F5 BIG-IP: nShield HSM Integration Guide
Table of Contents
Introduction
The nshield Hardware Security Module (HSM) can generate and store a Root of Trust that protects security objects used by F5 Big-IP LTM to safeguard users' keys and credentials. The HSM in FIPS 140-2 Level 2 or Level 3 mode meets compliance requirements.
More than one HSM can enroll to a F5 BIG-IP machine if all HSMs are in the same Security World.
Product configurations
Entrust has successfully tested nshield HSM integration with F5 BIG-IP in the following configurations:
Software | Version |
---|---|
Operating System |
CentOS 7.3 |
BIG-IP |
16.0.1, 17.0.0.1 |
Supported nshield hardware and software versions
Entrust has successfully tested with the following nshield hardware and software versions:
Connect XC
Security World Software | Firmware | Image | OCS | Softcard | Module |
---|---|---|---|---|---|
12.60.11 |
12.50.11 (FIPS Certified) |
12.60.10 |
✓ |
✓ |
✓ |
12.80.4 |
12.50.11 (FIPS Certified) |
12.80.4 |
✓ |
✓ |
✓ |
12.80.4 |
12.72.1 (FIPS Certified) |
12.80.5 |
✓ |
✓ |
✓ |
Connect +
Security World Software | Firmware | Image | OCS | Softcard | Module |
---|---|---|---|---|---|
12.60.11 |
12.50.8 (FIPS Certified) |
12.60.10 |
✓ |
✓ |
✓ |
12.80.4 |
12.50.8 (FIPS Certified) |
12.80.4 |
✓ |
✓ |
✓ |
12.80.4 |
12.72.0 (FIPS Certified) |
12.80.5 |
✓ |
✓ |
✓ |
nShield 5c
Security World Software | Firmware | Image | OCS | Softcard | Module |
---|---|---|---|---|---|
13.2.2 |
13.2.2 (FIPS Pending) |
13.2.2 |
✓ |
✓ |
✓ |
Note
|
Hotfix TAC_955 is required for the nShield 5 configuration. An unrestricted world may be used without the need for a hotfix. |
Supported nshield HSM functionality
Feature | Support |
---|---|
Module-Only key |
Yes |
OCS cards |
Yes |
Softcards |
Yes |
nSaaS |
Yes |
FIPS 140-2 Level 3 |
Yes |
Requirements
Before installing these products, read the associated documentation:
-
For the nshield HSM: Installation Guide and User Guide.
-
If nshield Remote Administration is to be used: nShield Remote Administration User Guide.
-
F5 BIG-IP documentation (https://techdocs.f5.com/en-us/bigip-16-0-0/big-ip-system-and-ncipher-hsm-implementation.html).
In addition, the integration between nshield HSMs and F5 BIG-IP requires:
-
PKCS #11 support in the HSM.
-
A correct quorum for the Administrator Card Set (ACS).
-
Operator Card Set (OCS), Softcard, or Module-Only protection.
-
If OCS protection is to be used, a 1-of-N quorum must be used.
-
-
Firewall configuration with usable ports:
-
9004 for the HSM (hardserver).
-
Furthermore, the following design decisions have an impact on how the HSM is installed and configured:
-
Whether your Security World must comply with FIPS 140-2 Level 3 standards.
-
If using FIPS Restricted mode, it is advisable to create an OCS for FIPS authorization. The OCS can also provide key protection for the Vault master key. For information about limitations on FIPS authorization, see the Installation Guide of the nshield HSM.
-
-
Whether to instantiate the Security World as recoverable or not.
More information
For more information about OS support, contact your F5 sales representative or Entrust nshield Support, https://nshieldsupport.entrust.com.
Procedures
Prerequisites
-
A Big-IP system must be deployed before following the steps in this guide.
NoteBig-IP Virtual Edition was used for this guide, but the procedures in this guide can be applied to other deployments. -
The BIG-IP system must be licensed for External Interface and Network HSM.
-
Access is required to the command-line interface of the Big-IP machine and the Configuration utility web interface.
-
A Security World ISO file is required for installing the nshield Security World software.
Install the Security World software
The following steps will be a manual installation of Security World on the BIG-IP machine. Automatic installation steps exist for older versions of Security World software. See the F5 documentation for more information.
-
Mount the Security World ISO file:
% cd /shared % mkdir SecWorld-12.60.11 % mount -o loop SecWorld_Lin64-12.60.11.iso SecWorld-12.60.11
-
Untar the Security World files:
% cd /shared % sudo tar -zxvf /shared/SecWorld-12.60.11/linux/amd64/ctd.tar.gz
-
Repeat for all
tar.gz
files in theamd64
directory. -
Fix installation directory paths:
% mv /shared/opt/nfast/ /shared % rmdir /shared/opt
-
Create a link from
/opt/nfast
to/shared/nfast
:% cd /opt % ln -s /shared/nfast % ls -al
-
Run the installation:
% /opt/nfast/sbin/install
-
Run the
enquiry
utility to see if the hardserver is up and running:% /opt/nfast/bin/enquiry
Configure the Security World
To configure the Security World:
-
Enroll the HSM onto the Big-IP machine. The machine must be a client of the HSM. For more information, see the User Guide for the HSM.
