Setting up the ncipher nshield HSM for use with Kerberized Certificate Authority

Similar documents
Manual for installation and usage of the module Secure-Connect

TIBCO Statistica Options Configuration

INSTALLING CCRQINVOICE

The screenshots/advice are based on upgrading Controller 10.1 RTM to 10.1 IF6 on Win2003

Date: October User guide. Integration through ONVIF driver. Partner Self-test. Prepared By: Devices & Integrations Team, Milestone Systems

Technical Paper. Installing and Configuring SAS Environment Manager in a SAS Grid Environment with a Shared Configuration Directory

Demand Forecasting. For. Microsoft Dynamics 365 for Operations. Technical Guide. Release 7.1. December 2017

Oracle Universal Records Management Oracle Universal Records Manager Adapter for Documentum Installation Guide

Xilinx Answer Xilinx PCI Express DMA Drivers and Software Guide

Configure Data Source for Automatic Import from CMDB

Technical Paper. Installing and Configuring SAS Environment Manager in a SAS Grid Environment

VMware AirWatch Certificate Authentication for Cisco IPSec VPN

Planning, installing, and configuring IBM CMIS for Content Manager OnDemand

I. Introduction: About Firmware Files, Naming, Versions, and Formats

HPE AppPulse Mobile. Software Version: 2.1. IT Operations Management Integration Guide

Customer Information. Agilent 2100 Bioanalyzer System Startup Service G2949CA - Checklist

Dell EqualLogic PS Series Arrays: Expanding Windows Basic Disk Partitions

ClassFlow Administrator User Guide

DIVAR IP 3000 Field Installation Guide

SAS Hot Fix Analysis, Download and Deployment Tool

Kaltura MediaSpace Installation and Upgrade Guide. Version: 5.0

User Guide. ACE Data Source. OnCommand Workflow Automation (WFA) Abstract PROFESSIONAL SERVICES

ADSS Server Evaluation Quick Guide

ROCK-POND REPORTING 2.1

TN How to configure servers to use Optimise2 (ERO) when using Oracle

Release Notes. Dell SonicWALL Security firmware is supported on the following appliances: Dell SonicWALL Security 200

HPE LoadRunner Best Practices Series. LoadRunner Upgrade Best Practices

Migrating iway Data Quality Server Plans and Components on Windows

USER MANUAL. RoomWizard Administrative Console

Manually Upgrading PostgreSQL 9.1 to PostgreSQL

Please contact technical support if you have questions about the directory that your organization uses for user management.

These tasks can now be performed by a special program called FTP clients.

EView/400i Management Pack for Systems Center Operations Manager (SCOM)

Graduate Application Review Process Documentation

I. Introduction: About Firmware Files, Naming, Versions, and Formats

Summary. Server environment: Subversion 1.4.6

Troubleshooting Citrix- Published Resources Configuration in VMware Identity Manager

Installation and Getting Started

RISKMAN REFERENCE GUIDE TO USER MANAGEMENT (Non-Network Logins)

Extended Traceability Report for Enterprise Architect

IT Essentials (ITE v6.0) Chapter 5 Exam Answers 100% 2016

Dashboard Extension for Enterprise Architect

Create Your Own Report Connector

Campuses that access the SFS nvision Windows-based client need to allow outbound traffic to:

INTELLISNAP. TECHNOLOGY QUICK START GUIDE Pure Storage FlashArray. Publish Date: July 30, 2015 Distribution: Public Author: Jonathan Howard

Log shipping is a HA option. Log shipping ensures that log backups from Primary are

Troubleshooting Citrix- Published Resources Configuration in VMware Identity Manager

Reference Guide. Service Pack 3 Cumulative Update 2. Revision J Issued October DocAve 6: Control Panel

Overview. Enhancement for Policy Configuration Module

Repstor custodian. On Premise Pre-Requisites. Document Version 1.1 January 2017

USO RESTRITO. SNMP Agent. Functional Description and Specifications Version: 1.1 March 20, 2015

Gemini Intercom Quick Start Guide

Lab 1 - Calculator. K&R All of Chapter 1, 7.4, and Appendix B1.2

August 22, 2006 IPRO Tech Client Services Tip of the Day. Concordance and IPRO Camera Button / Backwards DB Link Setup

