BorderWare MXtreme Mail Firewall Version 3.1

CSV information ?

Status archived
Valid from 30.07.2004
Valid until 05.03.2013
Scheme 🇬🇧 UK
Manufacturer Borderware Technologies
Category Boundary Protection Devices and Systems
Security level AVA_VLA.3, EAL4+, ALC_FLR.1

Heuristics summary ?

Certificate ID: CRP204

Certificate ?

Certification report ?

Extracted keywords

Hash functions
MD5
Protocols
SSL, TLS

Security level
EAL4, EAL1, EAL7, EAL4 augmented
Security Assurance Requirements (SAR)
ALC_FLR.1, ALC_FLR, AVA_VLA.3, AVA_VLA.2
Security Functional Requirements (SFR)
FDP_IFF.1.2, FPT_SEP.1, FPT_RVM.1, FPT_STM.1, FPT_RIP.1
Certificates
CERTIFICATION REPORT No. P204

Certification process
out of scope, The SMTP server accepts clear text and TLS encrypted connections on port 25, although the latter is out of scope of the evaluation. ii. The MCS may be configured to accept connections on ports 80 and 443, of the firewall via the MCS and allows users to access their mailboxes, although the latter is out of scope. v. The Authentication server authenticates administrators before they are able to access the MCS

Standards
CCIMB-2004-01-004, CCIMB-99-031, CCIMB-99-032, CCIMB-99-033

File metadata

Title Borderware MXtreme Mail Firewall CR1.0.doc
Author racook
Creation date D:20040804100821Z
Modification date D:20131119171800Z
Pages 36
Creator Borderware MXtreme Mail Firewall CR1.0 - Microsoft Word
Producer Acrobat PDFWriter 5.0 for Windows NT

Security target ?

Extracted keywords

Protocols
SSL, TLS

Security level
EAL4
Claims
O.ADDRESS, O.PORTS, O.DIRECT, O.MEDIATE, O.SELPRO, O.MAILCTL, O.ATTEMPT, O.NOREP, O.AUDREC, O.ADMIN, O.LIMEXT, O.GW, O.PORT, T.CONN, T.MEDIAT, T.REM_CONN, T.REPEAT, T.DETECT, T.SOURCE, T.CONFIG, T.OS_FAC, T.OPEN_RELAY, T.SELPRO, T.OLDINF, T.UNSOLICITED, A.PHYSICAL, A.TRANSFER, A.USEAGE, A.TRUSTED
Security Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ADO_DEL.2, ADO_IGS.1, ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_FLR.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VLA.3, AVA_MSU.2, AVA_SOF.1, AVA_SOF
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_STG.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG.1.1, FAU_STG.1.2, FDP_ACC.1, FDP_ACF.1, FDP_IFC.1, FDP_IFF.1, FDP_RIP.1, FDP_IFF.1.2, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_IFF.1.6, FDP_RIP.1.1, FDP_SEP.1, FDP_RVM.1, FIA_UID.2, FIA_UAU.2, FIA_AFL.1, FIA_UID.2.1, FIA_UAU.2.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UID.1, FIA_UAU.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_SMR.1, FMT_SMF.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA.1.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF.1.1, FPT_RVM.1, FPT_SEP.1, FPT_STM.1, FPT_RVM.1.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_STM.1.1

File metadata

Title MXtreme V3.0 Security Target
Author BorderWare Technologies Inc
Creation date D:20040804110458Z
Modification date D:20040804134352+02'00'
Pages 54
Creator SecurityTarget3.0Final - Microsoft Word
Producer Acrobat PDFWriter 5.0 for Windows NT

Heuristics ?

Certificate ID: CRP204

Extracted SARs

ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ALC_FLR.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.2, AVA_SOF.1, AVA_VLA.3

References ?

No references are available for this certificate.

Updates ?

  • 05.02.2025 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.
    • The st property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.
    • The cert property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.

    The computed heuristics were updated.

