HaltDos Mitigation Platform version 1.1 comprising of hdInspector version 1.0, hdDeviceUI version 2.0, hdDetectionService version 1.0 and hdCLI version 2.0.

CSV information ?

Status archived
Valid from 03.06.2019
Valid until 02.06.2024
Scheme 🇮🇳 IN
Manufacturer Haltdos.com Private Limited E – 52, Sector -3, Noida, UP, 201301, India
Category Boundary Protection Devices and Systems
Security level ALC_CMC.3, ALC_CMS.3, EAL2

Heuristics summary ?

Certificate ID: IC3S/BG01/HALTDOS/EAL2/0317/0008

Certificate ?

Extracted keywords

Hash functions
SHA512
Protocols
SSH

Security level
EAL 2+

File metadata

Creation date D:20190405145224+05'30'
Pages 2
Creator Canon
Producer

Certification report ?

Extracted keywords

Hash functions
SHA512
Protocols
SSH

Security level
EAL2+, EAL2, EAL 2+, EAL1
Claims
A.BACKUP, A.CONNECT, A.NOEVIL, A.PHYSICAL
Security Assurance Requirements (SAR)
ALC_CMC.3, ALC_CMS.3
Certificates
IC3S/BG01/HALTDOS/EAL2/0317/0008/CR
Evaluation facilities
Common Criteria Test Laboratory, ETDC

File metadata

Creation date D:20190405104104+05'30'
Modification date D:20190405104122+05'30'
Pages 15
Producer Foxit PhantomPDF Printer Version 6.0.4.1129

Security target ?

Extracted keywords

Symmetric Algorithms
AES
Hash functions
SHA1
Protocols
SSH, SSL, TLS, VPN

Security level
EAL2, EAL2+, EAL 2+, EAL 2
Claims
O.AUDIT, O.FAILSAFE, O.IDAUTH, O.MANAGE, O.PROCOM, T.AUDIT, T.FAILURE, T.MANAGE, T.NOAUTH, T.PROCOM, A.BACKUP, A.CONNECT, A.NOEVIL, A.PHYSICAL, OE.AUDIT, OE.BACKUP, OE.CONNECT, OE.NOEVIL, OE.PHYSICAL
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_CMC.2, ALC_CMS.2, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_SAR.3, FAU_STG.1, FAU_GEN, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.3.1, FAU_STG.1.1, FAU_STG.1.2, FCS_COP.1, FCS_COP, FDP_IFC.1, FDP_IFF.1, FDP_ITC.1, FDP_ITT.1, FDP_IFC.1.1, FDP_IFF, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_ITT.1.1, FIA_UAU_EXT.2, FIA_UAU, FIA_ATD.1, FIA_SOS.1, FIA_UAU.5, FIA_UID.1, FIA_UID.2, FIA_UAU.1, FIA_UAU_EXT.2.1, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UID.1.1, FIA_UID.1.2, FIA_UID.2.1, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF, FMT_MTD, FPT_FLS.1, FPT_STM.1, FPT_FLS.1.1, FPT_STM.1.1, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3

Standards
FIPS 197, FIPS 180-3, PKCS#1

File metadata

Title Microsoft Word - Security Target Document.docx-v1.4.docx
Creation date D:20180918113533Z00'00'
Modification date D:20180918113533Z00'00'
Pages 91
Creator Word
Producer Mac OS X 10.13.4 Quartz PDFContext

Heuristics ?

Certificate ID: IC3S/BG01/HALTDOS/EAL2/0317/0008

Extracted SARs

ADV_FSP.2, ALC_DVS.1, ALC_CMS.3, ASE_CCL.1, ASE_TSS.1, ALC_LCD.1, ATE_COV.1, ATE_FUN.1, AGD_OPE.1, ADV_TDS.1, ASE_OBJ.2, ATE_IND.2, ALC_DEL.1, ALC_CMC.3, ASE_INT.1, ASE_REQ.2, ADV_ARC.1, AGD_PRE.1, ASE_ECD.1, ASE_SPD.1, AVA_VAN.2

Scheme data ?

