Network Security Services (NSS) Cryptographic Module

Certificate #1280

Webpage information

Status historical
Historical reason Moved to historical list due to sunsetting
Validation dates 29.03.2010
Standard FIPS 140-2
Security level 2
Type Software
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS mode
Description Network Security Services (NSS) is a set of open source C libraries designed to support cross-platform development of security-enabled applications. NSS implements major crypto algorithms and Internet security standards, and supports smartcards and hardware crypto devices. NSS is available free of charge under the Mozilla Public License, the GNU General Public License, and the GNU Lesser General Public License. For more information, see http://www.mozilla.org/projects/security/pki/nss/
Tested configurations
  • Red Hat Enterprise Linux v5 running on an HP ProLiant DL145
  • Red Hat Enterprise Linux v5 running on an IBM System x3550
Vendor Sun Microsystems, Inc., Red Hat®, Inc. and Mozilla Foundation, Inc.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, RC2, RC4, DES, Triple-DES, SEED, HMAC
Asymmetric Algorithms
ECC, Diffie-Hellman, DSA
Hash functions
SHA-1, SHA-256, SHA-384, SHA-512, MD5, PBKDF1
Schemes
MAC
Protocols
TLS
Randomness
DRBG
Libraries
NSS
Block cipher modes
ECB, CBC

Security level
Level 2
Side-channel analysis
Timing attacks, Timing attack, timing attacks, Timing Attacks

Standards
FIPS 140-2, FIPS PUB 140-2, FIPS 46-3, FIPS 197, FIPS 180-2, FIPS 198, FIPS 186-2, SP 800-90, NIST SP 800-90, PKCS #11, PKCS #1, PKCS #5

File metadata

Title Security Policy - MozillaWiki
Keywords Security Policy
Creation date D:20100208113518-08'00'
Modification date D:20100208150818-05'00'
Pages 32
Creator Writer
Producer OpenOffice.org 3.1

Heuristics

No heuristics are available for this certificate.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 1280,
  "dgst": "6f13d39f5c466596",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "AES#1126",
        "HMAC#636",
        "DRBG#16",
        "RSA#533",
        "SHS#1048",
        "DSA#366",
        "Triple-DES#821"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 3
          },
          "DSA": {
            "DSA": 12
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        },
        "ECB": {
          "ECB": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "NSS": {
          "NSS": 103
        }
      },
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 9
          }
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "#1": 2,
          "#11": 16,
          "#5": 2
        }
      },
      "fips_certlike": {
        "Certlike": {
          "AES 1126": 1,
          "DES 821": 1,
          "DRBG 16": 1,
          "DSA 366": 1,
          "HMAC 636": 2,
          "HMAC-SHA256": 2,
          "HMAC-SHA348": 2,
          "HMAC-SHA512": 2,
          "PKCS #1": 4,
          "PKCS #11": 30,
          "PKCS #5": 4,
          "RSA 533": 1,
          "SHA-1": 5,
          "SHA-256": 6,
          "SHA-384": 4,
          "SHA-386": 1,
          "SHA-512": 5,
          "SHS 1048": 1
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 2": 5
        }
      },
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 1
          }
        },
        "PBKDF": {
          "PBKDF1": 1
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 6
          },
          "SHA2": {
            "SHA-256": 6,
            "SHA-384": 4,
            "SHA-512": 5
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 8
        }
      },
      "side_channel_analysis": {
        "SCA": {
          "Timing Attacks": 2,
          "Timing attack": 1,
          "Timing attacks": 1,
          "timing attacks": 1
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 11,
          "FIPS 180-2": 1,
          "FIPS 186-2": 1,
          "FIPS 197": 1,
          "FIPS 198": 1,
          "FIPS 46-3": 1,
          "FIPS PUB 140-2": 1
        },
        "NIST": {
          "NIST SP 800-90": 1,
          "SP 800-90": 1
        },
        "PKCS": {
          "PKCS #1": 2,
          "PKCS #11": 15,
          "PKCS #5": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 6
          },
          "RC": {
            "RC2": 1,
            "RC4": 1
          }
        },
        "DES": {
          "3DES": {
            "Triple-DES": 5
          },
          "DES": {
            "DES": 5
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 9
          }
        },
        "miscellaneous": {
          "SEED": {
            "SEED": 1
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/CreationDate": "D:20100208113518-08\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "Security Policy",
      "/ModDate": "D:20100208150818-05\u002700\u0027",
      "/Producer": "OpenOffice.org 3.1",
      "/Title": "Security Policy - MozillaWiki",
      "pdf_file_size_bytes": 347031,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.rsasecurity.com/rsalabs/node.asp?id=2133",
          "http://www.redhat.com/solutions/government/commoncriteria/",
          "http://www.daemonology.net/papers/htt.pdf",
          "http://crypto.stanford.edu/~dabo/abstracts/ssl-timing.html",
          "http://www.cryptography.com/timingattack/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 32
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "523c6cd4d206e8d0009c57f879c86b0aa2c88f16dec520b05f601b249048312e",
    "policy_txt_hash": "348b7ae0bb6416130a2c8e1eb21db4192fe6937d80106df9bcca449977898f1c"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/140crt1280.pdf",
    "date_sunset": null,
    "description": "Network Security Services (NSS) is a set of open source C libraries designed to support cross-platform development of security-enabled applications. NSS implements major crypto algorithms and Internet security standards, and supports smartcards and hardware crypto devices. NSS is available free of charge under the Mozilla Public License, the GNU General Public License, and the GNU Lesser General Public License. For more information, see http://www.mozilla.org/projects/security/pki/nss/",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": null,
    "fw_versions": null,
    "historical_reason": "Moved to historical list due to sunsetting",
    "hw_versions": null,
    "level": 2,
    "mentioned_certs": {},
    "module_name": "Network Security Services (NSS) Cryptographic Module",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": "3.12.4",
    "tested_conf": [
      "Red Hat Enterprise Linux v5 running on an HP ProLiant DL145",
      "Red Hat Enterprise Linux v5 running on an IBM System x3550"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2010-03-29",
        "lab": "SAIC-VA",
        "validation_type": "Initial"
      }
    ],
    "vendor": "Sun Microsystems, Inc., Red Hat\u00ae, Inc. and Mozilla Foundation, Inc.",
    "vendor_url": "http://wiki.mozilla.org/FIPS_Validation"
  }
}