{"product_id":10501,"v_id":10501,"product_name":"Makito and Barracuda Video Encoders with firmware version 2.1.1-3; Appliances: S-280E-SDI, S-290E-HDSDI, S-290E-DVI, S-290E-DVI-S, S-290E-AIR; Blades: B-290E-DVI, B-290E-DVI-S, B-290E-HDSDI, B-280E-SDI; Chassis: F-280-1, F-290-1DH, F-290-1, F-MB6B-RAC, F-MB6X-RAC, F-MB6B-DC, F-MB6B-MED, F-MB21B-R; Firmware Options: SW-290E-KLV, FCO-SV-SW-CONFIG","certification_status":"Not Certified","certification_date":"2013-06-03T00:06:00Z","tech_type":"Network Device","vendor_id":{"name":"Haivision Systems, Inc.","website":"http://www.haivision.com"},"vendor_poc":"Andy Vaughn","vendor_phone":"+1-202-319-1511","vendor_email":"avaughan@haivision.com","assigned_lab":{"cctl_name":"COACT, Inc. Labs"},"product_description":"<p>The Target of Evaluation (TOE) is the Haivision Makito Video Encoders with firmware version 2.1.1-3. The following models were evaluated:</p>\r\n<table border=\"1\" cellspacing=\"0\" cellpadding=\"0\">\r\n<tbody>\r\n<tr>\r\n<td colspan=\"2\" width=\"421\" valign=\"top\">\r\n<p class=\"NormalTable\">Makito Video   Encoders with firmware version 2.1.1-3.</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td width=\"144\" valign=\"top\">\r\n<p class=\"NormalTable\">Product   Reference #</p>\r\n</td>\r\n<td width=\"277\" valign=\"top\">\r\n<p class=\"NormalTable\">Description</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td colspan=\"2\" width=\"421\" valign=\"top\">\r\n<p class=\"NormalTable\">Blades</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td width=\"144\" valign=\"top\">\r\n<p class=\"NormalTable\">B-290E-DVI</p>\r\n</td>\r\n<td width=\"277\" valign=\"top\">\r\n<p class=\"NormalTable\">Makito HD-DVI   H.264 Encoder blade</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td width=\"144\" valign=\"top\">\r\n<p class=\"NormalTable\">B-290E-DVI-S</p>\r\n</td>\r\n<td width=\"277\" valign=\"top\">\r\n<p class=\"NormalTable\">Makito HD-DVI   H.264 Encoder blade with serial port</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td width=\"144\" valign=\"top\">\r\n<p class=\"NormalTable\">B-290E-HDSDI</p>\r\n</td>\r\n<td width=\"277\" valign=\"top\">\r\n<p class=\"NormalTable\">Makito HD-SDI   H.264 Encoder blade</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td width=\"144\" valign=\"top\">\r\n<p class=\"NormalTable\">B-280E-SDI</p>\r\n</td>\r\n<td width=\"277\" valign=\"top\">\r\n<p class=\"NormalTable\">Barracuda SD-SDI   H.264 Encoder blade</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td colspan=\"2\" width=\"421\" valign=\"top\">\r\n<p class=\"NormalTable\">Firmware Options</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td width=\"144\" valign=\"top\">\r\n<p class=\"NormalTable\">SW-290E-KLV</p>\r\n</td>\r\n<td width=\"277\" valign=\"top\">\r\n<p class=\"NormalTable\">KLV metadata   support, a licensable feature providing Key Length Value encoding   functionality</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td width=\"144\" valign=\"top\">\r\n<p class=\"NormalTable\">FCO-SV-SW-CONFIG</p>\r\n</td>\r\n<td width=\"277\" valign=\"top\">\r\n<p class=\"NormalTable\">A specific   firmware version can be requested by including this part number in the   purchase order.&nbsp; Please specify the   2.1.1-3 release as part of the configuration information in order to receive   the firmware described in this Security Target.