SUSE Rancher Kubernetes Cryptographic Library

Certificate #4578

Webpage information ?

Status historical
Historical reason Moved to historical list due to sunsetting
Validation dates 01.09.2023
Standard FIPS 140-2
Security level 1
Type Software
Embodiment Multi-Chip Stand Alone
Caveat When installed, initialized and configured as specified in Section 9.1 of the Security Policy and operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy.
Exceptions
  • Physical Security: N/A
  • Mitigation of Other Attacks: N/A
Description A software library that contains cryptography to serve SUSE’s Rancher Kubernetes Engine and its ecosystem of supported cloud-native tools written in the Go programming language.
Tested configurations
  • CentOS 7.8 running on Dell PowerEdge R440 with Intel® Xeon® Silver 4214R with PAA (clang 6.0.1)
  • CentOS 7.8 running on Dell PowerEdge R440 with Intel® Xeon® Silver 4214R without PAA (clang 6.0.1)
  • CentOS 8.2 running on Dell PowerEdge R440 with Intel® Xeon® Silver 4214R with PAA (clang 6.0.1)
  • CentOS 8.2 running on Dell PowerEdge R440 with Intel® Xeon® Silver 4214R without PAA (clang 6.0.1)
  • Red Hat Enterprise Linux 7.8 running on Dell PowerEdge R440 with Intel® Xeon® Silver 4214R with PAA (clang 6.0.1)
  • Red Hat Enterprise Linux 7.8 running on Dell PowerEdge R440 with Intel® Xeon® Silver 4214R without PAA (clang 6.0.1)
  • Red Hat Enterprise Linux 8.2 running on Dell PowerEdge R440 with Intel® Xeon® Silver 4214R with PAA (clang 6.0.1)
  • Red Hat Enterprise Linux 8.2 running on Dell PowerEdge R440 with Intel® Xeon® Silver 4214R without PAA (clang 6.0.1) (single-user mode)
Vendor SUSE LLC
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy ?

Symmetric Algorithms
AES, AES-256, DES, TDEA, Triple-DES, HMAC, HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512
Asymmetric Algorithms
ECDSA, ECC, DH, Diffie-Hellman
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, MD4, MD5
Schemes
Key Agreement
Protocols
TLS
Randomness
DRBG
Libraries
BoringSSL
Elliptic Curves
P-224, P-256, P-384, P-521
Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM

Security level
Level 1

Standards
FIPS 140-2, FIPS 180-4, FIPS 186-4, FIPS 197, FIPS 198-1, SP 800-38A, NIST SP 800-38A, SP 800-38D, NIST SP 800-38D, SP 800-38F, NIST SP 800-38F, SP 800-56A, NIST SP 800-56A, SP 800-56B, NIST SP 800-56B, SP 800-57, NIST SP 800-57, SP 800-67, NIST SP 800-67, SP 800-90A, NIST SP 800-90A, SP 800-131A, NIST SP 800-131A, SP 800-133, NIST SP 800-133, SP 800-135, NIST SP 800-135, RFC 5288, RFC 5246

File metadata

Author Rachel Shelby
Creation date D:20230209211224-08'00'
Modification date D:20230209211224-08'00'
Pages 16
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

References

Outgoing
  • 500 - historical - BlackBerry® Cryptographic Kernel

Heuristics ?

No heuristics are available for this certificate.

References ?

Updates ?

  • 01.11.2023 The certificate data changed.
    Certificate changed

    The web extraction data was updated.

    • The certificate_pdf_url property was set to https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/September 2023_101023_1100 signed (2).pdf.
    • The status property was set to historical.
    • The historical_reason property was set to Moved to historical list due to sunsetting.
    • The date_sunset property was set to None.
  • 18.09.2023 The certificate was first processed.
    New certificate

