Windows Server 2008 R2 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH)

Certificate #1338

Webpage information ?

Status historical
Historical reason RNG SP800-131A Revision 1 Transition
Validation dates 12.08.2010 , 01.06.2011 , 21.06.2011
Standard FIPS 140-2
Security level 1
Type Software
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS mode with Code Integrity (ci.dll) validated to FIPS 140-2 under Cert. #1334 operating in FIPS mode and Kernel Mode Cryptographic Primitives Library (cng.sys) validated to FIPS 140-2 under Cert. #1335 operating in FIPS mode
Description DSSENH encapsulates several different cryptographic algorithms in an easy-to-use cryptographic module accessible via the Microsoft CryptoAPI. Software developers dynamically link the Microsoft DSSENH module into their applications to provide FIPS 140-2 compliant cryptographic support.
Tested configurations
  • Microsoft Windows Server 2008 R2 (IA64 version)
  • Microsoft Windows Server 2008 R2 (x64 Version)
  • Microsoft Windows Server 2008 R2 SP1 (IA64 version) (single-user mode)
  • Microsoft Windows Server 2008 R2 SP1 (x64 version)
Vendor Microsoft Corporation
References

This certificate's webpage directly references 2 certificates, transitively this expands into 4 certificates.

Security policy ?

Symmetric Algorithms
AES-256, AES, RC4, RC2, DES, Triple-DES, TDEA
Asymmetric Algorithms
Diffie-Hellman, DH, DSA
Hash functions
SHA-1, MD5
Schemes
MAC
Protocols
SSL 2.0, SSL 3.0, TLS v1.0, TLS
Randomness
RNG, RBG

Vendor
Microsoft Corporation, Microsoft

Security level
Level 1

Standards
FIPS PUB 140-2, FIPS 140-2, FIPS 186-2, FIPS PUB 186-2

File metadata

Title Microsoft Word - Windows Server 2008 R2 DSSENH security policy.doc
Author noltinge
Creation date D:20110609152007-04'00'
Modification date D:20110609152007-04'00'
Pages 23
Creator PScript5.dll Version 5.2
Producer Acrobat Distiller 8.1.0 (Windows)

References

Outgoing
  • 1334 - historical - Windows Server 2008 R2 Code Integrity (ci.dll)
  • 1335 - historical - Microsoft Windows Server 2008 R2 Kernel Mode Cryptographic Primitives Library (cng.sys)

Heuristics ?

No heuristics are available for this certificate.

References ?

Updates ?

  • 19.03.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was set to None.
    • The related_cves property was set to None.
  • 09.02.2023 The certificate data changed.
    Certificate changed

    The cert_id was updated.

    • The new value is 1338.

    The web extraction data was updated.

    • The following values were inserted: {'validation_history': [{'_type': 'sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry', 'date': '2010-08-12', 'validation_type': 'Initial', 'lab': 'SAIC-VA'}, {'_type': 'sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry', 'date': '2011-06-01', 'validation_type': 'Update', 'lab': 'SAIC-VA'}, {'_type': 'sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry', 'date': '2011-06-21', 'validation_type': 'Update', 'lab': 'SAIC-VA'}], 'vendor_url': 'http://www.microsoft.com', 'certificate_pdf_url': 'https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/140crt1338.pdf', 'hw_versions': None, 'fw_versions': None}.
    • The standard property was set to FIPS 140-2.
    • The status property was set to historical.
    • The level property was set to 1.
    • The embodiment property was set to Multi-Chip Stand Alone.
    • The description property was set to DSSENH encapsulates several different cryptographic algorithms in an easy-to-use cryptographic module accessible via the Microsoft CryptoAPI. Software developers dynamically link the Microsoft DSSENH module into their applications to provide FIPS 140-2 compliant cryptographic support..
    • The mentioned_certs property was updated, with the {'1334': 1, '1335': 1} data.
    • The following properties were deleted: ['date_validation', 'algorithms', 'vendor_www', 'lab', 'lab_nvlap', 'security_policy_www', 'certificate_www', 'hw_version', 'fw_version', 'product_url'].

    The PDF extraction data was updated.