Serial Number 2
Product HaltDos Mitigation Platform version 1.1 comprising of hdInspector version 1.0, hdDeviceUI version 2.0, hdDetectionService version 1.0 and hdCLI version 2.0.
Sponsor Haltdos.com Private Limited
Developer Haltdos.com Private Limited .
Level EAL2+
Target Link https://www.commoncriteria-india.gov.in/sites/default/files/2022-02/ST-version1.4.pdf
Target Name ST-version1.4.pdf
Cert Link https://www.commoncriteria-india.gov.in/sites/default/files/2022-02/HaltDoS%20Certificate.pdf
Cert Name HaltDoS Certificate.pdf
Certification Date 06/Mar/2019
Report Link https://www.commoncriteria-india.gov.in/sites/default/files/2022-02/CR-%20HaltDOS_EAL2.pdf
Report Name CR- HaltDOS_EAL2.pdf

References ?

No references are available for this certificate.

Updates ?

  • 09.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'serial_number': '2'} data.
  • 02.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'serial_number': '1', 'product': 'HaltDos Mitigation Platform version 1.1 comprising of hdInspector version 1.0, hdDeviceUI version 2.0, hdDetectionService version 1.0 and hdCLI version 2.0.', 'sponsor': 'Haltdos.com Private Limited', 'developer': 'Haltdos.com Private Limited .', 'level': 'EAL2+', 'target_link': 'https://www.commoncriteria-india.gov.in/sites/default/files/2022-02/ST-version1.4.pdf', 'target_name': 'ST-version1.4.pdf', 'cert_link': 'https://www.commoncriteria-india.gov.in/sites/default/files/2022-02/HaltDoS%20Certificate.pdf', 'cert_name': 'HaltDoS Certificate.pdf', 'certification_date': '06/Mar/2019', 'report_link': 'https://www.commoncriteria-india.gov.in/sites/default/files/2022-02/CR-%20HaltDOS_EAL2.pdf', 'report_name': 'CR- HaltDOS_EAL2.pdf'}.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '9aeafe749cabc47d09371539c3fe31069cddec0c64ff5dcb1f3b77e6cb80125c', 'txt_hash': 'f688cb8020060bc5a003cf01f309718d2e96a3cfb2bded72d4954b13cf44fa3b'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '38c6bb37d83f066055bb6748a12152f16a12fac92d8174d5656db70e74ee5e76', 'txt_hash': 'eafe4bc50bf269ecb030359b185117f6b77a39ab9ef2fcb26e6d1121121a6863'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'c37ddae4e7353c9209a5225d7c76caf80eeef6e8b93f38ad3b7620cdc1c19323', 'txt_hash': '73e2f528736c4653aabc3f92ba9e0b96e4657bcfaa34bc373f11273edbb71c47'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 409310, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 15, '/Author': '', '/CreationDate': "D:20190405104104+05'30'", '/Creator': '', '/Keywords': '', '/ModDate': "D:20190405104122+05'30'", '/Producer': 'Foxit PhantomPDF Printer Version 6.0.4.1129', '/Subject': '', '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.commoncriteria-india.gov.in/']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 1450814, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 91, '/Title': 'Microsoft Word - Security Target Document.docx-v1.4.docx', '/Producer': 'Mac OS X 10.13.4 Quartz PDFContext', '/Creator': 'Word', '/CreationDate': "D:20180918113533Z00'00'", '/ModDate': "D:20180918113533Z00'00'", '/Keywords': '', '/AAPL:Keywords': '[]', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 1212653, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/Creator': 'Canon ', '/CreationDate': "D:20190405145224+05'30'", '/Producer': ' ', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'IN': {'IC3S/BG01/HALTDOS/EAL2/0317/0008/CR': 