BorderWare MXtreme Mail Firewall Version 3.1
CSV information ?
Status | archived |
---|---|
Valid from | 30.07.2004 |
Valid until | 05.03.2013 |
Scheme | 🇬🇧 UK |
Manufacturer | Borderware Technologies |
Category | Boundary Protection Devices and Systems |
Security level | AVA_VLA.3, EAL4+, ALC_FLR.1 |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Hash functions
MD5Protocols
SSL, TLSSecurity level
EAL4, EAL1, EAL7, EAL4 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.1, ALC_FLR, AVA_VLA.3, AVA_VLA.2Security Functional Requirements (SFR)
FDP_IFF.1.2, FPT_SEP.1, FPT_RVM.1, FPT_STM.1, FPT_RIP.1Certificates
CERTIFICATION REPORT No. P204Certification process
out of scope, The SMTP server accepts clear text and TLS encrypted connections on port 25, although the latter is out of scope of the evaluation. ii. The MCS may be configured to accept connections on ports 80 and 443, of the firewall via the MCS and allows users to access their mailboxes, although the latter is out of scope. v. The Authentication server authenticates administrators before they are able to access the MCSStandards
CCIMB-2004-01-004, CCIMB-99-031, CCIMB-99-032, CCIMB-99-033File metadata
Title | Borderware MXtreme Mail Firewall CR1.0.doc |
---|---|
Author | racook |
Creation date | D:20040804100821Z |
Modification date | D:20131119171800Z |
Pages | 36 |
Creator | Borderware MXtreme Mail Firewall CR1.0 - Microsoft Word |
Producer | Acrobat PDFWriter 5.0 for Windows NT |
Security target ?
Extracted keywords
Protocols
SSL, TLSSecurity level
EAL4Claims
O.ADDRESS, O.PORTS, O.DIRECT, O.MEDIATE, O.SELPRO, O.MAILCTL, O.ATTEMPT, O.NOREP, O.AUDREC, O.ADMIN, O.LIMEXT, O.GW, O.PORT, T.CONN, T.MEDIAT, T.REM_CONN, T.REPEAT, T.DETECT, T.SOURCE, T.CONFIG, T.OS_FAC, T.OPEN_RELAY, T.SELPRO, T.OLDINF, T.UNSOLICITED, A.PHYSICAL, A.TRANSFER, A.USEAGE, A.TRUSTEDSecurity Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ADO_DEL.2, ADO_IGS.1, ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_FLR.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VLA.3, AVA_MSU.2, AVA_SOF.1, AVA_SOFSecurity Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_STG.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG.1.1, FAU_STG.1.2, FDP_ACC.1, FDP_ACF.1, FDP_IFC.1, FDP_IFF.1, FDP_RIP.1, FDP_IFF.1.2, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_IFF.1.6, FDP_RIP.1.1, FDP_SEP.1, FDP_RVM.1, FIA_UID.2, FIA_UAU.2, FIA_AFL.1, FIA_UID.2.1, FIA_UAU.2.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UID.1, FIA_UAU.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_SMR.1, FMT_SMF.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA.1.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF.1.1, FPT_RVM.1, FPT_SEP.1, FPT_STM.1, FPT_RVM.1.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_STM.1.1File metadata
Title | MXtreme V3.0 Security Target |
---|---|
Author | BorderWare Technologies Inc |
Creation date | D:20040804110458Z |
Modification date | D:20040804134352+02'00' |
Pages | 54 |
Creator | SecurityTarget3.0Final - Microsoft Word |
Producer | Acrobat PDFWriter 5.0 for Windows NT |
Heuristics ?
Extracted SARs
ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ALC_FLR.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.2, AVA_SOF.1, AVA_VLA.3References ?
No references are available for this certificate.
Updates ?
-
05.02.2025 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data. - The st property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data. - The cert property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data.
The computed heuristics were updated.
- The following values were inserted:
{'protection_profiles': None, 'eal': 'EAL4+'}
. - The prev_certificates property was set to
None
. - The next_certificates property was set to
None
.
