Module Name
Ubuntu 18.04 Strongswan Cryptographic Module
Historical Reason
SP 800-56Arev3 transition
Caveat
When operated in FIPS mode and installed, initialized and configured as specified in Section 9.1 of the Security Policy with module Ubuntu OpenSSL Cryptographic Module validated to FIPS 140-2 under Cert. #3622 operating in FIPS mode and with module Ubuntu Kernel Crypto API Cryptographic Module validated to FIPS140-2 under Cert. #3647 operating in FIPS mode
Security Level Exceptions
- Physical Security: N/A
- Mitigation of Other Attacks: N/A
Embodiment
Multi-Chip Stand Alone
Description
Ubuntu 18.04 Strongswan Cryptographic Module provides cryptographic services for the Internet Key Exchange (IKE) protocol in the Ubuntu Operating System user space.
Tested Configuration(s)
- Ubuntu 18.04 LTS 64-bit on IBM z/VM running on IBM z/14 with z14 with PAI [1]
- Ubuntu 18.04 LTS 64-bit on IBM z/VM running on IBM z/14 with z14 without PAI [1] (single-user mode)
- Ubuntu 18.04 LTS 64-bit running on Supermicro SYS-5018R-WR with Intel Xeon CPU E5-2620v3 with PAA [1][2]
- Ubuntu 18.04 LTS 64-bit running on Supermicro SYS-5018R-WR with Intel Xeon CPU E5-2620v3 without PAA [1][2]
Approved Algorithms
AES |
Certs. #C670, #C671, #C672, #C673, #C674, #C675, #C676, #C677, #C678, #C679, #C680, #C687, #C688, #C689, #C690, #C691 and #C692 |
CVL |
Certs. #C682, #C683, #C684, #C685, #C687, #C688, #C752 and #C753 |
DRBG |
Certs. #C670, #C673, #C677, #C687 and #C688 |
ECDSA |
Certs. #C682, #C683, #C684, #C685, #C687 and #C688 |
HMAC |
Certs. #C682, #C683, #C684, #C685, #C687, #C688, #C755, #C766, #C767, #C768, #C771 and #C772 |
RSA |
Certs. #C682, #C683, #C684, #C685, #C687 and #C688 |
SHS |
Certs. #C682, #C683, #C684, #C685, #C687, #C688, #C755, #C766, #C767, #C768, #C771 and #C772 |
Triple-DES |
Certs. #C669 and #C686 |
Allowed Algorithms
Diffie-Hellman (CVL Certs. #C682, #C683, #C684, #C685, #C687 and #C688 with CVL Certs. #C752 and #C753, key agreement; key establishment methodology provides between 112 and 192 bits of encryption strength); EC Diffie-Hellman (CVL Certs. #C682, #C683, #C684, #C685, #C687 and #C688 with CVL Certs. #C752 and #C753, key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength); NDRNG
Software Versions
2.0 [1] and 2.1 [2]