Module Name
Ubuntu 18.04 OpenSSH Client Cryptographic Module
Historical Reason
SP 800-56Arev3 transition
Caveat
When operated in FIPS mode and installed, initialized and configured as specified in Section 9.1 of the Security Policy with module Ubuntu 18.04 OpenSSL Cryptographic Module validated to FIPS 140-2 under Cert. #3622 operating in FIPS mode
Security Level Exceptions
- Physical Security: N/A
- Mitigation of Other Attacks: N/A
Embodiment
Multi-Chip Stand Alone
Description
The Ubuntu 18.04 OpenSSH Client cryptographic module provides the client-side component for an SSH protocol version 2 protected communication channel. Its cryptographic mechanisms use the OpenSSL library in FIPS 140-2 mode.
Tested Configuration(s)
- Ubuntu 18.04 LTS 64-bit on IBM z/VM running on IBM z/14 with z14 with PAI
- Ubuntu 18.04 LTS 64-bit on IBM z/VM running on IBM z/14 with z14 without PAI (single-user mode)
- Ubuntu 18.04 LTS 64-bit running on Supermicro SYS-5018R-WR with Intel Xeon CPU E5-2620v3 with PAA
- Ubuntu 18.04 LTS 64-bit running on Supermicro SYS-5018R-WR with Intel Xeon CPU E5-2620v3 without PAA
Approved Algorithms
AES |
Certs. #C670, #C671, #C672, #C673, #C674, #C675, #C676, #C677, #C678, #C679, #C680, #C687, #C688, #C689, #C690, #C691 and #C692 |
CVL |
Certs. #C682, #C683, #C684, #C685, #C687, #C688, #C740 and #C741 |
DRBG |
Certs. #C670, #C673, #C677, #C687 and #C688 |
DSA |
Certs. #C682, #C683, #C684, #C685, #C687 and #C688 |
ECDSA |
Certs. #C682, #C683, #C684, #C685, #C687 and #C688 |
HMAC |
Certs. #C682, #C683, #C684, #C685, #C687 and #C688 |
RSA |
Certs. #C682, #C683, #C684, #C685, #C687 and #C688 |
SHS |
Certs. #C682, #C683, #C684, #C685, #C687 and #C688 |
Triple-DES |
Certs. #C669 and #C686 |
Allowed Algorithms
Diffie-Hellman (CVL Certs. #C682, #C683, #C684, #C685, #C687 and #C688 with CVL Certs. #C740 and #C741, key agreement; key establishment methodology provides between 112 and 201 bits of encryption strength); EC Diffie-Hellman (CVL Certs. #C682, #C683, #C684, #C685, #C687 and #C688 with CVL Certs. #C740 and #C741, key agreement; key establishment methodology provides between 128 and 256 bits of encryption strength); NDRNG