Trellix OpenSSL FIPS Object Module

Certificate #2969

Webpage information

Status active
Validation dates 25.07.2017 , 16.11.2017 , 28.07.2021 , 11.07.2022 , 20.07.2022
Sunset date 21-09-2026
Standard FIPS 140-2
Security level 1
Type Software
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS mode. When built, installed, protected and initialized as assumed by the Crypto Officer role and as specified in the provided Security Policy. Appendix A of the provided Security Policy specifies the actual distribution tar file containing the source code of this module. There shall be no additions, deletions or alterations to the tar file contents as used during module build. The distribution tar file shall be verified as specified in Appendix A of the provided Security Policy. Installation and protection shall be completed as specified in Appendix A of the provided Security Policy. Initialization shall be invoked as per Section 4 of the provided Security Policy. Any deviation from specified verification, protection, installation and initialization procedures will result in a non FIPS 140-2 compliant module. The module generates cryptographic keys whose strengths are modified by available entropy. No assurance of the minimum strength of generated keys.
Exceptions
  • Roles, Services, and Authentication: Level 2
  • Physical Security: N/A
  • Design Assurance: Level 3
  • Mitigation of Other Attacks: N/A
Description The Trellix OpenSSL FIPS module provides cryptographic services for Trellix products.
Tested configurations
  • Darwin 10.15.7 (MacOS) on ESXi 6.7.0 running on MacBook Pro 13 with Intel® Xeon® CPU E5-1680 with PAA (clang-1200.0.32.29)
  • Darwin 10.15.7 (MacOS) on ESXi 6.7.0 running on MacBook Pro 13 with Intel® Xeon® CPU E5-1680 without PAA (clang-1200.0.32.29)
  • McAfee Linux Operating System v3.8.0 running on Dell PowerEdge 610 with Intel® Xeon® CPU X5560 with PAA (gcc 4.8.5)
  • SUSE Enterprise 12 SP3 on Vmware ESXi 6.7.0 running on Intel Taylor Pass 2U Xeon DP Quad Board Server with Intel® Xeon® CPU E5-2699 with PAA (gcc 7.5.0)
  • Ubuntu Server 16.04 on Vmware ESXi 6.7.0 running on Intel Taylor Pass 2U Xeon DP Quad Board Server with Intel® Xeon® CPU E5-2699 with PAA (gcc 10.2.0)
  • Windows 10 32-bit on Vmware ESXi 6.7.0 running on Intel Taylor Pass 2U Xeon DP Quad Board Server with Intel® Xeon® CPU E5-2699 without PAA (Microsoft Visual Studio Professional 2017 15.8.5)
  • Windows Server 2019 H2 64-bit on Vmware ESXi 6.7.0 running on Intel Taylor Pass 2U Xeon DP Quad Board Server with Intel® Xeon® CPU E5-2699 without PAA (Microsoft Visual Studio Professional 2017 15.8.5) (single-user mode)
Vendor Trellix
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, TDEA, Triple-DES, HMAC, CMAC
Asymmetric Algorithms
ECDSA, ECC, DH, Diffie-Hellman, DSA
Hash functions
SHA-1, SHA1, SHA-256, SHA-224, SHA224, SHA256, SHA384, SHA512, SHA-384, SHA-2
Schemes
Key agreement
Protocols
TLS 1.2
Randomness
DRBG
Libraries
OpenSSL
Elliptic Curves
P-224, P-384, P-256, P-521, P-192, K-233, K-409, B-233, B-409, B-163, B-283
Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM, XTS

Vendor
Microsoft

Standards
FIPS 140-2, FIPS 180-4, FIPS 186-4, FIPS 197, FIPS 198-1, FIPS 198, FIPS 186-2, SP 800-38A, SP 800-38B, SP 800-38C, SP 800-38D, SP 800-56A, SP 800-67, SP 800-89, SP 800-90A, SP 800-131A, SP 800-90, SP 800-56B, SP 800-38E, SP 800-52, PKCS#1, RFC5288

