Sourcefire 3D System Version 5.2.0.1
CSV information ?
Status | archived |
---|---|
Valid from | 06.08.2014 |
Valid until | 21.03.2016 |
Scheme | 🇺🇸 US |
Manufacturer | Sourcefire Inc. |
Category | Detection Devices and Systems |
Security level | |
Protection profiles |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, HMAC-SHA-384, HMAC-SHA-512Hash functions
SHA-1, SHA-224, SHA-384Protocols
SSHRandomness
RBGBlock cipher modes
CBCCertificates
CCEVS-VR-VID10537-2014Standards
FIPS PUB 197, FIPS PUB 186-2, FIPS PUB 180-3, FIPS PUB 198-1, FIPS PUB 140-2, NIST SP 800-38AFile metadata
Title | |
---|---|
Author | Robert Roland |
Creation date | D:20140807135046-04'00' |
Modification date | D:20140807135101-04'00' |
Pages | 20 |
Creator | Acrobat PDFMaker 10.1 for Word |
Producer | Adobe PDF Library 10.0 |
Frontpage
Certificate ID | CCEVS-VR-VID10537-2014 |
---|---|
Certified item | Sourcefire 3D System Version 5.2.0.1 |
Certification lab | US NIAP |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, 3DES, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512Asymmetric Algorithms
Diffie-Hellman, DHHash functions
SHA-1, SHA-224, SHA-384, SHA-512, SHA-256Schemes
Key Agreement, Key agreementProtocols
SSH, TLS, TLS 1.0, VPNRandomness
PRNG, RNG, RBGLibraries
OpenSSLBlock cipher modes
CBCTLS cipher suites
TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHAClaims
O.ADDRESS_FILTERING, O.PORT_FILTERING, O.RELATED_CONNECTION_FILTERING, O.STATEFUL_INSPECTION, O.DISPLAY_BANNER, O.PROTECTED_COMMUNICATIONS, O.RESIDUAL_INFORMATION_CLEARING, O.SESSION_LOCK, O.SYSTEM_MONITORING, O.TOE_ADMINISTRATION, O.TSF_SELF_TEST, O.VERIFIABLE_UPDATES, T.NETWORK_DISCLOSURE, T.NETWORK_MISUSE, T.NETWORK_DOS, T.NETWORK_ACCESS, T.ADMIN_ERROR, T.TSF_FAILURE, T.UNAUTHORIZED_ACCESS, T.UNAUTHORIZED_UPDATE, T.UNDETECTED_ACTIONS, T.USER_DATA_REUSE, A.CONNECTIONS, A.NO_GENERAL_PURPOSE, A.PHYSICAL, A.TRUSTED_ADMIN, OE.CONNECTIONSSecurity Assurance Requirements (SAR)
ADV_FSP, ADV_FSP.1, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_CMC, ALC_CMS, ALC_CMC.1, ALC_CMS.1, ATE_IND, ATE_IND.1, AVA_VAN, AVA_VAN.1Security Functional Requirements (SFR)
FAU_STG_EXT.1, FAU_GEN, FAU_STG_EXT, FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2, FAU_GEN.2.1, FAU_STG_EXT.1.1, FCS_TLS_EXT.1.1, FCS_CKM_EXT.4, FCS_RBG_EXT.1, FCS_SSH_EXT.1, FCS_TLS_EXT.1, FCS_CKM, FCS_CKM_EXT, FCS_COP.1, FCS_RBG_EXT, FCS_SSH_EXT, FCS_TLS_EXT, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM_EXT.4.1, FCS_COP.1.1, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_SSH_EXT.1.1, FCS_SSH_EXT.1.2, FCS_SSH_EXT.1.3, FCS_SSH_EXT.1.4, FCS_SSH_EXT.1.5, FCS_SSH_EXT.1.6, FCS_SSH_EXT.1.7, FCS_CKM.2, FCS_CKM.4, FDP_RIP, FDP_RIP.2, FDP_RIP.2.1, FDP_ITC.1, FDP_ITC.2, FIA_PMG_