On Aug 13, 1:32 pm, Rishi <rishirenj...@gmail.com> wrote:
> On Aug 13, 6:13 am, Nelson B Bolyard <nel...@bolyard.me> wrote:
>
>
>
>
>
> > On 2009-08-12 03:43 PDT, Rishi Renjith wrote:
>
> > > Hello,
> > > I tried creating a NSS database, linking it with crypto card and
> > > connecting using apache mod_nss. Everything works fine, except that the
> > > *rsaprivate *jobs are not getting increased in the kstat of the card.
>
> > This is essentially the same issue that Rishi reported yesterday.
> > I think he is not seeing our replies.
>
> > > *bash-3.00# modutil -list -dbdir . *
> > > Listing of PKCS #11 Modules
> > >   2. Sun Crypto Accelerator
> > >         library name: /usr/lib/libpkcs11.so
> > >          slots: 2 slots attached
> > >         status: loaded
>
> > >          slot: Sun Metaslot
> > >         token: Sun Metaslot
>
> > >          slot: Sun Crypto Softtoken
> > >         token: Sun Software PKCS#11 softtoken
>
> > There's obviously no crypto accelerator there.
>
> > > Generating key.  This may take a few moments...
>
> > > Enter Password or Pin for "Sun Software PKCS#11 softtoken":
>
> > The above prompt confirms that the key was generated in Sun's pure
> > software token, not in the SCA 6000 crypto accelerator token.
>
> > When the SCA 6000 is properly configured, it shows up as one of the slot
> > and tokens in the list of slots and tokens (shown above) for the module
> > /usr/lib/libpkcs11.so.  I searched today through Sun's public documentation
> > trying to find out how to register the SCA 6000 with the MetaSlot so that
> > it would show up in that list, and could not find any documentation about
> > that.  :(
>
> > Sorry.
>
> > /Nelson
>
> Sorry, I was not receiving the replies you had posted earlier as I did
> not subscribe to the list.
>
> When I do a cryptoadm list to list the providers, there are no s/w
> providers for RSA, as below.
> bash-3.00# cryptoadm list
>
> User-level providers:
> Provider: /usr/lib/security/$ISA/pkcs11_kernel.so
> Provider: /usr/lib/security/$ISA/pkcs11_softtoken_extra.so
>
> Kernel software providers:
>         des
>         aes256
>         arcfour2048
>         blowfish448
>         sha1
>         sha2
>         md5
>         swrand
>
> Kernel hardware providers:
>         mca/0
>
> I went through the documentation of the SCA6000 
> athttp://dlc.sun.com/pdf/819-5536-11/819-5536-11.pdf
> This is that they say...
> "Configuring Sun Metaslot to Use the Sun Crypto Accelerator 6000
> Keystore
>
> Through Sun Metaslot, only one keystore can be accessed. By default
> Sun Metaslot
> uses the Solaris Softtoken keystore. To access the Sun Crypto
> Accelerator 6000
> keystore through Sun Metaslot, you must use one of the following
> configurations.
> ■ Configure Sun Metaslot to use the Sun Crypto Accelerator 6000
> keystore systemwide
> using cryptoadm(1M).
> Enter the following command to use the Sun Crypto Accelerator 6000
> keystore.
> For the example in this section, ks is the name of the Sun Crypto
> Accelerator 6000
> cryptoadm enable metaslot token=ks
> This command forces a global change throughout the system, which
> causes all
> applications on the system to use the Sun Crypto Accelerator 6000
> keystore by
> default."
>
> I had done this earlier, nevertheless, I tried it again today as below
>
> bash-3.00# cryptoadm list -v metaslot
> System-wide Meta Slot Configuration:
> ------------------------------------
> Status: enabled
> Sensitive Token Object Automatic Migrate: disabled
> Persistent object store token: Military.602889
>
> Detailed Meta Slot Information:
> -------------------------------
> actual status: enabled.
> Description: Sun Metaslot
> Token Present: True
> Token Label: Sun Metaslot
> Manufacturer ID: Sun Microsystems, Inc.
> Model: 1.0
> Serial Number:
> Hardware Version: 0.0
> Firmware Version: 0.0
> UTC Time:
> PIN Length: 0-253
> Flags: CKF_RNG CKF_LOGIN_REQUIRED CKF_USER_PIN_INITIALIZED
> CKF_TOKEN_INITIALIZED CKF_SO_PIN_LOCKED
>
> bash-3.00# cryptoadm enable metaslot token="Military.602889"
> bash-3.00#
>
> bash-3.00# modutil -list -dbdir .
