This page was not yet optimized for use on mobile
devices.
FortiClient 5.0 VPN Client
Certificate #2543
Webpage information
Security policy
Symmetric Algorithms
AES, Triple-DES, HMAC, HMAC-SHA-384Asymmetric Algorithms
Diffie-HellmanHash functions
SHA-1, SHA-384, SHA-512, SHA-256, PBKDFSchemes
Key agreementProtocols
SSH, SSL, TLS, IKE, VPNRandomness
DRBGBlock cipher modes
CBCVendor
MicrosoftSecurity level
Level 2Standards
FIPS 140-2, FIPS 140, NIST SP 800-90B, NIST SP 800-90A, NIST SP 800-90, NIST SP 800-132, PKCS1File metadata
| Title | FCT 5.0 FIPS Level 2 Security Policy.book |
|---|---|
| Author | akaye |
| Creation date | D:20160122151735-05'00' |
| Modification date | D:20160122151735-05'00' |
| Pages | 13 |
| Creator | PScript5.dll Version 5.2.2 |
| Producer | Acrobat Elements 9.0.0 (Windows) |
Heuristics
No heuristics are available for this certificate.
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 2543,
"dgst": "887846b0aa6af194",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"SHS#2460",
"Triple-DES#1728",
"SHS#2451",
"DRBG#538",
"RSA#1533",
"HMAC#1851",
"AES#2912",
"HMAC#1842",
"Triple-DES#1737",
"AES#2924",
"CVL#329"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"5.0"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"FF": {
"DH": {
"Diffie-Hellman": 3
}
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 4
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 23
},
"SSH": {
"SSH": 2
},
"TLS": {
"SSL": {
"SSL": 2
},
"TLS": {
"TLS": 7
}
},
"VPN": {
"VPN": 26
}
},
"crypto_scheme": {
"KA": {
"Key agreement": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"fips_cert_id": {},
"fips_certlike": {
"Certlike": {
"AES 2912": 1,
"HMAC SHA-1": 5,
"HMAC SHA-1 1842": 1,
"HMAC SHA-256": 8,
"HMAC SHA-256 1842": 1,
"HMAC SHA-384": 2,
"HMAC SHA-512": 2,
"HMAC- SHA-512": 1,
"HMAC-SHA-384": 2,
"PKCS1": 1,
"RSA PKCS1": 1,
"SHA-1": 6,
"SHA-1 1842": 1,
"SHA-1 2451": 1,
"SHA-256": 11,
"SHA-384": 5,
"SHA-512": 6
}
},
"fips_security_level": {
"Level": {
"Level 2": 18
}
},
"hash_function": {
"PBKDF": {
"PBKDF": 1
},
"SHA": {
"SHA1": {
"SHA-1": 8
},
"SHA2": {
"SHA-256": 11,
"SHA-384": 5,
"SHA-512": 6
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 11
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140": 1,
"FIPS 140-2": 28
},
"NIST": {
"NIST SP 800-132": 1,
"NIST SP 800-90": 1,
"NIST SP 800-90A": 1,
"NIST SP 800-90B": 1
},
"PKCS": {
"PKCS1": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 14
}
},
"DES": {
"3DES": {
"Triple-DES": 6
}
},
"constructions": {
"MAC": {
"HMAC": 19,
"HMAC-SHA-384": 1
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 3
}
},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "akaye",
"/CreationDate": "D:20160122151735-05\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20160122151735-05\u002700\u0027",
"/Producer": "Acrobat Elements 9.0.0 (Windows)",
"/Title": "FCT 5.0 FIPS Level 2 Security Policy.book",
"pdf_file_size_bytes": 135472,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 13
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "7186af2881c48f59b70d5b6171cc969f7fb23d482c5c10204fb4a1092e090900",
"policy_txt_hash": "d9f6f442b30a087a8fe31fd5343ecacd727e5fc825006747fa9d0d0fa9b88d3a"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated in FIPS mode and configured according to the Entropy Token Section of the Security Policy. The module generates cryptographic keys whose strengths are modified by available entropy. There is no assurance of the minimum strength of generated keys",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertJan2016.pdf",
"date_sunset": null,
"description": "The FortiClient VPN client provides a FIPS 140-2 validated, IPSec and SSL VPN client for Windows platforms.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Physical Security: N/A",
"Mitigation of Other Attacks: N/A"
],
"fw_versions": null,
"historical_reason": "Moved to historical list due to sunsetting",
"hw_versions": null,
"level": 2,
"mentioned_certs": {},
"module_name": "FortiClient 5.0 VPN Client",
"module_type": "Software",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": "FortiClient 5.0, build0367, 151201",
"tested_conf": [
"Windows 7 Enterprise Edition running on a Dell Optiplex 755 with the Fortinet entropy \ntoken (part number FTR-ENT-1) (single-user mode)"
],
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2016-01-26",
"lab": "DXC Technology",
"validation_type": "Initial"
}
],
"vendor": "Fortinet, Inc.",
"vendor_url": "http://www.fortinet.com"
}
}