EXT.1, FIA_UAU_EXT.2, FIA_UIA_EXT.1, FIA_PMG_EXT, FIA_UIA_EXT, FIA_UAU_EXT, FIA_UAU, FIA_UAU.7, FIA_PMG_EXT.1.1, FIA_UIA_EXT.1.1, FIA_UIA_EXT.1.2, FIA_UAU_EXT.2.1, FIA_UAU.7.1, FIA_UID.1, FIA_UID_EXT, FMT_MTD, FMT_SMF, FMT_SMR, FMT_SMF.1, FMT_MTD.1, FMT_SMR.2, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FPT_ITT.1, FPT_SKP_EXT.1, FPT_APW_EXT.1, FPT_TUD_EXT.1, FPT_TST_EXT.1, FPT_ITT, FPT_SKP_EXT, FPT_APW_EXT, FPT_STM, FPT_TUD_EXT, FPT_TST_EXT, FPT_STM.1, FPT_ITT.1.1, FPT_SKP_EXT.1.1, FPT_APW_EXT.1.1, FPT_APW_EXT.1.2, FPT_STM.1.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FPT_TST_EXT.1.1, FPT_AWP_EXT, FTA_SSL_EXT.1, FTA_SSL_EXT, FTA_SSL, FTA_TAB, FTA_SSL.3, FTA_SSL.4, FTA_TAB.1, FTA_SSL_EXT.1.1, FTA_SSL.3.1, FTA_SSL.4.1, FTA_TAB.1.1, FTP_ITC, FTP_TRP, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3Certification process
Out of Scope, out of scope, NTP Server SMTP Server Audit Server SNMP Server Network Assets Legend TOE Operational Environment Out of Scope … … Sourcefire 3D System Security Target 13 The TOE main subsystems are summarized as followed: •, in the update header to ensure they match. 12 This process requires access to the Internet and is out of scope of the evaluation. Sourcefire 3D System Security Target 61 During the update process, if the SnortStandards
FIPS PUB 197, FIPS PUB 186-2, FIPS PUB 186-3, FIPS 140-2, FIPS PUB 180-3, FIPS PUB 198-1, FIPS PUB 140-2, FIPS 186-2, FIPS 186-3, NIST SP 800-38A, NIST SP 800-56B, SP 800-56B, SP 800-90, RFC 2818, RFC 4253, RFC 2246, RFC 792, RFC 4443, RFC 791, RFC 2460, RFC 793, RFC 768, RFC 959, RFC 5735, RFC 3513File metadata
Title | Sourcefire v5.2 Security Target |
---|---|
Author | Sourcefire |
Creation date | D:20140807084734-04'00' |
Modification date | D:20140807084758-04'00' |
Pages | 80 |
Creator | Acrobat PDFMaker 10.1 for Word |
Producer | Adobe PDF Library 10.0 |
Heuristics ?
Extracted SARs
ADV_FSP.1, AGD_PRE.1, ALC_CMS.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, AGD_OPE.1Similar certificates
Scheme data ?
Product | Sourcefire 3D System Version 5.2.0.1 | |
---|---|---|
Id | CCEVS-VR-VID10537 | |
Url | https://www.niap-ccevs.org/product/10537 | |
Certification Date | 2014-08-06T00:00:00Z | |
Expiration Date | 2016-08-06T00:00:00Z | |
Category | Firewall, Wireless Monitoring | |
Vendor | Sourcefire, Inc. | |
Evaluation Facility | COACT, Inc. Labs | |
Scheme | US |
References ?
No references are available for this certificate.
Updates ?
-
17.10.2024 The certificate data changed.
Certificate changed
The Protection Profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Network Devices', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_nd_v1.1.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PP_ND_V1.1']}}]}
.