- The report property was updated, with the
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '852746b86c81f210b46e6eca5a63a6155809877082c9248d64698e1d7d4f6881', 'txt_hash': '067fe78efe5e9e5f2bf53663c673c5772d4b2125d4875f1b9cd9dfcc8a2f6423'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '597e143e7c4a68e394a39b12a3773681cb2d01fc3621181b094910cde7a17562', 'txt_hash': '1aff262644cf75d95514916f0fcedcd27d71417eef97fb5d211d5dd318481fc4'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 186048, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 36, '/Author': 'racook', '/CreationDate': 'D:20040804100821Z', '/Creator': 'Borderware MXtreme Mail Firewall CR1.0 - Microsoft Word', '/ModDate': 'D:20131119171800Z', '/Producer': 'Acrobat PDFWriter 5.0 for Windows NT', '/Title': 'Borderware MXtreme Mail Firewall CR1.0.doc', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 165061, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 54, '/Creator': 'SecurityTarget3.0Final - Microsoft Word', '/CreationDate': 'D:20040804110458Z', '/Title': 'MXtreme V3.0 Security Target', '/Author': 'BorderWare Technologies Inc', '/Producer': 'Acrobat PDFWriter 5.0 for Windows NT', '/ModDate': "D:20040804134352+02'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'UK': {'CERTIFICATION REPORT No. P204': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 25, 'EAL1': 1, 'EAL7': 1, 'EAL4 augmented': 18}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 39, 'ALC_FLR': 1}, 'AVA': {'AVA_VLA.3': 42, 'AVA_VLA.2': 1}}, 'cc_sfr': {'FDP': {'FDP_IFF.1.2': 1}, 'FPT': {'FPT_SEP.1': 1, 'FPT_RVM.1': 1, 'FPT_STM.1': 1, 'FPT_RIP.1': 1}}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'MD': {'MD5': {'MD5': 3}}}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 3}, 'TLS': {'TLS': 3}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCIMB-2004-01-004': 1, 'CCIMB-99-031': 1, 'CCIMB-99-032': 1, 'CCIMB-99-033': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 2, 'The SMTP server accepts clear text and TLS encrypted connections on port 25, although the latter is out of scope of the evaluation. ii. The MCS may be configured to accept connections on ports 80 and 443': 1, 'of the firewall via the MCS and allows users to access their mailboxes, although the latter is out of scope. v. The Authentication server authenticates administrators before they are able to access the MCS': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 10}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 1, 'ACM_CAP.4': 1, 'ACM_SCP.2': 1}, 'ADO': {'ADO_DEL.2': 2, 'ADO_IGS.1': 2}, 'ADV': {'ADV_FSP.2': 1, 'ADV_HLD.2': 1, 'ADV_IMP.1': 1, 'ADV_LLD.1': 1, 'ADV_RCR.1': 1, 'ADV_SPM.1': 2}, 'AGD': {'AGD_ADM.1': 1, 'AGD_USR.1': 1}, 'ALC': {'ALC_FLR.1': 7, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VLA.3': 7, 'AVA_MSU.2': 1, 'AVA_SOF.1': 1, 'AVA_SOF': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 6, 'FAU_SAR.1': 6, 'FAU_STG.1': 6, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1}, 'FDP': {'FDP_ACC.1': 7, 'FDP_ACF.1': 5, 'FDP_IFC.1': 7, 'FDP_IFF.1': 9, 'FDP_RIP.1': 5, 'FDP_IFF.1.2': 3, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 1, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.1': 2, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 2, 'FDP_IFF.1.5': 2, 'FDP_IFF.1.6': 1, 'FDP_RIP.1.1': 1, 'FDP_SEP.1': 2, 'FDP_RVM.1': 2}, 'FIA': {'FIA_UID.2': 11, 'FIA_UAU.2': 9, 'FIA_AFL.1': 6, 'FIA_UID.2.1': 1, 'FIA_UAU.2.1': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UID.1': 3, 'FIA_UAU.1': 2}, 'FMT': {'FMT_MSA.1': 10, 