Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Module Validation Program

Certificate #1386

Details

Module Name
Red Hat Enterprise Linux 5 OpenSwan Cryptographic Module
Standard
FIPS 140-2
Status
Historical
 Historical Reason
RNG SP800-131A Revision 1 Transition
Validation Dates
8/12/2010
Overall Level
1
Caveat
When operated in FIPS mode. When obtained, installed, and initialized as assumed by the Crypto Officer role and specified in Section 9 of the provided Security Policy. This module contains the embedded modules Red Hat Enterprise Linux 5 OpenSSL Cryptographic Module validated to FIPS 140-2 under Cert. #1320 operating in FIPS mode and the Network Security Services (NSS) Cryptographic Module validated to FIPS 140-2 under Cert. #815 (Approved algorithms retested on listed operating environment) operating in FIPS mode. Section 1 of the provided Security Policy specifies the precise RPM files containing this module. The integrity of the RPMs is automatically verified during the installation and the Crypto officer shall not install the RPM files if the RPM tool indicates an integrity error. Any deviation from the specified verification, installation and initialization procedures will result in a non FIPS 140-2 compliant module.
Module Type
Software
Embodiment
Multi-chip standalone
Description
The Red Hat Enterprise Linux 5 OpenSwan Cryptographic Module is a software only cryptographic module that provides the IKE protocol version 1 and version 2 key agreement services required for IPSec.
Tested Configuration(s)
  • Red Hat Enterprise Linux 5.4 (single-user mode)
FIPS Algorithms
AES Cert. #1368
DSA Cert. #449
HMAC Certs. #661, #662 and #663
RNG Cert. #755
RSA Cert. #669
SHS Cert. #1250
Triple-DES Cert. #943
Other Algorithms
Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 112 bits and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); RSA (key wrapping; key establishment methodology provides between 112 bits and 192 bits of encryption strength; non-compliant less than 112 bits of encryption strength); RC2; RC4; DES; MD2; MD5
Software Versions
1.0

Vendor

Red Hat®, Inc.
314 Littleton Road
Raleigh, NC 27606
USA

Irina Boverman
iboverma@redhat.com
Phone: 978 392 1000
Karl Wirth
kwirth@redhat.com
Phone: 978 392 1000

Lab

atsec
NVLAP Code: 200658-0