This page was not yet optimized for use on mobile
devices.
Acme Packet VME
Certificate #3491
Webpage information
Security policy
Symmetric Algorithms
AES, AES-256, AES128, AES256, AES-128, AES-, Rijndael, DES, Triple-DES, TDEA, HMAC, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512Asymmetric Algorithms
RSA 2048, ECDH, ECDSA, Diffie-Hellman, DH, DHE, DSAHash functions
SHA-1, SHA-256, SHA-384, SHA-512, SHA384, MD5Schemes
Key Exchange, Key agreementProtocols
SSH, TLS, TLSv1.2, IKEv1, IKEv2, IKE, IPsecRandomness
DRBGElliptic Curves
P-256, P-384Block cipher modes
ECB, CBC, CTR, GCMTLS cipher suites
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256Security level
Level 1, level 1Standards
FIPS 140-2, FIPS 140, FIPS PUB 140-2, FIPS186-2, FIPS186-4, FIPS PUB 197, FIPS PUB 198-1, FIPS PUB 186-4, FIPS PUB 180-4, NIST SP 800-90A, SP 800-90a, NIST SP 800-135, SP 800-133, SP 800-90A, NIST SP 800-67, NIST SP 800-131A, PKCS1, PKCS#1, RFC 4251, RFC 5246, RFC 5288File metadata
| Author | chris brych |
|---|---|
| Creation date | D:20191127151605-05'00' |
| Modification date | D:20191127151605-05'00' |
| Pages | 34 |
| Creator | Microsoft® Word for Office 365 |
| Producer | Microsoft® Word for Office 365 |
Heuristics
No heuristics are available for this certificate.
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 3491,
"dgst": "625bcac215cfcfd0",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"CVL#C142",
"RSA#C144",
"HMAC#C142",
"SHS#C144",
"CVL#C144",
"AES#C144",
"RSA#C142",
"Triple-DES#C142",
"SHS#C142",
"DRBG#C144",
"HMAC#C144",
"AES#C142",
"KTS#C144",
"Triple-DES#C144",
"ECDSA#C144"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDH": {
"ECDH": 8
},
"ECDSA": {
"ECDSA": 8
}
},
"FF": {
"DH": {
"DH": 8,
"DHE": 1,
"Diffie-Hellman": 21
},
"DSA": {
"DSA": 1
}
},
"RSA": {
"RSA 2048": 3
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 6
},
"CTR": {
"CTR": 6
},
"ECB": {
"ECB": 1
},
"GCM": {
"GCM": 5
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 17,
"IKEv1": 2,
"IKEv2": 5
},
"IPsec": {
"IPsec": 7
},
"SSH": {
"SSH": 33
},
"TLS": {
"TLS": {
"TLS": 43,
"TLSv1.2": 1
}
}
},
"crypto_scheme": {
"KA": {
"Key agreement": 1
},
"KEX": {
"Key Exchange": 1
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 2,
"P-384": 4
}
},
"eval_facility": {
"Acumen": {
"Acumen Security": 1
}
},
"fips_cert_id": {},
"fips_certlike": {
"Certlike": {
"# C142": 2,
"# C144": 2,
"AES 128": 2,
"AES- 128": 4,
"AES- 256": 3,
"AES-128": 15,
"AES-256": 8,
"AES128": 6,
"AES256": 6,
"DES1": 1,
"DES2": 1,
"HMAC- SHA384": 1,
"HMAC-SHA-1": 10,
"HMAC-SHA-256": 18,
"HMAC-SHA-384": 8,
"HMAC-SHA-512": 20,
"HMAC-SHA1": 2,
"HMAC-SHA256": 4,
"HMAC-SHA384": 2,
"HMAC-SHA512": 2,
"PKCS#1": 4,
"PKCS1": 2,
"RSA 2048": 3,
"SHA (1": 2,
"SHA (256": 2,
"SHA(1": 6,
"SHA-1": 6,
"SHA-256": 9,
"SHA-384": 4,
"SHA-512": 4,
"SHA384": 1
}
},
"fips_security_level": {
"Level": {
"Level 1": 5,
"level 1": 1
}
},
"hash_function": {
"MD": {
"MD5": {
"MD5": 6
}
},
"SHA": {
"SHA1": {
"SHA-1": 6
},
"SHA2": {
"SHA-256": 9,
"SHA-384": 4,
"SHA-512": 4,
"SHA384": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 19
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140": 3,
"FIPS 140-2": 28,
"FIPS PUB 140-2": 9,
"FIPS PUB 180-4": 1,
"FIPS PUB 186-4": 1,
"FIPS PUB 197": 1,
"FIPS PUB 198-1": 1,
"FIPS186-2": 2,
"FIPS186-4": 1
},
"NIST": {
"NIST SP 800-131A": 1,
"NIST SP 800-135": 11,
"NIST SP 800-67": 1,
"NIST SP 800-90A": 2,
"SP 800-133": 1,
"SP 800-90A": 7,
"SP 800-90a": 4
},
"PKCS": {
"PKCS#1": 2,
"PKCS1": 1
