Ubuntu 20.04 Strongswan Cryptographic Module

Certificate #4046

Webpage information

Status active
Validation dates 18.10.2021
Sunset date 21-09-2026
Standard FIPS 140-2
Security level 1
Type Software
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS mode and installed, initialized and configured as specified in Section 9.1 of the Security Policy with module Ubuntu 20.04 OpenSSL Cryptographic Module validated to FIPS 140-2 under Cert. #3966 operating in FIPS mode and with module Ubuntu 20.04 Kernel Crypto API Cryptographic Module validated to FIPS140-2 under Cert. #3928 operating in FIPS mode
Exceptions
  • Physical Security: N/A
  • Mitigation of Other Attacks: N/A
Description Ubuntu 20.04 Strongswan Cryptographic Module provides cryptographic services for the Internet Key Exchange (IKE) protocol in the Ubuntu Operating System user space.
Tested configurations
  • Ubuntu 20.04 LTS 64-bit running on Supermicro SYS-1019P-WTR with Intel Xeon Gold 6226 with PAA
  • Ubuntu 20.04 LTS 64-bit running on Supermicro SYS-1019P-WTR with Intel Xeon Gold 6226 without PAA (single-user mode)
Vendor Canonical Ltd.
References

This certificate's webpage directly references 2 certificates, transitively this expands into 2 certificates.

Security policy

Symmetric Algorithms
AES, DES, Triple-DES, ChaCha20, Poly1305, HMAC, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512
Asymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DSA
Hash functions
SHA-1, SHA-256, SHA-384, SHA-512, SHA-224
Schemes
MAC, Key Exchange, Key exchange, Key Agreement
Protocols
SSH, IKEv2, IKE
Randomness
DRBG, RNG
Libraries
OpenSSL
Elliptic Curves
P-224, P-256, P-384, P-521, K-283, K-409, K-571, B-233, B-283, B-409, B-571
Block cipher modes
CBC, CTR, GCM

Security level
Level 1

Standards
FIPS 140-2, FIPS140-2, FIPS PUB 140-2, RFC5282, RFC7296

File metadata

Title Microsoft Word - UbuntuStrongswan-SecurityPolicy.doc
Creation date D:20210929202731Z00'00'
Modification date D:20210929202731Z00'00'
Pages 35
Creator Word
Producer macOS Version 11.6 (Build 20G165) Quartz PDFContext

References

Outgoing
  • 3966 - active - Ubuntu 20.04 OpenSSL Cryptographic Module
  • 3928 - active - Ubuntu 20.04 Kernel Crypto API Cryptographic Module

Heuristics

No heuristics are available for this certificate.