</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td colspan=\"2\" width=\"421\" valign=\"top\">\r\n<p class=\"NormalTable\">Chassis</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td width=\"144\" valign=\"top\">\r\n<p class=\"NormalTable\">F-280-1</p>\r\n</td>\r\n<td width=\"277\" valign=\"top\">\r\n<p class=\"NormalTable\">Single-slot   Barracuda enclosure with AC power supply</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td width=\"144\" valign=\"top\">\r\n<p class=\"NormalTable\">F-290-1DH</p>\r\n</td>\r\n<td width=\"277\" valign=\"top\">\r\n<p class=\"NormalTable\">Dual height,   single-slot Makito enclosure with AC power supply</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td width=\"144\" valign=\"top\">\r\n<p class=\"NormalTable\">F-290-1</p>\r\n</td>\r\n<td width=\"277\" valign=\"top\">\r\n<p class=\"NormalTable\">Single-slot Makito   enclosure with AC power supply</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td width=\"144\" valign=\"top\">\r\n<p class=\"NormalTable\">F-MB6B-RAC</p>\r\n</td>\r\n<td width=\"277\" valign=\"top\">\r\n<p class=\"NormalTable\">Second   generation 6-slot chassis with redundant AC power supply (can hold any B-   blade)</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td width=\"144\" valign=\"top\">\r\n<p class=\"NormalTable\">F-MB6X-RAC</p>\r\n</td>\r\n<td width=\"277\" valign=\"top\">\r\n<p class=\"NormalTable\">Same as   F-MB6B-RAC, but with new power supplies for MakitoX series (can hold any B-   blade)</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td width=\"144\" valign=\"top\">\r\n<p class=\"NormalTable\">F-MB6B-DC</p>\r\n</td>\r\n<td width=\"277\" valign=\"top\">\r\n<p class=\"NormalTable\">Second generation   6-slot chassis with DC power supply (can hold any B- blade)</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td width=\"144\" valign=\"top\">\r\n<p class=\"NormalTable\">F-MB6B-MED</p>\r\n</td>\r\n<td width=\"277\" valign=\"top\">\r\n<p class=\"NormalTable\">Second   generation 6-slot chassis with medical-grade AC power supply (can hold any B-   blade)</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td width=\"144\" valign=\"top\">\r\n<p class=\"NormalTable\">F-MB21B-R</p>\r\n</td>\r\n<td width=\"277\" valign=\"top\">\r\n<p class=\"NormalTable\">Second   generation 21-slot chassis with redundant power supplies (can hold any B-   blade)</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td colspan=\"2\" width=\"421\" valign=\"top\">\r\n<p class=\"NormalTable\">Appliances</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td width=\"144\" valign=\"top\">\r\n<p class=\"NormalTable\">S-280E-SDI</p>\r\n</td>\r\n<td width=\"277\" valign=\"top\">\r\n<p class=\"NormalTable\">Barracuda SD-SDI   H.264 Encoder appliance (B-280E-SDI) in single-card enclosure (F-280-1)</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td width=\"144\" valign=\"top\">\r\n<p class=\"NormalTable\">S-290E-HDSDI</p>\r\n</td>\r\n<td width=\"277\" valign=\"top\">\r\n<p class=\"NormalTable\">Makito HD-SDI   H.264 Encoder appliance (B-290EHDSDI) in single-card enclosure (F-290-1)</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td width=\"144\" valign=\"top\">\r\n<p class=\"NormalTable\">S-290E-DVI</p>\r\n</td>\r\n<td width=\"277\" valign=\"top\">\r\n<p class=\"NormalTable\">Makito HD-DVI   H.264 Encoder appliance (B-290EDVI) in single-card enclosure (F-290-1)</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td width=\"144\" valign=\"top\">\r\n<p class=\"NormalTable\">S-290E-DVI-S</p>\r\n</td>\r\n<td width=\"277\" valign=\"top\">\r\n<p class=\"NormalTable\">Makito HD-DVI   H.264 Encoder appliance (B-290EDVI-S) in single-card, dual-height enclosure   (F-290-1DH)</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td width=\"144\" valign=\"top\">\r\n<p class=\"NormalTable\">S-290E-AIR</p>\r\n</td>\r\n<td width=\"277\" valign=\"top\">\r\n<p class=\"NormalTable\">Makito Air   Ruggedized HD/SD H.264 Video Encoder with SW-290E-KLV</p>\r\n</td>\r\n</tr>\r\n</tbody>\r\n</table>\r\n<p>&nbsp;</p>\r\n<p>The TOE is a full-featured, high-performance IP audio/video encoder that is capable of encoding H.264 video at resolutions of up to 1080p60, with a latency of less than 55 milliseconds. The TOE can also support computer display input at resolutions up to 1920x1080@60 Hz or 1280x1024@75 Hz.