This page was not yet optimized for use on mobile
devices.
Trellix OpenSSL FIPS Object Module
Certificate #2969
Webpage information
Security policy
Symmetric Algorithms
AES, TDEA, Triple-DES, HMAC, CMACAsymmetric Algorithms
ECDSA, ECC, DH, Diffie-Hellman, DSAHash functions
SHA-1, SHA1, SHA-256, SHA-224, SHA224, SHA256, SHA384, SHA512, SHA-384, SHA-2Schemes
Key agreementProtocols
TLS 1.2Randomness
DRBGLibraries
OpenSSLElliptic Curves
P-224, P-384, P-256, P-521, P-192, K-233, K-409, B-233, B-409, B-163, B-283Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM, XTSVendor
MicrosoftStandards
FIPS 140-2, FIPS 180-4, FIPS 186-4, FIPS 197, FIPS 198-1, FIPS 198, FIPS 186-2, SP 800-38A, SP 800-38B, SP 800-38C, SP 800-38D, SP 800-56A, SP 800-67, SP 800-89, SP 800-90A, SP 800-131A, SP 800-90, SP 800-56B, SP 800-38E, SP 800-52, PKCS#1, RFC5288File metadata
| Author | Ryan Thomas |
|---|---|
| Creation date | D:20220623133751-07'00' |
| Modification date | D:20220623133751-07'00' |
| Pages | 22 |
| Creator | Microsoft® Word for Microsoft 365 |
| Producer | Microsoft® Word for Microsoft 365 |
Heuristics
No heuristics are available for this certificate.
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 2969,
"dgst": "27e928d476f169e6",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"AES#A2624",
"DRBG#A2624",
"HMAC#A2624",
"RSA#A2624",
"DSA#A2624",
"KAS-SSC#A2624",
"SHS#A2624",
"ECDSA#A2624"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 3
},
"ECDSA": {
"ECDSA": 16
}
},
"FF": {
"DH": {
"DH": 4,
"Diffie-Hellman": 2
},
"DSA": {
"DSA": 16
}
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 3
},
"CCM": {
"CCM": 4
},
"CFB": {
"CFB": 3
},
"CTR": {
"CTR": 2
},
"ECB": {
"ECB": 3
},
"GCM": {
"GCM": 8
},
"OFB": {
"OFB": 1
},
"XTS": {
"XTS": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 6
}
},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS 1.2": 1
}
}
},
"crypto_scheme": {
"KA": {
"Key agreement": 1
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"B-163": 3,
"B-233": 1,
"B-283": 1,
"B-409": 1,
"K-233": 4,
"K-409": 2,
"P-192": 6,
"P-224": 6,
"P-256": 4,
"P-384": 2,
"P-521": 4
}
},
"eval_facility": {
"Acumen": {
"Acumen Security": 1
}
},
"fips_cert_id": {},
"fips_certlike": {
"Certlike": {
"AES 128/192/256": 1,
"HMAC SHA-1": 1,
"HMAC-SHA-1": 10,
"HMAC-SHA1": 4,
"PAA 2": 1,
"PAA 3": 1,
"PAA 4": 1,
"PAA 5": 1,
"PAA 6": 1,
"PAA 7": 1,
"PKCS#1": 2,
"SHA- 1, 224": 7,
"SHA- 1, 256": 1,
"SHA-1": 23,
"SHA-1, 224": 38,
"SHA-1, 256": 1,
"SHA-2": 1,
"SHA-2 (224": 2,
"SHA-224": 4,
"SHA-256": 10,
"SHA-384": 1,
"SHA1": 1,
"SHA224": 1,
"SHA256": 3,
"SHA384": 1,
"SHA512": 2
}
},
"fips_security_level": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 62,
"SHA1": 1
},
"SHA2": {
"SHA-2": 3,
"SHA-224": 4,
"SHA-256": 10,
"SHA-384": 1,
"SHA224": 1,
"SHA256": 3,
"SHA384": 1,
"SHA512": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 17
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 10,
"FIPS 180-4": 2,
"FIPS 186-2": 3,
"FIPS 186-4": 9,
"FIPS 197": 2,
"FIPS 198": 1,
"FIPS 198-1": 1
},
"NIST": {
"SP 800-131A": 2,
"SP 800-38A": 2,
"SP 800-38B": 2,
"SP 800-38C": 2,
"SP 800-38D": 2,
"SP 800-38E": 1,
"SP 800-52": 1,
"SP 800-56A": 4,
"SP 800-56B": 1,
"SP 800-67": 2,
"SP 800-89": 1,
"SP 800-90": 2,
"SP 800-90A": 3
},
"PKCS": {
"PKCS#1": 1
},
"RFC": {
"RFC5288": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 19
}
},
"DES": {
"3DES": {
"TDEA": 1,
"Triple-DES": 4
}
},
"constructions": {
"MAC": {
"CMAC": 11,
"HMAC": 7
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 3
}
},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "Ryan Thomas",
"/CreationDate": "D:20220623133751-07\u002700\u0027",
"/Creator": "Microsoft\u00ae Word for Microsoft 365",
"/ModDate": "D:20220623133751-07\u002700\u0027",
"/Producer": "Microsoft\u00ae Word for Microsoft 365",
"pdf_file_size_bytes": 537657,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://openssl.org/",
