshandbuch, Version 10.0 Z Patch 000, Ausgabe M\u00e4rz 2021, Revision": 1,
"being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1,
"v10.0-RC3 [10] Archiv von Konfigurationslisten, 1154-ALC_CMS-RC3-20210331.tgz, Date 31.03.2021 (confidential document) 7 specifically \u2022 AIS 32, Version 7, CC-Interpretationen im deutschen Zertifizierungsschema \u2022 AIS": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IPsec": {
"IPsec": 1
},
"SSH": {
"SSH": 5
},
"TLS": {
"SSL": {
"SSL": 1
},
"TLS": {
"TLS": 1
}
},
"VPN": {
"VPN": 1
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"secuvera": {
"secuvera": 3
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 2,
"SHA-384": 1,
"SHA-512": 2,
"SHA256": 36,
"SHA512": 36
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 32": 1,
"AIS 34": 2,
"AIS 38": 1
},
"FIPS": {
"FIPS PUB 180-4": 4
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
},
"PKCS": {
"PKCS#1": 2
},
"RFC": {
"RFC 3447": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {
"BSI": {
"BSI 7148": 1,
"BSI TR-02102": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20210630113008+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Zertifizierung, Certification, genugate 10.0 Firewall Software from genua GmbH\"",
"/ModDate": "D:20210701114458+02\u002700\u0027",
"/Producer": "LibreOffice 6.3",
"/Subject": "BSI-DSZ-CC-1154-2021 for genugate 10.0 Firewall Software from genua GmbH",
"/Title": "Zertifizierungsreport BSI-DSZ-CC-1154-2021",
"pdf_file_size_bytes": 637521,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.sogis.eu/",
"https://www.bsi.bund.de/",
"https://www.bsi.bund.de/zertifizierung",
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/zertifizierungsreporte",
"https://www.bsi.bund.de/AIS",
"http://www.commoncriteriaportal.org/cc/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 29
},
"st_filename": "1154b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ADMIN": 2,
"A.HANET": 2,
"A.LEGACY": 2,
"A.LOCAL": 3,
"A.NOEVIL": 2,
"A.OSPF": 2,
"A.PHYSEC": 2,
"A.POLICY": 2,
"A.REMOTE_AUTH": 2,
"A.REST": 2,
"A.SINGEN": 3,
"A.TIMESTMP": 2,
"A.TRUSTK": 2,
"A.TRUSTU": 2,
"A.USER": 2
},
"O": {
"O.ACCOUN": 6,
"O.AUDREC": 17,
"O.AVAIL": 8,
"O.IDAUTH": 15,
"O.MEDIAT": 13,
"O.MISUSESSH": 7,
"O.PATCH": 5,
"O.SECFUN": 22,
"O.SECSTA": 8,
"O.SELPRO": 4
},
"OE": {
"OE.ADMIN": 2,
"OE.HANET": 3,
"OE.LEGACY": 1,
"OE.LOCAL": 1,
"OE.NOEVIL": 1,
"OE.OSPF": 1,
"OE.PASSWD": 3,
"OE.PHYSEC": 2,
"OE.POLICY": 2,
"OE.REMOTE_AUTH": 2,
"OE.REST": 2,
"OE.RTCLOCK": 3,
"OE.SINGEN": 1,
"OE.TIMESTMP": 2,
"OE.TRUSTK": 3,
"OE.TRUSTU": 2,
"OE.USER": 2
},
"T": {
"T.MEDIAT": 2,
"T.MISUSESSH": 2,
"T.NOAUTH": 2,
"T.PATCH": 2,
"T.SELPRO": 2,
"T.SPOOF": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 4,
"ADV_FSP": 1,
"ADV_FSP.1": 1,
"ADV_FSP.2": 3,
"ADV_FSP.4": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 3,
"ADV_INT": 2,
"ADV_SPM": 2,
"ADV_TAT.1": 1,
"ADV_TDS": 1,
"ADV_TDS.1": 1,
"ADV_TDS.2": 1,
"ADV_TDS.3": 2
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 5,
"AGD_PRE": 1,
"AGD_PRE.1": 3
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.4": 1,
"ALC_CMS": 1,
"ALC_CMS.4": 1,
"ALC_DEL": 3,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.1": 2,
"ALC_FLR": 1,
"ALC_FLR.2": 5,
"ALC_LCD": 1,
"ALC_LCD.1": 2,
"ALC_PAM": 32,
"ALC_PAM.1": 48,
"ALC_TAT": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 1,
"ASE_ECD": 1,
"ASE_ECD.1": 3,
"ASE_INT": 1,
"ASE_INT.1": 1,
"ASE_OBJ": 1,
"ASE_OBJ.2": 1,
"ASE_REQ": 1,
"ASE_REQ.1": 2,
"ASE_REQ.2": 1,
"ASE_SPD": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 1,
"ASE_TSS.2": 4
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 1,
"ATE_COV.2": 1,
"ATE_DPT": 1,
"ATE_DPT.1": 1,
"ATE_FUN": 1,
"ATE_FUN.1": 4,
"ATE_IND": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL4": 4,