    • The following values were inserted: {'policy_metadata': {'pdf_file_size_bytes': 165309, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 23, '/CreationDate': "D:20110609152007-04'00'", '/Author': 'noltinge', '/Creator': 'PScript5.dll Version 5.2', '/Producer': 'Acrobat Distiller 8.1.0 (Windows)', '/ModDate': "D:20110609152007-04'00'", '/Title': 'Microsoft Word - Windows Server 2008 R2 DSSENH security policy.doc', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}}.
    • The following properties were deleted: ['cert_id', 'algorithms', 'clean_cert_ids', 'st_metadata'].

    The computed heuristics were updated.

    • The following values were inserted: {'policy_prunned_references': {'_type': 'Set', 'elements': ['1334', '1335']}, 'module_prunned_references': {'_type': 'Set', 'elements': ['1334', '1335']}, 'policy_processed_references': {'_type': 'sec_certs.sample.certificate.References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['1334', '1335']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['1334', '1321', '1335', '1333']}}, 'module_processed_references': {'_type': 'sec_certs.sample.certificate.References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['1334', '1335']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['1334', '1321', '1335', '1333']}}, 'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The algorithms property was set to {'_type': 'Set', 'elements': ['SHS#1081', 'Triple-DES#846', 'RNG#649', 'DSA#390', 'Triple-DES MAC#846']}.
    • The following properties were deleted: ['keywords', 'unmatched_algs', 'clean_cert_ids', 'st_references', 'web_references'].

    The state was updated.

    • The following values were inserted: {'module_download_ok': True, 'policy_download_ok': True, 'policy_convert_garbage': False, 'policy_convert_ok': True, 'module_extract_ok': True, 'policy_extract_ok': True, 'policy_pdf_hash': 'c0da152abbdabf1f92d708121120997e126ae688f82db8eefca400ce5a43cace', 'policy_txt_hash': 'd7a18593fccf360c4071a74a340706b4b0075ad97964bb366ca0d85fef9045e9'}.
    • The following properties were deleted: ['sp_path', 'html_path', 'tables_done', 'file_status', 'txt_state'].
  • 16.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2008-4609']} values discarded.
  • 07.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The clean_cert_ids property was updated, with the {'#649': 1, '#846': 2} values inserted.
    • The st_references property was updated, with the {'directly_referencing': {'__add__': {'_type': 'Set', 'elements': ['846', '649']}}, 'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['218', '649', '299', '568', '239', '308', '315', '41', '319', '310', '1081', '454', '131', '559', '55', '1187', '517', '261', '382', '129', '135', '62', '229', '846', '159', '184', '102', '101', '1168', '82', '69', '567']}}} data.
  • 05.11.2022 The certificate data changed.
    Certificate changed

    The web extraction data was updated.

    • The algorithms property was set to {'_type': 'Set', 'elements': []}.

    The PDF extraction data was updated.

    • The clean_cert_ids property was updated, with the {'#649': 1, '#846': 2} values inserted.

    The computed heuristics were updated.

    • The algorithms property was set to {'_type': 'Set', 'elements': []}.
  • 25.10.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The keywords property was updated, with the {'fips_certlike': {'__update__': {'Certlike': {'__delete__': ['DES (Cert. #846']}}}, 'vendor': {'__update__': {'Microsoft': {'__update__': {'Microsoft Corporation': 3, 'Microsoft': 22}}}}, 'symmetric_crypto': {'__update__': {'DES': {'__update__': {'DES': {'__update__': {'DES': 4}, '__delete__': ['DEA']}}}}}, 'asymmetric_crypto': {'__update__': {'FF': {'__update__': {'DH': {'__update__': {'DH': 3}}}}}}, 'crypto_scheme': {'__delete__': ['KA']}, 'crypto_protocol': {'__update__': {'TLS': {'__update__': {'SSL': {'__delete__': ['SSL']}, 'TLS': {'__update__': {'TLS': 3}}}}}}, 'side_channel_analysis': {}, 'tee_name': {}} data.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['1334', '1335']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['1334', '1321', '1335', '1333']}} data.
    • The web_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['1334', '1335']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['1334', '1321', '1335', '1333']}} data.

    The state was updated.

