Huawei EulerOS 2.0 OpenSSH Server Cryptographic Module

Certificate #4242

Webpage information

Status active
Validation dates 06.06.2022
Sunset date 21-09-2026
Standard FIPS 140-2
Security level 1
Type Software
Embodiment Multi-Chip Stand Alone
Caveat This module contains the embedded module Huawei EulerOS 2.0 OpenSSL Cryptographic module validated to FIPS 140-2 under Cert. #4235 operating in FIPS mode. When operated in FIPS mode.
Exceptions
  • Physical Security: N/A
  • Mitigation of Other Attacks: N/A
Description The Huawei EulerOS 2.0 OpenSSH Server Cryptographic Module is a binary implementing the Secure Shell (SSH) protocol in the EulerOS 2.0 Operating System user space. The module interacts with other entities acting as SSH clients via the SSH protocol. The module only supports SSHv2 protocol.
Tested configurations
  • Huawei EulerOS 2.0 on FusionServer RH2288 with Intel Xeon E5-2690 v3 processor without PAA
  • Huawei EulerOS 2.0 on Taishan200 with Huawei Kunpeng 920 processor without PAA (single-user mode).
Vendor Huawei Technologies CO., Ltd.
References

This certificate's webpage directly references 1 certificates, transitively this expands into 1 certificates.

Security policy

Symmetric Algorithms
AES-128, AES-192, AES-, AES, DES, Triple-DES, TDES, T-DES, TDEA, HMAC
Asymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DH, DSA
Hash functions
SHA-1, SHA-256, SHA-512
Schemes
MAC, Key Agreement, Key agreement
Protocols
SSH, SSHv2, TLS
Randomness
DRBG
Libraries
OpenSSL
Elliptic Curves
P-224, P-256, P-521, P-384
Block cipher modes
ECB, CBC, CTR, CFB, GCM

Trusted Execution Environments
SSC
Vendor
Huawei, Huawei Technologies Co

Security level
Level 1, level 1

Standards
FIPS 140-2, FIPS PUB 140-2, FIPS PUB 197, FIPS 186-4, FIPS PUB 198-1, FIPS PUB 186-4, FIPS PUB 180-4, FIPS 197, FIPS 180-4, FIPS 198-1, NIST SP 800-135, SP 800-67, NIST SP 800-67, SP 800-38A, NIST SP 800-38A, SP 800-38D, NIST SP 800-38D, SP 800-38F, NIST SP 800-38F, SP 800-56A, NIST SP 800-56A, SP 800-90A, NIST SP 800-90A, SP 800-131A, NIST SP 800-131A, SP 800-135, PKCS 1, RFC5647

File metadata

Subject FIPS 140-2 Security Policy Template
Author huziyuan
Creation date D:20220527114304+02'00'
Modification date D:20220527114304+02'00'
Pages 26
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

References

Outgoing
  • 4235 - active - Huawei EulerOS 2.0 OpenSSL Cryptographic Module

Heuristics

No heuristics are available for this certificate.