"EAL4 augmented": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP": 2,
"FAU_ARP.1": 6,
"FAU_ARP.1.1": 1,
"FAU_GEN": 33,
"FAU_GEN.1": 16,
"FAU_GEN.2": 1,
"FAU_SAA": 2,
"FAU_SAA.1": 7,
"FAU_SAA.1.1": 1,
"FAU_SAA.1.2": 1,
"FAU_SAR": 4,
"FAU_SAR.1": 8,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2": 6,
"FAU_SAR.2.1": 1,
"FAU_SAR.3": 6,
"FAU_SAR.3.1": 1,
"FAU_STG": 31,
"FAU_STG.1": 7,
"FAU_STG.4": 2,
"FAU_UPD": 1
},
"FCS": {
"FCS_CKM.4": 2,
"FCS_COP": 2,
"FCS_COP.1": 11,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_IFC": 60,
"FDP_IFC.1": 5,
"FDP_IFF": 52,
"FDP_IFF.1": 25,
"FDP_ITC.1": 2
},
"FIA": {
"FIA_AFL": 2,
"FIA_AFL.1": 6,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD": 2,
"FIA_ATD.1": 6,
"FIA_ATD.1.1": 1,
"FIA_SOS": 2,
"FIA_SOS.1": 6,
"FIA_SOS.1.1": 1,
"FIA_UAU": 28,
"FIA_UAU.1": 2,
"FIA_UAU.2": 8,
"FIA_UAU.2.1": 1,
"FIA_UAU.3": 1,
"FIA_UAU.4": 1,
"FIA_UAU.5": 8,
"FIA_UAU.6": 7,
"FIA_UAU.6.1": 1,
"FIA_UAU.7": 1,
"FIA_UID": 3,
"FIA_UID.1": 3,
"FIA_UID.2": 7,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_IFF": 2,
"FMT_MOF": 21,
"FMT_MOF.1": 3,
"FMT_MOF.1.3": 1,
"FMT_MSA": 68,
"FMT_MSA.1": 4,
"FMT_MSA.3": 3,
"FMT_MTD": 15,
"FMT_MTD.1": 2,
"FMT_SMF": 2,
"FMT_SMF.1": 24,
"FMT_SMF.1.1": 1,
"FMT_SMR": 5,
"FMT_SMR.1": 25,
"FMT_SMR.2": 19,
"FMT_SMR.2.1": 1,
"FMT_SMR.2.2": 1,
"FMT_SMR.2.3": 1,
"FMT_SMR.3": 6,
"FMT_SMR.3.1": 1
},
"FPT": {
"FPT_AMT.1": 1,
"FPT_ITT.1": 1,
"FPT_RCV": 2,
"FPT_RCV.2": 6,
"FPT_RCV.2.1": 1,
"FPT_RCV.2.2": 1,
"FPT_SST": 22,
"FPT_STM": 2,
"FPT_STM.1": 9,
"FPT_STM.1.1": 1,
"FPT_TRC": 3,
"FPT_TRC.1": 5,
"FPT_TRC.1.1": 1,
"FPT_TRC.1.2": 1,
"FPT_TST.1": 2,
"FPT_UPD": 42
}
},
"certification_process": {
"OutOfScope": {
"genugate 400, genugate 600 and genugate 800 in the field with hardware revision 6 and 7 which are out of scope for the current certification. The genugate firewall 10.0 runs on this hardware with the same": 1,
"out of scope": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IPsec": {
"IPsec": 2
},
"SSH": {
"SSH": 26
},
"TLS": {
"SSL": {
"SSL": 3
},
"TLS": {
"TLS": 5
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 3,
"SHA-384": 3,
"SHA-512": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"SCA": {
"side channel": 31
}
},
"standard_id": {
"CC": {
"CCMB-2017-04-002": 1
},
"FIPS": {
"FIPS PUB 180-4": 3
},
"ISO": {
"ISO/IEC 18045": 4
},
"PKCS": {
"PKCS#1": 3
},
"RFC": {
"RFC 4251": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "genua GmbH",
"/CreationDate": "D:20210616140218+02\u002700\u0027",
"/Creator": "LaTeX with hyperref",
"/Keywords": "firewall, application level gateway, packet filter",
"/ModDate": "D:20210616140218+02\u002700\u0027",
"/Producer": "GPL Ghostscript 9.53.3",
"/Subject": "Common Criteria certification",
"/Title": "genugate 10.0 Security Target",
"pdf_file_size_bytes": 460773,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.openssh.org",
"http://www.ietf.org/rfc/rfc4251.txt"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 81
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1154a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VAN.5",
"ASE_TSS.2",
"ALC_FLR.2",
"EAL4+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1154b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "f6490f4bd3755b5ab3f32cd34a07501e045fc8ddc32ad5987b5966a41eed50da",
"txt_hash": "50af03dfddd87de76ca33b6444f5af10f1cfde18c9794963f3114b29f0b170b4"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "86f2e0bcc7b11465da147358585db0557864c6ee3cc3c4b8f66697ed4f81f005",
"txt_hash": "9fac66d6037ff7ad36d6794c98da55311ba1c1ab1cc70583ddce0f44e8d49817"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "96c4c9f54d244ab966c01f45fcb1397efdf08aa2e9a2ed78a23f60f03b8d901a",
"txt_hash": "9e20dc50bb971bc87293f3d8def7cf419800b5d3b0abc4d5b8717c0589596495"
}
},
"status": "active"
}