    • The tables_done property was set to True.
  • 10.10.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was set to {'_type': 'Set', 'elements': ['cpe:2.3:o:microsoft:windows_server_2008:-:r2:itanium:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2008:-:r2:*:*:*:*:x64:*', 'cpe:2.3:o:microsoft:windows_server_2008:-:r2:x64:*:*:*:*:*']}.
    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2009-2515', 'CVE-2009-1544', 'CVE-2010-0232', 'CVE-2011-1234', 'CVE-2009-0234', 'CVE-2011-0676', 'CVE-2009-2512', 'CVE-2010-0035', 'CVE-2013-1252', 'CVE-2009-3677', 'CVE-2012-1194', 'CVE-2013-1268', 'CVE-2010-0239', 'CVE-2009-2509', 'CVE-2011-1876', 'CVE-2012-1867', 'CVE-2013-1278', 'CVE-2010-2554', 'CVE-2009-0083', 'CVE-2011-0096', 'CVE-2018-0973', 'CVE-2013-1270', 'CVE-2009-2513', 'CVE-2013-3865', 'CVE-2010-0810', 'CVE-2010-2550', 'CVE-2010-0024', 'CVE-2010-1255', 'CVE-2011-1872', 'CVE-2008-4269', 'CVE-2018-0887', 'CVE-2011-0675', 'CVE-2010-2729', 'CVE-2012-2527', 'CVE-2010-0020', 'CVE-2009-2501', 'CVE-2013-1260', 'CVE-2011-1264', 'CVE-2011-3415', 'CVE-2011-1882', 'CVE-2013-1275', 'CVE-2010-1892', 'CVE-2012-2556', 'CVE-2009-2493', 'CVE-2010-0719', 'CVE-2013-1280', 'CVE-2011-0658', 'CVE-2010-0270', 'CVE-2011-0671', 'CVE-2017-11831', 'CVE-2011-1885', 'CVE-2011-0672', 'CVE-2013-0011', 'CVE-2011-1282', 'CVE-2013-1262', 'CVE-2013-1258', 'CVE-2013-1261', 'CVE-2008-1083', 'CVE-2010-2568', 'CVE-2013-1274', 'CVE-2018-0975', 'CVE-2018-0960', 'CVE-2009-1928', 'CVE-2009-0078', 'CVE-2011-1869', 'CVE-2012-1866', 'CVE-2010-0477', 'CVE-2011-1877', 'CVE-2011-1226', 'CVE-2008-1436', 'CVE-2010-2742', 'CVE-2009-0550', 'CVE-2011-0662', 'CVE-2013-1343', 'CVE-2009-1536', 'CVE-2009-2510', 'CVE-2013-1292', 'CVE-2010-0811', 'CVE-2008-4834', 'CVE-2010-0240', 'CVE-2012-1864', 'CVE-2008-3013', 'CVE-2010-0476', 'CVE-2010-3970', 'CVE-2013-3866', 'CVE-2010-0820', 'CVE-2011-1227', 'CVE-2009-0320', 'CVE-2010-2738', 'CVE-2013-1279', 'CVE-2013-1293', 'CVE-2012-0175', 'CVE-2009-0232', 'CVE-2009-1127', 'CVE-2011-0090', 'CVE-2013-2556', 'CVE-2010-0818', 'CVE-2011-0665', 'CVE-2011-0086', 'CVE-2010-0231', 'CVE-2011-1267', 'CVE-2011-1233', 'CVE-2011-0089', 'CVE-2011-0087', 'CVE-2011-1281', 'CVE-2011-0660', 'CVE-2010-1897', 'CVE-2010-1889', 'CVE-2013-1257', 'CVE-2010-0018', 'CVE-2011-0670', 'CVE-2011-1236', 'CVE-2011-1883', 'CVE-2011-1230', 'CVE-2010-0025', 'CVE-2009-0082', 'CVE-2008-4609', 'CVE-2013-1263', 'CVE-2010-1890', 'CVE-2013-0013', 'CVE-2011-1235', 'CVE-2010-3974', 'CVE-2010-2549', 'CVE-2009-2524', 'CVE-2011-1241', 'CVE-2011-0674', 'CVE-2018-0971', 'CVE-2009-1930', 'CVE-2007-6753', 'CVE-2010-0241', 'CVE-2017-11852', 'CVE-2008-2250', 'CVE-2009-2514', 'CVE-2009-0094', 'CVE-2011-0033', 'CVE-2011-1888', 'CVE-2013-1255', 'CVE-2010-0269', 'CVE-2013-3868', 'CVE-2009-0243', 'CVE-2018-0969', 'CVE-2012-2530', 'CVE-2009-0085', 'CVE-2009-2500', 'CVE-2011-1873', 'CVE-2010-3960', 'CVE-2013-1271', 'CVE-2008-4268', 'CVE-2013-1248', 'CVE-2010-3940', 