'FMT_MSA.2': 4, 'FMT_MSA.3': 9, 'FMT_SMR.1': 7, 'FMT_SMF.1': 6, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.1.1': 1, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMF.1.1': 1}, 'FPT': {'FPT_RVM.1': 7, 'FPT_SEP.1': 7, 'FPT_STM.1': 6, 'FPT_RVM.1.1': 1, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1, 'FPT_STM.1.1': 1}}, 'cc_claims': {'O': {'O.ADDRESS': 10, 'O.PORTS': 10, 'O.DIRECT': 5, 'O.MEDIATE': 10, 'O.SELPRO': 5, 'O.MAILCTL': 6, 'O.ATTEMPT': 4, 'O.NOREP': 3, 'O.AUDREC': 4, 'O.ADMIN': 7, 'O.LIMEXT': 4, 'O.GW': 4, 'O.PORT': 1}, 'T': {'T.CONN': 1, 'T.MEDIAT': 2, 'T.REM_CONN': 2, 'T.REPEAT': 2, 'T.DETECT': 2, 'T.SOURCE': 2, 'T.CONFIG': 2, 'T.OS_FAC': 2, 'T.OPEN_RELAY': 2, 'T.SELPRO': 2, 'T.OLDINF': 2, 'T.UNSOLICITED': 2}, 'A': {'A.PHYSICAL': 2, 'A.TRANSFER': 2, 'A.USEAGE': 2, 'A.TRUSTED': 2}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 2}, 'TLS': {'TLS': 3}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
CRP204.pdf
. - The st_filename property was set to
borderware_3.0Final.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
CRP204
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP204.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/borderware_3.0Final.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}]}
values discarded.
- The new value is
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name BorderWare MXtreme Mail Firewall Version 3.1 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Boundary Protection Devices and Systems",
"cert_link": null,
"dgst": "02140ad16c37fee4",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "CRP204",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_LLD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_SOF",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"3.1"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Borderware Technologies",
"manufacturer_web": "https://www.borderware.com/",
"name": "BorderWare MXtreme Mail Firewall Version 3.1",
"not_valid_after": "2013-03-05",
"not_valid_before": "2004-07-30",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "CRP204.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"UK": {
"CERTIFICATION REPORT No. P204": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR": 1,
"ALC_FLR.1": 39
},
"AVA": {
"AVA_VLA.2": 1,
"AVA_VLA.3": 42
}
},
"cc_security_level": {
"EAL": {
"EAL1": 1,
"EAL4": 25,
"EAL4 augmented": 18,
"EAL7": 1
}
},
"cc_sfr": {
"FDP": {
"FDP_IFF.1.2": 1
},
"FPT": {
"FPT_RIP.1": 1,
"FPT_RVM.1": 1,
"FPT_SEP.1": 1,
"FPT_STM.1": 1
}
},
"certification_process": {
"OutOfScope": {
"The SMTP server accepts clear text and TLS encrypted connections on port 25, although the latter is out of scope of the evaluation. ii. The MCS may be configured to accept connections on ports 80 and 443": 1,
"of the firewall via the MCS and allows users to access their mailboxes, although the latter is out of scope. v. The Authentication server authenticates administrators before they are able to access the MCS": 1,
"out of scope": 2
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 3
},
"TLS": {
"TLS": 3
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"MD": {
"MD5": {
"MD5": 3
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCIMB-2004-01-004": 1,
"CCIMB-99-031": 1,
"CCIMB-99-032": 1,
"CCIMB-99-033": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "racook",
"/CreationDate": "D:20040804100821Z",
"/Creator": "Borderware MXtreme Mail Firewall CR1.0 - Microsoft Word",
"/ModDate": "D:20131119171800Z",
"/Producer": "Acrobat PDFWriter 5.0 for Windows NT",