- The new value is
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '2b46f0c9d4165e656ecb60c5679e9e1e9bf2c09bac1adbf5ab14e660f49fce8d', 'txt_hash': 'a102e36c448e5c4b1b121fcfcbfdc92b78dd0d1b27c5f3439de5a5d1df53bbbe'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ff7d9c51c64807446f33de76ebe642a9574ef181a07ac95a73ef9b5019b2dfa2', 'txt_hash': 'a324072ff212c3228de22433dfe42b49566441dd1675494a996d3eeca9588aa5'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 136944, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 20, '/Author': 'Robert Roland', '/Comments': '', '/Company': 'COACT', '/CreationDate': "D:20140807135046-04'00'", '/Creator': 'Acrobat PDFMaker 10.1 for Word', '/Keywords': '', '/ModDate': "D:20140807135101-04'00'", '/Producer': 'Adobe PDF Library 10.0', '/SourceModified': 'D:20140807175026', '/Subject': '', '/Title': ' ', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 747356, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 80, '/Author': 'Sourcefire', '/CRTarget': '4092', '/Company': 'Sourcefire, Inc', '/CreationDate': "D:20140807084734-04'00'", '/Creator': 'Acrobat PDFMaker 10.1 for Word', '/Keywords': '', '/ModDate': "D:20140807084758-04'00'", '/Producer': 'Adobe PDF Library 10.0', '/SourceModified': 'D:20140807124122', '/Subject': '', '/Title': 'Sourcefire v5.2 Security Target', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://support.sourcefire.com/', 'http://jitc.fhu.disa.mil/tssi/cert_pdfs/sourcefire_3d_ips_ids_aug12.pdf', 'https://www.icsalabs.com/technology-program/ipv6-/-usgv6/usgv6-tested-products']}}
. - The report_frontpage property was set to
{'US': {'cert_id': 'CCEVS-VR-VID10537-2014', 'cert_item': 'Sourcefire 3D System Version 5.2.0.1', 'cert_lab': 'US NIAP'}}
. - The report_keywords property was set to
{'cc_cert_id': {'US': {'CCEVS-VR-VID10537-2014': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 2}}, 'constructions': {'MAC': {'HMAC-SHA-384': 1, 'HMAC-SHA-512': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}, 'SHA2': {'SHA-224': 2, 'SHA-384': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 2}}, 'randomness': {'RNG': {'RBG': 3}}, 'cipher_mode': {'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 1, 'FIPS PUB 186-2': 1, 'FIPS PUB 180-3': 1, 'FIPS PUB 198-1': 1, 'FIPS PUB 140-2': 1}, 'NIST': {'NIST SP 800-38A': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {'ADV': {'ADV_FSP': 1, 'ADV_FSP.1': 16}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1, 'AGD_OPE.1': 15, 'AGD_PRE.1': 11}, 'ALC': {'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_CMC.1': 5, 'ALC_CMS.1': 6}, 'ATE': {'ATE_IND': 1, 'ATE_IND.1': 6}, 'AVA': {'AVA_VAN': 1, 'AVA_VAN.1': 7}}, 'cc_sfr': {'FAU': {'FAU_STG_EXT.1': 4, 'FAU_GEN': 11, 'FAU_STG_EXT': 5, 'FAU_GEN.1': 6, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2': 3, 'FAU_GEN.2.1': 1, 'FAU_STG_EXT.1.1': 1}, 'FCS': {'FCS_TLS_EXT.1.1': 2, 