Refreshing Axiom TEST with a Current Copy of Production Axiom EPM June 20, 2014

Launching Xacta 360 Marketplace AMI Guide June 2017

Avocent Power Management Distribution Unit (PM PDU) Release Notes Firmware Version April 18, 2011

Upgrade Guide. Medtech Evolution General Practice. Version 1.9 Build (March 2018)

OO Shell for Authoring (OOSHA) User Guide

Oracle BPM 10rR3. Role Authorization resolution using groups. Version: 1.0

1 Getting and Extracting the Upgrader

Smart Collector Embedded Assistant User Guide

PAGE NAMING STRATEGIES

Adverse Action Letters

Technical Service Bulletin

Dolby Conference Phone Support Frequently Asked Questions

Single File Upload Guide

DC Remote Control Installation and Configuration Guide. Version 1.2

DocAve 6 Service Pack 2 Control Panel

Your New Service Request Process: Technical Support Reference Guide for Cisco Customer Journey Platform

Milestone XProtect. NVR Installer s Guide

Creating a TES Encounter/Transaction Entry Batch

1 Getting and Extracting the Upgrader

Re-Flashing Your CDM-760 Advanced High-Speed Trunking Modem

STIDistrict AL Rollover Procedures

Proficy* System Requirements

Assignment #5: Rootkit. ECE 650 Fall 2018

Systems & Operating Systems

Upgrading Kaltura MediaSpace TM Enterprise 1.0 to Kaltura MediaSpace TM Enterprise 2.0

Universal CMDB. Software Version: Backup and Recovery Guide

Kaltura MediaSpace TM Enterprise 2.0 Requirements and Installation

Exosoft Backup Manager

TaskCentre v4.5 Save As File Tool White Paper

Element Creator for Enterprise Architect

Integrating QuickBooks with TimePro

RxAXIS Security Module 09/25/2013

PAY EQUITY HEARINGS TRIBUNAL. Filing Guide. A Guide to Preparing and Filing Forms and Submissions with the Pay Equity Hearings Tribunal

Enabling Your Personal Web Page on the SacLink

NiceLabel LMS. Installation Guide for Single Server Deployment. Rev-1702 NiceLabel

Engineering Development Group

Table of Contents. WipeDrive Enterprise Logging, March Logging Settings... 3 Log Format Types Audit Log Destination Options...

DocAve 6 Control Panel

CMC Blade BIOS Profile Cloning

Integration Framework for SAP Business One

AvePoint Accessibility Accelerator 2.0

Interfacing to MATLAB. You can download the interface developed in this tutorial. It exists as a collection of 3 MATLAB files.

Using CppSim to Generate Neural Network Modules in Simulink using the simulink_neural_net_gen command

WorldShip PRE-INSTALLATION INSTRUCTIONS: INSTALLATION INSTRUCTIONS: Window (if available) Install on a Single or Workgroup Workstation

Aras Innovator 8.1 Document #: Last Modified: 4/4/2007. Copyright 2007 Aras Corporation All Rights Reserved.

VMware EVO:RAIL Customer Release Notes

Transcription:

Setting up the ncipher nshield HSM fr use with Kerberized Certificate Authrity Intrductin This dcument cntains instructins fr setting up ncipher nshield hardware security mdules (HSM) fr use with the Kerberized Certificate Authrity (KCA) service. It is assumed that the reader is familiar with the cncepts and prcedures utlined in the nshield dcumentatin. Dcument Cnventins This dcument refers t specific sectins f the nshield/payshield Administratr Guide (Administratr Guide) fr Windws, the nshield/payshield Operatr Guide fr Windws (Operatr Guide) and the nshield/payshield User Guide fr Windws (User Guide). These dcuments can be fund n the ncipher sftware installatin DVD. Since there is significant verlap in the cntent f the three guides, the infrmatin that is being referred may be fund in guides ther than the specific ne being referenced. Cmmands t be typed and expected cmmand utput are shwn in mnspaced type and parameters in such cmmands are shwn in italicized mnspace type. Fr example: C:\> cpy surce_file_name destinatin_file_name Unless specified therwise, all the cmmands that are shwn as examples are lcated in the bin subdirectry f the nfast installatin directry. The NFAST_HOME envirnment variable cntains the path t the nfast installatin directry. On a typical installatin, this wuld be : C:\Prgram Files\nCipher\nfast\bin

