SUSE Linux Enterprise Server 12 - OpenSSH Client Module

Certificate #2472

Webpage information

Status historical
Historical reason Moved to historical list due to sunsetting
Validation dates 13.11.2015 , 02.01.2018
Standard FIPS 140-2
Security level 1
Type Software
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS mode with module SUSE Linux Enterprise Server 12 - OpenSSL Module validated to FIPS 140-2 under Cert. #2435 [1] operating in FIPS mode or with SUSE Linux Enterprise Server OpenSSL Module validated to FIPS 140-2 under Cert. #3038 [2] operating in FIPS mode.
Exceptions
  • Physical Security: N/A
  • Mitigation of Other Attacks: N/A
Description SUSE client software that provides encrypted network communication using the SSH protocol.
Tested configurations
  • SUSE Linux Enterprise Server 12 running on HP ProLiant DL320e Gen8 with AES-NI[1]
  • SUSE Linux Enterprise Server 12 running on HP ProLiant DL320e Gen8 without AES-NI[1]
  • SUSE Linux Enterprise Server 12 SP2 running on FUJITSU Server PRIMERGY CX2570 M2 inside a CX400 M1 enclosure with AES-NI[2]
  • SUSE Linux Enterprise Server 12 SP2 running on FUJITSU Server PRIMERGY CX2570 M2 inside a CX400 M1 enclosure without AES-NI[2]
  • SUSE Linux Enterprise Server 12 SP2 running on IBM z13[2] (single-user mode)
Vendor SUSE, LLC
References

This certificate's webpage directly references 1 certificates, transitively this expands into 1 certificates.

Security policy

Symmetric Algorithms
AES, CAST, RC4, DES, Triple-DES, TDEA, ChaCha20, Poly1305, Blowfish, HMAC, HMAC-SHA-256
Asymmetric Algorithms
ECDH, ECDSA, Diffie-Hellman, DSA
Hash functions
SHA-1, SHA-224, SHA-384, SHA-256, MD5, RIPEMD160
Schemes
MAC, Key Agreement
Protocols
SSH, SSHv2, SSHv1
Randomness
DRBG, RNG
Libraries
OpenSSL
Elliptic Curves
P-256, P-384, P-521, Curve25519, Ed25519
Block cipher modes
CBC, CTR, GCM

Security level
Level 1, level 1
Certification process
out of scope, the client's public-private key pair and storing client's public keys in the ~/.ssh/, which is out of scope for this validation. The client's public key is only sent to the server and the Module does not use, or 1 hour of operation, whichever occurs first. Persistently stored secret and private keys are out of scope, but may be zeroized using a FIPS140-2 approved mechanism to clear data on hard disks. 6.2. Key

Standards
FIPS 140-2, FIPS140-2, FIPS 197, FIPS 180-4, FIPS 198-1, FIPS 186-4, SP 800-90A, SP 800-131A, NIST SP 800-67, NIST SP 800-56A, NIST SP 800-90A, NIST SP 800-131A, NIST SP 800-135

File metadata

Title FIPS 140-2 Non-Proprietary Security Policy
Subject SUSE Linux Enterprise Server 12 - OpenSSH Client Module
Author Miloslav Trmač
Creation date D:20171221192558-06'00'
Modification date D:20171221192558-06'00'
Pages 19
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