'FCS_CKM_EXT.4': 8, 'FCS_RBG_EXT.1': 4, 'FCS_SSH_EXT.1': 4, 'FCS_TLS_EXT.1': 6, 'FCS_CKM': 5, 'FCS_CKM_EXT': 5, 'FCS_COP.1': 33, 'FCS_RBG_EXT': 5, 'FCS_SSH_EXT': 5, 'FCS_TLS_EXT': 5, 'FCS_CKM.1': 9, 'FCS_CKM.1.1': 1, 'FCS_CKM_EXT.4.1': 1, 'FCS_COP.1.1': 4, 'FCS_RBG_EXT.1.1': 1, 'FCS_RBG_EXT.1.2': 1, 'FCS_SSH_EXT.1.1': 1, 'FCS_SSH_EXT.1.2': 1, 'FCS_SSH_EXT.1.3': 1, 'FCS_SSH_EXT.1.4': 1, 'FCS_SSH_EXT.1.5': 1, 'FCS_SSH_EXT.1.6': 1, 'FCS_SSH_EXT.1.7': 1, 'FCS_CKM.2': 1, 'FCS_CKM.4': 5}, 'FDP': {'FDP_RIP': 5, 'FDP_RIP.2': 3, 'FDP_RIP.2.1': 1, 'FDP_ITC.1': 5, 'FDP_ITC.2': 5}, 'FIA': {'FIA_PMG_EXT.1': 4, 'FIA_UAU_EXT.2': 4, 'FIA_UIA_EXT.1': 7, 'FIA_PMG_EXT': 5, 'FIA_UIA_EXT': 4, 'FIA_UAU_EXT': 5, 'FIA_UAU': 5, 'FIA_UAU.7': 3, 'FIA_PMG_EXT.1.1': 1, 'FIA_UIA_EXT.1.1': 1, 'FIA_UIA_EXT.1.2': 1, 'FIA_UAU_EXT.2.1': 1, 'FIA_UAU.7.1': 1, 'FIA_UID.1': 2, 'FIA_UID_EXT': 1}, 'FMT': {'FMT_MTD': 5, 'FMT_SMF': 6, 'FMT_SMR': 5, 'FMT_SMF.1': 5, 'FMT_MTD.1': 3, 'FMT_SMR.2': 3, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.2.1': 1, 'FMT_SMR.2.2': 1, 'FMT_SMR.2.3': 1}, 'FPT': {'FPT_ITT.1': 7, 'FPT_SKP_EXT.1': 4, 'FPT_APW_EXT.1': 4, 'FPT_TUD_EXT.1': 4, 'FPT_TST_EXT.1': 4, 'FPT_ITT': 5, 'FPT_SKP_EXT': 5, 'FPT_APW_EXT': 3, 'FPT_STM': 5, 'FPT_TUD_EXT': 5, 'FPT_TST_EXT': 5, 'FPT_STM.1': 4, 'FPT_ITT.1.1': 1, 'FPT_SKP_EXT.1.1': 1, 'FPT_APW_EXT.1.1': 1, 'FPT_APW_EXT.1.2': 1, 'FPT_STM.1.1': 1, 'FPT_TUD_EXT.1.1': 1, 'FPT_TUD_EXT.1.2': 1, 'FPT_TUD_EXT.1.3': 1, 'FPT_TST_EXT.1.1': 1, 'FPT_AWP_EXT': 2}, 'FTA': {'FTA_SSL_EXT.1': 4, 'FTA_SSL_EXT': 6, 'FTA_SSL': 12, 'FTA_TAB': 5, 'FTA_SSL.3': 3, 'FTA_SSL.4': 4, 'FTA_TAB.1': 4, 'FTA_SSL_EXT.1.1': 1, 'FTA_SSL.3.1': 1, 'FTA_SSL.4.1': 1, 'FTA_TAB.1.1': 1}, 'FTP': {'FTP_ITC': 5, 'FTP_TRP': 6, 'FTP_ITC.1': 3, 'FTP_TRP.1': 3, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1}}, 'cc_claims': {'O': {'O.ADDRESS_FILTERING': 5, 'O.PORT_FILTERING': 5, 'O.RELATED_CONNECTION_FILTERING': 5, 'O.STATEFUL_INSPECTION': 5, 'O.DISPLAY_BANNER': 1, 'O.PROTECTED_COMMUNICATIONS': 1, 'O.RESIDUAL_INFORMATION_CLEARING': 1, 'O.SESSION_LOCK': 1, 'O.SYSTEM_MONITORING': 1, 'O.TOE_ADMINISTRATION': 1, 'O.TSF_SELF_TEST': 1, 'O.VERIFIABLE_UPDATES': 1}, 'T': {'T.NETWORK_DISCLOSURE': 2, 'T.NETWORK_MISUSE': 2, 'T.NETWORK_DOS': 4, 'T.NETWORK_ACCESS': 3, 'T.ADMIN_ERROR': 1, 'T.TSF_FAILURE': 1, 'T.UNAUTHORIZED_ACCESS': 1, 'T.UNAUTHORIZED_UPDATE': 1, 'T.UNDETECTED_ACTIONS': 1, 'T.USER_DATA_REUSE': 1}, 'A': {'A.CONNECTIONS': 4, 'A.NO_GENERAL_PURPOSE': 1, 'A.PHYSICAL': 1, 'A.TRUSTED_ADMIN': 1}, 'OE': {'OE.CONNECTIONS': 2}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 13}}, 'DES': {'DES': {'DES': 1}, '3DES': {'3DES': 1}}, 'constructions': {'MAC': {'HMAC-SHA-256': 2, 'HMAC-SHA-384': 1, 'HMAC-SHA-512': 1}}}, 'asymmetric_crypto': {'FF': {'DH': {'Diffie-Hellman': 1, 'DH': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 4}, 'SHA2': {'SHA-224': 4, 'SHA-384': 5, 'SHA-512': 