File metadata

Author Ryan Thomas
Creation date D:20220623133751-07'00'
Modification date D:20220623133751-07'00'
Pages 22
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

Heuristics

No heuristics are available for this certificate.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 2969,
  "dgst": "27e928d476f169e6",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "AES#A2624",
        "DRBG#A2624",
        "HMAC#A2624",
        "RSA#A2624",
        "DSA#A2624",
        "KAS-SSC#A2624",
        "SHS#A2624",
        "ECDSA#A2624"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 3
          },
          "ECDSA": {
            "ECDSA": 16
          }
        },
        "FF": {
          "DH": {
            "DH": 4,
            "Diffie-Hellman": 2
          },
          "DSA": {
            "DSA": 16
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        },
        "CCM": {
          "CCM": 4
        },
        "CFB": {
          "CFB": 3
        },
        "CTR": {
          "CTR": 2
        },
        "ECB": {
          "ECB": 3
        },
        "GCM": {
          "GCM": 8
        },
        "OFB": {
          "OFB": 1
        },
        "XTS": {
          "XTS": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 6
        }
      },
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS 1.2": 1
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key agreement": 1
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "B-163": 3,
          "B-233": 1,
          "B-283": 1,
          "B-409": 1,
          "K-233": 4,
          "K-409": 2,
          "P-192": 6,
          "P-224": 6,
          "P-256": 4,
          "P-384": 2,
          "P-521": 4
        }
      },
      "eval_facility": {
        "Acumen": {
          "Acumen Security": 1
        }
      },
      "fips_cert_id": {},
      "fips_certlike": {
        "Certlike": {
          "AES 128/192/256": 1,
          "HMAC SHA-1": 1,
          "HMAC-SHA-1": 10,
          "HMAC-SHA1": 4,
          "PAA 2": 1,
          "PAA 3": 1,
          "PAA 4": 1,
          "PAA 5": 1,
          "PAA 6": 1,
          "PAA 7": 1,
          "PKCS#1": 2,
          "SHA- 1, 224": 7,
          "SHA- 1, 256": 1,
          "SHA-1": 23,
          "SHA-1, 224": 38,
          "SHA-1, 256": 1,
          "SHA-2": 1,
          "SHA-2 (224": 2,
          "SHA-224": 4,
          "SHA-256": 10,
          "SHA-384": 1,
          "SHA1": 1,
          "SHA224": 1,
          "SHA256": 3,
          "SHA384": 1,
          "SHA512": 2
        }
      },
      "fips_security_level": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 62,
            "SHA1": 1
          },
          "SHA2": {
            "SHA-2": 3,
            "SHA-224": 4,
            "SHA-256": 10,
            "SHA-384": 1,
            "SHA224": 1,
            "SHA256": 3,
            "SHA384": 1,
            "SHA512": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 17
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 10,
          "FIPS 180-4": 2,
          "FIPS 186-2": 3,
          "FIPS 186-4": 9,
          "FIPS 197": 2,
          "FIPS 198": 1,
          "FIPS 198-1": 1
        },
        "NIST": {
          "SP 800-131A": 2,
          "SP 800-38A": 2,
          "SP 800-38B": 2,
          "SP 800-38C": 2,
          "SP 800-38D": 2,
          "SP 800-38E": 1,
          "SP 800-52": 1,
          "SP 800-56A": 4,
          "SP 800-56B": 1,
          "SP 800-67": 2,
          "SP 800-89": 1,
          "SP 800-90": 2,
          "SP 800-90A": 3
        },
        "PKCS": {
          "PKCS#1": 1
        },
        "RFC": {
          "RFC5288": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 19
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "Triple-DES": 4
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 11,
            "HMAC": 7
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 3
        }
      },
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "Ryan Thomas",