</p>\r\n<p>The TOE can take any one of several forms, based on a combination of blades, firmware options, and chassis/appliances described in the tables below. Please note the following:</p>\r\n<p>&bull; Each blade is identical except for the number and type of physical interfaces.</p>\r\n<p>&bull; The KLV firmware option refers to non-TSF related functionality (factory installed).</p>\r\n<p>&bull; Firmware version is 2.1.1-3.</p>\r\n<p>&bull; Chassis serve only to enclose the blades and to provide power distribution.</p>\r\n<p>&bull; Appliances are a combination of one blade in a single-slot enclosure.</p>\r\n<p>The differences in the blades include the number of ports, interfaces, and throughput. Although these blades have different specifications (in terms of performance and capabilities), they all provide the same security functions described in the ST. They are therefore considered to be the same for the purposes of the ST description.</p>","evaluation_configuration":null,"security_evaluation_summary":"<p>The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme. The criteria against which the Haivision Makito Video Encoders with firmware version 2.1.1-3 was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1 rev 3.&nbsp; The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1 rev 3.&nbsp; COACT, Inc. determined that the evaluation assurance level (EAL) for the product is EAL 1.&nbsp; The product, when delivered and configured as identified in the <em>Haivision Makito 2.1 Hardening Guide, Document Number HVS-PD-IG-MAK211, May 29, 2013&nbsp; </em>document, satisfies all of the security functional requirements stated in the <em>Haivision Makito 2.1 Security Target, Document Number: HVS-PD-ST-MAK211, Version 1.1, May 29, 2013.&nbsp; </em>The project underwent CCEVS Validator review.&nbsp; The evaluation was completed in June 2013.&nbsp; Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report, (report number CCEVS-VR-VID10501-2013, dated June 2013) prepared by CCEVS.</p>","environmental_strengths":"<p>The logical boundaries of the Makito Video Encoders with firmware version 2.1.1-3 TOE are realized in the security functions that it implements. Each of these security functions is summarized below.</p>\r\n<p><strong>&nbsp;</strong></p>\r\n<p><strong>Security audit - </strong>The TOE is designed to be able to generate audit logs for a wide range of security relevant events. The TOE is configured in the evaluated configuration to send the logs to a designated syslog server.</p>\r\n<p>&nbsp;</p>\r\n<p><strong>Cryptographic support &ndash; </strong>The TOE includes Cryptographic functions that provides key management, random bit generation, encryption/decryption, digital signature and secure hashing and asymmetric key generation features in support of higher level cryptographic protocols including TLS, HTTPS, and SSH.&nbsp; The TOE algorithms were validated through the Cryptographic Algorithm Validation Program (CAVP).&nbsp;</p>\r\n<p>&nbsp;</p>\r\n<p><strong>User data protection - </strong>There is no private user data per se transiting through the TOE. Users of the TOE are passive viewers/listeners of common media streams (MPEG-TS, RTP, RTMP, or QuickTime) encoded in real-time from the TOE audio, video, and metadata inputs, and transmitted unprotected on the network.</p>\r\n<p>The input signal is the same for all viewers/listeners and is considered to be the organization&rsquo;s data for which confidentiality, authenticity and integrity is not the responsibility of the TOE. Viewers/listeners of the media streams do not have to be identified users of the TOE. The knowledge of the multicast address (and the protocols) provides access to the content. If RTSP is enabled on the TOE, the knowledge of the URL of the media stream is enough to provide access to it.