12, 'SHA-256': 2}}}, 'crypto_scheme': {'KA': {'Key Agreement': 1, 'Key agreement': 1}}, 'crypto_protocol': {'SSH': {'SSH': 37}, 'TLS': {'TLS': {'TLS': 16, 'TLS 1.0': 1}}, 'VPN': {'VPN': 4}}, 'randomness': {'PRNG': {'PRNG': 3}, 'RNG': {'RNG': 4, 'RBG': 5}}, 'cipher_mode': {'CBC': {'CBC': 4}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_RSA_WITH_AES_128_CBC_SHA': 2, 'TLS_RSA_WITH_AES_256_CBC_SHA': 2, 'TLS_DHE_RSA_WITH_AES_256_CBC_SHA': 2, 'TLS_DHE_RSA_WITH_AES_128_CBC_SHA': 1}}, 'crypto_library': {'OpenSSL': {'OpenSSL': 4}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 2, 'FIPS PUB 186-2': 2, 'FIPS PUB 186-3': 1, 'FIPS 140-2': 4, 'FIPS PUB 180-3': 1, 'FIPS PUB 198-1': 1, 'FIPS PUB 140-2': 1, 'FIPS 186-2': 1, 'FIPS 186-3': 1}, 'NIST': {'NIST SP 800-38A': 2, 'NIST SP 800-56B': 1, 'SP 800-56B': 3, 'SP 800-90': 1}, 'RFC': {'RFC 2818': 2, 'RFC 4253': 1, 'RFC 2246': 2, 'RFC 792': 2, 'RFC 4443': 2, 'RFC 791': 2, 'RFC 2460': 2, 'RFC 793': 2, 'RFC 768': 2, 'RFC 959': 1, 'RFC 5735': 2, 'RFC 3513': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'Out of Scope': 1, 'out of scope': 1, 'NTP Server SMTP Server Audit Server SNMP Server Network Assets Legend TOE Operational Environment Out of Scope … … Sourcefire 3D System Security Target 13 The TOE main subsystems are summarized as followed: •': 1, 'in the update header to ensure they match. 12 This process requires access to the Internet and is out of scope of the evaluation. Sourcefire 3D System Security Target 61 During the update process, if the Snort': 1}}}
. - The report_filename property was set to
st_vid10537-vr.pdf
. - The st_filename property was set to
st_vid10537-st.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['US']
. - The cert_id property was set to
CCEVS-VR-VID-10537-2014
. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}]}
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10537-vr.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10537-st.pdf
.
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was set to
None
.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
.
- The report property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Sourcefire 3D System Version 5.2.0.1 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Detection Devices and Systems",
"cert_link": null,
"dgst": "79f1b9da6ca5a71c",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "CCEVS-VR-VID-10537-2014",
"cert_lab": [
"US"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"5.2.0.1"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"category": "Firewall, Wireless Monitoring",
"certification_date": "2014-08-06T00:00:00Z",
"evaluation_facility": "COACT, Inc. Labs",
"expiration_date": "2016-08-06T00:00:00Z",
"id": "CCEVS-VR-VID10537",
"product": "Sourcefire 3D System Version 5.2.0.1",
"scheme": "US",
"url": "https://www.niap-ccevs.org/product/10537",
"vendor": "Sourcefire, Inc."