References

Outgoing
  • 3043 - historical - CA Technologies C-Security Kernel
  • 2439 - historical - NPCT6XX TPM 1.2
  • 676 - historical - Cisco Catalyst 6506, 6509, 6506(E), 6509(E), 7606 and 7609 Routers With VPN Services Module
  • 4647 - active - Qualcomm® Crypto Engine Core
  • 1531 - historical - RFS7000 RF Switch
  • 3769 - historical - PTP 820C, PTP 820C-HP, PTP 820C 2E2SX, PTP 820S, PTP 820N, PTP 820A, PTP 820G, and PTP 820GX
  • 675 - historical - nShield F3 Ultrasign PCI, nShield F3 Ultrasign 32 PCI, nCipher F3 PCI for NetHSM, payShield Ultra PCI, payShield Ultra PCI for NetHSM, nShield F3 PCI, payShield PCI, nShield F3 PCI and nShield lite
  • 3197 - historical - Cryptographic Primitives Library
  • 2016 - historical - Apple OS X CoreCrypto Kernel Module, v4.0
  • 3198 - historical - MultiApp V4.0 Platform
  • 1536 - historical - Astro Subscriber Motorola Advanced Crypto Engine (MACE)
  • 1537 - historical - Brocade Mobility RFS7000 Controller
  • 1823 - historical - Cisco Telepresence C40, C60, and C90 Codecs
  • 674 - historical - nShield F3 Ultrasign PCI, nShield F3 Ultrasign 32 PCI, nCipher F3 PCI for NetHSM, payShield Ultra PCI, payShield Ultra PCI for NetHSM, nShield F3 PCI, payShield PCI, nShield F3 PCI and nShield lite
  • 1263 - historical - StoneGate Firewall / VPN Core
  • 4622 - active - NPCT7xx TPM 2.0 rev 1.38
  • 1131 - historical - McAfee Endpoint Encryption for PCs
  • 2014 - historical - Atmel Trusted Platform Module
  • 2519 - historical - HP FlexFabric 5900CP and 12910 Switch Series
  • 1276 - historical - Mocana Cryptographic Suite B Module
  • 4595 - historical - VMware's IKE Crypto Module
  • 586 - historical - Subscriber Encryption Module (SEM)
  • 1540 - historical - XYGATE /ESDK
  • 4645 - active - RSA BSAFE® Crypto-J JSAFE and JCE Software Module 6.2.5
  • 4623 - historical - Aruba AP-203R, AP-203RP, and AP-303H Wireless Access Points
  • 3768 - historical - REDCOM OpenSSL Cryptographic Module
  • 1628 - historical - XM Crypto Module
  • 3060 - historical - CommVault Crypto Library
  • 3045 - historical - None
  • 1535 - historical - Astro Subscriber Motorola Advanced Crypto Engine (MACE)
  • 431 - historical - GemXpresso Pro R3 E64 PK - FIPS
  • 3044 - historical - None
  • 2015 - historical - Apple OS X CoreCrypto Module, v4.0
  • 3770 - historical - Qualcomm® Trusted Execution Environment Software Cryptographic Library
  • 3788 - historical - NITROXIII CNN35XX-NFBE HSM Family
  • 4594 - historical - Ubuntu 18.04 IBM-GT Kernel Crypto API Cryptographic Module
  • 3199 - historical - FortiGate-3700D/3815D
  • 2646 - historical - Samsung Flash Memory Protector V1.1
  • 2435 - historical - SUSE Linux Enterprise Server 12 - OpenSSL Module
  • 3771 - historical - LifeCare PCA™ Infusion Pump
  • 1553 - historical - SLM-5650A TRANSEC Module
  • 4646 - active - RSA BSAFE® Crypto-J JSAFE and JCE Software Module 6.2.5
  • 1552 - historical - Check Point IP Appliance
  • 3059 - historical - Atalla Cryptographic Subsystem (ACS)
  • 1127 - historical - CryptoStor Tape SC702R
  • 1538 - historical - Datacryptor® 100M Ethernet
  • 1539 - historical - Xirrus Wi-Fi Array XN4, XN8, XN12 and XN16
  • 4588 - historical - SafeZone FIPS Cryptographic Module
  • 2505 - historical - Cisco FIPS Object Module
  • 3042 - historical - Datacryptor® 100M Ethernet
  • 2645 - historical - RF-7800W Broadband Ethernet Radio
  • 3789 - historical - Cisco ASA Cryptographic Module
  • 2648 - historical - NetApp Cryptographic Security Module

Heuristics

No heuristics are available for this certificate.