</p>\r\n<p>&nbsp;</p>\r\n<p><strong>Identification and authentication - </strong>The TSF maintains local administrative user name/password/role databases for interactive management sessions.</p>\r\n<p>Security Administrators manage all administrative users&rsquo; account with the CLI account command or the WCI Accounts page. Password policies are managed with the CLI policy (password) command or the WCI Policies page.</p>\r\n<p>Password policies are not enforced by the TSF when Security Administrators create accounts or reset the password of other users&rsquo; accounts. Instead, the password is forced to expire and the account owner is required to change its password upon next login.</p>\r\n<p>Administrative users can change their own password using the CLI <em>passwd</em> command or the WCI My Account page (or their own Account page for Security Administrators), constrained by the password policies.</p>\r\n<p>Administrative users can also manage their SSH authorized public keys using the CLI <em>pubkey</em> command or the WCI My Account page (or their own Account page for Security Administrators). Security Administrators can manage any administrative user&rsquo;s public keys with the CLI account command or the WCI Accounts page.</p>\r\n<p><strong>Security management- </strong>The TOE Security Administrators can create login accounts and assign them to one of the following roles: Administrator, Operator, or Guest. The CLI account command or the WCI Accounts page is used to create an administrative user account and assign it a role.</p>\r\n<p>The TOE Administrator role maps to the Security Administrator role described in the security target and the applicable Protection Profile.</p>\r\n<p>The Administrators manage the TSF and the media streams. The Operators manage the media streams, and the Guests can only read the media stream configuration and monitor the status of the TOE.</p>\r\n<p>All roles are permitted to log on the TOE using the CLI or the web interface (WCI), but their actions on the TOE are limited by their role.</p>\r\n<p>&nbsp;</p>\r\n<p><strong>Protection of the TSF- </strong>The TSF Data is mostly stored on a flash-memory based Linux file system, in files and databases that are readable and writable by the root user only.</p>\r\n<p>The root account is not used to log in to the TOE and is locked down at the factory.</p>\r\n<p>The ability to manage the TSF data is provided to the Security Administrators through the <em>sudo</em> Linux command for a limited set of operations.</p>\r\n<p>The TOE flash-memory based file system is supported by a micro-SD device that can be ejected if the TOE enclosure is opened. The environment shall then provide physical security to the TOE as stipulated by the A.PHYSICAL assumption.</p>\r\n<p>The firmware is based on the Linux operating system and proprietary applications that can be upgraded from digitally signed packages only.</p>\r\n<p><strong>TOE access - </strong>The TOE presents a warning and consent message before establishing an interactive session with any user role (Administrator, Operator, or Guest) and terminates the session if it remains idle for a configured period of time.</p>\r\n<p>An interactive session is established either via local CLI using the serial port, or remotely via CLI with SSH or a web browser using HTTPS.</p>\r\n<p><strong>Trusted path/channels - </strong>The TSF can be configured to transmit its audit records to a remote audit server. The TSF also supports remote interactive CLI and web interface sessions.</p>\r\n<p>The cryptographic support for the CC evaluated configuration is set with the CLI policy (crypto) command or WCI Policies page. Setting the crypto compliance policy to Makito21st (Makito 2.1 Security Target) sets, upon next reboot, the FIPS mode of operation of the cryptographic module, along with other cryptographic restrictions for TLS, SSH, and HTTPS.<strong>&nbsp;</strong></p>","features":[]}