SUSE Rancher Kubernetes Cryptographic Library

Certificate #4578

Webpage information ?

Status active
Validation dates 01.09.2023
Sunset date 01-11-2023
Standard FIPS 140-2
Security level 1
Type Software
Embodiment Multi-Chip Stand Alone
Caveat When installed, initialized and configured as specified in Section 9.1 of the Security Policy and operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy.
Exceptions
  • Physical Security: N/A
  • Mitigation of Other Attacks: N/A
Description A software library that contains cryptography to serve SUSE’s Rancher Kubernetes Engine and its ecosystem of supported cloud-native tools written in the Go programming language.
Tested configurations
  • CentOS 7.8 running on Dell PowerEdge R440 with Intel® Xeon® Silver 4214R with PAA (clang 6.0.1)
  • CentOS 7.8 running on Dell PowerEdge R440 with Intel® Xeon® Silver 4214R without PAA (clang 6.0.1)
  • CentOS 8.2 running on Dell PowerEdge R440 with Intel® Xeon® Silver 4214R with PAA (clang 6.0.1)
  • CentOS 8.2 running on Dell PowerEdge R440 with Intel® Xeon® Silver 4214R without PAA (clang 6.0.1)
  • Red Hat Enterprise Linux 7.8 running on Dell PowerEdge R440 with Intel® Xeon® Silver 4214R with PAA (clang 6.0.1)
  • Red Hat Enterprise Linux 7.8 running on Dell PowerEdge R440 with Intel® Xeon® Silver 4214R without PAA (clang 6.0.1)
  • Red Hat Enterprise Linux 8.2 running on Dell PowerEdge R440 with Intel® Xeon® Silver 4214R with PAA (clang 6.0.1)
  • Red Hat Enterprise Linux 8.2 running on Dell PowerEdge R440 with Intel® Xeon® Silver 4214R without PAA (clang 6.0.1) (single-user mode)
Vendor SUSE LLC
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Document information ?

Security policy

Symmetric Algorithms
AES, AES-256, DES, TDEA, Triple-DES, HMAC, HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512
Asymmetric Algorithms
ECDSA, ECC, DH, Diffie-Hellman
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, MD4, MD5
Schemes
Key Agreement
Protocols
TLS
Randomness
DRBG
Libraries
BoringSSL
Elliptic Curves
P-224, P-256, P-384, P-521
Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM

Security level
Level 1

Standards
FIPS 140-2, FIPS 180-4, FIPS 186-4, FIPS 197, FIPS 198-1, SP 800-38A, NIST SP 800-38A, SP 800-38D, NIST SP 800-38D, SP 800-38F, NIST SP 800-38F, SP 800-56A, NIST SP 800-56A, SP 800-56B, NIST SP 800-56B, SP 800-57, NIST SP 800-57, SP 800-67, NIST SP 800-67, SP 800-90A, NIST SP 800-90A, SP 800-131A, NIST SP 800-131A, SP 800-133, NIST SP 800-133, SP 800-135, NIST SP 800-135, RFC 5288, RFC 5246

File metadata

Author: Rachel Shelby
Creation date: D:20230209211224-08'00'
Modification date: D:20230209211224-08'00'
Pages: 16
Creator: Microsoft® Word for Microsoft 365
Producer: Microsoft® Word for Microsoft 365

References

Heuristics ?

No heuristics are available for this certificate.

References ?

No references are available for this certificate.

Updates ?