},
"RFC": {
"RFC 4251": 1,
"RFC 5246": 2,
"RFC 5288": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 22,
"AES-": 7,
"AES-128": 15,
"AES-256": 8,
"AES128": 6,
"AES256": 6
},
"Rijndael": {
"Rijndael": 1
}
},
"DES": {
"3DES": {
"TDEA": 1,
"Triple-DES": 14
},
"DES": {
"DES": 4
}
},
"constructions": {
"MAC": {
"HMAC": 9,
"HMAC-SHA-256": 9,
"HMAC-SHA-384": 4,
"HMAC-SHA-512": 10
}
}
},
"tee_name": {},
"tls_cipher_suite": {
"TLS": {
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA256": 1,
"TLS_DHE_RSA_WITH_AES_128_GCM_SHA256": 1,
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA256": 1,
"TLS_DHE_RSA_WITH_AES_256_GCM_SHA384": 1,
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": 1,
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 1,
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256": 1,
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": 1,
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384": 1,
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384": 1
}
},
"vendor": {},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "chris brych",
"/CreationDate": "D:20191127151605-05\u002700\u0027",
"/Creator": "Microsoft\u00ae Word for Office 365",
"/ModDate": "D:20191127151605-05\u002700\u0027",
"/Producer": "Microsoft\u00ae Word for Office 365",
"pdf_file_size_bytes": 568981,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=10503",
"http://csrc.nist.gov/groups/STM/cmvp/index.html",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=10505",
"https://www.oracle.com/industries/communications/enterprise/products/session-border-controller/index.html"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 34
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "69e3d76e788a36bff3df97849ad51e361db3fef9907c230cdb754b05048a9126",
"policy_txt_hash": "a522d48a331883d3dda1ae2a5e1092d331c41c92684e6a43288c2d5207b15bab"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When installed, initialized and configured as specified in the Security Policy Section 8 and operated in FIPS mode",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/JulyConsolidated.pdf",
"date_sunset": null,
"description": "The Acme Packet VME appliance are specifically designed to meet the unique price performance and manageability requirements of the small to medium sized enterprise and remote office/ branch office. Ideal for small site border control and Session Initiation Protocol (SIP) trunking service termination applications, the Acme Packet VME appliance delivers Oracle\u2019s industry leading ESBC capabilities in a small form factor appliance.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Roles, Services, and Authentication: Level 2",
"Physical Security: N/A",
"Design Assurance: Level 3",
"Mitigation of Other Attacks: N/A"
],
"fw_versions": null,
"historical_reason": "SP 800-56Arev3 transition",
"hw_versions": null,
"level": 1,
"mentioned_certs": {},
"module_name": "Acme Packet VME",
"module_type": "Software",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": "S-Cz8.2.0 and S-Cz8.2.0p5",
"tested_conf": [
"Oracle Linux 7 on VMware ESXi 6.5 running on a Oracle Server X7-2 with Intel Xeon Gold 6140 without PAA (single-user mode)"
],
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2019-07-15",
"lab": "Acumen Security",
"validation_type": "Initial"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2019-12-09",
"lab": "Acumen Security",
"validation_type": "Update"
}
],
"vendor": "Oracle Communications",
"vendor_url": "http://www.oracle.com"
}
}