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 2472,
  "dgst": "1ab6078431739cd9",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "CVL#483",
        "CVL#1493",
        "CVL#1492"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "12"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "2435"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "2435"
        ]
      }
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": [
        "2435"
      ]
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "1535",
          "4645",
          "431",
          "1823",
          "1628",
          "4622",
          "2016",
          "1537",
          "2014",
          "3770",
          "2015",
          "2648",
          "674",
          "1276",
          "2519",
          "3044",
          "3060",
          "4588",
          "3199",
          "1553",
          "3788",
          "4646",
          "4595",
          "3197",
          "2646",
          "4594",
          "1536",
          "1263",
          "586",
          "675",
          "2645",
          "4623",
          "3045",
          "3042",
          "3771",
          "3043",
          "676",
          "1531",
          "3769",
          "1131",
          "1127",
          "2435",
          "1552",
          "1538",
          "3198",
          "1540",
          "2439",
          "1539",
          "4647",
          "3768",
          "2505",
          "3789",
          "3059"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "1535",
          "4645",
          "431",
          "2481",
          "1823",
          "1628",
          "4622",
          "1537",
          "2016",
          "2014",
          "2507",
          "3770",
          "3114",
          "2648",
          "674",
          "1276",
          "2015",
          "2519",
          "3091",
          "3195",
          "3060",
          "3044",
          "4588",
          "3199",
          "1553",
          "3788",
          "3644",
          "3196",
          "4646",
          "3090",
          "4595",
          "3615",
          "3197",
          "2646",
          "4594",
          "1536",
          "1263",
          "586",
          "675",
          "2645",
          "4623",
          "2017",
          "3045",
          "3651",
          "3042",
          "3771",
          "3043",
          "676",
          "1531",
          "3769",
          "3480",
          "1131",
          "1127",
          "1930",
          "1552",
          "2435",
          "3198",
          "1540",
          "3194",
          "3096",
          "1538",
          "2439",
          "1219",
          "1539",
          "4647",
          "3089",
          "3768",
          "2505",
          "3789",
          "3059"
        ]
      }
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": [
        "1535",
        "4645",
        "431",
        "1823",
        "1628",
        "4622",
        "2016",
        "1537",
        "2014",
        "3770",
        "2015",
        "2648",
        "674",
        "1276",
        "2519",
        "3044",
        "3060",
        "4588",
        "3199",
        "1553",
        "3788",
        "4646",
        "4595",
        "3197",
        "2646",
        "4594",
        "1536",
        "1263",
        "586",
        "675",
        "2645",
        "4623",
        "3045",
        "3042",
        "3771",
        "3043",
        "676",
        "1531",
        "3769",
        "1131",
        "1127",
        "2435",
        "1552",
        "1538",
        "3198",
        "1540",
        "2439",
        "1539",
        "4647",
        "3768",
        "2505",
        "3789",
        "3059"
      ]
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDH": {
            "ECDH": 2
          },
          "ECDSA": {
            "ECDSA": 11
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 15
          },
          "DSA": {
            "DSA": 6
          }
        }
      },
      "certification_process": {
        "OutOfScope": {
          "or 1 hour of operation, whichever occurs first. Persistently stored secret and private keys are out of scope, but may be zeroized using a FIPS140-2 approved mechanism to clear data on hard disks. 6.2. Key": 1,
          "out of scope": 2,
          "the client\u0027s public-private key pair and storing client\u0027s public keys in the ~/.ssh/, which is out of scope for this validation. The client\u0027s public key is only sent to the server and the Module does not use": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        },
        "CTR": {
          "CTR": 1
        },
        "GCM": {
          "GCM": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 42
        }
      },
      "crypto_protocol": {
        "SSH": {
          "SSH": 44,
          "SSHv1": 1,
          "SSHv2": 2
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 5
        },
        "MAC": {
          "MAC": 2
        }
      },
      "device_model": {},
