Red Hat Enterprise Linux 6.6 OpenSSH Server Cryptographic Module

Known vulnerabilities detected

Our automated heuristics have identified vulnerabilities that may be associated with this certificate. See the CVEs section for details.

Certificate #2446

Webpage information

Status historical
Historical reason Moved to historical list due to sunsetting
Validation dates 16.09.2015 , 28.04.2016
Standard FIPS 140-2
Security level 1
Type Software
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS mode with module Red Hat Enterprise Linux 6.6 OpenSSL Module validated to FIPS 140-2 under Cert. #2441 operating in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy
Exceptions
  • Physical Security: N/A
Description The OpenSSH Server cryptographic module provides the server-side component for an SSH protocol version 2 protected communication channel. OpenSSH is the standard SSH implementation and shipped with RHEL 6.6. Its cryptographic mechanisms use the OpenSSL library in FIPS 140-2 mode.
Tested configurations
  • Red Hat Enterprise Linux 6.6 running on HP ProLiant DL380p Gen8 with PAA
  • Red Hat Enterprise Linux 6.6 running on HP ProLiant DL380p Gen8 without PAA
  • Red Hat Enterprise Linux 6.6 running on IBM System x3500 M4 with PAA
  • Red Hat Enterprise Linux 6.6 running on IBM System x3500 M4 without PAA (single-user mode)
Vendor Red Hat®, Inc.
References

This certificate's webpage directly references 1 certificates, transitively this expands into 1 certificates.

Security policy

Symmetric Algorithms
AES, DES, Triple-DES, HMAC, HMAC-SHA-256, HMAC-SHA-224, HMAC-SHA-384
Asymmetric Algorithms
ECDSA, Diffie-Hellman, DH, DSA
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384
Schemes
MAC, Key agreement, Key Agreement
Protocols
SSH, SSHv2, SSL, IKE
Randomness
DRBG, RNG
Libraries
OpenSSL, NSS, libgcrypt
Block cipher modes
ECB, CBC, CFB, OFB, CCM

Security level
Level 1, level 1
Side-channel analysis
timing attacks
Certification process
out of scope, through that session, whichever occurs first. Persistently stored secret and private keys are out of scope, but may be zeroized using the a FIPS140-2 approved mechanism to clear data on hard disks. 6.2. Key

Standards
FIPS 140-2, FIPS140-2, FIPS 197, FIPS 180-4, FIPS 198-1, FIPS 186-4

File metadata

Title FIPS 140-2 Security Policy
Subject Red Hat Enterprise Linux 6.6 OpenSSH Server Cryptographic Module
Author Renaudt Nuñez
Creation date D:20160427141557-05'00'
Pages 24
Creator Writer
Producer LibreOffice 5.1

References

Outgoing
  • 2441 - historical - Red Hat Enterprise Linux 6.6 OpenSSL Module, Red Hat Enterprise Linux 7.1 OpenSSL Module

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2016-7091
C N
MEDIUM 4.4 3.6 22.12.2016
CVE-2017-1000253
C N
HIGH 7.8 5.9 05.10.2017
CVE-2018-1111
C N
HIGH 7.5 5.9 17.05.2018