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Sourcefire Inc.",
"manufacturer_web": "https://www.sourcefire.com/",
"name": "Sourcefire 3D System Version 5.2.0.1",
"not_valid_after": "2016-03-21",
"not_valid_before": "2014-08-06",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "st_vid10537-vr.pdf",
"report_frontpage": {
"US": {
"cert_id": "CCEVS-VR-VID10537-2014",
"cert_item": "Sourcefire 3D System Version 5.2.0.1",
"cert_lab": "US NIAP"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"US": {
"CCEVS-VR-VID10537-2014": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 2
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
},
"SHA2": {
"SHA-224": 2,
"SHA-384": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RBG": 3
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS PUB 140-2": 1,
"FIPS PUB 180-3": 1,
"FIPS PUB 186-2": 1,
"FIPS PUB 197": 1,
"FIPS PUB 198-1": 1
},
"NIST": {
"NIST SP 800-38A": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 2
}
},
"constructions": {
"MAC": {
"HMAC-SHA-384": 1,
"HMAC-SHA-512": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Robert Roland",
"/Comments": "",
"/Company": "COACT",
"/CreationDate": "D:20140807135046-04\u002700\u0027",
"/Creator": "Acrobat PDFMaker 10.1 for Word",
"/Keywords": "",
"/ModDate": "D:20140807135101-04\u002700\u0027",
"/Producer": "Adobe PDF Library 10.0",
"/SourceModified": "D:20140807175026",
"/Subject": "",
"/Title": " ",
"pdf_file_size_bytes": 136944,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 20
},
"st_filename": "st_vid10537-st.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"FF": {
"DH": {
"DH": 2,
"Diffie-Hellman": 1
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CONNECTIONS": 4,
"A.NO_GENERAL_PURPOSE": 1,
"A.PHYSICAL": 1,
"A.TRUSTED_ADMIN": 1
},
"O": {
"O.ADDRESS_FILTERING": 5,
"O.DISPLAY_BANNER": 1,
"O.PORT_FILTERING": 5,
"O.PROTECTED_COMMUNICATIONS": 1,
"O.RELATED_CONNECTION_FILTERING": 5,
"O.RESIDUAL_INFORMATION_CLEARING": 1,
"O.SESSION_LOCK": 1,
"O.STATEFUL_INSPECTION": 5,
"O.SYSTEM_MONITORING": 1,
"O.TOE_ADMINISTRATION": 1,
"O.TSF_SELF_TEST": 1,
"O.VERIFIABLE_UPDATES": 1
},
"OE": {
"OE.CONNECTIONS": 2
},
"T": {
"T.ADMIN_ERROR": 1,
"T.NETWORK_ACCESS": 3,
"T.NETWORK_DISCLOSURE": 2,
"T.NETWORK_DOS": 4,
"T.NETWORK_MISUSE": 2,
"T.TSF_FAILURE": 1,
"T.UNAUTHORIZED_ACCESS": 1,
"T.UNAUTHORIZED_UPDATE": 1,
"T.UNDETECTED_ACTIONS": 1,
"T.USER_DATA_REUSE": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP": 1,
"ADV_FSP.1": 16
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 15,
"AGD_PRE": 1,
"AGD_PRE.1": 11
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.1": 5,
"ALC_CMS": 1,
"ALC_CMS.1": 6
},
"ATE": {
"ATE_IND": 1,
"ATE_IND.1": 6
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.1": 7
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN": 11,
