This page was not yet optimized for use on mobile
devices.
Red Hat Enterprise Linux OpenSSH Server Cryptographic Module
Certificate #3063
Webpage information
Security policy
Symmetric Algorithms
AES, DES, Triple-DES, TDES, TDEA, HMAC, HMAC-SHA-256, CMACAsymmetric Algorithms
ECDSA, ECC, DSASchemes
MAC, Key AgreementProtocols
SSH, SSHv2Randomness
DRBG, RNGLibraries
OpenSSLElliptic Curves
P-384, P-521, P-256Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM, XTSSecurity level
Level 1Standards
FIPS 140-2, FIPS PUB 140-2, FIPS180-4, FIPS186-4, FIPS197, FIPS198-1, SP 800-135, SP 800-56A, PKCS#1, RFC3394, RFC5649File metadata
| Title | FIPS 140-2 Non-Proprietary Security Policy |
|---|---|
| Keywords | FIPS 140-2 |
| Author | Alejandro Fabio Masino |
| Creation date | D:20180220082652-06'00' |
| Pages | 22 |
| Creator | Writer |
| Producer | LibreOffice 5.4 |
References
Outgoing- 3016 - historical - Red Hat Enterprise Linux OpenSSL Cryptographic Module
Heuristics
No heuristics are available for this certificate.
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 3063,
"dgst": "7e9025938042a87f",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"DRBG#1977",
"AES#5210",
"AES#4695",
"DRBG#1567",
"AES#4667",
"DRBG#1595",
"ECDSA#1151",
"CVL#1700",
"Triple-DES#2483",
"SHS#4198",
"ECDSA#1347",
"Triple-DES#2639",
"SHS#4207",
"AES#5203",
"Triple-DES#2484",
"HMAC#3088",
"RSA#2789",
"RSA#2535",
"HMAC#3110",
"HMAC#3449",
"AES#5212",
"AES#5204",
"RSA#2786",
"DRBG#1981",
"CVL#1318",
"HMAC#3109",
"DRBG#1579",
"CVL#1361",
"AES#5207",
"SHS#4200",
"AES#4700",
"SHS#3846",
"HMAC#3452",
"AES#4697",
"DRBG#1976",
"HMAC#3450",
"DRBG#1982",
"SHS#4199",
"HMAC#3112",
"SHS#4193",
"SHS#3823",
"HMAC#3446",
"RSA#2792",
"Triple-DES#2471",
"Triple-DES#2642",
"HMAC#3445",
"AES#4699",
"DRBG#1984",
"SHS#3847",
"AES#5227",
"DRBG#1979",
"HMAC#3076",
"SHS#3807",
"DRBG#1598",
"DRBG#1593",
"DRBG#1983",
"AES#5209",
"AES#4664",
"RSA#2546",
"AES#4696",
"DRBG#1980",
"AES#4698",
"HMAC#3459",
"DRBG#1596",
"DRBG#1597",
"SHS#3845",
"AES#5208",
"Triple-DES#2481",
"ECDSA#1348",
"RSA#2787",
"RSA#2544",
"Triple-DES#2641",
"ECDSA#1144",
"RSA#2547",
"AES#5211",
"HMAC#3451",
"AES#4644",
"CVL#1320",
"HMAC#3111",
"DRBG#1594",
"HMAC#3108",
"SHS#3844",
"CVL#1312",
"HMAC#3090",
"DRBG#1993",
"Triple-DES#2638",
"HMAC#3447",
"ECDSA#1150",
"DRBG#1576",
"ECDSA#1350",
"SHS#3824",
"DRBG#1975",
"AES#5205",
"AES#4666",
"SHS#4195",
"CVL#1298",
"SHS#4194",
"SHS#4201",
"CVL#1718",
"HMAC#3107",
"SHS#3842",
"CVL#1693",
"DRBG#1578",
"ECDSA#1353",
"SHS#3843",
"HMAC#3091",
"SHS#4197",
"ECDSA#1148",
"HMAC#3453",
"SHS#3821",
"HMAC#3454",
"CVL#1687",
"CVL#1689",
"SHS#4202"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"3016"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"3016"
]
}
},
"module_prunned_references": {
"_type": "Set",
"elements": [
"3016"
]
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"3016"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"3016"
]
}
},
"policy_prunned_references": {
"_type": "Set",
"elements": [
"3016"
]
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
},
"ECDSA": {
"ECDSA": 3
}
},
"FF": {
"DSA": {
"DSA": 6
}
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 3
},
"CCM": {
"CCM": 2
},
"CFB": {
"CFB": 1
},
"CTR": {
"CTR": 2
},
"ECB": {
"ECB": 1
},
"GCM": {
"GCM": 2
},
"OFB": {
"OFB": 1
},
"XTS": {
"XTS": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 22
}
},
"crypto_protocol": {
"SSH": {
"SSH": 17,
"SSHv2": 2
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
},
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 2,
"P-384": 2,
"P-521": 4
}
},
"eval_facility": {
"atsec": {
"atsec": 24
}
},
"fips_cert_id": {
"Cert": {
"#1144": 1,
"#1148": 1,
"#1150": 1,
"#1151": 1,
"#1298": 4,
"#1312": 4,
"#1318": 4,
"#1320": 4,
"#1347": 1,
"#1348": 1,
"#1350": 1,
"#1353": 1,
"#1361": 3,
"#1567": 1,
"#1576": 1,
"#1578": 1,
"#1579": 1,
"#1593": 1,
"#1594": 1,
"#1595": 1,
"#1596": 1,
"#1597": 1,
"#1598": 1,
"#1687": 4,
"#1689": 4,
"#1693": 4,
"#1700": 4,
"#1718": 3,
"#1975": 1,
"#1976": 1,
"#1977": 1,
"#1979": 1,
"#1980": 1,
"#1981": 1,
"#1982": 1,
"#1983": 1,
"#1984": 1,
"#1993": 1,
"#2471": 1,
