{"product_id":11522,"v_id":11522,"product_name":"Berryville Holdings, LLC Warden v1.2","certification_status":"Certified","certification_date":"2025-07-07T00:00:00Z","tech_type":"Firewall,Network Device,Virtual Private Network,Wireless Monitoring","vendor_id":{"name":"Berryville Holdings LLC","website":"https://bvhllc.com"},"vendor_poc":"Steven Pritchett","vendor_phone":"703-662-9316","vendor_email":"warden@bvhllc.com","assigned_lab":{"cctl_name":"Gossamer Security Solutions"},"product_description":"<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">The TOE consists of a single instance of virtual Berryville device running the Warden software v1.2 on a physical device running Ubuntu 22.04&rsquo;s KVM hypervisor.</p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">The TOE is assumed to be installed and operated within a physically protected environment, administered by trusted and trained administrators. The TOE can be remotely administered via SSH or via a local console.</p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">The VM leverages the physical hardware&rsquo;s ethernet interface or additional USB interfaces to create virtual interfaces. The TOE is able to filter connections to/from external IT entities using its stateful firewall/IP traffic filtering capabilities. In addition to packet filtering, the TOE can also provide Intrusion prevention via anomaly or signature-based detection.</p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">The TOE provides VPN gateway capabilities, allowing the Engine to use IKE/IPsec to protect traffic exchanged with remote peer gateways (for a site-to-site VPN configuration) and with VPN clients. Site-to-site configuration can be used to protect data between the TOE and a remote syslog server or NTP server.</p>","evaluation_configuration":"<p><span style=\"font-size: 10.0pt; font-family: Times, serif;\">The TOE consists of a single instance of virtual Berryville device running the Warden software v1.2 on a physical device running Ubuntu 22.04&rsquo;s KVM hypervisor</span></p>","security_evaluation_summary":"<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\">The evaluation was carried out in accordance to the Common Criteria Evaluation and Validation Scheme (CCEVS) requirements and guidance.&nbsp; The evaluation demonstrated that the TOE<em> </em>meets the security requirements contained in the Security Target.&nbsp; The criteria against which the TOE was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 5, April 2017. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Evaluation Methodology, Version 3.1, Revision 5, April 2017.&nbsp; The product, when delivered and configured as identified in the Berryville Holdings LLC, Warden v1.2 CC Administrator Guide, July 3, 2025 document, satisfies all of the security functional requirements stated in the Berryville Holdings, LLC Warden v1.2 Security Target, Version 0.6, July 3, 2025 .&nbsp; The project underwent CCEVS Validator review.&nbsp; The evaluation was completed in July 2025.&nbsp; Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report (report number CCEVS-VR-VID11522-2025) prepared by CCEVS.</p>\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>","environmental_strengths":"<div class=\"WordSection1\">\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\">The logical boundaries of the Warden are realized in the security functions that it implements. Each of these security functions is summarized below.</p>\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>Security audit:</strong></p>\r\n<p style=\"margin: 0in 0in 5pt; text-align: justify; font-size: 10pt; font-family: Times, serif;\">The TOE provides auditing capabilities to provide a secure and reliable record of all security relevant events, including administrative changes to the TOE. &nbsp;Any security relevant event is audited internally and then transmitted externally over a secure communication channel to an audit server via IPsec in real-time. All audited events have the necessary details like timestamp, event log, event code, and identity of the party involved to provide a comprehensive audit trail. Depending on the context of the audit, the identity may be the relevant user id, or remote IT entity involved in the event. All audits are protected from unauthorized deletion. The TOE&rsquo;s logd will rotate logs and once out of space, delete the oldest logs in order to make room for newer logs. The administrator may configure IPS auditing to limit the number of audits generated for similar events.</p>\r\n<p style=\"margin: 0in 0in 5pt; text-align: justify; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>\r\n<p style=\"text-align: justify; break-after: avoid; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>Cryptographic support:</strong></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; line-height: 11pt; font-size: 10pt; font-family: Times, serif;\">The TOE<span style=\"font-family: 'Times New Roman', serif;\"> leverages </span>OpenSSL library (version 3.0.10) executing on the TOE&rsquo;s Intel Core i7-1165G7 Processor library<span style=\"font-family: 'Times New Roman', serif;\"> to provide cryptographic functions supporting secure administration access (via SSH), secure network traffic with VPN peers (via IKE/IPsec), and for secure communication to external systems such as audit log servers and NTP servers (also via IPsec). &nbsp;Functions include Key generation, key establishment, key distribution, key destruction, and cryptographic operations.