    A new FIPS 140 certificate with the product name was processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 4578,
  "dgst": "243b8a8b497f3126",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "RSA#A865",
        "SHS#A865",
        "Triple-DES#A865",
        "KTS#A865",
        "AES#A865",
        "ECDSA#A865",
        "HMAC#A865",
        "CVL#A865",
        "DRBG#A865"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "500"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "500"
        ]
      }
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": [
        "500"
      ]
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 2
          },
          "ECDSA": {
            "ECDSA": 18
          }
        },
        "FF": {
          "DH": {
            "DH": 1,
            "Diffie-Hellman": 3
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        },
        "CFB": {
          "CFB": 3
        },
        "CTR": {
          "CTR": 1
        },
        "ECB": {
          "ECB": 1
        },
        "GCM": {
          "GCM": 3
        },
        "OFB": {
          "OFB": 3
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "BoringSSL": {
          "BoringSSL": 3
        }
      },
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 5
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 4
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-224": 2,
          "P-256": 4,
          "P-384": 2,
          "P-521": 2
        }
      },
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "#500": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "AES-256": 1,
          "DRBG 7": 1,
          "HMAC-SHA-1": 4,
          "HMAC-SHA-224": 2,
          "HMAC-SHA-256": 2,
          "HMAC-SHA-384": 2,
          "HMAC-SHA-512": 6,
          "SHA-1": 2,
          "SHA-224": 1,
          "SHA-256": 3,
          "SHA-384": 1,
          "SHA-512": 2
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 2
        }
      },
      "hash_function": {
        "MD": {
          "MD4": {
            "MD4": 2
          },
          "MD5": {
            "MD5": 3
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 2
          },
          "SHA2": {
            "SHA-224": 1,
            "SHA-256": 3,
            "SHA-384": 1,
            "SHA-512": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 8
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 20,
          "FIPS 180-4": 3,
          "FIPS 186-4": 4,
          "FIPS 197": 3,
          "FIPS 198-1": 3
        },
        "NIST": {
          "NIST SP 800-131A": 1,
          "NIST SP 800-133": 1,
          "NIST SP 800-135": 1,
          "NIST SP 800-38A": 1,
          "NIST SP 800-38D": 1,
          "NIST SP 800-38F": 1,
          "NIST SP 800-56A": 1,
          "NIST SP 800-56B": 1,
          "NIST SP 800-57": 1,
          "NIST SP 800-67": 1,
          "NIST SP 800-90A": 1,
          "SP 800-131A": 2,
          "SP 800-133": 3,
          "SP 800-135": 3,
          "SP 800-38A": 3,
          "SP 800-38D": 3,
          "SP 800-38F": 2,
          "SP 800-56A": 5,
          "SP 800-56B": 3,
          "SP 800-57": 1,
          "SP 800-67": 2,
          "SP 800-90A": 5
        },
        "RFC": {
          "RFC 5246": 1,
          "RFC 5288": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 18,
            "AES-256": 1
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "Triple-DES": 11
          },
          "DES": {
            "DES": 2
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 6,
            "HMAC-SHA-224": 1,
            "HMAC-SHA-256": 1,
            "HMAC-SHA-384": 1,
            "HMAC-SHA-512": 3
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "Rachel Shelby",
      "/CreationDate": "D:20230209211224-08\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/ModDate": "D:20230209211224-08\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "pdf_file_size_bytes": 557566,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf",
          "https://csrc.nist.gov/CSRC/media/Publications/fips/140/2/final/documents/fips1402annexc.pdf",
          "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Br2.pdf",
          "http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.140-2.pdf",
          "https://csrc.nist.gov/CSRC/media/Projects/Cryptographic-Module-Validation-Program/documents/fips140-2/FIPS1402IG.pdf",
          "https://csrc.nist.gov/publications/detail/sp/800-135/rev-1/final",
          "http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf",
          "http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38a.pdf",
          "http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-38F.pdf",
          "http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90Ar1.pdf",
          "https://csrc.nist.gov/CSRC/media/Publications/fips/140/2/final/documents/fips1402annexa.pdf",
          "https://csrc.nist.gov/publications/detail/sp/800-67/rev-2/final",
          "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-133r2.pdf",
          "http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.198-1.pdf",
          "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar2.pdf",
          "https://csrc.nist.gov/CSRC/media/Projects/Cryptographic-Module-Validation-Program/documents/fips140-2/FIPS1402DTR.pdf",
          "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf",
          "https://csrc.nist.gov/publications/detail/sp/800-38d/final",
          "http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf",
          "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Ar3.pdf",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=33463",
          "https://csrc.nist.gov/CSRC/media/Publications/fips/140/2/final/documents/fips1402annexd.pdf"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 16
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_garbage": false,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_pdf_hash": "1b5dd868489ad70514ec56373749c6eaf9f7219124698f67db2e36f59a49beba",
    "policy_txt_hash": "b50e7f115756a14da1245b7311feb6a80b587a2c7da5caf8e84247fd8f4fb1ed"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When installed, initialized and configured as specified in Section 9.1 of the Security Policy and operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy.",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/September 2023_101023_1100 signed (2).pdf",
    "date_sunset": null,
    "description": "A software library that contains cryptography to serve SUSE\u2019s Rancher Kubernetes Engine and its ecosystem of supported cloud-native tools written in the Go programming language.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Physical Security: N/A",
      "Mitigation of Other Attacks: N/A"
    ],
    "fw_versions": null,
    "historical_reason": "Moved to historical list due to sunsetting",
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {},
    "module_name": "SUSE Rancher Kubernetes Cryptographic Library",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": "66005f41fbc3529ffe8d007708756720529da20d",
    "tested_conf": [
      "CentOS 7.8 running on Dell PowerEdge R440 with Intel\u00ae Xeon\u00ae Silver 4214R with PAA (clang 6.0.1)",
      "CentOS 7.8 running on Dell PowerEdge R440 with Intel\u00ae Xeon\u00ae Silver 4214R without PAA (clang 6.0.1)",
      "CentOS 8.2 running on Dell PowerEdge R440 with Intel\u00ae Xeon\u00ae Silver 4214R with PAA (clang 6.0.1)",
      "CentOS 8.2 running on Dell PowerEdge R440 with Intel\u00ae Xeon\u00ae Silver 4214R without PAA (clang 6.0.1)",
      "Red Hat Enterprise Linux 7.8 running on Dell PowerEdge R440 with Intel\u00ae Xeon\u00ae Silver 4214R with PAA (clang 6.0.1)",
      "Red Hat Enterprise Linux 7.8 running on Dell PowerEdge R440 with Intel\u00ae Xeon\u00ae Silver 4214R without PAA (clang 6.0.1)",
      "Red Hat Enterprise Linux 8.2 running on Dell PowerEdge R440 with Intel\u00ae Xeon\u00ae Silver 4214R with PAA (clang 6.0.1)",
      "Red Hat Enterprise Linux 8.2 running on Dell PowerEdge R440 with Intel\u00ae Xeon\u00ae Silver 4214R without PAA (clang 6.0.1) (single-user mode)"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2023-09-01",
        "lab": "ACUMEN SECURITY, LLC",
        "validation_type": "Initial"
      }
    ],
    "vendor": "SUSE LLC",
    "vendor_url": "https://www.suse.com"
  }
}