This page was not yet optimized for use on mobile
devices.
Red Hat Enterprise Linux OpenSSH Server Cryptographic Module
Certificate #2630
Webpage information
Security policy
Symmetric Algorithms
AES, DES, TDES, TDEA, HMAC, HMAC-SHA-256, CMACAsymmetric Algorithms
ECDSA, ECC, Diffie-Hellman, DSASchemes
MAC, Key AgreementProtocols
SSH, SSHv2Randomness
DRBG, RNGLibraries
OpenSSLBlock cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM, XTSSecurity level
Level 1Standards
FIPS 140-2, FIPS PUB 140-2, FIPS180-4, FIPS186-4, FIPS197, FIPS198-1, SP 800-135, PKCS#1, RFC3394, RFC5649File metadata
| Title | FIPS 140-2 Non-Proprietary Security Policy |
|---|---|
| Keywords | FIPS 140-2 |
| Author | Alejandro Fabio Masino |
| Creation date | D:20160613102953-05'00' |
| Pages | 21 |
| Creator | Writer |
| Producer | LibreOffice 5.1 |
References
Outgoing- 2441 - historical - Red Hat Enterprise Linux 6.6 OpenSSL Module, Red Hat Enterprise Linux 7.1 OpenSSL Module
Heuristics
No heuristics are available for this certificate.
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 2630,
"dgst": "75ca28395bfc9ad1",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"CVL#702",
"CVL#701",
"CVL#700"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"2441"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"2441"
]
}
},
"module_prunned_references": {
"_type": "Set",
"elements": [
"2441"
]
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"2441"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"1404",
"1403",
"1401",
"1409",
"1406",
"1397",
"1398",
"1399",
"1405",
"1402",
"2441",
"1400"
]
}
},
"policy_prunned_references": {
"_type": "Set",
"elements": [
"2441"
]
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
},
"ECDSA": {
"ECDSA": 2
}
},
"FF": {
"DH": {
"Diffie-Hellman": 2
},
"DSA": {
"DSA": 5
}
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 1
},
"CCM": {
"CCM": 2
},
"CFB": {
"CFB": 1
},
"CTR": {
"CTR": 1
},
"ECB": {
"ECB": 1
},
"GCM": {
"GCM": 2
},
"OFB": {
"OFB": 1
},
"XTS": {
"XTS": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 17
}
},
"crypto_protocol": {
"SSH": {
"SSH": 15,
"SSHv2": 2
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
},
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"atsec": {
"atsec": 23
}
},
"fips_cert_id": {
"Cert": {
"#2441": 3,
"#700": 2,
"#701": 2,
"#702": 2
}
},
"fips_certlike": {
"Certlike": {
"HMAC-SHA-256": 20,
"PKCS#1": 2
}
},
"fips_security_level": {
"Level": {
"Level 1": 5
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 1
},
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 11,
"FIPS PUB 140-2": 1,
"FIPS180-4": 1,
"FIPS186-4": 1,
"FIPS197": 1,
"FIPS198-1": 1
},
"NIST": {
"SP 800-135": 8
},
"PKCS": {
"PKCS#1": 1
},
"RFC": {
"RFC3394": 1,
"RFC5649": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 5
}
},
"DES": {
"3DES": {
"TDEA": 1,
"TDES": 1
},
"DES": {
"DES": 2
}
},
"constructions": {
"MAC": {
"CMAC": 2,
"HMAC": 8,
"HMAC-SHA-256": 10
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "Alejandro Fabio Masino",
"/CreationDate": "D:20160613102953-05\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "FIPS 140-2",
"/Producer": "LibreOffice 5.1",
"/Title": "FIPS 140-2 Non-Proprietary Security Policy",
"pdf_file_size_bytes": 223870,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.atsec.com/",
"mailto:[email protected]",
"mailto:[email protected]",
"http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/1401val2015.htm#2441",
"mailto:[email protected]",
"mailto:[email protected]"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 21
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_garbage": false,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_pdf_hash": "57e27b3b224ac32cd565bb653ae9141a80b6bb2c4121f75b583c64fe55e4bd28",
"policy_txt_hash": "d784c6554261dba00314c9ec8fc1145b2d211e4e10b94757f914cfe2d9d4e111"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated in FIPS mode with module Red Hat Enterprise Linux 7.1 OpenSSL Module validated to FIPS 140-2 under Cert. #2441 operating in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertMay2016.pdf",
"date_sunset": null,
"description": "The OpenSSH Server cryptographic module provides the server-side component for an SSH protocol version 2 protected communication channel. OpenSSH is the standard SSH implementation and shipped with RHEL 7.1. Its cryptographic mechanisms use the OpenSSL library in FIPS 140-2 mode.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Physical Security: N/A",
"Mitigation of Other Attacks: N/A"
],
"fw_versions": null,
"historical_reason": "Moved to historical list due to sunsetting",
"hw_versions": null,
"level": 1,
"mentioned_certs": {
"2441": 1
},
"module_name": "Red Hat Enterprise Linux OpenSSH Server Cryptographic Module",
"module_type": "Software",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": "4.0",
"tested_conf": [
"Red Hat Enterprise Linux 7.1 running on IBM Power8 Little Endian 8286-41A",
"Red Hat Enterprise Linux 7.1 running on IBM z13 with CP Assist for Cryptographic Functions (single-user mode)",
"Red Hat Enterprise Linux 7.1 running on ProLiant DL380p Gen8 with PAA",
"Red Hat Enterprise Linux 7.1 running on ProLiant DL380p Gen8 without PAA"
],
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2016-05-02",
"lab": "atsec information security corporation",
"validation_type": "Initial"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2016-06-17",
"lab": "atsec information security corporation",
"validation_type": "Update"
}
],
"vendor": "Red Hat\u00ae, Inc.",
"vendor_url": "http://www.redhat.com"
}
}