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 2446,
  "dgst": "d047f40b7ef6b9d2",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "CVL#527",
        "CVL#526"
      ]
    },
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:o:redhat:enterprise_linux:6.6:*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "6.6"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "2441"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "2441"
        ]
      }
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": [
        "2441"
      ]
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "2441"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "1401",
          "1397",
          "1404",
          "1406",
          "1409",
          "1403",
          "1398",
          "1399",
          "1400",
          "2441",
          "1402",
          "1405"
        ]
      }
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": [
        "2441"
      ]
    },
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2016-7091",
        "CVE-2018-1111",
        "CVE-2017-1000253"
      ]
    },
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDSA": {
            "ECDSA": 6
          }
        },
        "FF": {
          "DH": {
            "DH": 3,
            "Diffie-Hellman": 11
          },
          "DSA": {
            "DSA": 9
          }
        }
      },
      "certification_process": {
        "OutOfScope": {
          "out of scope": 1,
          "through that session, whichever occurs first. Persistently stored secret and private keys are out of scope, but may be zeroized using the a FIPS140-2 approved mechanism to clear data on hard disks. 6.2. Key": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        },
        "CCM": {
          "CCM": 1
        },
        "CFB": {
          "CFB": 1
        },
        "ECB": {
          "ECB": 1
        },
        "OFB": {
          "OFB": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "NSS": {
          "NSS": 1
        },
        "OpenSSL": {
          "OpenSSL": 39
        },
        "libgcrypt": {
          "libgcrypt": 1
        }
      },
      "crypto_protocol": {
        "IKE": {
          "IKE": 1
        },
        "SSH": {
          "SSH": 42,
          "SSHv2": 1
        },
        "TLS": {
          "SSL": {
            "SSL": 1
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 2,
          "Key agreement": 1
        },
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "atsec": {
          "atsec": 23
        }
      },
      "fips_cert_id": {
        "Cert": {
          "#2441": 2,
          "#526": 1,
          "#527": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "HMAC-SHA- 1": 2,
          "HMAC-SHA- 256": 4,
          "HMAC-SHA-1": 2,
          "HMAC-SHA-224": 2,
          "HMAC-SHA-256": 20,
          "HMAC-SHA-384": 2,
          "SHA-1": 1,
          "SHA-224": 1,
          "SHA-256": 1,
          "SHA-384": 1
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 2,
          "level 1": 5
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          },
          "SHA2": {
            "SHA-224": 1,
            "SHA-256": 1,
            "SHA-384": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 17
        },
        "RNG": {
          "RNG": 4
        }
      },
      "side_channel_analysis": {
        "SCA": {
          "timing attacks": 1
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 50,
          "FIPS 180-4": 1,
          "FIPS 186-4": 1,
          "FIPS 197": 1,
          "FIPS 198-1": 1,
          "FIPS140-2": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 5
          }
        },
        "DES": {
          "3DES": {
            "Triple-DES": 3
          },
          "DES": {
            "DES": 2
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 6,
            "HMAC-SHA-224": 1,
            "HMAC-SHA-256": 10,
            "HMAC-SHA-384": 1
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "Renaudt Nu\u00f1ez",
      "/CreationDate": "D:20160427141557-05\u002700\u0027",
      "/Creator": "Writer",
      "/Producer": "LibreOffice 5.1",
      "/Subject": "Red Hat Enterprise Linux 6.6 OpenSSH Server Cryptographic Module",
      "/Title": "FIPS 140-2 Security Policy",
      "pdf_file_size_bytes": 258901,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://webstore.ansi.org/FindStandards.aspx?Action=displaydept\u0026DeptID=80\u0026Acro=X9\u0026DpName=X9,%20Inc.",
          "http://webstore.ansi.org/RecordDetail.aspx?sku=ANSI+X9.52%3A1998",
          "mailto:[email protected]",
          "http://csrc.nist.gov/groups/STM/cmvp/standards.html",
          "http://csrc.nist.gov/publications/PubsFIPS.html"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 24
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "3d8a479d3babdeafee3e45af83f9cfbcd35a45cb898dd3799f30a6cab106bda0",
    "policy_txt_hash": "d5ea26245b45cad7a1f55e83b307da7e44d19ee9b22f437a9c6549129bc00498"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode with module Red Hat Enterprise Linux 6.6 OpenSSL Module validated to FIPS 140-2 under Cert. #2441 operating in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertList0057.pdf",
    "date_sunset": null,
    "description": "The OpenSSH Server cryptographic module provides the server-side component for an SSH protocol version 2 protected communication channel. OpenSSH is the standard SSH implementation and shipped with RHEL 6.6. Its cryptographic mechanisms use the OpenSSL library in FIPS 140-2 mode.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Physical Security: N/A"
    ],
    "fw_versions": null,
    "historical_reason": "Moved to historical list due to sunsetting",
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {
      "2441": 1
    },
    "module_name": "Red Hat Enterprise Linux 6.6 OpenSSH Server Cryptographic Module",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": "3.1",
    "tested_conf": [
      "Red Hat Enterprise Linux 6.6 running on HP ProLiant DL380p Gen8 with PAA",
      "Red Hat Enterprise Linux 6.6 running on HP ProLiant DL380p Gen8 without PAA",
      "Red Hat Enterprise Linux 6.6 running on IBM System x3500 M4 with PAA",
      "Red Hat Enterprise Linux 6.6 running on IBM System x3500 M4 without PAA (single-user mode)"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2015-09-16",
        "lab": "atsec information security corporation",
        "validation_type": "Initial"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2016-04-28",
        "lab": "atsec information security corporation",
        "validation_type": "Update"
      }
    ],
    "vendor": "Red Hat\u00ae, Inc.",
    "vendor_url": "http://www.redhat.com"
  }
}