15}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2+': 2, 'EAL2': 2, 'EAL 2+': 1, 'EAL1': 1}}, 'cc_sar': {'ALC': {'ALC_CMC.3': 2, 'ALC_CMS.3': 3}}, 'cc_sfr': {}, 'cc_claims': {'A': {'A.BACKUP': 1, 'A.CONNECT': 1, 'A.NOEVIL': 1, 'A.PHYSICAL': 1}}, 'vendor': {}, 'eval_facility': {'ETDC': {'Common Criteria Test Laboratory, ETDC': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA512': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 2}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 2, 'EAL2+': 1, 'EAL 2+': 2, 'EAL 2': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 11, 'ADV_FSP.2': 11, 'ADV_TDS.1': 11}, 'AGD': {'AGD_OPE.1': 11, 'AGD_PRE.1': 6}, 'ALC': {'ALC_CMC.3': 18, 'ALC_CMS.3': 11, 'ALC_DEL.1': 6, 'ALC_DVS.1': 5, 'ALC_LCD.1': 7, 'ALC_CMC.2': 1, 'ALC_CMS.2': 1}, 'ATE': {'ATE_COV.1': 5, 'ATE_FUN.1': 9, 'ATE_IND.2': 6}, 'AVA': {'AVA_VAN.2': 5}, 'ASE': {'ASE_CCL.1': 15, 'ASE_ECD.1': 10, 'ASE_INT.1': 12, 'ASE_OBJ.2': 11, 'ASE_REQ.2': 14, 'ASE_SPD.1': 8, 'ASE_TSS.1': 5}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 15, 'FAU_GEN.2': 8, 'FAU_SAR.1': 9, 'FAU_SAR.3': 7, 'FAU_STG.1': 6, 'FAU_GEN': 3, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.3.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1}, 'FCS': {'FCS_COP.1': 9, 'FCS_COP': 18}, 'FDP': {'FDP_IFC.1': 15, 'FDP_IFF.1': 7, 'FDP_ITC.1': 13, 'FDP_ITT.1': 6, 'FDP_IFC.1.1': 2, 'FDP_IFF': 1, 'FDP_IFF.1.1': 2, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_ITT.1.1': 1}, 'FIA': {'FIA_UAU_EXT.2': 15, 'FIA_UAU': 3, 'FIA_ATD.1': 8, 'FIA_SOS.1': 8, 'FIA_UAU.5': 8, 'FIA_UID.1': 9, 'FIA_UID.2': 7, 'FIA_UAU.1': 2, 'FIA_UAU_EXT.2.1': 2, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UID.2.1': 1}, 'FMT': {'FMT_MTD.1': 14, 'FMT_SMF.1': 12, 'FMT_SMR.1': 10, 'FMT_MSA.1': 8, 'FMT_MSA.3': 11, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMF': 1, 'FMT_MTD': 1}, 'FPT': {'FPT_FLS.1': 8, 'FPT_STM.1': 10, 'FPT_FLS.1.1': 1, 'FPT_STM.1.1': 1}, 'FTP': {'FTP_ITC.1': 9, 'FTP_TRP.1': 9, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1}}, 'cc_claims': {'O': {'O.AUDIT': 12, 'O.FAILSAFE': 6, 'O.IDAUTH': 10, 'O.MANAGE': 9, 'O.PROCOM': 10}, 'T': {'T.AUDIT': 3, 'T.FAILURE': 3, 'T.MANAGE': 4, 'T.NOAUTH': 3, 'T.PROCOM': 3}, 'A': {'A.BACKUP': 3, 'A.CONNECT': 3, 'A.NOEVIL': 3, 'A.PHYSICAL': 3}, 'OE': {'OE.AUDIT': 4, 'OE.BACKUP': 3, 'OE.CONNECT': 3, 'OE.NOEVIL': 3, 'OE.PHYSICAL': 3}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 14}, 'TLS': {'SSL': {'SSL': 10}, 'TLS': {'TLS': 4}}, 'VPN': {'VPN': 2}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 197': 1, 'FIPS 180-3': 1}, 'PKCS': {'PKCS#1': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The cert_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2+': 1}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA512': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 1}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to CR- HaltDOS_EAL2.pdf.
    • The st_filename property was set to ST-version1.4.pdf.
    • The cert_filename property was set to HaltDoS Certificate.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to IC3S/BG01/HALTDOS/EAL2/0317/0008.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}]} values added.
    • The scheme_data property was set to None.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CR-%20HaltDOS_EAL2.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST-version1.4.pdf.