"/Title": "Borderware MXtreme Mail Firewall CR1.0.doc",
"pdf_file_size_bytes": 186048,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 36
},
"st_filename": "borderware_3.0Final.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.PHYSICAL": 2,
"A.TRANSFER": 2,
"A.TRUSTED": 2,
"A.USEAGE": 2
},
"O": {
"O.ADDRESS": 10,
"O.ADMIN": 7,
"O.ATTEMPT": 4,
"O.AUDREC": 4,
"O.DIRECT": 5,
"O.GW": 4,
"O.LIMEXT": 4,
"O.MAILCTL": 6,
"O.MEDIATE": 10,
"O.NOREP": 3,
"O.PORT": 1,
"O.PORTS": 10,
"O.SELPRO": 5
},
"T": {
"T.CONFIG": 2,
"T.CONN": 1,
"T.DETECT": 2,
"T.MEDIAT": 2,
"T.OLDINF": 2,
"T.OPEN_RELAY": 2,
"T.OS_FAC": 2,
"T.REM_CONN": 2,
"T.REPEAT": 2,
"T.SELPRO": 2,
"T.SOURCE": 2,
"T.UNSOLICITED": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_AUT.1": 1,
"ACM_CAP.4": 1,
"ACM_SCP.2": 1
},
"ADO": {
"ADO_DEL.2": 2,
"ADO_IGS.1": 2
},
"ADV": {
"ADV_FSP.2": 1,
"ADV_HLD.2": 1,
"ADV_IMP.1": 1,
"ADV_LLD.1": 1,
"ADV_RCR.1": 1,
"ADV_SPM.1": 2
},
"AGD": {
"AGD_ADM.1": 1,
"AGD_USR.1": 1
},
"ALC": {
"ALC_DVS.1": 1,
"ALC_FLR.1": 7,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_MSU.2": 1,
"AVA_SOF": 1,
"AVA_SOF.1": 1,
"AVA_VLA.3": 7
}
},
"cc_security_level": {
"EAL": {
"EAL4": 10
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 6,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_SAR.1": 6,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_STG.1": 6,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1
},
"FDP": {
"FDP_ACC.1": 7,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 5,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 2,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 7,
"FDP_IFC.1.1": 1,
"FDP_IFF.1": 9,
"FDP_IFF.1.1": 2,
"FDP_IFF.1.2": 3,
"FDP_IFF.1.3": 1,
"FDP_IFF.1.4": 2,
"FDP_IFF.1.5": 2,
"FDP_IFF.1.6": 1,
"FDP_RIP.1": 5,
"FDP_RIP.1.1": 1,
"FDP_RVM.1": 2,
"FDP_SEP.1": 2
},
"FIA": {
"FIA_AFL.1": 6,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_UAU.1": 2,
"FIA_UAU.2": 9,
"FIA_UAU.2.1": 1,
"FIA_UID.1": 3,
"FIA_UID.2": 11,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MSA.1": 10,
"FMT_MSA.1.1": 1,
"FMT_MSA.2": 4,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 9,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_SMF.1": 6,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 7,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_RVM.1": 7,
"FPT_RVM.1.1": 1,
"FPT_SEP.1": 7,
"FPT_SEP.1.1": 1,
"FPT_SEP.1.2": 1,
"FPT_STM.1": 6,
"FPT_STM.1.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 2
},
"TLS": {
"TLS": 3
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "BorderWare Technologies Inc",
"/CreationDate": "D:20040804110458Z",
"/Creator": "SecurityTarget3.0Final - Microsoft Word",
"/ModDate": "D:20040804134352+02\u002700\u0027",
"/Producer": "Acrobat PDFWriter 5.0 for Windows NT",
"/Title": "MXtreme V3.0 Security Target",
"pdf_file_size_bytes": 165061,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 54
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP204.pdf",
"scheme": "UK",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VLA.3",
"ALC_FLR.1",
"EAL4+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/borderware_3.0Final.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "852746b86c81f210b46e6eca5a63a6155809877082c9248d64698e1d7d4f6881",
"txt_hash": "067fe78efe5e9e5f2bf53663c673c5772d4b2125d4875f1b9cd9dfcc8a2f6423"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "597e143e7c4a68e394a39b12a3773681cb2d01fc3621181b094910cde7a17562",
"txt_hash": "1aff262644cf75d95514916f0fcedcd27d71417eef97fb5d211d5dd318481fc4"
}
},
"status": "archived"
}