"http://www.acumensecurity.net/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 22
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "f97d1cfcf39d26fcd4af2f4d1fb37c9d129fbb38c2433a5aa758240fff29a3c1",
"policy_txt_hash": "208d3800638171b7eda479128ffe40d440fb0b498b0cbab99e1adb42d50e13a9"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated in FIPS mode. When built, installed, protected and initialized as assumed by the Crypto Officer role and as specified in the provided Security Policy. Appendix A of the provided Security Policy specifies the actual distribution tar file containing the source code of this module. There shall be no additions, deletions or alterations to the tar file contents as used during module build. The distribution tar file shall be verified as specified in Appendix A of the provided Security Policy. Installation and protection shall be completed as specified in Appendix A of the provided Security Policy. Initialization shall be invoked as per Section 4 of the provided Security Policy. Any deviation from specified verification, protection, installation and initialization procedures will result in a non FIPS 140-2 compliant module. The module generates cryptographic keys whose strengths are modified by available entropy. No assurance of the minimum strength of generated keys.",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertJuly2017.pdf",
"date_sunset": "2026-09-21",
"description": "The Trellix OpenSSL FIPS module provides cryptographic services for Trellix products.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Roles, Services, and Authentication: Level 2",
"Physical Security: N/A",
"Design Assurance: Level 3",
"Mitigation of Other Attacks: N/A"
],
"fw_versions": null,
"historical_reason": null,
"hw_versions": null,
"level": 1,
"mentioned_certs": {},
"module_name": "Trellix OpenSSL FIPS Object Module",
"module_type": "Software",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "active",
"sw_versions": "1.0.3",
"tested_conf": [
"Darwin 10.15.7 (MacOS) on ESXi 6.7.0 running on MacBook Pro 13 with Intel\u00ae Xeon\u00ae CPU E5-1680 with PAA (clang-1200.0.32.29)",
"Darwin 10.15.7 (MacOS) on ESXi 6.7.0 running on MacBook Pro 13 with Intel\u00ae Xeon\u00ae CPU E5-1680 without PAA (clang-1200.0.32.29)",
"McAfee Linux Operating System v3.8.0 running on Dell PowerEdge 610 with Intel\u00ae Xeon\u00ae CPU X5560 with PAA (gcc 4.8.5)",
"SUSE Enterprise 12 SP3 on Vmware ESXi 6.7.0 running on Intel Taylor Pass 2U Xeon DP Quad Board Server with Intel\u00ae Xeon\u00ae CPU E5-2699 with PAA (gcc 7.5.0)",
"Ubuntu Server 16.04 on Vmware ESXi 6.7.0 running on Intel Taylor Pass 2U Xeon DP Quad Board Server with Intel\u00ae Xeon\u00ae CPU E5-2699 with PAA (gcc 10.2.0)",
"Windows 10 32-bit on Vmware ESXi 6.7.0 running on Intel Taylor Pass 2U Xeon DP Quad Board Server with Intel\u00ae Xeon\u00ae CPU E5-2699 without PAA (Microsoft Visual Studio Professional 2017 15.8.5)",
"Windows Server 2019 H2 64-bit on Vmware ESXi 6.7.0 running on Intel Taylor Pass 2U Xeon DP Quad Board Server with Intel\u00ae Xeon\u00ae CPU E5-2699 without PAA (Microsoft Visual Studio Professional 2017 15.8.5) (single-user mode)"
],
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2017-07-25",
"lab": "Acumen Security",
"validation_type": "Initial"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2017-11-16",
"lab": "Acumen Security",
"validation_type": "Update"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2021-07-28",
"lab": "Acumen Security",
"validation_type": "Update"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2022-07-11",
"lab": "Acumen Security",
"validation_type": "Update"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2022-07-20",
"lab": "Acumen Security",
"validation_type": "Update"
}
],
"vendor": "Trellix",
"vendor_url": "http://www.trellix.com"
}
}