Questo contenuto non è disponibile nella lingua selezionata.
Chapter 8. Using hardware security modules with subsystems
A subsystem instance generates and stores its key information in a key store, called a security module or a token. A subsystem instance can be configured for the keys to be generated and stored using the internal NSS token or on a separate cryptographic device, a hardware token.
8.1. Adding or managing the HSM entry for a subsystem Copia collegamentoCollegamento copiato negli appunti!
During installation, when an HSM is selected as the default token where appropriate HSM-specific parameters are set in the configuration file passed to the pkispawn
command, the following parameter is added to the /var/lib/pki/ instance_name/conf/password.conf
file for the HSM password:
hardware-HSM_token_name=HSM_token_password
hardware-HSM_token_name=HSM_token_password
8.2. Installing a subsystem using an HSM Copia collegamentoCollegamento copiato negli appunti!
To install a Certificate System instance using an HSM, follow the procedure in Preparing for installing Certificate System with an HSM to prepare a pkispawn
file for installation of a Certificate System instance using one of the supported HSMs.
You can find full installation examples using an HSM, such as the following, in Installing the CA subsystem:
8.3. Viewing Tokens Copia collegamentoCollegamento copiato negli appunti!
To view a list of the tokens currently installed for a Certificate System instance, use the modutil
utility.
Change to the instance
alias
directory. For example:cd /var/lib/pki/pki-tomcat/alias
# cd /var/lib/pki/pki-tomcat/alias
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Show the information about the installed PKCS #11 modules installed as well as information on the corresponding tokens using the
modutil
tool.modutil -dbdir . -nocertdb -list
# modutil -dbdir . -nocertdb -list
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
8.4. Detecting Tokens Copia collegamentoCollegamento copiato negli appunti!
To see if a token can be detected by Certificate System, use the TokenInfo
utility, pointing to the alias
directory for the subsystem instance. This is a Certificate System tool which is available after the Certificate System packages are installed.
For example:
TokenInfo /var/lib/pki/pki-tomcat/alias
# TokenInfo /var/lib/pki/pki-tomcat/alias
This utility returns all tokens which can be detected by the Certificate System, not only tokens which are installed in the Certificate System.
8.5. Failover and resilience Copia collegamentoCollegamento copiato negli appunti!
Failover means setting up multiple units, and configuring them so that if one unit fails, another one will take over and continue the service without interruption.
Resilience ensures that when the network connection to a unit is interrupted and then reconnected, the service is not interrupted within a reasonable timeframe.
Some Hardware Security Module (HSM) models offer failover or resilience of varying degrees. For detail on the exact make and models and the features that they offer, consult your HSM manual, or contact the manufacturer. The HSMs described in the following sections have been tested with Red Hat Certificate System.
8.5.1. nCipher nShield HSM Copia collegamentoCollegamento copiato negli appunti!
The failover and resilience tests were conducted on the older Entrust HSMS model, nShield Connect 6000, however, according to the Entrust website, failover and resilience are also supported in the newer model of nShield Connect HSMs, such as the XC. They are expected to work in a similar manner.
Failover
With nShield Connect 6000, failover has been tested in the scenario where there are two HSM modules, nShield1, and nShield2, both running and configured for failover.
If one of nShield units goes down, the other exhibits ability to continue the provision of cryptographic services to Certificate System with no known issues, without restarting of the RHCS instance.
When the above situation happens (one HSM unit goes down), the administrator is expected to schedule a downtime for all the connected Certificate System instances and fix the down hsm unit and bring it back up and restart the instances. This means that if one unit goes down, Certificate System is expected to continue functioning; however, if the down hsm is brought back up without restarting the instances, the newly brought up HSM unit is not expected to be part of the failover scheme as originally planned.
Resilience
With nShield Connect 6000, testing has shown that when the network cable is pulled off the HSM unit, and replugged in within up to 90 minutes, the service continues. There is no data for any time period longer than 90 minutes.
8.5.2. Gemalto Safenet LunaSA HSM Copia collegamentoCollegamento copiato negli appunti!
Failover
The Gemalto Safenet LunaSA Cloning model offers Failover. However, we have no data on this model.
8.6. Backing up keys on Hardware Security modules Copia collegamentoCollegamento copiato negli appunti!
It is not possible to export keys and certificates stored on an HSM to a .p12
file. If such an instance is to be backed-up, contact the manufacturer of your HSM for support.