      "/CreationDate": "D:20220623133751-07\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/ModDate": "D:20220623133751-07\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "pdf_file_size_bytes": 537657,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://openssl.org/",
          "http://www.acumensecurity.net/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 22
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "f97d1cfcf39d26fcd4af2f4d1fb37c9d129fbb38c2433a5aa758240fff29a3c1",
    "policy_txt_hash": "208d3800638171b7eda479128ffe40d440fb0b498b0cbab99e1adb42d50e13a9"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode. When built, installed, protected and initialized as assumed by the Crypto Officer role and as specified in the provided Security Policy. Appendix A of the provided Security Policy specifies the actual distribution tar file containing the source code of this module. There shall be no additions, deletions or alterations to the tar file contents as used during module build. The distribution tar file shall be verified as specified in Appendix A of the provided Security Policy. Installation and protection shall be completed as specified in Appendix A of the provided Security Policy. Initialization shall be invoked as per Section 4 of the provided Security Policy. Any deviation from specified verification, protection, installation and initialization procedures will result in a non FIPS 140-2 compliant module. The module generates cryptographic keys whose strengths are modified by available entropy. No assurance of the minimum strength of generated keys.",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertJuly2017.pdf",
    "date_sunset": "2026-09-21",
    "description": "The Trellix OpenSSL FIPS module provides cryptographic services for Trellix products.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Roles, Services, and Authentication: Level 2",
      "Physical Security: N/A",
      "Design Assurance: Level 3",
      "Mitigation of Other Attacks: N/A"
    ],
    "fw_versions": null,
    "historical_reason": null,
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {},
    "module_name": "Trellix OpenSSL FIPS Object Module",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "active",
    "sw_versions": "1.0.3",
    "tested_conf": [
      "Darwin 10.15.7 (MacOS) on ESXi 6.7.0 running on MacBook Pro 13 with Intel\u00ae Xeon\u00ae CPU E5-1680 with PAA (clang-1200.0.32.29)",
      "Darwin 10.15.7 (MacOS) on ESXi 6.7.0 running on MacBook Pro 13 with Intel\u00ae Xeon\u00ae CPU E5-1680 without PAA (clang-1200.0.32.29)",
      "McAfee Linux Operating System v3.8.0 running on Dell PowerEdge 610 with Intel\u00ae Xeon\u00ae CPU X5560 with PAA (gcc 4.8.5)",
      "SUSE Enterprise 12 SP3 on Vmware ESXi 6.7.0 running on Intel Taylor Pass 2U Xeon DP Quad Board Server with Intel\u00ae Xeon\u00ae CPU E5-2699 with PAA (gcc 7.5.0)",
      "Ubuntu Server 16.04 on Vmware ESXi 6.7.0 running on Intel Taylor Pass 2U Xeon DP Quad Board Server with Intel\u00ae Xeon\u00ae CPU E5-2699 with PAA (gcc 10.2.0)",
      "Windows 10 32-bit on Vmware ESXi 6.7.0 running on Intel Taylor Pass 2U Xeon DP Quad Board Server with Intel\u00ae Xeon\u00ae CPU E5-2699 without PAA (Microsoft Visual Studio Professional 2017 15.8.5)",
      "Windows Server 2019 H2 64-bit on Vmware ESXi 6.7.0 running on Intel Taylor Pass 2U Xeon DP Quad Board Server with Intel\u00ae Xeon\u00ae CPU E5-2699 without PAA (Microsoft Visual Studio Professional 2017 15.8.5) (single-user mode)"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2017-07-25",
        "lab": "Acumen Security",
        "validation_type": "Initial"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2017-11-16",
        "lab": "Acumen Security",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2021-07-28",
        "lab": "Acumen Security",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2022-07-11",
        "lab": "Acumen Security",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2022-07-20",
        "lab": "Acumen Security",
        "validation_type": "Update"
      }
    ],
    "vendor": "Trellix",
    "vendor_url": "http://www.trellix.com"
  }
}