>
> Listing of PKCS #11 Modules
> -----------------------------------------------------------
>   1. NSS Internal PKCS #11 Module
>          slots: 2 slots attached
>         status: loaded
>
>          slot: NSS Internal Cryptographic Services
>         token: NSS Generic Crypto Services
>
>          slot: NSS User Private Key and Certificate Services
>         token: NSS Certificate DB
>
>   2. Sun Crypto Accelerator
>         library name: /usr/lib/libpkcs11.so
>          slots: 2 slots attached
>         status: loaded
>
>          slot: Sun Metaslot
>         token: Sun Metaslot
>
>          slot: Sun Crypto Softtoken
>         token: Sun Software PKCS#11 softtoken
> -----------------------------------------------------------
> bash-3.00# modutil -disable "NSS Internal PKCS #11 Module" -dbdir .
> WARNING: Performing this operation while the browser is running could
> cause
> corruption of your security databases. If the browser is currently
> running,
> you should exit browser before continuing this operation. Type
> 'q <enter>' to abort, or <enter> to continue:
>
> Slot "NSS Internal Cryptographic Services" disabled.
> Slot "NSS User Private Key and Certificate Services" disabled.
>
> bash-3.00# modutil -disable "Sun Crypto Accelerator" -dbdir .
> WARNING: Performing this operation while the browser is running could
> cause
> corruption of your security databases. If the browser is currently
> running,
> you should exit browser before continuing this operation. Type
> 'q <enter>' to abort, or <enter> to continue:
>
> Slot "Sun Metaslot" disabled.
> Slot "Sun Crypto Softtoken" disabled.
>
> bash-3.00# modutil -enable "Sun Crypto Accelerator" -slot "Sun
> Metaslot" -dbdir .
> WARNING: Performing this operation while the browser is running could
> cause
> corruption of your security databases. If the browser is currently
> running,
> you should exit browser before continuing this operation. Type
> 'q <enter>' to abort, or <enter> to continue:
>
> Slot "Sun Metaslot" enabled.
>
> Another strange thing is that when I check the kstat output, the
> AESjobs are getting incremented. This means that somehow the NSS is
> using the crypto hardware for symmetric jobs, but for asymmetric jobs,
> it is not using the h/w card. And also if you use it through JSSE, the
> card is correctly used for RSA jobs.
>
> Is there any possibility the RSA jobs are getting done by the " NSS
> Internal PKCS #11 Module" that gets created automatically when we
> create the DB? It is clear from the previous mail that the the
> certificates and keys are stored in the card, only that the RSA jobs
> are not offloaded to the crypto card. I can retrieve even using pktool
> giving my hardware keystore  as below.
>
> bash-3.00# pktool list token=Military.602889 objtype=both
> Enter pin for Military.602889:
> Found 8 keys.
> Key #1 - RSA private key:
> Key #2 - RSA private key:  sanCert
> Key #3 - RSA private key:
> Key #4 - RSA private key:
> Key #5 - RSA private key:
> Key #6 - RSA private key:
> Key #7 - RSA private key:  fips999
> Key #8 - RSA private key:
> Found 3 keys.
> Key #1 - AES:  VSAT_AES_KEY (1077504064 bits)    256 bits
> Key #2 - AES:  smc_encrptor (1077507264 bits)    256 bits
> Key #3 - AES:  smcAesEncryptor (1077506944 bits)         256 bits
> Found 8 certificates.
> 1. (X.509 certificate)
>         Label: ismc_cert
>         ID: 4e:75:2a:9b:4a:76:c1:46:2d:9a:ec:76:de:16:17:e0:8d:07:ff:
> 42
>         Subject: CN=sandeeprc.eu.org
>         Issuer: O=Root CA, OU=http://www.cacert.org, CN=CA Cert
> Signing Authority, emailaddress=supp...@cacert.org
>         Serial: 0x0747A9
>         X509v3 Subject Alternative Name:
>     DNS:sandeeprc.eu.org, othername:<unsupported>
>
> 2. (X.509 certificate)
>         Label: CACERT CA
>         ID: c8:1e:42:ce:da:0b:c1:d6:5c:90:51:b0:eb:
> 86:79:e2:9d:d6:c0:67
>         Subject: O=Root CA, OU=http://www.cacert.org, CN=CA Cert
> Signing Authority, emailaddress=supp...@cacert.org
>         Issuer: O=Root CA, OU=http://www.cacert.org, CN=CA Cert
> Signing Authority, emailaddress=supp...@cacert.org
>         Serial: 0x00

Finally I found a solution!!! Googled till cows came home and finally
found that if you add METASLOT_DISABLED=false in env variables, then
rsa jobs get offloaded to the crypto card. But it still gives me "ssl
handshake failure", this i think i should ask in the mod_nss forum.

Thanks!!!!
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to