Prpsed Architecture f the HSM backed KCA The master key f the certificate authrity certificate will be stred n the HSM. All cryptgraphic peratins invlving the master key, such as the generatin f the master key and signing certificate requests will be perfrmed thrugh the HSM. The prduct chsen fr the HSM backed KCA is the ncipher nshield. Key management thrugh ncipher security wrlds is described in Chapter 2: ncipher security wrlds in the Administratr guide. The prpsed architecture is implemented as fllws: 1. An ncipher security wrld is created using ne r mre hardware security mdules. The security wrld key will be prtected using a set f administratr smart cards. 2. An RSA key will be generated using the HSM. The key will be prtected nly by the security wrld key. Once generated, the key will be prpagated t all the hsts that are part f the security wrld. 3. A rt certificate request will be created and signed n a machine that has access t the security wrld using the key generated in step 2 as the private key. 4. The KCA service is installed and cnfigured t run n the hsts that are part f the security wrld. The service will use the generated rt certificate as the certificate authrity certificate. Since the private key f the rt certificate was generated n the HSM and used frm the HSM, the key material is never expsed beynd the hardware mdule. Setting up the HSM Instructins fr setting up the HSM are in Chapter 3: Getting the Mdule Wrking in the Administratr Guide. In particular the subsectin Creating and cnfiguring the security wrld has instructins fr creating the security wrld. The Kerberized Certificate Authrity (KCA) des nt supprt the full range f security plicies that nshield supprts. Specifically, being an unattended service, the KCA des nt supprt prmpting fr peratr cards r passwrds. Therefre, the keys that will be used by the KCA must be keys that can be accessed by the HSM withut any user interventin. All the hardware mdules that are t be used by a set f KCA servers that share a Certificate Authrity certificate must be part f the same security wrld *. Therefre, nce a security wrld has been created using ne security mdule, the ther security mdules must be added t the same security wrld. * This restrictin stems frm the assumptin that the private key f the CA certificate will be generated and used frm the HSM. See sectin Generating X509 certificates with OpenSSL using prtected private keys.

In ther wrds: Create the security wrld using ne security mdule as utlined in Chapter 3, sectin Creating and cnfiguring the security wrld in the Administratr Guide Install the sftware and hardware n additinal hsts. Cpy the security wrld data frm the first hst t the ther hsts. Security wrld files are described in Chapter 11, sectin Security wrld files in the Administratr Guide. Add each security mdule in each new hst as per Chapter 11, sectin Adding r restring a mdule t the security wrld. Example wrkflw fr setting up the security wrld Install the hardware security mdule in the hst machine. Install the ncipher sftware using the ncipher sftware installatin CD. Run setup.exe frm the ncipher sftware installatin CD and fllw the installatin wizard prmpts. Test the sftware and hardware. Run the enquiry cmmand. enquiry If the hardware security mdule is installed prperly, the cmmand shuld utput details abut bth the nfast server and the nshield mdule. The cmmand utput als includes the serial number f the mdule as well as the firmware versin number. Create and cnfigure the security wrld. This can either be dne using a GUI r the cmmand-line. This sectin assumes that the security wrld is created using the cmmand-line. Figure ut the prtectin mdel fr administering the HSM. In particular, yu shuld knw the number and qurum f administratr cards t be used. Place the HSM int the pre-initializatin state. Fr nshield HSMs, this invlves setting the mde switch in the back f the card t I. This prcess is described in Chapter 3, sectin Entering the pre-initializatin state f the Administratr Guide. Run the new-wrld cmmand t create the new security wrld. new-wrld --initialize --acs-qurum=1/2