      "ecc_curve": {
        "Curve": {
          "Curve25519": 2
        },
        "Edwards": {
          "Ed25519": 5
        },
        "NIST": {
          "P-256": 2,
          "P-384": 4,
          "P-521": 4
        }
      },
      "eval_facility": {
        "atsec": {
          "atsec": 21
        }
      },
      "fips_cert_id": {
        "Cert": {
          "#1127": 1,
          "#1131": 1,
          "#1263": 2,
          "#1276": 2,
          "#1492": 1,
          "#1493": 1,
          "#1531": 1,
          "#1535": 1,
          "#1536": 1,
          "#1537": 1,
          "#1538": 1,
          "#1539": 1,
          "#1540": 1,
          "#1552": 1,
          "#1553": 1,
          "#1628": 1,
          "#1823": 1,
          "#2014": 1,
          "#2015": 1,
          "#2016": 1,
          "#2435": 2,
          "#2439": 1,
          "#2455": 1,
          "#2505": 1,
          "#2519": 1,
          "#2645": 1,
          "#2646": 1,
          "#2648": 1,
          "#3038": 2,
          "#3042": 1,
          "#3043": 1,
          "#3044": 1,
          "#3045": 1,
          "#3059": 1,
          "#3060": 1,
          "#3197": 1,
          "#3198": 1,
          "#3199": 1,
          "#3768": 1,
          "#3769": 1,
          "#3770": 1,
          "#3771": 1,
          "#3788": 1,
          "#3789": 1,
          "#431": 2,
          "#4588": 1,
          "#4594": 1,
          "#4595": 1,
          "#4622": 1,
          "#4623": 1,
          "#4645": 1,
          "#4646": 1,
          "#4647": 1,
          "#483": 1,
          "#586": 1,
          "#674": 1,
          "#675": 1,
          "#676": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "#1492 CVL": 1,
          "#2455 RSA": 1,
          "#3038 AES": 1,
          "Cert. #483 CVL": 1,
          "HMAC- SHA-256": 1,
          "HMAC-SHA- 1": 2,
          "HMAC-SHA- 256": 4,
          "HMAC-SHA- 512": 4,
          "HMAC-SHA-1": 2,
          "HMAC-SHA-256": 4,
          "SHA- 256": 1,
          "SHA- 512": 1,
          "SHA-1": 1,
          "SHA-224": 1,
          "SHA-256": 1,
          "SHA-384": 1
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 1,
          "level 1": 2
        }
      },
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 2
          }
        },
        "RIPEMD": {
          "RIPEMD160": 2
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          },
          "SHA2": {
            "SHA-224": 1,
            "SHA-256": 1,
            "SHA-384": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 20
        },
        "RNG": {
          "RNG": 2
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 35,
          "FIPS 180-4": 1,
          "FIPS 186-4": 1,
          "FIPS 197": 1,
          "FIPS 198-1": 1,
          "FIPS140-2": 1
        },
        "NIST": {
          "NIST SP 800-131A": 1,
          "NIST SP 800-135": 1,
          "NIST SP 800-56A": 1,
          "NIST SP 800-67": 1,
          "NIST SP 800-90A": 1,
          "SP 800-131A": 2,
          "SP 800-90A": 9
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 9
          },
          "CAST": {
            "CAST": 2
          },
          "RC": {
            "RC4": 2
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "Triple-DES": 8
          },
          "DES": {
            "DES": 3
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 16,
            "HMAC-SHA-256": 2
          }
        },
        "djb": {
          "ChaCha": {
            "ChaCha20": 2
          },
          "Poly": {
            "Poly1305": 2
          }
        },
        "miscellaneous": {
          "Blowfish": {
            "Blowfish": 2
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "Miloslav Trma\u010d",
      "/CreationDate": "D:20171221192558-06\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/ModDate": "D:20171221192558-06\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "/Subject": "SUSE Linux Enterprise Server 12 - OpenSSH Client Module",
      "/Title": "FIPS 140-2 Non-Proprietary Security Policy",
      "pdf_file_size_bytes": 724124,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/validation/validation-list/shs#3768",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/validation/validation-list/aes#4588",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/validation/validation-list/drbg#1539",
          "https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/ECDSA#1131",
          "https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/RSA#2505",
          "https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/Component#1263",
          "https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/HMAC#3043",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/validation/validation-list/aes#4646",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/validation/validation-list/tdes#2439",
          "https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/ECDSA#1127",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/validation/validation-list/drbg#1536",