    • The following values were inserted: {'protection_profiles': None, 'eal': 'EAL4+'}.
    • The prev_certificates property was set to None.
    • The next_certificates property was set to None.
  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '852746b86c81f210b46e6eca5a63a6155809877082c9248d64698e1d7d4f6881', 'txt_hash': '067fe78efe5e9e5f2bf53663c673c5772d4b2125d4875f1b9cd9dfcc8a2f6423'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '597e143e7c4a68e394a39b12a3773681cb2d01fc3621181b094910cde7a17562', 'txt_hash': '1aff262644cf75d95514916f0fcedcd27d71417eef97fb5d211d5dd318481fc4'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 186048, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 36, '/Author': 'racook', '/CreationDate': 'D:20040804100821Z', '/Creator': 'Borderware MXtreme Mail Firewall CR1.0 - Microsoft Word', '/ModDate': 'D:20131119171800Z', '/Producer': 'Acrobat PDFWriter 5.0 for Windows NT', '/Title': 'Borderware MXtreme Mail Firewall CR1.0.doc', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 165061, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 54, '/Creator': 'SecurityTarget3.0Final - Microsoft Word', '/CreationDate': 'D:20040804110458Z', '/Title': 'MXtreme V3.0 Security Target', '/Author': 'BorderWare Technologies Inc', '/Producer': 'Acrobat PDFWriter 5.0 for Windows NT', '/ModDate': "D:20040804134352+02'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'UK': {'CERTIFICATION REPORT No. P204': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 25, 'EAL1': 1, 'EAL7': 1, 'EAL4 augmented': 18}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 39, 'ALC_FLR': 1}, 'AVA': {'AVA_VLA.3': 42, 'AVA_VLA.2': 1}}, 'cc_sfr': {'FDP': {'FDP_IFF.1.2': 1}, 'FPT': {'FPT_SEP.1': 1, 'FPT_RVM.1': 1, 'FPT_STM.1': 1, 'FPT_RIP.1': 1}}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'MD': {'MD5': {'MD5': 3}}}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 3}, 'TLS': {'TLS': 3}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCIMB-2004-01-004': 1, 'CCIMB-99-031': 1, 'CCIMB-99-032': 1, 'CCIMB-99-033': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 2, 'The SMTP server accepts clear text and TLS encrypted connections on port 25, although the latter is out of scope of the evaluation. ii. The MCS may be configured to accept connections on ports 80 and 443': 1, 'of the firewall via the MCS and allows users to access their mailboxes, although the latter is out of scope. v. The Authentication server authenticates administrators before they are able to access the MCS': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 10}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 1, 'ACM_CAP.4': 1, 'ACM_SCP.2': 1}, 'ADO': {'ADO_DEL.2': 2, 'ADO_IGS.1': 2}, 'ADV': {'ADV_FSP.2': 1, 'ADV_HLD.2': 1, 'ADV_IMP.1': 1, 'ADV_LLD.1': 1, 'ADV_RCR.1': 1, 'ADV_SPM.1': 2}, 'AGD': {'AGD_ADM.1': 1, 'AGD_USR.1': 1}, 'ALC': {'ALC_FLR.1': 7, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VLA.3': 7, 'AVA_MSU.2': 1, 'AVA_SOF.1': 1, 'AVA_SOF': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 6, 'FAU_SAR.1': 6, 'FAU_STG.1': 6, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1}, 'FDP': {'FDP_ACC.1': 7, 'FDP_ACF.1': 5, 'FDP_IFC.1': 7, 'FDP_IFF.1': 9, 'FDP_RIP.1': 5, 'FDP_IFF.1.2': 3, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 1, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.1': 2, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 2, 'FDP_IFF.1.5': 2, 'FDP_IFF.1.6': 1, 'FDP_RIP.1.1': 1, 'FDP_SEP.1': 2, 'FDP_RVM.1': 2}, 'FIA': {'FIA_UID.2': 11, 'FIA_UAU.2': 9, 'FIA_AFL.1': 6, 'FIA_UID.2.1': 1, 'FIA_UAU.2.1': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UID.1': 3, 'FIA_UAU.1': 2}, 'FMT': {'FMT_MSA.1': 10, 'FMT_MSA.2': 4, 'FMT_MSA.3': 9, 'FMT_SMR.1': 7, 'FMT_SMF.1': 6, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.1.1': 1, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMF.1.1': 1}, 'FPT': {'FPT_RVM.1': 7, 'FPT_SEP.1': 7, 'FPT_STM.1': 6, 'FPT_RVM.1.1': 1, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1, 