Loren Data's SAM Daily™

fbodaily.com
Home Today's SAM Search Archives Numbered Notes CBD Archives Subscribe
FBO DAILY - FEDBIZOPPS ISSUE OF DECEMBER 14, 2017 FBO #5865
SOLICITATION NOTICE

70 -- Brutalis password/encryption hardware - OIG211638_Brutalis_Combined Synopsis Solicitation

Notice Date
12/12/2017
 
Notice Type
Combined Synopsis/Solicitation
 
NAICS
541512 — Computer Systems Design Services
 
Contracting Office
Department of Health and Human Services, Program Support Center, Acquisition Management Services, 7700 Wisconsin Ave, Bethesda, Maryland, 20857, United States
 
ZIP Code
20857
 
Solicitation Number
OIG211638
 
Archive Date
1/2/2018
 
Point of Contact
Ingrid Walker, Phone: (301) 492-4716
 
E-Mail Address
ingrid.walker@psc.hhs.gov
(ingrid.walker@psc.hhs.gov)
 
Small Business Set-Aside
N/A
 
Description
PDF of combined synopsis/solicitation (i) This is a combined synopsis/solicitation for commercial items prepared in accordance with the format in Subpart 12.6, as supplemented with additional information included in this notice. This announcement constitutes the only solicitation; proposals are being requested and a written solicitation will not be issued. (ii) The solicitation number is OIG211638. The solicitation is issued as a Request For quotation (RFQ) (iii) A statement that the solicitation document and incorporated provisions and clauses are those in effect through Federal Acquisition Circular 2005-96. (iv)The corresponding NAICS code is 541512 and the small business size standard is $27.5 million. (v) A list of line item number(s) and items, quantities, and units of measure - Item Description Quantity 1. Brutalis:N4X48-GTX1080TI-2620-128-2X500-10 1 8-GPU 4U Rackmount Compute Node (3) 1600W 80 Plus Platinum PSU (8) Nvidia GTX 1080 Ti GPU (2) Intel Xeon E5-2620 v4 8c CPU 128GB DDR4 ECC RDIMM RAM (2) 512GB 2.5" SATA/600 SSD in RAID-1 10GBase-T 802.3an NIC 3-year warranty & enterprise support MD5 Performance Ratio 10.37 MH/$ Install & Configure Ubuntu Server LTS Install & Configure Hashstack *24 hour response to maintenance and support issues to include holidays and weekends. **Must be able to distribute password-cracking workloads for no less than the following 238 algorithms: • 1Password, agilekeychain (GPU) • 1Password, cloudkeychain (GPU) • 7zip (GPU) • Adobe PDF 1.1 - 1.3 (Acrobat 2 - 4) (GPU) • Adobe PDF 1.4 - 1.6 (Acrobat 5 - 8) (GPU) • Adobe PDF 1.7 Level 3 (Acrobat 9) (GPU) • Adobe PDF 1.7 Level 8 (Acrobat 10 - 11) (GPU) • AIX {smd5} (GPU) • AIX {ssha1} (GPU) • AIX {ssha256} (GPU) • AIX {ssha512} (GPU) • Android FDE <= 4.3 (GPU) • Android Password/PIN (GPU) • Apple DMG (GPU) • Apple iOS 7+.plist (GPU) • bcrypt, Blowfish(OpenBSD) (CPU) • Bitcoin/Litecoin wallet.dat (GPU) • Blackberry Enterprise Service 10 (CPU) • BLAKE2b (CPU) • Blockchain.info Wallet (GPU) • BSDi (CPU) • Cisco $8$ (GPU) • Cisco $9$ (GPU) • Cisco-ASA MD5 (GPU) • Cisco-IOS SHA256 (GPU) • Cisco-PIX MD5 (GPU) • Citrix Netscaler (GPU) • Clipperz Password Manager (CPU) • Cram MD5 (GPU) • CRC32 (GPU) • Dahua CCTV DVR (CPU) • descrypt, DES(Unix), Traditional DES (GPU) • DIGEST-MD5 C/R (CPU) • Django (PBKDF2-SHA256) (GPU) • Django (scrypt) (CPU) • Django (SHA-1) (GPU) • DNSSEC (NSEC3) (GPU) • Domain Cached Credentials2, mscash2 (GPU) • Domain Cached Credentials, mscash (GPU) • Double MD5 (GPU) • Double SHA1 (GPU) • Drupal7 (GPU) • eCryptfs (CPU) • Eggdrop (GPU) • EIGRP HMAC-SHA256 (CPU) • EIGRP MD5 (CPU) • EncFS (GPU) • EPiServer 6.x < v4 (GPU) • EPiServer 6.x > v4 (GPU) • Fortigate (FortiOS) (CPU) • GNOME Keyring (GPU) • GnuPG (GPU) • GOST R 34.11-94 (GPU) • GRUB 2 (GPU) • Half MD5 (GPU) • HAVAL-128-4 (CPU) • HAVAL-256-3 (CPU) • HMAC-MD5 (key = $pass) (GPU) • HMAC-MD5 (key = $salt) (GPU) • HMAC-SHA1 (key = $pass) (GPU) • HMAC-SHA1 (key = $salt) (GPU) • HMAC-SHA256 (key = $pass) (GPU) • HMAC-SHA256 (key = $salt) (GPU) • HMAC-SHA512 (key = $pass) (GPU) • HMAC-SHA512 (key = $salt) (GPU) • hMailServer (GPU) • HTTP Digest Authentication (CPU) • IKE-PSK MD5 (GPU) • IKE-PSK SHA1 (GPU) • IPB2+, MyBB1.2+ (GPU) • IPMI2 RAKP HMAC-SHA1 (GPU) • Java KeyStore (CPU) • Joomla < 2.5.18 (GPU) • Juniper IVE (GPU) • Juniper Netscreen/SSG (ScreenOS) (GPU) • KDE KWallet (CPU) • KeePass (CPU) • Kerberos 5 AS-REQ Pre-Auth etype 17/18 (CPU) • Kerberos 5 AS-REQ Pre-Auth etype 23 (GPU) • Kerberos 5 db etype 18 (CPU) • Kerberos AFS (CPU) • Kerberos v4 TGT (CPU) • Kerberos v5 TGT (CPU) • Lastpass (cached) (GPU) • LastPass (sniffed session) (CPU) • LM (GPU) • Lotus Notes/Domino 5 (GPU) • Lotus Notes/Domino 6 (GPU) • Lotus Notes/Domino 8 (GPU) • LUKS (CPU) • Mac OS X Keychain (GPU) • MD2 (CPU) • MD4 (GPU) • md5apr1, MD5(APR), Apache MD5 (GPU) • MD5(Chap), iSCSI CHAP authentication (GPU) • md5crypt, MD5(Unix), FreeBSD MD5, Cisco-IOS MD5 (GPU) • MD5 (GPU) • md5(md5(md5($pass))) (CPU) • md5(md5($pass).md5($salt)) (CPU) • md5(md5($salt).$pass) (CPU) • md5($pass.md5($salt)) (CPU) • md5($pass.$salt) (GPU) • md5($pass.$salt.$pass) (GPU) • md5($salt.md5($pass)) (GPU) • md5($salt.md5($pass.$salt)) (CPU) • md5($salt.md5($salt.$pass)) (CPU) • md5($salt.$pass) (GPU) • md5($salt.unicode($pass)) (GPU) • md5(sha1($pass)) (GPU) • md5(strtoupper(md5($pass))) (GPU) • MD5(Sun) (CPU) • md5(unicode($pass).$salt) (GPU) • md5($username.0.$pass) (CPU) • MDC-2 (CPU) • Mediawiki B type (GPU) • Microsoft EFS (CPU) • Microsoft Office 2007 (GPU) • Microsoft Office 2010 (GPU) • Microsoft Office 2013 (GPU) • Microsoft Office 97-2003 MD5 + RC4 (GPU) • Microsoft Office 97-2003 SHA1 + RC4 (GPU) • Microsoft Outlook PST (CPU) • MongoDB (CPU) • Mozilla key3.db (CPU) • MSCHAPv2 C/R (CPU) • MSSQL(2000) (GPU) • MSSQL(2005) (GPU) • MSSQL(2012), MSSQL(2014) (GPU) • MySQL323 (GPU) • MySQL4.1/MySQL5 (GPU) • MySQL Challenge-Response Authentication (SHA1) (GPU) • NetLM C/R (CPU) • NetLM C/R (Half) (CPU) • NetLMv2 C/R (CPU) • Net MD5 (RIPv2, OSPF, BGP, SNMPv2) (CPU) • NetNTLMv1-VANILLA / NetNTLMv1+ESS (GPU) • NetNTLMv2 (GPU) • Net SHA1 (BFD) (CPU) • nsldap, SHA-1(Base64), Netscape LDAP SHA (GPU) • nsldaps, SSHA-1(Base64), Netscape LDAP SSHA (GPU) • NTLM (GPU) • Nuked-Klan CMS (CPU) • OpenBSD Softraid (CPU) • Open Document Format (GPU) • OpenSSH known_hosts (CPU) • OpenVMS (CPU) • Oracle 11g/12c (GPU) • Oracle 7-10g, DES(Oracle) (GPU) • Oracle O5LOGON (GPU) • osCommerce, xt:Commerce (GPU) • OSX v10.4, v10.5, v10.6 (GPU) • OSX v10.7 (GPU) • OSX v10.8 / v10.9 (GPU) • Panama (CPU) • Password Safe v2 (GPU) • Password Safe v3 (GPU) • PBKDF2-HMAC-SHA1 (GPU) • PBKDF2-HMAC-SHA256 (GPU) • PBKDF2-HMAC-SHA512 (GPU) • PeopleSoft (GPU) • PFX, PKCS12 (.pfx,.p12) (CPU) • phpass, MD5(Wordpress), MD5(phpBB3), MD5(Joomla) (GPU) • PHPS (GPU) • PKZIP (CPU) • PostgreSQL Challenge-Response Authentication (MD5) (GPU) • PostgreSQL (GPU) • Post.Office (CPU) • PrestaShop (GPU) • PuTTY Private Key (CPU) • RACF (GPU) • Radmin2 (GPU) • RAR 3.x (GPU) • RAR 5.x (GPU) • Rational ClearQuest (CPU) • Redmine Project Management Web App (GPU) • RipeMD128 (CPU) • RipeMD160 (GPU) • SAP CODVN B (BCODE) (GPU) • SAP CODVN F/G (PASSCODE) (GPU) • SAP CODVN H (PWDSALTEDHASH) (GPU) • scrypt (CPU) • sha1crypt (GPU) • SHA1 (GPU) • sha1(LinkedIn) (GPU) • sha1(md5($pass)) (GPU) • sha1($pass.$salt) (GPU) • sha1($salt.$pass) (GPU) • sha1($salt.$pass.$salt) (GPU) • sha1($salt.unicode($pass)) (GPU) • sha1(sha1(sha1($pass))) (CPU) • sha1(unicode($pass).$salt) (GPU) • sha256crypt, SHA256(Unix) (GPU) • SHA256 (GPU) • sha256($pass.$salt) (GPU) • sha256($salt.$pass) (GPU) • sha256($salt.unicode($pass)) (GPU) • sha256(unicode($pass).$salt) (GPU) • SHA384 (GPU) • SHA-3(Keccak) (GPU) • sha512crypt, SHA512(Unix) (GPU) • SHA512 (GPU) • sha512($pass.$salt) (GPU) • sha512($salt.$pass) (GPU) • sha512($salt.unicode($pass)) (GPU) • sha512(unicode($pass).$salt) (GPU) • Siemens S7 (CPU) • SIP (CPU) • SIP digest authentication (MD5) (GPU) • SipHash (GPU) • Skype (GPU) • SMF > v1.1 (GPU) • SSHA-512(Base64), LDAP {SSHA512} (GPU) • SSH Private Key (CPU) • StarOffice SXC (GPU) • STRIP Password Manager (GPU) • Sybase ASE (GPU) • Sybase PROP (CPU) • TCP MD5 Signatures, BGP (CPU) • Trip Code (CPU) • TrueCrypt 5.0+ AES-PBKDF2-HMAC-RipeMD160 + boot-mode (GPU) • TrueCrypt 5.0+ AES-PBKDF2-HMAC-RipeMD160 + boot-mode + hidden-volume (GPU) • TrueCrypt 5.0+ AES-PBKDF2-HMAC-RipeMD160 (GPU) • TrueCrypt 5.0+ AES-PBKDF2-HMAC-RipeMD160 + hidden-volume (GPU) • TrueCrypt 5.0+ AES-PBKDF2-HMAC-SHA512 (GPU) • TrueCrypt 5.0+ AES-PBKDF2-HMAC-SHA512 + hidden-volume (GPU) • TrueCrypt 5.0+ AES-PBKDF2-HMAC-Whirlpool (GPU) • TrueCrypt 5.0+ AES-PBKDF2-HMAC-Whirlpool + hidden-volume (GPU) • TrueCrypt 5.0+ AES-XTS-PBKDF2-HMAC-RipeMD160 (CPU) • TrueCrypt 5.0+ AES-XTS-PBKDF2-HMAC-Whirlpool (CPU) • vBulletin < v3.8.5 (GPU) • vBulletin > v3.8.5 (GPU) • VNC (CPU) • WBB3, Woltlab Burning Board 3 (GPU) • WebEdition CMS (CPU) • Whirlpool (GPU) • WoWSRP, Battlenet (CPU) • WPA/WPA2 (GPU) 1 (vi) Description of Requirements - this acquisition is for Brutalis password/encryption hardware needed to allow continuity of operations for the Office of Inspector General (OIG) Forensic Computer Examiners (FCEs) in the performance of their duties relating to forensic analysis of electronic data/digital evidence as part of ongoing criminal investigations, which is/are secured by unknown/unidentified password/ encryption. (vii) The period of performance is 01/20/2018 - 01/19/2019. Technical support for the hardware shall be at 355 E St. SW, Suite 200, Washington, DC 20024 (viii) The provision at 52.212-1, Instructions to Offerors -- Commercial, applies to this acquisition. (ix) The provision at 52.212-2, Evaluation -- Commercial Items, applies to this acquisition. The Government will award a contract resulting from this synopsis/solicitation to the responsible offeror whose offer conforming to the solicitation will be most advantageous to the Government, price and other factors considered. The following factors shall be used to evaluate offers: Low Price Technically Acceptable (x) Offerors to include a completed copy of the provision