VMware's BoringCrypto Module

Certificate #3846

Webpage information

Status historical
Historical reason Moved to historical list due to sunsetting
Validation dates 13.03.2021
Standard FIPS 140-2
Security level 1
Type Software
Embodiment Multi-Chip Stand Alone
Caveat When installed, initialized and configured as specified in Section 3.1 of the Security Policy and operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy
Exceptions
  • Physical Security: N/A
  • Mitigation of Other Attacks: N/A
Description VMware’s BoringCrypto Module is a versatile software library that implements FIPS 140-2 Approved cryptographic services for VMware products and platforms.
Tested configurations
  • Amazon Linux 2 on ESXi 7.0 running on Dell PowerEdge R740 with Intel® Xeon Gold 6126 with PAA
  • Amazon Linux 2 on ESXi 7.0 running on Dell PowerEdge R740 with Intel® Xeon Gold 6126 without PAA
  • Photon OS 2.0 on ESXi 7.0 running on Dell PowerEdge R740 with Intel® Xeon Gold 6126 with PAA
  • Photon OS 2.0 on ESXi 7.0 running on Dell PowerEdge R740 with Intel® Xeon Gold 6126 without PAA
  • Photon OS 3.0 on ESXi 6.7 running on Dell PowerEdge R740 with Intel® Xeon Gold 6126 with PAA
  • Photon OS 3.0 on ESXi 6.7 running on Dell PowerEdge R740 with Intel® Xeon Gold 6126 without PAA
  • Photon OS 3.0 on ESXi 7.0 running on Dell PowerEdge R740 with Intel® Xeon Gold 6126 with PAA
  • Photon OS 3.0 on ESXi 7.0 running on Dell PowerEdge R740 with Intel® Xeon Gold 6126 without PAA
  • Red Hat Enterprise Linux 7.7 on ESXi 7.0 running on Dell PowerEdge R740 with Intel® Xeon Gold 6126 with PAA
  • Red Hat Enterprise Linux 7.7 on ESXi 7.0 running on Dell PowerEdge R740 with Intel® Xeon Gold 6126 without PAA
  • Ubuntu 16.04 on ESXi 7.0 running on Dell PowerEdge R740 with Intel® Xeon Gold 6126 with PAA
  • Ubuntu 16.04 on ESXi 7.0 running on Dell PowerEdge R740 with Intel® Xeon Gold 6126 without PAA
  • Ubuntu 18.04 on ESXi 7.0 running on Dell PowerEdge R740 with Intel® Xeon Gold 6126 with PAA
  • Ubuntu 18.04 on ESXi 7.0 running on Dell PowerEdge R740 with Intel® Xeon Gold 6126 without PAA
  • Ubuntu 20.04 on ESXi 7.0 running on Dell PowerEdge R740 with Intel® Xeon Gold 6126 with PAA
  • Ubuntu 20.04 on ESXi 7.0 running on Dell PowerEdge R740 with Intel® Xeon Gold 6126 without PAA
  • Ubuntu 20.04 running on Dell Latitude E7450 with Intel® Core i5 with PAA
  • Ubuntu 20.04 running on Dell Latitude E7450 with Intel® Core i5 without PAA (single-user mode)
  • Within ESXi 7.0 (as a host) running on Dell PowerEdge R740 with Intel® Xeon Gold 6126 with PAA
  • Within ESXi 7.0 (as a host) running on Dell PowerEdge R740 with Intel® Xeon Gold 6126 without PAA
Vendor VMware, Inc.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, DES, Triple-DES, TDES, HMAC, CBC-MAC, CMAC
Asymmetric Algorithms
ECDSA, DSA
Hash functions
SHA-1, SHA-512, SHA-256, SHA-2, MD4, MD5
Schemes
MAC
Protocols
TLS
Randomness
PRNG, DRBG, RNG
Libraries
OpenSSL, BoringSSL
Elliptic Curves
P-256
Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM

Vendor
Cisco

Security level
Level 1

Standards
FIPS 140-2, FIPS 197, FIPS 186-4, FIPS 180-4, FIPS 198-1, SP 800-67, SP 800-38A, SP 800-38F, SP 800-38D, SP 800-56B, SP 800-90A, SP 800-133

File metadata

Title Security Policy
Subject FIPS 140-2 Security Policy Template
Author Manoj Maskara
Creation date D:20201214180942-05'00'
Modification date D:20201214180942-05'00'
Pages 24
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