"FAU_GEN.1": 6,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 3,
"FAU_GEN.2.1": 1,
"FAU_STG_EXT": 5,
"FAU_STG_EXT.1": 4,
"FAU_STG_EXT.1.1": 1
},
"FCS": {
"FCS_CKM": 5,
"FCS_CKM.1": 9,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 1,
"FCS_CKM.4": 5,
"FCS_CKM_EXT": 5,
"FCS_CKM_EXT.4": 8,
"FCS_CKM_EXT.4.1": 1,
"FCS_COP.1": 33,
"FCS_COP.1.1": 4,
"FCS_RBG_EXT": 5,
"FCS_RBG_EXT.1": 4,
"FCS_RBG_EXT.1.1": 1,
"FCS_RBG_EXT.1.2": 1,
"FCS_SSH_EXT": 5,
"FCS_SSH_EXT.1": 4,
"FCS_SSH_EXT.1.1": 1,
"FCS_SSH_EXT.1.2": 1,
"FCS_SSH_EXT.1.3": 1,
"FCS_SSH_EXT.1.4": 1,
"FCS_SSH_EXT.1.5": 1,
"FCS_SSH_EXT.1.6": 1,
"FCS_SSH_EXT.1.7": 1,
"FCS_TLS_EXT": 5,
"FCS_TLS_EXT.1": 6,
"FCS_TLS_EXT.1.1": 2
},
"FDP": {
"FDP_ITC.1": 5,
"FDP_ITC.2": 5,
"FDP_RIP": 5,
"FDP_RIP.2": 3,
"FDP_RIP.2.1": 1
},
"FIA": {
"FIA_PMG_EXT": 5,
"FIA_PMG_EXT.1": 4,
"FIA_PMG_EXT.1.1": 1,
"FIA_UAU": 5,
"FIA_UAU.7": 3,
"FIA_UAU.7.1": 1,
"FIA_UAU_EXT": 5,
"FIA_UAU_EXT.2": 4,
"FIA_UAU_EXT.2.1": 1,
"FIA_UIA_EXT": 4,
"FIA_UIA_EXT.1": 7,
"FIA_UIA_EXT.1.1": 1,
"FIA_UIA_EXT.1.2": 1,
"FIA_UID.1": 2,
"FIA_UID_EXT": 1
},
"FMT": {
"FMT_MTD": 5,
"FMT_MTD.1": 3,
"FMT_MTD.1.1": 1,
"FMT_SMF": 6,
"FMT_SMF.1": 5,
"FMT_SMF.1.1": 1,
"FMT_SMR": 5,
"FMT_SMR.2": 3,
"FMT_SMR.2.1": 1,
"FMT_SMR.2.2": 1,
"FMT_SMR.2.3": 1
},
"FPT": {
"FPT_APW_EXT": 3,
"FPT_APW_EXT.1": 4,
"FPT_APW_EXT.1.1": 1,
"FPT_APW_EXT.1.2": 1,
"FPT_AWP_EXT": 2,
"FPT_ITT": 5,
"FPT_ITT.1": 7,
"FPT_ITT.1.1": 1,
"FPT_SKP_EXT": 5,
"FPT_SKP_EXT.1": 4,
"FPT_SKP_EXT.1.1": 1,
"FPT_STM": 5,
"FPT_STM.1": 4,
"FPT_STM.1.1": 1,
"FPT_TST_EXT": 5,
"FPT_TST_EXT.1": 4,
"FPT_TST_EXT.1.1": 1,
"FPT_TUD_EXT": 5,
"FPT_TUD_EXT.1": 4,
"FPT_TUD_EXT.1.1": 1,
"FPT_TUD_EXT.1.2": 1,
"FPT_TUD_EXT.1.3": 1
},
"FTA": {
"FTA_SSL": 12,
"FTA_SSL.3": 3,
"FTA_SSL.3.1": 1,
"FTA_SSL.4": 4,
"FTA_SSL.4.1": 1,
"FTA_SSL_EXT": 6,
"FTA_SSL_EXT.1": 4,
"FTA_SSL_EXT.1.1": 1,
"FTA_TAB": 5,
"FTA_TAB.1": 4,
"FTA_TAB.1.1": 1
},
"FTP": {
"FTP_ITC": 5,
"FTP_ITC.1": 3,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP": 6,
"FTP_TRP.1": 3,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {
"OutOfScope": {
"NTP Server SMTP Server Audit Server SNMP Server Network Assets Legend TOE Operational Environment Out of Scope \u2026 \u2026 Sourcefire 3D System Security Target 13 The TOE main subsystems are summarized as followed: \u2022": 1,
"Out of Scope": 1,
"in the update header to ensure they match. 12 This process requires access to the Internet and is out of scope of the evaluation. Sourcefire 3D System Security Target 61 During the update process, if the Snort": 1,
"out of scope": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 4
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 4
}
},
"crypto_protocol": {
"SSH": {
"SSH": 37
},
"TLS": {
"TLS": {
"TLS": 16,
"TLS 1.0": 1
}
},
"VPN": {
"VPN": 4