'CVE-2011-1884', 'CVE-2018-8641', 'CVE-2011-1225', 'CVE-2013-1264', 'CVE-2009-1929', 'CVE-2010-0485', 'CVE-2012-1850', 'CVE-2009-1125', 'CVE-2009-0093', 'CVE-2010-0026', 'CVE-2009-1925', 'CVE-2010-2746', 'CVE-2010-3227', 'CVE-2013-1253', 'CVE-2010-0819', 'CVE-2013-1249', 'CVE-2013-1277', 'CVE-2018-0974', 'CVE-2009-2494', 'CVE-2008-4835', 'CVE-2008-2249', 'CVE-2010-0486', 'CVE-2013-1283', 'CVE-2013-1276', 'CVE-2011-1228', 'CVE-2012-4774', 'CVE-2010-1887', 'CVE-2011-1240', 'CVE-2011-0034', 'CVE-2009-0081', 'CVE-2013-1294', 'CVE-2011-1879', 'CVE-2011-1238', 'CVE-2012-1527', 'CVE-2013-1272', 'CVE-2010-3956', 'CVE-2010-4398', 'CVE-2010-3942', 'CVE-2009-2503', 'CVE-2008-2251', 'CVE-2009-0233', 'CVE-2010-1886', 'CVE-2010-0017', 'CVE-2010-0242', 'CVE-2011-0666', 'CVE-2011-1875', 'CVE-2013-1250', 'CVE-2010-0233', 'CVE-2011-1242', 'CVE-2010-0252', 'CVE-2011-1880', 'CVE-2009-2516', 'CVE-2018-0970', 'CVE-2010-3229', 'CVE-2013-1286', 'CVE-2010-3943', 'CVE-2012-2551', 'CVE-2010-2552', 'CVE-2010-3957', 'CVE-2008-2252', 'CVE-2010-4562', 'CVE-2011-1874', 'CVE-2013-1285', 'CVE-2009-1545', 'CVE-2009-3126', 'CVE-2009-3103', 'CVE-2010-0812', 'CVE-2010-0250', 'CVE-2010-2743', 'CVE-2008-1084', 'CVE-2011-1887', 'CVE-2009-1126', 'CVE-2013-1265', 'CVE-2010-0480', 'CVE-2012-2549', 'CVE-2009-0231', 'CVE-2008-3465', 'CVE-2013-3864', 'CVE-2011-1268', 'CVE-2009-2504', 'CVE-2013-1287', 'CVE-2011-1249', 'CVE-2011-1229', 'CVE-2011-1284', 'CVE-2013-1267', 'CVE-2011-3417', 'CVE-2010-2551', 'CVE-2013-1342', 'CVE-2009-0229', 'CVE-2010-0022', 'CVE-2013-1344', 'CVE-2009-2526', 'CVE-2009-0086', 'CVE-2009-0089', 'CVE-2011-3416', 'CVE-2010-0481', 'CVE-2010-3941', 'CVE-2011-1894', 'CVE-2010-0482', 'CVE-2009-1920', 'CVE-2018-0968', 'CVE-2012-1865', 'CVE-2013-1341', 'CVE-2013-1269', 'CVE-2008-1441', 'CVE-2011-1881', 'CVE-2013-1273', 'CVE-2011-1248', 'CVE-2009-2528', 'CVE-2011-0677', 'CVE-2018-0972', 'CVE-2011-3414', 'CVE-2013-0076', 'CVE-2010-0021', 'CVE-2012-1528', 'CVE-2011-0657', 'CVE-2008-4038', 'CVE-2011-1878', 'CVE-2013-1251', 'CVE-2017-0175', 'CVE-2009-1133', 'CVE-2009-2511', 'CVE-2010-4669', 'CVE-2010-3961', 'CVE-2010-1893', 'CVE-2011-1237', 'CVE-2009-0080', 'CVE-2008-4037', 'CVE-2012-2529', 'CVE-2011-0088', 'CVE-2011-1231', 'CVE-2013-1256', 'CVE-2010-3959', 'CVE-2013-3862', 'CVE-2008-4114', 'CVE-2009-1216', 'CVE-2010-2744', 'CVE-2010-0484', 'CVE-2009-2532', 'CVE-2011-0041', 'CVE-2009-1123', 'CVE-2010-1896', 'CVE-2010-2555', 'CVE-2013-1266', 'CVE-2011-1283', 'CVE-2010-0487', 'CVE-2008-1454', 'CVE-2009-1546', 'CVE-2010-3338', 'CVE-2008-4036', 'CVE-2012-1851', 'CVE-2011-1232', 'CVE-2013-1259', 'CVE-2009-1124', 'CVE-2009-2502', 'CVE-2010-3939', 'CVE-2011-0667', 'CVE-2010-0234', 'CVE-2013-1254', 'CVE-2009-2508', 'CVE-2011-0661', 'CVE-2011-1239', 'CVE-2010-1883', 'CVE-2009-1926']} values added.
  • 08.10.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The web_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.fips.FIPSCertificate.