The abve invcatin assumes that the administratr card set has tw cards with a ne card qurum. If any additinal infrmatin is needed, the new-wrld cmmand will prmpt fr it. Once all the required infrmatin has been furnished, the cmmand will prmpt fr each administratr card t be inserted int the card reader. Stre the cards in a safe and secure lcatin. Place the HSM int the peratinal state. Fr nshield HSMs, this can be accmplished by setting the mde switch in the back f the card t O. This prcess is described in Chapter 3 sectin Entering the peratinal state f the Administratr Guide. Since the nly specified ptin was --acs-qurum, all ther ptins and features will be cnfigured using defaults. The default feature states can be listed using the fllwing cmmand: new-wrld --help-features The sectin titled new-wrld in Chapter 15 f the Administratr Guide has details f the default ptins fr the new-wrld cmmand. As an alternative, the security wrld can als be created using the Cryptgraphic Service Prvider Installatin Wizard (CSP Installatin Wizard). A shrtcut t the CSP Installatin Wizard can be fund n the ncipher start menu prgram grup. Instructins fr creating a new security wrld using this wizard is in Chapter 11, sectin Creating a security wrld using the CSP Wizard. Install hardware and sftware fr the additinal hsts. Cpy the security wrld files ver t each hst. The NFAST_KMLOCAL envirnment variable pints t the rt f the lcal security wrld data files. It is imprtant that nce the files are cpied ver that the envirnment variable n the new hst be updated accrdingly. Add the HSM t the security wrld using the cpied security wrld data and the administratr card set. Set the mdule t the pre-initializatin state. Run the fllwing cmmand: new-wrld --prgram

The new-wrld cmmand will prmpt fr the administratr cards t authrize the peratin and decrypt the security wrld key. Creating keys The keys that are t be used with the KCA must fulfill the fllwing requirements. Sme f these requirements may be relaxed in future versins f the KCA. The key must be prtected by the security mdule. This is nt a strict requirement, but stems frm the fact that the KCA service, at the mment, has n mechanism f prmpting fr the user t insert peratr cards r type passwrds that might be required t use keys that are prtected by peratr card sets r sft tkens. The applicatin name (APPNAME) f the key must be hwcrhk. This dentes that the key is generated fr use with the Cryptgraphic Hardware Interface Library (CHIL). The key must nt be stred in NVRAM. nshield gives the ptin f string keys in the NVRAM f the hardware mdule. Hwever, ding s prevents the keys frm being backed up r being easily shared amng different hsts. A key that is stred in the file system can be cpied ver t ther hsts. Instructins n hw t create keys are in Chapter 9, sectin Generating Keys f the User Guide. The fllwing is a sample transcript f a test key that was created using the required applicatin name and prtected by the security mdule. C:\Prgram Files (x86)\ncipher\nfast\bin> generatekey.exe --generate hwcrhk prtect: Prtected by? (tken, sftcard, mdule) [tken] > mdule type: Key type? (RSA, DSA, DH) [RSA] > size: Key size? (bits, minimum 1024) [1024] > 2048 OPTIONAL: pubexp: Public expnent fr RSA key (hex)? [] > ident: Key identifier? [] > mdrsa02 nvram: Blb in NVRAM (needs ACS)? (yes/n) [n] > key generatin parameters: peratin Operatin t perfrm generate applicatin Applicatin hwcrhk prtect Prtected by mdule verify Verify security f key yes type Key type RSA size Key size 2048 pubexp Public expnent fr RSA key (hex) ident Key identifier mdrsa02 nvram Blb in NVRAM (needs ACS) n Key successfully generated. Path t key: C:\PrgramData\nCipher\Key Management Data\lcal\key_hwcrhk_rsamdrsa02 Nte that the cmmand utput cntains the path f the created key. The generated key will be stred in the security wrld data directry unless the user instructs that the key shuld be stred in NVRAM.