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; line-height: 11pt; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>User data protection:</strong></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; line-height: 11pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">The TOE has been designed to ensure that no residual information exists in network packets. When the TOE allocates a new buffer for either an incoming or outgoing network packet, the new packet data will be used to overwrite any previous data in the buffer. If an allocated buffer exceeds the size of the packet, any additional space will be overwritten (padded) with zeros before the packet is forwarded (to the external network or delivered to the appropriate, internal application).</span></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; line-height: 11pt; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>Firewall:</strong></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">The VM bridges the physical hardware&rsquo;s ethernet interface or additional USB interfaces to create virtual interfaces. Using these virtual interfaces, the TOE supports many protocols for packet filtering including icmpv4, icmpv6, ipv4, ipv6, tcp and udp.&nbsp; The firewall rules implement the SPD rules (permit, deny, bypass).&nbsp; Each rule can be configured to log status of packets pertaining to the rule. All codes under each protocol are implemented.&nbsp; The TOE supports FTP for stateful filtering.</p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">Routed packets are forwarded to a TOE interface with the interface&rsquo;s MAC address as the layer-2 destination address.&nbsp; The TOE routes the packets using the presumed destination address in the IP header, in accordance with route tables maintained by the TOE.</p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">IP packets are processed by the software, which associates them with application-level connections, using the IP packet header fields: source and destination IP address and port, as well as IP protocol. &nbsp;Fragmented packets are reassembled before they are processed.</p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">The TOE mediates the information flows according to an administrator-defined policy. &nbsp;Some of the traffic may be either silently dropped or rejected (with notification to the presumed source).</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; line-height: 11pt; font-size: 10pt; font-family: Times, serif;\">The TOE's firewall and packet filtering capabilities are controlled by defining an ordered set of iptables rules. The rule specifies what communication will be allowed to pass and what will be blocked. &nbsp;It specifies the source and destination of the communication, what services can be used, and whether to log the connection.</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; line-height: 11pt; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>Identification and authentication:</strong></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">The TOE maintains a single security administrator role. While the TOE allows unique users, each created user has the security administrator role. The TOE provides secure password-based for local administrators and password or public key based authentication for remote SSH administrators. The only functionality available to an administrator prior to authentication is viewing the warning banner.</span><span style=\"font-family: 'Times New Roman', serif;\"> The TOE, </span>supports passwords of varying lengths and allows an administrator to specify a minimum password length between 15 and 32 characters long<span style=\"font-family: 'Times New Roman', serif;\">. &nbsp;</span>The password composition can contain all special characters as required by FIA_PMG_EXT.1.1.</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; line-height: 11pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">Consecutive unsuccessful authentication attempts beyond a configurable limit will result in locking of the user for a specified duration of time.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; line-height: 11pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">The TOE provides secure connectivity between itself and a remote VPN peer, syslog server, or NTP server using IPsec with X.509 certificate-based authentication. </span>X.509v3 certificates are stored internally and the store is protected by file permissions. X.509 certificates are manually loaded by the authorized administrator onto the TOE by an administrator. The TOE checks the revocations status of peer certificates via CRL. The TOE can generate certificate signing requests (CSRs) and accept the upload of the signed certificates.</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; line-height: 11pt; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>Security management:</strong></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; line-height: 11pt; font-size: 10pt; font-family: Times, serif;\">The TOE maintains a single security administrator role that allows both local and remote administration for management of the TOE&rsquo;s security functions. <span style=\"font-family: 'Times New Roman', serif;\">TOE administrators manage the security functions of the TOE through a local console or SSH CLI. &nbsp;The security administrator is able to perform all management functions, including, but not limited to, modifying audit behavior, performing updates, managing crypto keys, managing firewall, IPS, and packet filtering rules.