    The computed heuristics were updated.

    • The following values were inserted: {'clean_cert_ids': {'#1334': 1, '#1335': 1}}.
    • The _type property was set to sec_certs.sample.fips.FIPSCertificate.Heuristics.
    • The keywords property was set to {}.
    • The algorithms property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#390', 'algorithm_type': 'DSA', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#846', 'algorithm_type': 'Triple-DES MAC', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1081', 'algorithm_type': 'SHS', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#649', 'algorithm_type': 'RNG', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#846', 'algorithm_type': 'Triple-DES', 'vendor': None, 'implementation': None, 'date': None}]}.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References', 'directly_referencing': {'__add__': {'_type': 'Set', 'elements': ['1334']}}, 'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['1334']}}} data.
    • The web_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.

    The state was updated.

    • The _type property was set to sec_certs.sample.fips.FIPSCertificate.InternalState.
    • The following properties were deleted: ['fragment_path'].
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The pdf_scan was updated.

    • The keywords property was updated, with the {'rules_cert_id': {}, 'rules_standard_id': {'__update__': {'FIPS ?(?:PUB )?[0-9]+-[0-9]+?': {'__update__': {'FIPS 186-2': {'__update__': {'count': 1}}}, '__delete__': ['FIPS 140-2', 'FIPS PUB 140-2', 'FIPS PUB 186-2']}, 'TLS[ ]*v[0-9\\.]+': {'__update__': {'TLS v1.0': {'__update__': {'count': 1}}}}}}} data.

    The computed heuristics were updated.

    • The keywords property was updated, with the {'rules_cert_id': {'__delete__': ['(?:#[^\\S\\r\\n]?|Cert\\.?(?!.\\s)[^\\S\\r\\n]?|Certificate[^\\S\\r\\n]?)(?P<id>\\d{4})(?!\\d)', '(?:#[^\\S\\r\\n]?|Cert\\.?(?!.\\s)[^\\S\\r\\n]?|Certificate[^\\S\\r\\n]?)(?P<id>\\d{3})(?!\\d)']}, 'rules_standard_id': {'__update__': {'FIPS ?(?:PUB )?[0-9]+-[0-9]+?': {'__update__': {'FIPS 186-2': {'__update__': {'count': 1}}}, '__delete__': ['FIPS 140-2', 'FIPS PUB 140-2', 'FIPS PUB 186-2']}, 'TLS[ ]*v[0-9\\.]+': {'__update__': {'TLS v1.0': {'__update__': {'count': 1}}}}}}} data.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The web_scan was updated.

    • The following properties were deleted: ['connections'].

    The pdf_scan was updated.

    • The following properties were deleted: ['connections'].