Keys that are stred in the file system can be cpied ver t ther hsts by cpying the key blb file t the crrespnding lcatin n the destinatin hst. The newly created key can be viewed using nfkminf.exe as dcumented in Chapter 9, sectin Viewing Keys, in the User Guide. C:\Prgram Files (x86)\ncipher\nfast\bin> nfkminf.exe -k hwcrhk rsa-mdrsa02 Key AppName hwcrhk Ident rsa-mdrsa02 BlbKA length 1036 BlbPubKA length 444 BlbRecveryKA length 1172 name NONE hash d6a36749cfa104747284b775ddf6818be502aa33 recvery Enabled prtectin Mdule ther flags PublicKey!SEEAppKey!NVMemBlb +0x0 gentime 2009-02-10 01:17:53 SEE integrity key NONE The identifier f the key is particularly imprtant. In the abve example, the name f the resulting RSA key is rsa-mdrsa02. This name will be used t refer t this key when setting up the KCA service. A list f existing keys can be viewed using the nfkminf.exe k cmmand: C:\Prgram Files (x86)\ncipher\nfast\bin>nfkminf -k Key list - 4 keys AppName hwcrhk AppName hwcrhk AppName hwcrhk AppName hwcrhk Ident rsa-mdrsa01 Ident rsa-mdrsa02 Ident rsa-stkrsa01 Ident rsa-tkrsa01 Once created, a key can nly be destryed by destrying the key blb file. Generating X509 certificates with OpenSSL using prtected private keys A private key that is prtected by a security wrld can be used as the private key fr a certificate. The wrkflw fr generating such a certificate is similar t the wrkflw f generating a certificate request using a generated key, with the exceptin that the private key has t be generated prir t the certificate request. generatekey.exe generate hwcrhk [ther ptins] penssl req engine chil key <key id> keyfrm engine [ther ptins] The requirements and restrictins are: The key needs t be generated with APPNAME set t hwcrhk.

OpenSSL must be cnfigured t access the private key thrugh the HSM. Once created, any use f the certificate that requires the private key can nly be perfrmed frm a hst that has access t the security wrld. It is pssible t generate the key utside f the HSM and imprt the key int the security wrld. Hwever generating keys within the security wrld is preferred, since that methd des nt expse key material. As an example, the fllwing cmmand can be used t generate a certificate request using the private key that was generated in the Creating keys sectin: penssl req -new -cnfig make_kca_cert.cnf -days 365 \ -key rsa-mdrsa01 \ -keyfrm engine \ -engine chil \ -ut newcert.req Nte that in rder fr the abve cmmand t wrk, the OpenSSL cnfiguratin file shuld have these entries which are required fr lcating the using the ncipher CHIL plug-in: penssl_cnf = penssl_def [penssl_def] engines = engine_sectin [engine_sectin] chil = chil_sectin [chil_sectin] SO_PATH=C:/Prgram Files/nCipher/nfast/tlkits/hwcrhk/nfhwcrhk.dll Mre infrmatin abut cnfiguring OpenSSL t use the ncipher HSM can be fund in the fllwing sectin.

Cnfiguring the KCA Service The KCA Service can be installed as per the dcumentatin at http://www.secureendpints.cm/_private/fnal/kca_service.html. Once installed, fllw the instructins in the sectin Enabling the ncipher nshield HSM via the OpenSSL cnfiguratin file. The resulting cnfiguratin file wuld lk like the fllwing: penssl_cnf = penssl_def [penssl_def] engines = engine_sectin [engine_sectin] chil = chil_sectin [chil_sectin] SO_PATH=C:/Prgram Files/nCipher/nfast/tlkits/hwcrhk/nfhwcrhk.dll [ kca ] default_ca = CA_kca # The default ca sectin [ CA_kca ] dir = sme/directry certs = $dir/certs # Where the issued certs are kept crl_dir = $dir/crl # Where the issued crl are kept database = $dir/index.txt # database index file. new_certs_dir = $dir/newcerts # default place fr new certs. certificate = $dir/kca.crt # The CA certificate serial = $dir/kca.serial # The current serial number crl = $dir/kca.crl # The current CRL private_key = rsa-mdrsa02 # The private key engine = chil keyfrm = engine Prtins have been mitted fr clarity. The SO_PATH entry in the chil_sectin pints t the installed lcatin f nfhwcrhk.dll which allws OpenSSL t access the private key frm the HSM. The private_key entry in the [CA_kca] sectin specifies the name f the private key t use. This is the same name that was reprted by the nfkminf.exe utility abve. Once these settings are in place, the KCA shuld be able t start up and use the private key frm the HSM. Yu may see entries such as the fllwing in the KCA lg: Wed Nv 12 23:06:45 2008 [4428]: lg Cnfiguring engines Wed Nv 12 23:06:45 2008 [4428]: lg OPENSSL: Engine 'chil' successfully laded Wed Nv 12 23:06:56 2008 [4428]: lg Security wrld: Usable 1 mdule(s) If the KCA service encunters any prblems, detailed errr messages will be written t the KCA lg.