  • 18.09.2023 The certificate was first processed.
    New certificate

    A new FIPS 140 certificate with the product name was processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 4578,
  "dgst": "243b8a8b497f3126",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "RSA#A865",
        "DRBG#A865",
        "SHS#A865",
        "Triple-DES#A865",
        "ECDSA#A865",
        "KTS#A865",
        "HMAC#A865",
        "AES#A865",
        "CVL#A865"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "500"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "500"
        ]
      }
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": [
        "500"
      ]
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 2
          },
          "ECDSA": {
            "ECDSA": 18
          }
        },
        "FF": {
          "DH": {
            "DH": 1,
            "Diffie-Hellman": 3
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        },
        "CFB": {
          "CFB": 3
        },
        "CTR": {
          "CTR": 1
        },
        "ECB": {
          "ECB": 1
        },
        "GCM": {
          "GCM": 3
        },
        "OFB": {
          "OFB": 3
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "BoringSSL": {
          "BoringSSL": 3
        }
      },
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 5
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 4
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-224": 2,
          "P-256": 4,
          "P-384": 2,
          "P-521": 2
        }
      },
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "#500": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "AES-256": 1,
          "DRBG 7": 1,
          "HMAC-SHA-1": 4,
          "HMAC-SHA-224": 2,
          "HMAC-SHA-256": 2,
          "HMAC-SHA-384": 2,
          "HMAC-SHA-512": 6,
          "SHA-1": 2,
          "SHA-224": 1,
          "SHA-256": 3,
          "SHA-384": 1,
          "SHA-512": 2
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 2
        }
      },
      "hash_function": {
        "MD": {
          "MD4": {
            "MD4": 2
          },
          "MD5": {
            "MD5": 3
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 2
          },
          "SHA2": {
            "SHA-224": 1,
            "SHA-256": 3,
            "SHA-384": 1,
            "SHA-512": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 8
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 20,
          "FIPS 180-4": 3,
          "FIPS 186-4": 4,
          "FIPS 197": 3,
          "FIPS 198-1": 3
        },
        "NIST": {
          "NIST SP 800-131A": 1,
          "NIST SP 800-133": 1,
          "NIST SP 800-135": 1,
          "NIST SP 800-38A": 1,
          "NIST SP 800-38D": 1,
          "NIST SP 800-38F": 1,
          "NIST SP 800-56A": 1,
          "NIST SP 800-56B": 1,
          "NIST SP 800-57": 1,
          "NIST SP 800-67": 1,
          "NIST SP 800-90A": 1,
          "SP 800-131A": 2,
          "SP 800-133": 3,
          "SP 800-135": 3,
          "SP 800-38A": 3,
          "SP 800-38D": 3,
          "SP 800-38F": 2,
          "SP 800-56A": 5,
          "SP 800-56B": 3,
          "SP 800-57": 1,
          "SP 800-67": 2,
          "SP 800-90A": 5
        },
        "RFC": {
          "RFC 5246": 1,
          "RFC 5288": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 18,
            "AES-256": 1
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "Triple-DES": 11
          },
          "DES": {
            "DES": 2
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 6,
            "HMAC-SHA-224": 1,
            "HMAC-SHA-256": 1,
            "HMAC-SHA-384": 1,
            "HMAC-SHA-512": 3
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "Rachel Shelby",
      "/CreationDate": "D:20230209211224-08\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/ModDate": "D:20230209211224-08\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "pdf_file_size_bytes": 557566,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://csrc.nist.gov/CSRC/media/Projects/Cryptographic-Module-Validation-Program/documents/fips140-2/FIPS1402IG.pdf",
          "http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90Ar1.pdf",
          "http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf",
          "http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.198-1.pdf",
          "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Br2.pdf",
          "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Ar3.pdf",
          "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar2.pdf",
          "https://csrc.nist.gov/publications/detail/sp/800-135/rev-1/final",
          "https://csrc.nist.gov/CSRC/media/Publications/fips/140/2/final/documents/fips1402annexc.pdf",
          "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf",
          "http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38a.pdf",
          "http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-38F.pdf",
          "https://csrc.nist.gov/publications/detail/sp/800-67/rev-2/final",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=33463",
          "https://csrc.nist.gov/CSRC/media/Publications/fips/140/2/final/documents/fips1402annexd.pdf",
          "https://csrc.nist.gov/CSRC/media/Publications/fips/140/2/final/documents/fips1402annexa.pdf",
          "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-133r2.pdf",
          "https://csrc.nist.gov/publications/detail/sp/800-38d/final",
          "http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.140-2.pdf",
          "https://csrc.nist.gov/CSRC/media/Projects/Cryptographic-Module-Validation-Program/documents/fips140-2/FIPS1402DTR.pdf",
          "http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf",
          "http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 16
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_garbage": false,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_pdf_hash": "1b5dd868489ad70514ec56373749c6eaf9f7219124698f67db2e36f59a49beba",
    "policy_txt_hash": "b50e7f115756a14da1245b7311feb6a80b587a2c7da5caf8e84247fd8f4fb1ed"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When installed, initialized and configured as specified in Section 9.1 of the Security Policy and operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy.",
    "certificate_pdf_url": null,
    "date_sunset": "2023-11-01",
    "description": "A software library that contains cryptography to serve SUSE\u2019s Rancher Kubernetes Engine and its ecosystem of supported cloud-native tools written in the Go programming language.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Physical Security: N/A",
      "Mitigation of Other Attacks: N/A"
    ],
    "fw_versions": null,
    "historical_reason": null,
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {},
    "module_name": "SUSE Rancher Kubernetes Cryptographic Library",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "active",
    "sw_versions": "66005f41fbc3529ffe8d007708756720529da20d",
    "tested_conf": [
      "CentOS 7.8 running on Dell PowerEdge R440 with Intel\u00ae Xeon\u00ae Silver 4214R with PAA (clang 6.0.1)",
      "CentOS 7.8 running on Dell PowerEdge R440 with Intel\u00ae Xeon\u00ae Silver 4214R without PAA (clang 6.0.1)",
      "CentOS 8.2 running on Dell PowerEdge R440 with Intel\u00ae Xeon\u00ae Silver 4214R with PAA (clang 6.0.1)",
      "CentOS 8.2 running on Dell PowerEdge R440 with Intel\u00ae Xeon\u00ae Silver 4214R without PAA (clang 6.0.1)",
      "Red Hat Enterprise Linux 7.8 running on Dell PowerEdge R440 with Intel\u00ae Xeon\u00ae Silver 4214R with PAA (clang 6.0.1)",
      "Red Hat Enterprise Linux 7.8 running on Dell PowerEdge R440 with Intel\u00ae Xeon\u00ae Silver 4214R without PAA (clang 6.0.1)",
      "Red Hat Enterprise Linux 8.2 running on Dell PowerEdge R440 with Intel\u00ae Xeon\u00ae Silver 4214R with PAA (clang 6.0.1)",
      "Red Hat Enterprise Linux 8.2 running on Dell PowerEdge R440 with Intel\u00ae Xeon\u00ae Silver 4214R without PAA (clang 6.0.1) (single-user mode)"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2023-09-01",
        "lab": "ACUMEN SECURITY, LLC",
        "validation_type": "Initial"
      }
    ],
    "vendor": "SUSE LLC",
    "vendor_url": "https://www.suse.com"
  }
}