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 1,
"Key agreement": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 4
},
"SHA2": {
"SHA-224": 4,
"SHA-256": 2,
"SHA-384": 5,
"SHA-512": 12
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"PRNG": 3
},
"RNG": {
"RBG": 5,
"RNG": 4
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 4,
"FIPS 186-2": 1,
"FIPS 186-3": 1,
"FIPS PUB 140-2": 1,
"FIPS PUB 180-3": 1,
"FIPS PUB 186-2": 2,
"FIPS PUB 186-3": 1,
"FIPS PUB 197": 2,
"FIPS PUB 198-1": 1
},
"NIST": {
"NIST SP 800-38A": 2,
"NIST SP 800-56B": 1,
"SP 800-56B": 3,
"SP 800-90": 1
},
"RFC": {
"RFC 2246": 2,
"RFC 2460": 2,
"RFC 2818": 2,
"RFC 3513": 2,
"RFC 4253": 1,
"RFC 4443": 2,
"RFC 5735": 2,
"RFC 768": 2,
"RFC 791": 2,
"RFC 792": 2,
"RFC 793": 2,
"RFC 959": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 13
}
},
"DES": {
"3DES": {
"3DES": 1
},
"DES": {
"DES": 1
}
},
"constructions": {
"MAC": {
"HMAC-SHA-256": 2,
"HMAC-SHA-384": 1,
"HMAC-SHA-512": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {
"TLS": {
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA": 1,
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA": 2,
"TLS_RSA_WITH_AES_128_CBC_SHA": 2,
"TLS_RSA_WITH_AES_256_CBC_SHA": 2
}
},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Sourcefire",
"/CRTarget": "4092",
"/Company": "Sourcefire, Inc",
"/CreationDate": "D:20140807084734-04\u002700\u0027",
"/Creator": "Acrobat PDFMaker 10.1 for Word",
"/Keywords": "",
"/ModDate": "D:20140807084758-04\u002700\u0027",
"/Producer": "Adobe PDF Library 10.0",
"/SourceModified": "D:20140807124122",
"/Subject": "",
"/Title": "Sourcefire v5.2 Security Target",
"pdf_file_size_bytes": 747356,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://support.sourcefire.com/",
"http://jitc.fhu.disa.mil/tssi/cert_pdfs/sourcefire_3d_ips_ids_aug12.pdf",
"https://www.icsalabs.com/technology-program/ipv6-/-usgv6/usgv6-tested-products"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 80
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": {
"_type": "Set",
"elements": [
"PP_ND_V1.1"
]
},
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp_nd_v1.1.pdf",
"pp_name": "Protection Profile for Network Devices"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10537-vr.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": []
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10537-st.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "2b46f0c9d4165e656ecb60c5679e9e1e9bf2c09bac1adbf5ab14e660f49fce8d",
"txt_hash": "a102e36c448e5c4b1b121fcfcbfdc92b78dd0d1b27c5f3439de5a5d1df53bbbe"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "ff7d9c51c64807446f33de76ebe642a9574ef181a07ac95a73ef9b5019b2dfa2",
"txt_hash": "a324072ff212c3228de22433dfe42b49566441dd1675494a996d3eeca9588aa5"
}
},
"status": "archived"
}