"#2481": 1,
"#2483": 1,
"#2484": 1,
"#2535": 1,
"#2544": 1,
"#2546": 1,
"#2547": 1,
"#2638": 1,
"#2639": 1,
"#2641": 1,
"#2642": 1,
"#2786": 1,
"#2787": 1,
"#2789": 1,
"#2792": 1,
"#3016": 3,
"#3076": 1,
"#3088": 1,
"#3090": 1,
"#3091": 1,
"#3107": 1,
"#3108": 1,
"#3109": 1,
"#3110": 1,
"#3111": 1,
"#3112": 1,
"#3445": 1,
"#3446": 1,
"#3447": 1,
"#3449": 1,
"#3450": 1,
"#3451": 1,
"#3452": 1,
"#3453": 1,
"#3454": 1,
"#3459": 1,
"#3807": 1,
"#3821": 1,
"#3823": 1,
"#3824": 1,
"#3842": 1,
"#3843": 1,
"#3844": 1,
"#3845": 1,
"#3846": 1,
"#3847": 1,
"#4193": 1,
"#4194": 1,
"#4195": 1,
"#4197": 1,
"#4198": 1,
"#4199": 1,
"#4200": 1,
"#4201": 1,
"#4202": 1,
"#4207": 1,
"#4644": 1,
"#4664": 1,
"#4666": 1,
"#4667": 1,
"#4695": 1,
"#4696": 1,
"#4697": 1,
"#4698": 1,
"#4699": 1,
"#4700": 1,
"#5203": 1,
"#5204": 1,
"#5205": 1,
"#5207": 1,
"#5208": 1,
"#5209": 1,
"#5210": 1,
"#5211": 1,
"#5212": 1,
"#5227": 1
}
},
"fips_certlike": {
"Certlike": {
"#1320 CVL": 2,
"#1700 DRBG": 1,
"#2642 HMAC": 1,
"#3459 SHA": 1,
"#4207 RSA": 1,
"AES 128/192/25": 1,
"Cert. #1361 CVL": 1,
"HMAC-SHA-256": 20,
"PKCS#1": 2
}
},
"fips_security_level": {
"Level": {
"Level 1": 5
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 4
},
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 11,
"FIPS PUB 140-2": 1,
"FIPS180-4": 1,
"FIPS186-4": 1,
"FIPS197": 1,
"FIPS198-1": 1
},
"NIST": {
"SP 800-135": 9,
"SP 800-56A": 2
},
"PKCS": {
"PKCS#1": 1
},
"RFC": {
"RFC3394": 1,
"RFC5649": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 6
}
},
"DES": {
"3DES": {
"TDEA": 1,
"TDES": 1,
"Triple-DES": 2
},
"DES": {
"DES": 2
}
},
"constructions": {
"MAC": {
"CMAC": 2,
"HMAC": 10,
"HMAC-SHA-256": 10
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "Alejandro Fabio Masino",
"/CreationDate": "D:20180220082652-06\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "FIPS 140-2",
"/Producer": "LibreOffice 5.4",
"/Title": "FIPS 140-2 Non-Proprietary Security Policy",
"pdf_file_size_bytes": 227821,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:[email protected]",
"mailto:[email protected]",
"mailto:[email protected]",
"mailto:[email protected]",
"http://www.atsec.com/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 22
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "c588d871f026f73527e23272cc23708eb90bb39454435d8b02d79b06cc499fe0",
"policy_txt_hash": "a9221e24916bf9e94065dc6d2403b4530e92a5995f08280f7c7aed5c268fa2ab"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated in FIPS Mode with module Red Hat Enterprise Linux OpenSSL Module validated to FIPS 140-2 under Cert. #3016 operating in FIPS mode",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertNov2017.pdf",
"date_sunset": null,
"description": "The OpenSSH Server cryptographic module provides the server-side component for an SSH protocol version 2 protected communication channel. OpenSSH is the standard SSH implementation and shipped with RHEL 7. Its cryptographic mechanisms use the OpenSSL library in FIPS 140-2 mode.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Physical Security: N/A",
"Mitigation of Other Attacks: N/A"
],
"fw_versions": null,
"historical_reason": "SP 800-56Arev3 transition",
"hw_versions": null,
"level": 1,
"mentioned_certs": {
"3016": 1
},
"module_name": "Red Hat Enterprise Linux OpenSSH Server Cryptographic Module",
"module_type": "Software",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": "5.0 [1] , 6.0 [2]",
"tested_conf": [
"Red Hat Enterprise Linux 7.4 running on Dell PowerEdge R630 with PAA [1]",
"Red Hat Enterprise Linux 7.4 running on Dell PowerEdge R630 without PAA [1]",
"Red Hat Enterprise Linux 7.5 running on Dell PowerEdge R630 with PAA [2]",
"Red Hat Enterprise Linux 7.5 running on Dell PowerEdge R630 without PAA [2] (single-user mode)"
],
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2017-11-14",
"lab": "atsec information security corporation",
"validation_type": "Initial"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2018-06-15",
"lab": "atsec information security corporation",
"validation_type": "Update"
}
],
"vendor": "Red Hat\u00ae, Inc.",
"vendor_url": "http://www.redhat.com"
}
}