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['1335']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['1335']}}, 'web_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['1334', '1335']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['1334', '1335']}}}.
    • The following properties were deleted: ['connections', 'directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['2008']}.
    • The cpe_matches property was set to {'_type': 'Set', 'elements': ['cpe:2.3:o:microsoft:windows_server:2008:-:x64:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server:2008:*:ia64:*:*:*:*:*', 'cpe:2.3:a:microsoft:server:2008:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server:2008:*:*:*:*:*:itanium:*', 'cpe:2.3:o:microsoft:windows_server:2008:-:x32:*:*:*:*:*']}.
    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2018-8420', 'CVE-2018-8410', 'CVE-2018-8332', 'CVE-2018-8419', 'CVE-2018-8422']} values discarded.
  • 12.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the [[0, 'cpe:2.3:o:microsoft:windows_server:2008:-:x32:*:*:*:*:*'], [3, 'cpe:2.3:o:microsoft:windows_server:2008:*:sp2:*:*:*:itanium:*'], [5, 'cpe:2.3:o:microsoft:windows_server:2008:sp2:*:*:*:*:*:*'], [6, 'cpe:2.3:o:microsoft:windows_server:2008:r2:sp1:*:*:*:itanium:*'], [7, 'cpe:2.3:o:microsoft:windows_server:2008:sp2:*:*:*:*:itanium:*'], [9, 'cpe:2.3:o:microsoft:windows_server:2008:*:ia64:*:*:*:*:*']] values inserted.
  • 11.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the [[1, 'cpe:2.3:o:microsoft:windows_server:2008:sp2:*:*:*:*:*:*'], [3, 'cpe:2.3:o:microsoft:windows_server:2008:sp2:*:*:*:*:itanium:*'], [4, 'cpe:2.3:o:microsoft:windows_server:2008:r2:sp1:*:*:*:itanium:*'], [6, 'cpe:2.3:o:microsoft:windows_server:2008:*:ia64:*:*:*:*:*'], [7, 'cpe:2.3:o:microsoft:windows_server:2008:-:x32:*:*:*:*:*'], [9, 'cpe:2.3:o:microsoft:windows_server:2008:*:*:*:*:*:itanium:*']] values inserted.
  • 03.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the [[0, 'cpe:2.3:o:microsoft:windows_server:2008:r2:sp1:*:*:*:itanium:*'], [1, 'cpe:2.3:o:microsoft:windows_server:2008:r2:sp1:*:*:*:x64:*'], [4, 'cpe:2.3:o:microsoft:windows_server:2008:*:sp2:*:*:*:itanium:*'], [7, 'cpe:2.3:a:microsoft:server:2008:*:*:*:*:*:*:*'], [8, 'cpe:2.3:o:microsoft:windows_server:2008:-:x64:*:*:*:*:*'], [9, 'cpe:2.3:o:microsoft:windows_server:2008:sp2:*:*:*:*:*:*']] values inserted.
  • 02.02.2022 The certificate data changed.
    Certificate changed

    The web_scan was updated.

    • The module_type property was set to Software.

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the [[1, 'cpe:2.3:o:microsoft:windows_server:2008:*:ia64:*:*:*:*:*'], [3, 'cpe:2.3:o:microsoft:windows_server:2008:*:sp2:*:*:*:itanium:*'], [4, 'cpe:2.3:o:microsoft:windows_server:2008:sp2:*:*:*:*:itanium:*'], [6, 'cpe:2.3:o:microsoft:windows_server:2008:-:x32:*:*:*:*:*'], [7, 'cpe:2.3:o:microsoft:windows_server:2008:r2:sp1:*:*:*:x64:*'], [8, 'cpe:2.3:o:microsoft:windows_server:2008:*:*:*:*:*:itanium:*'], [9, 'cpe:2.3:o:microsoft:windows_server:2008:r2:sp1:*:*:*:itanium:*']] values inserted.
  • 01.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the [[7, 'cpe:2.3:o:microsoft:windows_server:2008:r2:sp1:*:*:*:x64:*']] values inserted.
  • 31.01.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the [[0, 'cpe:2.3:o:microsoft:windows_server:2008:-:x32:*:*:*:*:*'], [2, 'cpe:2.3:o:microsoft:windows_server:2008:sp2:*:*:*:*:itanium:*'], [4, 'cpe:2.3:o:microsoft:windows_server:2008:*:ia64:*:*:*:*:*'], [5, 'cpe:2.3:o:microsoft:windows_server:2008:-:x64:*:*:*:*:*'], [6, 'cpe:2.3:o:microsoft:windows_server:2008:r2:sp1:*:*:*:x64:*'], [7, 'cpe:2.3:o:microsoft:windows_server:2008:*:sp2:*:*:*:itanium:*'], [9, 'cpe:2.3:o:microsoft:windows_server:2008:sp2:*:*:*:*:*:*']] values inserted.
  • 30.01.2022 The certificate was first processed.
    New certificate