'FPT_STM.1.1': 1}}, 'cc_claims': {'O': {'O.ADDRESS': 10, 'O.PORTS': 10, 'O.DIRECT': 5, 'O.MEDIATE': 10, 'O.SELPRO': 5, 'O.MAILCTL': 6, 'O.ATTEMPT': 4, 'O.NOREP': 3, 'O.AUDREC': 4, 'O.ADMIN': 7, 'O.LIMEXT': 4, 'O.GW': 4, 'O.PORT': 1}, 'T': {'T.CONN': 1, 'T.MEDIAT': 2, 'T.REM_CONN': 2, 'T.REPEAT': 2, 'T.DETECT': 2, 'T.SOURCE': 2, 'T.CONFIG': 2, 'T.OS_FAC': 2, 'T.OPEN_RELAY': 2, 'T.SELPRO': 2, 'T.OLDINF': 2, 'T.UNSOLICITED': 2}, 'A': {'A.PHYSICAL': 2, 'A.TRANSFER': 2, 'A.USEAGE': 2, 'A.TRUSTED': 2}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 2}, 'TLS': {'TLS': 3}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to CRP204.pdf.
    • The st_filename property was set to borderware_3.0Final.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to CRP204.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP204.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/borderware_3.0Final.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}]} values discarded.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name BorderWare MXtreme Mail Firewall Version 3.1 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Boundary Protection Devices and Systems",
  "cert_link": null,
  "dgst": "02140ad16c37fee4",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "CRP204",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL4+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_LLD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "3.1"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Borderware Technologies",
  "manufacturer_web": "https://www.borderware.com/",
  "name": "BorderWare MXtreme Mail Firewall Version 3.1",
  "not_valid_after": "2013-03-05",
  "not_valid_before": "2004-07-30",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "CRP204.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "UK": {
          "CERTIFICATION REPORT No. P204": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 1,
          "ALC_FLR.1": 39
        },
        "AVA": {
          "AVA_VLA.2": 1,
          "AVA_VLA.3": 42
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL1": 1,
          "EAL4": 25,
          "EAL4 augmented": 18,
          "EAL7": 1
        }
      },
      "cc_sfr": {
        "FDP": {
          "FDP_IFF.1.2": 1
        },
        "FPT": {
          "FPT_RIP.1": 1,
          "FPT_RVM.1": 1,
          "FPT_SEP.1": 1,
          "FPT_STM.1": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          "The SMTP server accepts clear text and TLS encrypted connections on port 25, although the latter is out of scope of the evaluation. ii. The MCS may be configured to accept connections on ports 80 and 443": 1,
          "of the firewall via the MCS and allows users to access their mailboxes, although the latter is out of scope. v. The Authentication server authenticates administrators before they are able to access the MCS": 1,
          "out of scope": 2
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 3
          },
          "TLS": {
            "TLS": 3
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 3
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCIMB-2004-01-004": 1,
          "CCIMB-99-031": 1,
          "CCIMB-99-032": 1,
          "CCIMB-99-033": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "racook",
      "/CreationDate": "D:20040804100821Z",
      "/Creator": "Borderware MXtreme Mail Firewall CR1.0 - Microsoft Word",
      "/ModDate": "D:20131119171800Z",
      "/Producer": "Acrobat PDFWriter 5.0 for Windows NT",
      "/Title": "Borderware MXtreme Mail Firewall CR1.0.doc",
      "pdf_file_size_bytes": 186048,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 36
    },
    "st_filename": "borderware_3.0Final.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.PHYSICAL": 2,
          "A.TRANSFER": 2,
          "A.TRUSTED": 2,
          "A.USEAGE": 2
        },
        "O": {
          "O.ADDRESS": 10,
          "O.ADMIN": 7,
          "O.ATTEMPT": 4,
          "O.AUDREC": 4,
          "O.DIRECT": 5,
          "O.GW": 4,