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The report_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name HaltDos Mitigation Platform version 1.1 comprising of hdInspector version 1.0, hdDeviceUI version 2.0, hdDetectionService version 1.0 and hdCLI version 2.0. was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Boundary Protection Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/HaltDoS%20Certificate.pdf",
  "dgst": "0f265653766dcb0c",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "IC3S/BG01/HALTDOS/EAL2/0317/0008",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.1",
        "1.0",
        "2.0"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_link": "https://www.commoncriteria-india.gov.in/sites/default/files/2022-02/HaltDoS%20Certificate.pdf",
      "cert_name": "HaltDoS Certificate.pdf",
      "certification_date": "06/Mar/2019",
      "developer": "Haltdos.com Private Limited .",
      "level": "EAL2+",
      "product": "HaltDos Mitigation Platform version 1.1 comprising of hdInspector version 1.0, hdDeviceUI version 2.0, hdDetectionService version 1.0 and hdCLI version 2.0.",
      "report_link": "https://www.commoncriteria-india.gov.in/sites/default/files/2022-02/CR-%20HaltDOS_EAL2.pdf",
      "report_name": "CR- HaltDOS_EAL2.pdf",
      "serial_number": "2",
      "sponsor": "Haltdos.com Private Limited",
      "target_link": "https://www.commoncriteria-india.gov.in/sites/default/files/2022-02/ST-version1.4.pdf",
      "target_name": "ST-version1.4.pdf"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Haltdos.com Private Limited E \u2013 52, Sector -3, Noida, UP, 201301, India",
  "manufacturer_web": "https://www.haltdos.com/",
  "name": "HaltDos Mitigation Platform version 1.1 comprising of hdInspector version 1.0, hdDeviceUI version 2.0, hdDetectionService version 1.0 and hdCLI version 2.0.",
  "not_valid_after": "2024-06-02",
  "not_valid_before": "2019-06-03",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "HaltDoS Certificate.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL 2+": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 1
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20190405145224+05\u002730\u0027",
      "/Creator": "Canon ",
      "/Producer": " ",
      "pdf_file_size_bytes": 1212653,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "CR- HaltDOS_EAL2.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "IN": {
          "IC3S/BG01/HALTDOS/EAL2/0317/0008/CR": 15
        }
      },
      "cc_claims": {
        "A": {
          "A.BACKUP": 1,
          "A.CONNECT": 1,
          "A.NOEVIL": 1,
          "A.PHYSICAL": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_CMC.3": 2,
          "ALC_CMS.3": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2+": 1,
          "EAL1": 1,
          "EAL2": 2,
          "EAL2+": 2
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 2
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "ETDC": {
          "Common Criteria Test Laboratory, ETDC": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "",
      "/CreationDate": "D:20190405104104+05\u002730\u0027",
      "/Creator": "",
      "/Keywords": "",
      "/ModDate": "D:20190405104122+05\u002730\u0027",
      "/Producer": "Foxit PhantomPDF Printer Version 6.0.4.1129",
      "/Subject": "",
      "/Title": "",
      "pdf_file_size_bytes": 409310,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.commoncriteria-india.gov.in/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 15
    },
    "st_filename": "ST-version1.4.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.BACKUP": 3,
          "A.CONNECT": 3,
          "A.NOEVIL": 3,
          "A.PHYSICAL": 3
        },
        "O": {
          "O.AUDIT": 12,
          "O.FAILSAFE": 6,
          "O.IDAUTH": 10,
          "O.MANAGE": 9,
          "O.PROCOM": 10
        },
        "OE": {
          "OE.AUDIT": 4,
          "OE.BACKUP": 3,
          "OE.CONNECT": 3,
          "OE.NOEVIL": 3,
          "OE.PHYSICAL": 3
        },
        "T": {
          "T.AUDIT": 3,
          "T.FAILURE": 3,
          "T.MANAGE": 4,
          "T.NOAUTH": 3,
          "T.PROCOM": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 11,
          "ADV_FSP.2": 11,
          "ADV_TDS.1": 11
        },
        "AGD": {
          "AGD_OPE.1": 11,
          "AGD_PRE.1": 6
        },
        "ALC": {
          "ALC_CMC.2": 1,
