Kemp LoadMaster FIPS Object Module

Certificate #4639

Webpage information ?

Status historical
Historical reason Moved to historical list due to sunsetting
Validation dates 23.10.2023
Standard FIPS 140-2
Security level 1
Type Software
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy
Exceptions
  • Roles, Services, and Authentication: Level 2
  • Physical Security: N/A
  • Design Assurance: Level 3
  • Mitigation of Other Attacks: N/A
Description The LoadMaster is a family of load balancing appliances running a custom operating system developed by Kemp Technologies Inc.
Tested configurations
  • LMOS 7.2 on VMware ESXi 6.7 running Dell PowerEdge R830 with an Intel Xeon E5 4620 v4 Without PAA
  • LMOS 7.2 running on VMware ESXi 6.7 Dell PowerEdge R830 with an Intel Xeon E5 4620 v4 With PAA
  • LMOS 7.2 running LoadMasterX15 with an Intel Xeon E3 1275 v6 With PAA
  • LMOS 7.2 running LoadMasterX15 with an Intel Xeon E3 1275 v6 Without PAA
Vendor Progress Software Corporation
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy ?

Symmetric Algorithms
AES-128, AES-192, AES-256, AES-, AES, TDES, Triple-DES, TDEA, HMAC, CMAC
Asymmetric Algorithms
ECDSA, ECC, DH, Diffie-Hellman, DSA
Hash functions
SHA-1, SHA1, SHA-224, SHA-256, SHA-384, SHA-512, SHA256, SHA-2, SHA2
Schemes
Key Agreement
Protocols
TLS
Randomness
DRBG
Libraries
OpenSSL
Elliptic Curves
P-224, P-384, P-192, P-256, P-521, K-233, K-283, K-571, B-283, B-571, B-163, B-233, B-409
Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM, XTS

Security level
Level 1

Standards
FIPS 140-2, FIPS 197, FIPS 180-4, FIPS 198, FIPS 186-2, FIPS 186-4, FIPS 198-1, SP 800-90A, SP 800-133, SP 800-67, SP 800-38A, SP 800-38B, SP 800-38C, SP 800-38D, SP 800-38E, SP 800-56A, NIST SP 800-38D, SP 800-89, SP 800-131A, PKCS#1, RFC 5288, RFC 5246

File metadata

Author chris brych
Creation date D:20230411162329+05'30'
Modification date D:20230411162329+05'30'
Pages 19
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

Heuristics ?

No heuristics are available for this certificate.

References ?

No references are available for this certificate.

Updates ?

  • 02.01.2024 The certificate data changed.
    Certificate changed

    The web extraction data was updated.

    • The status property was set to historical.
    • The historical_reason property was set to Moved to historical list due to sunsetting.
    • The date_sunset property was set to None.
  • 06.11.2023 The certificate data changed.
    Certificate changed

    The web extraction data was updated.

    • The certificate_pdf_url property was set to https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/October 2023_011123_0711.pdf.
  • 01.11.2023 The certificate was first processed.
    New certificate