    A new FIPS 140 certificate with the product name was processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 1338,
  "dgst": "929335bd815765d7",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "RNG#649",
        "SHS#1081",
        "Triple-DES#846",
        "Triple-DES MAC#846",
        "DSA#390"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2008"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "1335",
          "1334"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "1333",
          "1334",
          "1335",
          "1321"
        ]
      }
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": [
        "1335",
        "1334"
      ]
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "1335",
          "1334"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "1333",
          "1334",
          "1335",
          "1321"
        ]
      }
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": [
        "1335",
        "1334"
      ]
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "DH": 3,
            "Diffie-Hellman": 8
          },
          "DSA": {
            "DSA": 11
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL 2.0": 3,
            "SSL 3.0": 3
          },
          "TLS": {
            "TLS": 3,
            "TLS v1.0": 1
          }
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 11
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "#1081": 1,
          "#1334": 1,
          "#1335": 1,
          "#390": 1,
          "#649": 1,
          "#846": 2
        }
      },
      "fips_certlike": {
        "Certlike": {
          "AES-256": 1,
          "DES40": 4,
          "DSA (Cert. #390": 1,
          "SHA-1": 3,
          "SHA-1 (Cert. #1081": 1
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 1
        }
      },
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 1
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 4
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RBG": 1,
          "RNG": 3
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 5,
          "FIPS 186-2": 2,
          "FIPS PUB 140-2": 3,
          "FIPS PUB 186-2": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1,
            "AES-256": 1
          },
          "RC": {
            "RC2": 4,
            "RC4": 2
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "Triple-DES": 11
          },
          "DES": {
            "DES": 4
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 22,
          "Microsoft Corporation": 3
        }
      },
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "noltinge",
      "/CreationDate": "D:20110609152007-04\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2",
      "/ModDate": "D:20110609152007-04\u002700\u0027",
      "/Producer": "Acrobat Distiller 8.1.0 (Windows)",
      "/Title": "Microsoft Word - Windows Server 2008 R2 DSSENH security policy.doc",
      "pdf_file_size_bytes": 165309,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 23
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_garbage": false,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_pdf_hash": "c0da152abbdabf1f92d708121120997e126ae688f82db8eefca400ce5a43cace",
    "policy_txt_hash": "d7a18593fccf360c4071a74a340706b4b0075ad97964bb366ca0d85fef9045e9"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode with Code Integrity (ci.dll) validated to FIPS 140-2 under Cert. #1334 operating in FIPS mode and Kernel Mode Cryptographic Primitives Library (cng.sys) validated to FIPS 140-2 under Cert. #1335 operating in FIPS mode",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/140crt1338.pdf",
    "date_sunset": null,
    "description": "DSSENH encapsulates several different cryptographic algorithms in an easy-to-use cryptographic module accessible via the Microsoft CryptoAPI. Software developers dynamically link the Microsoft DSSENH module into their applications to provide FIPS 140-2 compliant cryptographic support.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": null,
    "fw_versions": null,
    "historical_reason": "RNG SP800-131A Revision 1 Transition",
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {
      "1334": 1,
      "1335": 1
    },
    "module_name": "Windows Server 2008 R2 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH)",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": "6.1.7600.16385",
    "tested_conf": [
      "Microsoft Windows Server 2008 R2 (IA64 version)",
      "Microsoft Windows Server 2008 R2 (x64 Version)",
      "Microsoft Windows Server 2008 R2 SP1 (IA64 version) (single-user mode)",
      "Microsoft Windows Server 2008 R2 SP1 (x64 version)"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2010-08-12",
        "lab": "SAIC-VA",
        "validation_type": "Initial"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2011-06-01",
        "lab": "SAIC-VA",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2011-06-21",
        "lab": "SAIC-VA",
        "validation_type": "Update"
      }
    ],
    "vendor": "Microsoft Corporation",
    "vendor_url": "http://www.microsoft.com"
  }
}