Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Module Validation Program

Certificate #1792

Details

Module Name
Red Hat Enterprise Linux 6.2 OpenSSH Server Cryptographic Module
Standard
FIPS 140-2
Status
Historical
 Historical Reason
RNG SP800-131A Revision 1 Transition
Validation Dates
8/24/2012
10/23/2012
Overall Level
1
Caveat
When operated in FIPS mode. This module contains the embedded module Red Hat Enterprise Linux 6.2 OpenSSL Cryptographic Module validated to FIPS 140-2 under Cert. #1758 operating in FIPS mode. When obtained, installed, and initialized as specified in Section 9.1 of the provided Security Policy. Section 1 of the provided Security Policy specifies the precise RPM file containing this module. The integrity of the RPM is automatically verified during the installation and the Crypto officer shall not install the RPM file if the RPM tool indicates an integrity error. Any deviation from the specified verification, installation and initialization procedures will result in a non FIPS 140-2 compliant module. The module generates cryptographic keys whose strengths are modified by available entropy.
Module Type
Software
Embodiment
Multi-chip standalone
Description
The OpenSSH Server cryptographic module provides the server-side component for an SSH protocol version 2 protected communication channel. OpenSSH is the standard SSH implementation and shipped with RHEL 6.2. Its cryptographic mechanisms use the OpenSSL library in FIPS 140-2 mode.
Tested Configuration(s)
  • Red Hat Enterprise Linux 6.2 (single-user mode)
FIPS Algorithms
AES Certs. #1887, #1888, #1889, #1893, #1894 and #1895
DSA Certs. #592, #593, #597 and #598
HMAC Certs. #1129, #1130, #1134 and #1135
RNG Certs. #989, #990, #994 and #995
RSA Certs. #964, #965, #969 and #970
SHS Certs. #1658, #1659, #1663 and #1664
Triple-DES Certs. #1226, #1227, #1231 and #1232
Other Algorithms
RSA (key wrapping; key establishment methodology provides between 112 and 160 bits of encryption strength; non-compliant less than 112 bits of encryption strength); Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 160 bits of encryption strength; non-compliant less than 112 bits of encryption strength)
Software Versions
2.1

Vendor

Red Hat®, Inc.
314 Littleton Road
Westford, MA 01886
USA

Irina Boverman
iboverma@redhat.com
Phone: 978-392-1000
Fax: 978-392-1001

Lab

atsec
NVLAP Code: 200658-0