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; line-height: 11pt; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>Packet filtering:</strong></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\">The TOE provides packet filtering and secure IPsec tunneling. &nbsp;The TOE&rsquo;s netfilter kernel process bears responsibility for processing network packets and processes each packet against the netfilter rules governing each input and output chain. The tunnels can be established with <br>trusted VPN peers. &nbsp;More accurately, these tunnels are sets of security associations (SAs). The SAs define the protocols and algorithms to be applied to sensitive packets and specify the keying material to be used.<br>SAs are unidirectional and are established per the ESP security protocol.&nbsp; An authorized administrator can<br>define the traffic that needs to be protected via IPsec by configuring access lists (permit, deny, log) and<br>applying these access lists to interfaces using crypto map sets. The TOE processes incoming packets in netfilter&rsquo;s chain applying the administrator defined rulesets in order.&nbsp; See Section 1.4.1.2.4 above for more details.</p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>\r\n<p style=\"text-align: justify; break-after: avoid; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>Protection of the TSF:</strong></p>\r\n<p style=\"text-align: justify; break-after: avoid; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">The TOE includes capabilities to protect itself from unwanted modification as well as protecting its persistent data.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; line-height: 11pt; font-size: 10pt; font-family: Times, serif;\">The TOE does not store passwords in plaintext; they are obfuscated. &nbsp;The TOE does not support any command line capability to view any cryptographic keys generated or used by the TOE.</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; line-height: 11pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">The TOE provides image integrity verification using a digital signature to validate the authenticity of the images before loading them. Upon every boot up, power on self-tests is conducted to validate the integrity of the software components as well as perform cryptographic known answer tests for the supported cryptographic algorithms. If power-up self-tests fail, the TOE halts boot. &nbsp;The TOE also allows administrator to manually configure of the TOE&rsquo;s clock or configuration of an NTP server, with which the TOE will synchronize its time. </span>The TOE provides a timestamp for use with audit records, timing elements of cryptographic functions, and inactivity timeouts.</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; line-height: 11pt; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>TOE access:</strong></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">The TOE offers a login banner which provides the administrator to ability to display a custom warning/access policy message as per the organization needs. &nbsp;The TOE provides the ability to configure an inactivity timeout which terminates the session beyond the inactivity period configured. &nbsp;An administrator can also terminate their own session.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; line-height: 11pt; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>Trusted path/channels:</strong></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\">The TOE communicates to external components in a secure manner using IPsec for VPN peers,&nbsp;<span style=\"font-family: 'Times New Roman', serif;\">syslog servers, or NTP servers</span>.&nbsp; The TOE also employs SSH to secure remote administrative sessions.</p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>Intrusion Prevention:</strong></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; line-height: 11pt; font-size: 10pt; font-family: Times, serif;\">The TOE supports IPS functionality by leveraging the Suricata service. The TOE&rsquo;s intrusion detection and prevention system provides real-time monitoring and analysis of network traffic. The IPS will detect and respond to various types of network-based threats and attacks. IPS logs are generated and forwarded to Rsyslog. The IPS logs alert, drop, and reject actions to the syslog for traffic that matches a given rule.&nbsp; The TOE supports in-line and passive inspection modes using both anomaly and signature-based detection along with IP filtering based on blacklists &amp; white-lists. Anomaly-based detection can be determined by thresholds. Signature-based detection can be determined by packet headers, string-based pattern-matching, attacks. and/or patterns.</p>\r\n</div>\r\n<p>&nbsp;</p>","features":[{"id":3216,"feature_name":"Asymmetric Key Generation"},{"id":3328,"feature_name":"Auditing"},{"id":3225,"feature_name":"Certificate Authentication"},{"id":3226,"feature_name":"Certificate Validation"},{"id":3219,"feature_name":"Cryptograhic Hashing"},{"id":3217,"feature_name":"Cryptographic Key Establishment"},{"id":3218,"feature_name":"Cryptographic Signature Verification"},{"id":3215,"feature_name":"DRBG"},{"id":3221,"feature_name":"Firewall"},{"id":3327,"feature_name":"Flaw Remediation"},{"id":3222,"feature_name":"Intrusion Prevention"},{"id":3224,"feature_name":"IPsec"},{"id":3220,"feature_name":"Keyed-hash message authentication"},{"id":3223,"feature_name":"VPN Gateway"}]}