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 4242,
  "dgst": "0315b4020af3ecca",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "ECDSA#A903",
        "KAS#A1079",
        "KAS#A903",
        "KTS#A903",
        "DRBG#A903",
        "DSA#A903",
        "AES#A903",
        "SHS#A903",
        "Triple-DES#A903",
        "HMAC#A903",
        "CVL#A1079",
        "RSA#A903",
        "KAS-SSC#A903"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2.0"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "4235"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "4235"
        ]
      }
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": [
        "4235"
      ]
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "4235"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "4235"
        ]
      }
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": [
        "4235"
      ]
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          },
          "ECDH": {
            "ECDH": 1
          },
          "ECDSA": {
            "ECDSA": 7
          }
        },
        "FF": {
          "DH": {
            "DH": 1,
            "Diffie-Hellman": 13
          },
          "DSA": {
            "DSA": 10
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        },
        "CFB": {
          "CFB": 1
        },
        "CTR": {
          "CTR": 2
        },
        "ECB": {
          "ECB": 1
        },
        "GCM": {
          "GCM": 5
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 36
        }
      },
      "crypto_protocol": {
        "SSH": {
          "SSH": 53,
          "SSHv2": 10
        },
        "TLS": {
          "TLS": {
            "TLS": 1
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 5,
          "Key agreement": 1
        },
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-224": 4,
          "P-256": 16,
          "P-384": 12,
          "P-521": 16
        }
      },
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "#4235": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "AES- 256": 1,
          "AES-128": 1,
          "AES-192": 1,
          "PKCS 1": 2,
          "SHA- 384": 1,
          "SHA-1": 8,
          "SHA-1 and 1024": 1,
          "SHA-256": 1,
          "SHA-512": 1,
          "SHA2- 512": 1,
          "SHA2-256": 3,
          "SHA2-384": 2,
          "SHA2-512": 2
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 1,
          "level 1": 2
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 9
          },
          "SHA2": {
            "SHA-256": 1,
            "SHA-512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 2
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 11,
          "FIPS 180-4": 2,
          "FIPS 186-4": 4,
          "FIPS 197": 2,
          "FIPS 198-1": 2,
          "FIPS PUB 140-2": 3,
          "FIPS PUB 180-4": 1,
          "FIPS PUB 186-4": 1,
          "FIPS PUB 197": 3,
          "FIPS PUB 198-1": 1
        },
        "NIST": {
          "NIST SP 800-131A": 1,
          "NIST SP 800-135": 2,
          "NIST SP 800-38A": 1,
          "NIST SP 800-38D": 1,
          "NIST SP 800-38F": 1,
          "NIST SP 800-56A": 1,
          "NIST SP 800-67": 1,
          "NIST SP 800-90A": 1,
          "SP 800-131A": 1,
          "SP 800-135": 1,
          "SP 800-38A": 1,
          "SP 800-38D": 1,
          "SP 800-38F": 1,
          "SP 800-56A": 1,
          "SP 800-67": 1,
          "SP 800-90A": 1
        },
        "PKCS": {
          "PKCS 1": 1
        },
        "RFC": {
          "RFC5647": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 11,
            "AES-": 1,
            "AES-128": 1,
            "AES-192": 1
          }
        },
        "DES": {
          "3DES": {
            "T-DES": 1,
            "TDEA": 1,
            "TDES": 2,
            "Triple-DES": 11
          },
          "DES": {
            "DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 14
          }
        }
      },
      "tee_name": {
        "IBM": {
          "SSC": 2
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Huawei": {
          "Huawei": 11,
          "Huawei Technologies Co": 25
        }
      },
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "huziyuan",
      "/CreationDate": "D:20220527114304+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/ModDate": "D:20220527114304+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "/Subject": "FIPS 140-2 Security Policy Template",
      "pdf_file_size_bytes": 1004627,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "mailto:[email protected]",
          "mailto:[email protected]",
          "mailto:[email protected]",
          "mailto:[email protected]"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 26
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "a3a0e06d9b2ba62810a0d75b953f2444bca550e617462419ca2527d00b723f6a",
    "policy_txt_hash": "499b104f584506295051f299e96f7fc5717a697e1b7052f767f1c21589a55d17"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "This module contains the embedded module Huawei EulerOS 2.0 OpenSSL Cryptographic module validated to FIPS 140-2 under Cert. #4235 operating in FIPS mode. When operated in FIPS mode.",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/June 2022_010722_0704_signed.pdf",
    "date_sunset": "2026-09-21",
    "description": "The Huawei EulerOS 2.0 OpenSSH Server Cryptographic Module is a binary implementing the Secure Shell (SSH) protocol in the EulerOS 2.0 Operating System user space. The module interacts with other entities acting as SSH clients via the SSH protocol. The module only supports SSHv2 protocol.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Physical Security: N/A",
      "Mitigation of Other Attacks: N/A"
    ],
    "fw_versions": null,
    "historical_reason": null,
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {
      "4235": 1
    },
    "module_name": "Huawei EulerOS 2.0 OpenSSH Server Cryptographic Module",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "active",
    "sw_versions": "1.1",
    "tested_conf": [
      "Huawei EulerOS 2.0 on FusionServer RH2288 with Intel Xeon E5-2690 v3 processor without PAA",
      "Huawei EulerOS 2.0 on Taishan200 with Huawei Kunpeng 920 processor without PAA (single-user mode)."
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2022-06-06",
        "lab": "DEKRA Testing and Certification S.A.U",
        "validation_type": "Initial"
      }
    ],
    "vendor": "Huawei Technologies CO., Ltd.",
    "vendor_url": "https://www.huawei.com"
  }
}