% /opt/nfast/bin/nethsmenroll <HSM_IP_Address> % /opt/nfast/bin/enquiry
-
Create or import the Security World. For more information, see the User Guide for the HSM.
-
Edit
cknfastrc
in/opt/nfast
and update it to contain one of the following configurations:-
For Module-Only protection:
CKNFAST_FAKE_ACCELERATOR_LOGIN=1
-
For OCS or Softcard protection:
CKNFAST_LOADSHARING=1 CKNFAST_NO_ACCELERATOR_SLOTS=1
-
-
Add
*
to the end of the/shared/opt/nfast/kmdata/config/cardlist
file.
Configure HSM connectivity to Big-IP
To configure HSM connectivity to Big-IP:
-
Use the following command to check the name of the partition to be used. For OCS or Softcard protection, this is typically the name of the card set.
% /opt/nfast/bin/cklist
-
Take note of the partition name. This integration uses Module-Only protection, so the partition name was
accelerator
. -
Log in to the Configuration utility using an account with the administrator role.
-
Add the following information under System > Certificate Management > HSM Management > External HSM.
-
For Vendor, select Auto.
-
For PKCS11 Library Path, enter /opt/nfast/toolkits/pkcs11/libcknfast.so.
-
For Partition, enter the partition name.
-
For Password, enter the card set passphrase.
-
-
Select Add to add the partition.
-
Select Update.
-
Restart the
pkcs11d
service to apply the new settings to the system:% tmsh restart sys service pkcs11d % tmsh restart sys service tmm
-
Confirm that
pkcs11d
is running:% bigstart status pkcs11d
Manage HSM keys for LTM
Use the following procedures to manage HSM keys:
Generate an HSM key
The Traffic Management Shell tmsh
can be used to generate a key or certificate on the HSM.
-
Generate the key:
% tmsh create sys crypto key <key_name> gen-certificate common-name <cert_name> security-type nethsm
-
Verify that the key was created:
% tmsh list sys crypto key test_key
Generate a self-signed digital certificate
To generate a self-signed digital certificate:
-
Log in to the Configuration utility using an account with the administrator role.
-
On the main page, select System > Certificate Management > Traffic Certificate Management.
The Traffic Certificate Management page appears.
-
Select Create.
-
For Name, enter a unique name for the SSL certificate.
-
For Issuer, select Self.
-
For Common Name, enter a name. This is typically the name of a web site, such as www.siterequest.com.
-
Enter the other certificate details.
-
For Security Type, select NetHSM.
-
For NetHSM Partition, select a partition to use.
-
For Key Type, RSA is selected as the default key type.
-
For Size, select a size, in bits.
-
Select Finished.
Request a certificate from a Certificate Authority
To request a certificate from a Certificate Authority, you must generate a certificate signing request (CSR) and then submit the CSR to a third-party trusted certificate authority (CA):
-
Log in to the Configuration utility using an account with the administrator role.
-
On the main page, select System > Certificate Management > Traffic Certificate Management.
The Traffic Certificate Management page appears.
-
Select Create.
-
For Name, enter a unique name for the SSL certificate.
-
For Issuer list, select Certificate Authority.
-
Enter the other certificate details.
-
Select Finished.
-
The Certificate Signing Request page appears.
-
Do one of the following to download the request into a file on your system.
-
For Request Text, copy the certificate.
-
For Request File, select the Download button.
-
-
Submit the request to a certificate authority to be signed.
-
Select Finished.
An option appears to import the signed certificate.
-
Import the certificate.
Delete a key from the BIG-IP system
To delete a key from the BIG-IP system:
-
Log in to the Configuration utility using an account with the administrator role.
-
On the main page, select System > Certificate Management > Traffic Certificate Management.
The Traffic Certificate Management page appears.
-
For SSL Certificate List, select the key to delete.
-
Select Delete.
The key you selected is deleted from BIG-IP.
The key stored in NetHSM is not deleted. To do this, find the key file in
/opt/nfast/kmdata/local
and delete it.
Import a pre-existing NetHSM key to the BIG-IP system
To import a pre-existing NetHSM key to the BIG-IP system:
-
Log in to the command-line interface of the system using an account with administrator privileges.
-
Import the NetHSM key:
% tmsh install sys crypto key <nethsm_key_label> from-nethsm security-type nethsm
This step can be completed on the Configuration utility. See the F5 documentation for more information.
-
Integration GuideF5 BIG-IP Platform and nShield HSM Integration Guide
-
Web PagenShield® Integration with F5 BigIP v16.01
-
ProductsnShield Connect
-
ProductsnShield as a Service