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 4046,
  "dgst": "826aaa9db20b9fae",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "RSA#A530",
        "SHS#A617",
        "HMAC#A529",
        "RSA#A532",
        "KAS-SSC#A532",
        "SHS#A646",
        "DRBG#A524",
        "ECDSA#A531",
        "SHS#A532",
        "AES#A524",
        "ECDSA#A530",
        "ECDSA#A532",
        "AES#A528",
        "HMAC#A645",
        "KAS#A531",
        "SHS#A616",
        "HMAC#A646",
        "AES#A535",
        "AES#A536",
        "AES#A533",
        "KAS-SSC#A531",
        "RSA#A531",
        "DRBG#A522",
        "KAS#A660",
        "AES#A526",
        "KAS#A530",
        "HMAC#A531",
        "HMAC#A617",
        "AES#A534",
        "HMAC#A644",
        "HMAC#A616",
        "KAS-SSC#A530",
        "AES#A523",
        "HMAC#A530",
        "SHS#A644",
        "KAS-SSC#A539",
        "AES#A537",
        "AES#A538",
        "HMAC#A618",
        "SHS#A529",
        "RSA#A529",
        "SHS#A531",
        "AES#A522",
        "KAS#A539",
        "CVL#A660",
        "DRBG#A523",
        "SHS#A530",
        "Triple-DES#A525",
        "ECDSA#A529",
        "HMAC#A532",
        "SHS#A645",
        "AES#A527",
        "KAS-SSC#A529",
        "KAS#A532",
        "SHS#A618",
        "KAS#A529"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "20.04"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "3928",
          "3966"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "3928",
          "3966"
        ]
      }
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": [
        "3928",
        "3966"
      ]
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "3928",
          "3966"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "3928",
          "3966"
        ]
      }
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": [
        "3928",
        "3966"
      ]
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          },
          "ECDH": {
            "ECDH": 1
          },
          "ECDSA": {
            "ECDSA": 11
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 25
          },
          "DSA": {
            "DSA": 1
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 13
        },
        "CTR": {
          "CTR": 1
        },
        "GCM": {
          "GCM": 5
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 38
        }
      },
      "crypto_protocol": {
        "IKE": {
          "IKE": 3,
          "IKEv2": 49
        },
        "SSH": {
          "SSH": 1
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 2
        },
        "KEX": {
          "Key Exchange": 5,
          "Key exchange": 1
        },
        "MAC": {
          "MAC": 4
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "B-233": 1,
          "B-283": 1,
          "B-409": 1,
          "B-571": 1,
          "K-283": 1,
          "K-409": 1,
          "K-571": 1,
          "P-224": 8,
          "P-256": 12,
          "P-384": 12,
          "P-521": 12
        }
      },
      "eval_facility": {
        "atsec": {
          "atsec": 37
        }
      },
      "fips_cert_id": {
        "Cert": {
          "#3928": 1,
          "#3966": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "HMAC SHA-1": 3,
          "HMAC SHA-256": 3,
          "HMAC SHA-384": 2,
          "HMAC SHA-512": 2,
          "HMAC-SHA-1": 4,
          "HMAC-SHA-256": 8,
          "HMAC-SHA-384": 2,
          "HMAC-SHA-512": 2,
          "SHA- 256": 6,
          "SHA- 384": 1,
          "SHA- 512": 2,
          "SHA-1": 14,
          "SHA-224": 2,
          "SHA-256": 11,
          "SHA-384": 12,
          "SHA-512": 11
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 5
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 14
          },
          "SHA2": {
            "SHA-224": 2,
            "SHA-256": 11,
            "SHA-384": 12,
            "SHA-512": 11
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 4
        },
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 47,
          "FIPS PUB 140-2": 1,
          "FIPS140-2": 1
        },
        "RFC": {
          "RFC5282": 2,
          "RFC7296": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 9
          }
        },
        "DES": {
          "3DES": {
            "Triple-DES": 6
          },
          "DES": {
            "DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 36,
            "HMAC-SHA-256": 4,
            "HMAC-SHA-384": 1,
            "HMAC-SHA-512": 1
          }
        },
        "djb": {
          "ChaCha": {
            "ChaCha20": 4
          },
          "Poly": {
            "Poly1305": 4
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/CreationDate": "D:20210929202731Z00\u002700\u0027",
      "/Creator": "Word",
      "/ModDate": "D:20210929202731Z00\u002700\u0027",
      "/Producer": "macOS Version 11.6 (Build 20G165) Quartz PDFContext",
      "/Title": "Microsoft Word - UbuntuStrongswan-SecurityPolicy.doc",
      "pdf_file_size_bytes": 664374,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 35
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "4908da125e306578e81d8c3393f7d8eec49fe765bf45ce652f4e6d349b084a87",
    "policy_txt_hash": "b8cb1aae348f8531bc123daac8f8aaf0cabcbab0ff836f3b785dd7de08e23e48"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode and installed, initialized and configured as specified in Section 9.1 of the Security Policy with module Ubuntu 20.04 OpenSSL Cryptographic Module validated to FIPS 140-2 under Cert. #3966 operating in FIPS mode and with module Ubuntu 20.04 Kernel Crypto API Cryptographic Module validated to FIPS140-2 under Cert. #3928 operating in FIPS mode",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/October 2021_011121_0730_signed.pdf",
    "date_sunset": "2026-09-21",
    "description": "Ubuntu 20.04 Strongswan Cryptographic Module provides cryptographic services for the Internet Key Exchange (IKE) protocol in the Ubuntu Operating System user space.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Physical Security: N/A",
      "Mitigation of Other Attacks: N/A"
    ],
    "fw_versions": null,
    "historical_reason": null,
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {
      "3928": 1,
      "3966": 1
    },
    "module_name": "Ubuntu 20.04 Strongswan Cryptographic Module",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "active",
    "sw_versions": "3.0",
    "tested_conf": [
      "Ubuntu 20.04 LTS 64-bit running on Supermicro SYS-1019P-WTR with Intel Xeon Gold 6226 with PAA",
      "Ubuntu 20.04 LTS 64-bit running on Supermicro SYS-1019P-WTR with Intel Xeon Gold 6226 without PAA (single-user mode)"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2021-10-18",
        "lab": "atsec information security corporation",
        "validation_type": "Initial"
      }
    ],
    "vendor": "Canonical Ltd.",
    "vendor_url": "http://www.canonical.com"
  }
}