          "O.LIMEXT": 4,
          "O.MAILCTL": 6,
          "O.MEDIATE": 10,
          "O.NOREP": 3,
          "O.PORT": 1,
          "O.PORTS": 10,
          "O.SELPRO": 5
        },
        "T": {
          "T.CONFIG": 2,
          "T.CONN": 1,
          "T.DETECT": 2,
          "T.MEDIAT": 2,
          "T.OLDINF": 2,
          "T.OPEN_RELAY": 2,
          "T.OS_FAC": 2,
          "T.REM_CONN": 2,
          "T.REPEAT": 2,
          "T.SELPRO": 2,
          "T.SOURCE": 2,
          "T.UNSOLICITED": 2
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_AUT.1": 1,
          "ACM_CAP.4": 1,
          "ACM_SCP.2": 1
        },
        "ADO": {
          "ADO_DEL.2": 2,
          "ADO_IGS.1": 2
        },
        "ADV": {
          "ADV_FSP.2": 1,
          "ADV_HLD.2": 1,
          "ADV_IMP.1": 1,
          "ADV_LLD.1": 1,
          "ADV_RCR.1": 1,
          "ADV_SPM.1": 2
        },
        "AGD": {
          "AGD_ADM.1": 1,
          "AGD_USR.1": 1
        },
        "ALC": {
          "ALC_DVS.1": 1,
          "ALC_FLR.1": 7,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_MSU.2": 1,
          "AVA_SOF": 1,
          "AVA_SOF.1": 1,
          "AVA_VLA.3": 7
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 10
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 6,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_SAR.1": 6,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_STG.1": 6,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1
        },
        "FDP": {
          "FDP_ACC.1": 7,
          "FDP_ACC.1.1": 1,
          "FDP_ACF.1": 5,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 2,
          "FDP_ACF.1.4": 1,
          "FDP_IFC.1": 7,
          "FDP_IFC.1.1": 1,
          "FDP_IFF.1": 9,
          "FDP_IFF.1.1": 2,
          "FDP_IFF.1.2": 3,
          "FDP_IFF.1.3": 1,
          "FDP_IFF.1.4": 2,
          "FDP_IFF.1.5": 2,
          "FDP_IFF.1.6": 1,
          "FDP_RIP.1": 5,
          "FDP_RIP.1.1": 1,
          "FDP_RVM.1": 2,
          "FDP_SEP.1": 2
        },
        "FIA": {
          "FIA_AFL.1": 6,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_UAU.1": 2,
          "FIA_UAU.2": 9,
          "FIA_UAU.2.1": 1,
          "FIA_UID.1": 3,
          "FIA_UID.2": 11,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MSA.1": 10,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.2": 4,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 9,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_SMF.1": 6,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 7,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_RVM.1": 7,
          "FPT_RVM.1.1": 1,
          "FPT_SEP.1": 7,
          "FPT_SEP.1.1": 1,
          "FPT_SEP.1.2": 1,
          "FPT_STM.1": 6,
          "FPT_STM.1.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 2
          },
          "TLS": {
            "TLS": 3
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "BorderWare Technologies Inc",
      "/CreationDate": "D:20040804110458Z",
      "/Creator": "SecurityTarget3.0Final - Microsoft Word",
      "/ModDate": "D:20040804134352+02\u002700\u0027",
      "/Producer": "Acrobat PDFWriter 5.0 for Windows NT",
      "/Title": "MXtreme V3.0 Security Target",
      "pdf_file_size_bytes": 165061,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 54
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP204.pdf",
  "scheme": "UK",
  "security_level": {
    "_type": "Set",
    "elements": [
      "AVA_VLA.3",
      "ALC_FLR.1",
      "EAL4+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/borderware_3.0Final.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "852746b86c81f210b46e6eca5a63a6155809877082c9248d64698e1d7d4f6881",
      "txt_hash": "067fe78efe5e9e5f2bf53663c673c5772d4b2125d4875f1b9cd9dfcc8a2f6423"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "597e143e7c4a68e394a39b12a3773681cb2d01fc3621181b094910cde7a17562",
      "txt_hash": "1aff262644cf75d95514916f0fcedcd27d71417eef97fb5d211d5dd318481fc4"
    }
  },
  "status": "archived"
}