Heuristics

No heuristics are available for this certificate.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 3846,
  "dgst": "a1a5242f44256747",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "Triple-DES#C2129",
        "RSA#C2129",
        "ECDSA#C2129",
        "DRBG#C2129",
        "CVL#C2129",
        "KTS#C2129",
        "AES#C2129",
        "SHS#C2129",
        "HMAC#C2129"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDSA": {
            "ECDSA": 17
          }
        },
        "FF": {
          "DSA": {
            "DSA": 1
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        },
        "CCM": {
          "CCM": 1
        },
        "CFB": {
          "CFB": 4
        },
        "CTR": {
          "CTR": 4
        },
        "ECB": {
          "ECB": 3
        },
        "GCM": {
          "GCM": 5
        },
        "OFB": {
          "OFB": 4
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "BoringSSL": {
          "BoringSSL": 2
        },
        "OpenSSL": {
          "OpenSSL": 1
        }
      },
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 4
          }
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-256": 2
        }
      },
      "eval_facility": {},
      "fips_cert_id": {},
      "fips_certlike": {
        "Certlike": {
          "AES key 128, 192": 1,
          "HMAC SHA-1": 1,
          "HMAC SHA-512": 1,
          "RSA2": 1,
          "SHA-1": 4,
          "SHA-2 (224": 2,
          "SHA-256": 3,
          "SHA-512": 3
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 3
        }
      },
      "hash_function": {
        "MD": {
          "MD4": {
            "MD4": 2
          },
          "MD5": {
            "MD5": 2
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 4
          },
          "SHA2": {
            "SHA-2": 2,
            "SHA-256": 3,
            "SHA-512": 3
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 6,
          "PRNG": 1
        },
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 15,
          "FIPS 180-4": 1,
          "FIPS 186-4": 4,
          "FIPS 197": 1,
          "FIPS 198-1": 1
        },
        "NIST": {
          "SP 800-133": 1,
          "SP 800-38A": 1,
          "SP 800-38D": 1,
          "SP 800-38F": 1,
          "SP 800-56B": 1,
          "SP 800-67": 1,
          "SP 800-90A": 3
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 13
          }
        },
        "DES": {
          "3DES": {
            "TDES": 2,
            "Triple-DES": 12
          },
          "DES": {
            "DES": 3
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 1,
            "CMAC": 1,
            "HMAC": 7
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 1
        }
      },
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "Manoj Maskara",
      "/CreationDate": "D:20201214180942-05\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/ModDate": "D:20201214180942-05\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "/Subject": "FIPS 140-2 Security Policy Template",
      "/Title": "Security Policy",
      "pdf_file_size_bytes": 870767,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://github.com/ninja-build/ninja/releases",
          "mailto:[email protected]",
          "https://csrc.nist.gov/Projects/Cryptographic-Module-Validation-Program/Validated-Modules/Search",
          "https://commondatastorage.googleapis.com/chromium-boringssl-docs/fips/boringssl-24e5886c0edfc409c8083d10f9f1120111efd6f5.tar.xz",
          "https://csrc.nist.gov/projects/cryptographic-module-validation-program"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 24
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "59e6e36a27415828681074ecba231aa5f2cfdf358915f03f419b79bfc9d5ce64",
    "policy_txt_hash": "db2a7d58d31dde273aa0456efef97192d57b8cb2d573939e5be56e884027bf25"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When installed, initialized and configured as specified in Section 3.1 of the Security Policy and operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/March 2021_010421_0724_signed.pdf",
    "date_sunset": null,
    "description": "VMware\u2019s BoringCrypto Module is a versatile software library that implements FIPS 140-2 Approved cryptographic services for VMware products and platforms.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Physical Security: N/A",
      "Mitigation of Other Attacks: N/A"
    ],
    "fw_versions": null,
    "historical_reason": "Moved to historical list due to sunsetting",
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {},
    "module_name": "VMware\u0027s BoringCrypto Module",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": "1.0",
    "tested_conf": [
      "Amazon Linux 2 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6126 with PAA",
      "Amazon Linux 2 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6126 without PAA",
      "Photon OS 2.0 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6126 with PAA",
      "Photon OS 2.0 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6126 without PAA",
      "Photon OS 3.0 on ESXi 6.7 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6126 with PAA",
      "Photon OS 3.0 on ESXi 6.7 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6126 without PAA",
      "Photon OS 3.0 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6126 with PAA",
      "Photon OS 3.0 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6126 without PAA",
      "Red Hat Enterprise Linux 7.7 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6126 with PAA",
      "Red Hat Enterprise Linux 7.7 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6126 without PAA",
      "Ubuntu 16.04 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6126 with PAA",
      "Ubuntu 16.04 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6126 without PAA",
      "Ubuntu 18.04 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6126 with PAA",
      "Ubuntu 18.04 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6126 without PAA",
      "Ubuntu 20.04 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6126 with PAA",
      "Ubuntu 20.04 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6126 without PAA",
      "Ubuntu 20.04 running on Dell Latitude E7450 with Intel\u00ae Core i5 with PAA",
      "Ubuntu 20.04 running on Dell Latitude E7450 with Intel\u00ae Core i5 without PAA (single-user mode)",
      "Within ESXi 7.0 (as a host) running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6126 with PAA",
      "Within ESXi 7.0 (as a host) running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6126 without PAA"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2021-03-13",
        "lab": "Acumen Security",
        "validation_type": "Initial"
      }
    ],
    "vendor": "VMware, Inc.",
    "vendor_url": "https://www.vmware.com"
  }
}