          "ALC_CMC.3": 18,
          "ALC_CMS.2": 1,
          "ALC_CMS.3": 11,
          "ALC_DEL.1": 6,
          "ALC_DVS.1": 5,
          "ALC_LCD.1": 7
        },
        "ASE": {
          "ASE_CCL.1": 15,
          "ASE_ECD.1": 10,
          "ASE_INT.1": 12,
          "ASE_OBJ.2": 11,
          "ASE_REQ.2": 14,
          "ASE_SPD.1": 8,
          "ASE_TSS.1": 5
        },
        "ATE": {
          "ATE_COV.1": 5,
          "ATE_FUN.1": 9,
          "ATE_IND.2": 6
        },
        "AVA": {
          "AVA_VAN.2": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 2,
          "EAL 2+": 2,
          "EAL2": 2,
          "EAL2+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 3,
          "FAU_GEN.1": 15,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 8,
          "FAU_GEN.2.1": 1,
          "FAU_SAR.1": 9,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.3": 7,
          "FAU_SAR.3.1": 1,
          "FAU_STG.1": 6,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1
        },
        "FCS": {
          "FCS_COP": 18,
          "FCS_COP.1": 9
        },
        "FDP": {
          "FDP_IFC.1": 15,
          "FDP_IFC.1.1": 2,
          "FDP_IFF": 1,
          "FDP_IFF.1": 7,
          "FDP_IFF.1.1": 2,
          "FDP_IFF.1.2": 1,
          "FDP_IFF.1.3": 1,
          "FDP_IFF.1.4": 1,
          "FDP_IFF.1.5": 1,
          "FDP_ITC.1": 13,
          "FDP_ITC.1.1": 1,
          "FDP_ITC.1.2": 1,
          "FDP_ITC.1.3": 1,
          "FDP_ITT.1": 6,
          "FDP_ITT.1.1": 1
        },
        "FIA": {
          "FIA_ATD.1": 8,
          "FIA_ATD.1.1": 1,
          "FIA_SOS.1": 8,
          "FIA_SOS.1.1": 1,
          "FIA_UAU": 3,
          "FIA_UAU.1": 2,
          "FIA_UAU.5": 8,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UAU_EXT.2": 15,
          "FIA_UAU_EXT.2.1": 2,
          "FIA_UID.1": 9,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1,
          "FIA_UID.2": 7,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MSA.1": 8,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 11,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD": 1,
          "FMT_MTD.1": 14,
          "FMT_MTD.1.1": 1,
          "FMT_SMF": 1,
          "FMT_SMF.1": 12,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 10,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_FLS.1": 8,
          "FPT_FLS.1.1": 1,
          "FPT_STM.1": 10,
          "FPT_STM.1.1": 1
        },
        "FTP": {
          "FTP_ITC.1": 9,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP.1": 9,
          "FTP_TRP.1.1": 1,
          "FTP_TRP.1.2": 1,
          "FTP_TRP.1.3": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 14
        },
        "TLS": {
          "SSL": {
            "SSL": 10
          },
          "TLS": {
            "TLS": 4
          }
        },
        "VPN": {
          "VPN": 2
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA1": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 180-3": 1,
          "FIPS 197": 1
        },
        "PKCS": {
          "PKCS#1": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/AAPL:Keywords": "[]",
      "/CreationDate": "D:20180918113533Z00\u002700\u0027",
      "/Creator": "Word",
      "/Keywords": "",
      "/ModDate": "D:20180918113533Z00\u002700\u0027",
      "/Producer": "Mac OS X 10.13.4 Quartz PDFContext",
      "/Title": "Microsoft Word - Security Target Document.docx-v1.4.docx",
      "pdf_file_size_bytes": 1450814,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 91
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CR-%20HaltDOS_EAL2.pdf",
  "scheme": "IN",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_CMC.3",
      "ALC_CMS.3",
      "EAL2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST-version1.4.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "c37ddae4e7353c9209a5225d7c76caf80eeef6e8b93f38ad3b7620cdc1c19323",
      "txt_hash": "73e2f528736c4653aabc3f92ba9e0b96e4657bcfaa34bc373f11273edbb71c47"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "9aeafe749cabc47d09371539c3fe31069cddec0c64ff5dcb1f3b77e6cb80125c",
      "txt_hash": "f688cb8020060bc5a003cf01f309718d2e96a3cfb2bded72d4954b13cf44fa3b"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "38c6bb37d83f066055bb6748a12152f16a12fac92d8174d5656db70e74ee5e76",
      "txt_hash": "eafe4bc50bf269ecb030359b185117f6b77a39ab9ef2fcb26e6d1121121a6863"
    }
  },
  "status": "archived"
}