          "https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/HMAC#3042",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/validation/validation-list/drbg#1538",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/validation/validation-list/aes#4595",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/validation/validation-list/drbg#1553",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/validation/validation-list/tdes#2455",
          "https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/Component#1493",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/validation/validation-list/shs#3788",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/validation/validation-list/shs#3769",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/validation/validation-list/drbg#1531",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/validation/validation-list/drbg#1540",
          "http://csrc.nist.gov/groups/STM/cmvp/standards.html",
          "https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/Component#1276",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/validation/validation-list/drbg#1535",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/validation/validation-list/drbg#1552",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/validation/validation-list/shs#3789",
          "https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/HMAC#3060",
          "https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/HMAC#3045",
          "https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/HMAC#3059",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/validation/validation-list/aes#4647",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/validation/validation-list/aes#4622",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/validation/validation-list/aes#4645",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/validation/validation-list/aes#4623",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/validation/validation-list/shs#3771",
          "http://csrc.nist.gov/publications/PubsFIPS.html",
          "https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/RSA#2519",
          "https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/HMAC#3044",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/validation/validation-list/drbg#1537",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/validation/validation-list/shs#3770",
          "https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/Component#1492",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/validation/validation-list/aes#4594"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 19
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_garbage": false,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_pdf_hash": "76a596ed01f4381202b655b2990a00341e2b12dd7ed5e7147c539855727ec141",
    "policy_txt_hash": "c9b0b81cb6fb1a9fb381187470d8e52696696d0b0b2e6155f9a9fc671306b4c4"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode with module SUSE Linux Enterprise Server 12 - OpenSSL Module validated to FIPS 140-2 under Cert. #2435 [1] operating in FIPS mode or with SUSE Linux Enterprise Server OpenSSL Module validated to FIPS 140-2 under Cert. #3038 [2] operating in FIPS mode.",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertNov2015.pdf",
    "date_sunset": null,
    "description": "SUSE client software that provides encrypted network communication using the SSH protocol.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Physical Security: N/A",
      "Mitigation of Other Attacks: N/A"
    ],
    "fw_versions": null,
    "historical_reason": "Moved to historical list due to sunsetting",
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {
      "2435": 1,
      "3038": 1
    },
    "module_name": "SUSE Linux Enterprise Server 12 - OpenSSH Client Module",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": "1.0 [1] and 2.0 [2]",
    "tested_conf": [
      "SUSE Linux Enterprise Server 12 running on HP ProLiant DL320e Gen8 with AES-NI[1]",
      "SUSE Linux Enterprise Server 12 running on HP ProLiant DL320e Gen8 without AES-NI[1]",
      "SUSE Linux Enterprise Server 12 SP2 running on FUJITSU Server PRIMERGY CX2570 M2 inside a CX400 M1 enclosure with AES-NI[2]",
      "SUSE Linux Enterprise Server 12 SP2 running on FUJITSU Server PRIMERGY CX2570 M2 inside a CX400 M1 enclosure without AES-NI[2]",
      "SUSE Linux Enterprise Server 12 SP2 running on IBM z13[2] (single-user mode)"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2015-11-13",
        "lab": "atsec information security corporation",
        "validation_type": "Initial"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2018-01-02",
        "lab": "atsec information security corporation",
        "validation_type": "Update"
      }
    ],
    "vendor": "SUSE, LLC",
    "vendor_url": "http://www.suse.com"
  }
}