at 52.212-3, Offeror Representations and Certifications -- Commercial Items. (xi) The clause at 52.212-4, Contract Terms and Conditions -- Commercial Items, applies to this acquisition and a statement regarding any addenda to the clause. (xii) The clause at 52.212-5, Contract Terms and Conditions Required to Implement Statutes or Executive Orders -- Commercial Items, applies to this acquisition and a statement regarding which, if any, of the additional FAR clauses cited in the clause are applicable to the acquisition. The Contracting Officer has indicated the following clauses listed in paragraph (b) as applicable and are hereby incorporated by reference: (22) 52.219-28, Post Award Small Business Program Rerepresentation (Jul 2013) (15 U.S.C. 632(a)(2)); (25) 52.222-3, Convict Labor (June 2003) (E.O. 11755); (26) 52.222-19, Child Labor-Cooperation with Authorities and Remedies (Oct 2016) (E.O. 13126); (27) 52.222-21, Prohibition of Segregated Facilities (Apr 2015); (28) 52.222-26, Equal Opportunity (Sep 2016) (E.O. 11246); (30) 52.222-36, Equal Opportunity for Workers with Disabilities (Jul 2014) (29 U.S.C. 793); (33) (i) 52.222-50, Combating Trafficking in Persons (Mar 2015) (22 U.S.C. chapter 78 and E.O. 13627); (40) 52.223-15, Energy Efficiency in Energy-Consuming Products (Dec 2007) (42 U.S.C. 8259b), (41)(i) 52.223-16, Acquisition of EPEAT®-Registered Personal Computer Products (Oct 2015) (E.O.s 13423 and 13514); (ii) Alternate I (Jun 2014) of 52.223-16; (42) 52.223-18, Encouraging Contractor Policies to Ban Text Messaging while Driving (Aug 2011) (E.O. 13513); (49) 52.225-13, Restrictions on Certain Foreign Purchases (Jun 2008) (E.O.'s, proclamations, and statutes administered by the Office of Foreign Assets Control of the Department of the Treasury); (56) Payment by Electronic Funds Transfer- System for Award Management (Jul 2013) (31 U.S.C. 3332). (xiii) The following additional clauses are applicable to this acquisition: FAR 52.209-10, Prohibition on Contracting with Inverted Domestic Corporations; FAR 52.232-40, Providing Accelerated Payments to Small Business Subcontractors. The following Health and Human Services Acquisition Regulations (HHSAR) clauses apply to this acquisition: HHSAR 352.222-70, Contractor Cooperation in Equal Employment Opportunity Investigations; HHSAR 352.239-73, Electronic and Information Technology Accessibility. (xiv) DPAS -N/A. (xv) Quotes are due Thursday, January 04, 2018 by 2:00 pm, EST, electronically to the Contract Specialist at Ingrid.Walker@psc.hhs.gov (xvi) Contact Mrs. Ingrid Walker, Contract Specialist, at Ingrid.Walker@psc.hhs.gov regarding the solicitation. (xvii) Any inquiries must be emailed to the Contract Specialist, with "OIG211638 - Brutalis - Inquiries" in the subject line no later than Monday, December 18, 2017 by 2:00 pm, EST.
 
Web Link
FBO.gov Permalink
(https://www.fbo.gov/spg/HHS/PSC/DAM/OIG211638/listing.html)
 
Record
SN04764150-W 20171214/171212231023-0f329a58d2d322f0be8011e7842f2bde (fbodaily.com)
 
Source
FedBizOpps Link to This Notice
(may not be valid after Archive Date)

FSG Index  |  This Issue's Index  |  Today's FBO Daily Index Page |
ECGrid: EDI VAN Interconnect ECGridOS: EDI Web Services Interconnect API Government Data Publications CBDDisk Subscribers
 Privacy Policy  © 1994-2020, Loren Data Corp.