    A new FIPS 140 certificate with the product name was processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 4639,
  "dgst": "fd7d77de225b3254",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "Triple-DES#C2076",
        "SHS#C2076",
        "ECDSA#C2076",
        "DRBG#C2076",
        "CVL#C2076",
        "RSA#C2076",
        "HMAC#C2076",
        "DSA#C2076",
        "AES#C2076"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 3
          },
          "ECDSA": {
            "ECDSA": 15
          }
        },
        "FF": {
          "DH": {
            "DH": 8,
            "Diffie-Hellman": 2
          },
          "DSA": {
            "DSA": 16
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        },
        "CCM": {
          "CCM": 4
        },
        "CFB": {
          "CFB": 3
        },
        "CTR": {
          "CTR": 1
        },
        "ECB": {
          "ECB": 3
        },
        "GCM": {
          "GCM": 7
        },
        "OFB": {
          "OFB": 1
        },
        "XTS": {
          "XTS": 5
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 1
        }
      },
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 1
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 2
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "B-163": 2,
          "B-233": 1,
          "B-283": 1,
          "B-409": 1,
          "B-571": 1,
          "K-233": 2,
          "K-283": 2,
          "K-571": 2,
          "P-192": 6,
          "P-224": 4,
          "P-256": 2,
          "P-384": 2,
          "P-521": 2
        }
      },
      "eval_facility": {},
      "fips_cert_id": {},
      "fips_certlike": {
        "Certlike": {
          "AES 128/ 192/256": 1,
          "AES 128/192/256": 1,
          "AES, 256": 1,
          "AES- 256": 1,
          "AES-128": 3,
          "AES-128 128": 1,
          "AES-192": 2,
          "AES-256": 1,
          "AES-256 256": 1,
          "DRBG1": 1,
          "HMAC SHA-1": 1,
          "HMAC-SHA-1": 6,
          "PAA 2": 1,
          "PAA 3": 1,
          "PAA 4": 1,
          "PKCS#1": 2,
          "SHA-1": 19,
          "SHA-1 128": 1,
          "SHA-1, 224": 18,
          "SHA-2": 3,
          "SHA-2 (224": 2,
          "SHA-224": 15,
          "SHA-256": 5,
          "SHA-384": 5,
          "SHA-512": 4,
          "SHA-512 256": 1,
          "SHA1": 2,
          "SHA2": 1,
          "SHA256": 2
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 38,
            "SHA1": 2
          },
          "SHA2": {
            "SHA-2": 5,
            "SHA-224": 16,
            "SHA-256": 5,
            "SHA-384": 5,
            "SHA-512": 5,
            "SHA2": 1,
            "SHA256": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 19
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 12,
          "FIPS 180-4": 2,
          "FIPS 186-2": 4,
          "FIPS 186-4": 8,
          "FIPS 197": 2,
          "FIPS 198": 1,
          "FIPS 198-1": 1
        },
        "NIST": {
          "NIST SP 800-38D": 1,
          "SP 800-131A": 1,
          "SP 800-133": 1,
          "SP 800-38A": 2,
          "SP 800-38B": 2,
          "SP 800-38C": 2,
          "SP 800-38D": 2,
          "SP 800-38E": 1,
          "SP 800-56A": 6,
          "SP 800-67": 1,
          "SP 800-89": 1,
          "SP 800-90A": 4
        },
        "PKCS": {
          "PKCS#1": 1
        },
        "RFC": {
          "RFC 5246": 1,
          "RFC 5288": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 19,
            "AES-": 1,
            "AES-128": 4,
            "AES-192": 3,
            "AES-256": 2
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "TDES": 1,
            "Triple-DES": 7
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 15,
            "HMAC": 6
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "chris brych",
      "/CreationDate": "D:20230411162329+05\u002730\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/ModDate": "D:20230411162329+05\u002730\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "pdf_file_size_bytes": 441207,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://csrc.nist.gov/publications/nistpubs/800-90/SP800-90revised_March2007.pdf",
          "http://csrc.nist.gov/publications/fips/fips180-3/fips180-3_final.pdf",
          "http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf",
          "https://csrc.nist.gov/projects/cryptographic-module-validation-program",
          "http://csrc.nist.gov/publications/fips/fips186-3/fips_186-3.pdf",
          "http://csrc.nist.gov/publications/nistpubs/800-67/SP800-67.pdf",
          "http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf",
          "http://csrc.nist.gov/publications/nistpubs/800-89/SP-800-89_November2006.pdf",
          "http://csrc.nist.gov/publications/nistpubs/800-56A/SP800-56A_Revision1_Mar08-2007.pdf",
          "http://csrc.nist.gov/publications/fips/fips198-1/FIPS-198-1_final.pdf",
          "http://csrc.nist.gov/publications/nistpubs/800-131A/sp800-131A.pdf",
          "http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 19
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_garbage": false,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_pdf_hash": "ea207a06d647bed5440b9d1ce442d1edf8f983aff6c89311064779b827032a0b",
    "policy_txt_hash": "c84b86d6a05d60207050afd6dac73e15fafec0f2cf340603fcb53393fd44da1d"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/October 2023_011123_0711.pdf",
    "date_sunset": null,
    "description": "The LoadMaster is a family of load balancing appliances running a custom operating system developed by Kemp Technologies Inc.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Roles, Services, and Authentication: Level 2",
      "Physical Security: N/A",
      "Design Assurance: Level 3",
      "Mitigation of Other Attacks: N/A"
    ],
    "fw_versions": null,
    "historical_reason": "Moved to historical list due to sunsetting",
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {},
    "module_name": "Kemp LoadMaster FIPS Object Module",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": "v1.0",
    "tested_conf": [
      "LMOS 7.2 on VMware ESXi 6.7  running Dell PowerEdge R830 with an Intel Xeon E5 4620 v4 Without PAA",
      "LMOS 7.2 running  on VMware ESXi 6.7 Dell PowerEdge R830 with an Intel Xeon E5 4620 v4 With PAA",
      "LMOS 7.2 running LoadMasterX15 with an Intel Xeon E3 1275 v6 With PAA",
      "LMOS 7.2 running LoadMasterX15 with an Intel Xeon E3 1275 v6 Without PAA"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2023-10-23",
        "lab": "ACUMEN SECURITY, LLC",
        "validation_type": "Initial"
      }
    ],
    "vendor": "Progress Software Corporation",
    "vendor_url": "http://www.progress.com"
  }
}