Data Center Real User Monitoring SSL Monitoring Administration
Transcription
Data Center Real User Monitoring SSL Monitoring Administration
Data Center Real User Monitoring SSL Monitoring Administration Guide Release 12.3 Please direct questions about Data Center Real User Monitoring or comments on this document to: Customer Support https://community.compuwareapm.com/community/display/SUPPORT Copyright © 2014 Compuware Corporation. All rights reserved. Unpublished rights reserved under the Copyright Laws of the United States. U.S. GOVERNMENT RIGHTS-Use, duplication, or disclosure by the U.S. Government is subject to restrictions as set forth in Compuware Corporation license agreement and as provided in DFARS 227.7202-1(a) and 227.7202-3(a) (1995), DFARS 252.227-7013(c)(1)(ii) (OCT 1988), FAR 12.212(a) (1995), FAR 52.227-19, or FAR 52.227-14 (ALT III), as applicable. Compuware Corporation. This product contains confidential information and trade secrets of Compuware Corporation. Disclosure is prohibited without the prior express written permission of Compuware Corporation. Use of this product is subject to the terms and conditions of the user's License Agreement with Compuware Corporation. Documentation may only be reproduced by Licensee for internal use. The content of this document may not be altered, modified or changed without the express written consent of Compuware Corporation. Compuware Corporation may change the content specified herein at any time, with or without notice. All current Compuware Corporation product documentation can be found at https://community.compuwareapm.com/community/display/APMDOC. Compuware, FrontLine, Network Monitoring, Enterprise Synthetic, Server Monitoring, Dynatrace Network Analyzer, Dynatrace, VantageView, Dynatrace, Real-User Monitoring – First Mile, and Dynatrace Performance Network are trademarks or registered trademarks of Compuware Corporation. Cisco is a trademark or registered trademark of Cisco Systems, Inc. Internet Explorer, Outlook, SQL Server, Windows, Windows Server, and Windows Vista are trademarks or registered trademarks of Microsoft Corporation. Firefox is a trademark or registered trademark of Mozilla Foundation. Red Hat and Red Hat Enterprise Linux are trademarks or registered trademarks of Red Hat, Inc. J2EE, Java, and JRE are trademarks or registered trademarks of Oracle Corporation. VMware is a trademark or registered trademark of VMware, Inc. SAP and SAP R/3 are trademarks or registered trademarks of SAP AG. Adobe® Reader® is a registered trademark of Adobe Systems Incorporated in the United States and/or other countries. All other company and product names are trademarks or registered trademarks of their respective owners. Local Build: December 9, 2014, 4:45 Contents Contents Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Who Should Read This Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Related Publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Organization of This Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Customer Support Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Reporting a Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Documentation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 5 5 5 6 6 6 Chapter 1 ∙ Process Overview of SSL Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Chapter 2 ∙ Configuring SSL Monitoring on the AMD . . . . . . . . . . . . . . . . . . . . . . Configuring and Using RSA Private Keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Management of RSA Private Keys on AMD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Using a List File to Specify RSA Private Keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . SSL Hardware Accelerator Cards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Selecting and Configuring SSL Engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Installing and Configuring NITROX XL FIPS Acceleration Board . . . . . . . . . . . . . Supported NITROX XL FIPS Acceleration Board Security Levels . . . . . . . . . . . Invoking Acceleration Board Management Utility . . . . . . . . . . . . . . . . . . . . . . . Initializing the NITROX XL FIPS Acceleration Board . . . . . . . . . . . . . . . . . . . . Logging In and Out of the NITROX XL FIPS Acceleration Board . . . . . . . . . . . RSA Key Management on NITROX XL FIPS . . . . . . . . . . . . . . . . . . . . . . . . . . RoHS Directive Compliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Installing and Configuring an nCipher SSL Card on a 32-bit AMD . . . . . . . . . . . . . Installing and Configuring an nCipher SSL Card on a 64-bit AMD . . . . . . . . . . . . . Removing nCipher Security World . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Installing and Configuring Sun Crypto Accelerator 6000 PCIe Card . . . . . . . . . . . . Initializing the Sun Crypto Accelerator 6000 PCIe Card . . . . . . . . . . . . . . . . . . . Sun Crypto Accelerator 6000 PCIe Card - Key and Card Management . . . . . . . . . Additional Configuration Settings and Administration for Sun Crypto Accelerator 6000 PCIe Card . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Reference Information for Sun Crypto Accelerator 6000 PCIe Card . . . . . . . . . . . Sun Crypto Accelerator 6000 PCIe Card Known Issues . . . . . . . . . . . . . . . . . . . . 11 11 12 14 18 18 20 20 20 21 24 24 26 26 31 36 36 37 39 Data Center Real User Monitoring SSL Monitoring Administration Guide 42 43 43 3 Contents 4 Using KPA to Make Keys Available to the AMD Process . . . . . . . . . . . . . . . . . . . . . . Migrating from OpenSSL to Using SSL Hardware Accelerator . . . . . . . . . . . . . . . . . . Monitoring SSL-encoded Traffic without Decryption . . . . . . . . . . . . . . . . . . . . . . . . . Using AMD with nShield Connect HSM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Setting Up nShield Connect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Connecting AMD to Existing nShield Connect . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 45 46 46 47 47 Chapter 3 ∙ Server-Based SSL Monitoring Configuration . . . . . . . . . . . . . . . . . . . Defining SSL Error Names . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Managing SSL Alert Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 49 50 Chapter 4 ∙ Tuning Configuration and Troubleshooting Problems . . . . . . . . . . . . . Verification of Traffic Monitoring Quality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . SSL Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting SSL Monitoring Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Guided Configuration Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 55 56 57 62 Appendix A ∙ SSL-Related rcon Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . SSLDECR CERTS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . SSLDECR HELP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . SSLDECR LOGLEVEL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . SSLDECR NAMES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . SHOW SSLDECR CERTS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . SHOW SSLDECR CIPHERS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . SHOW SSLDECR HELP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . SHOW SSLDECR KEYS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . SHOW SSLDECR LOGLEVEL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . SHOW SSLDECR NAMES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . SHOW SSLDECR SERVERS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . SHOW SSLDECR STATUS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 67 68 69 70 70 71 72 73 74 74 75 76 Appendix B ∙ Extracting Web Server Private SSL Keys . . . . . . . . . . . . . . . . . . . . . Extracting Web Server Private RSA Keys for Apache/OpenSSL Server . . . . . . . . . . . . Extracting Web Server Private RSA Keys for Microsoft IIS 4.0 Server . . . . . . . . . . . . Extracting Web Server Private RSA Keys for Microsoft IIS 5.0 Server . . . . . . . . . . . . Extracting Web Server Private RSA Keys for Netscape (Old Format) . . . . . . . . . . . . . Extracting Web Server Private RSA Keys for Netscape (New Format) . . . . . . . . . . . . . Extracting Web Server Private RSA Keys for Zeus . . . . . . . . . . . . . . . . . . . . . . . . . . . Extracting SSL Private Keys from an iPlanet Web Server . . . . . . . . . . . . . . . . . . . . . . 79 79 80 81 82 84 85 85 Appendix C ∙ SSL Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . SSL Software Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . SSL Hardware Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 87 90 Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 Data Center Real User Monitoring SSL Monitoring Administration Guide INTRODUCTION Who Should Read This Guide This book is intended for users of Data Center Real User Monitoring who want to configure, diagnose, and troubleshoot the monitoring of SSL traffic. Related Publications Documentation for your product is distributed on the product media. For Data Center RUM, it is located in the \Documentation directory. It can also be accessed from the Media Browser. Go online (https://community.compuwareapm.com/) for fast access to information about your Dynatrace products. You can download documentation and FAQs as well as browse, ask questions and get answers on user forums (requires subscription). The first time you access FrontLine, you are required to register and obtain a password. Registration is free. PDF files can be viewed with Adobe Reader version 7 or later. If you do not have the Reader application installed, you can download the setup file from the Adobe Web site at http://www.adobe.com/downloads/. Organization of This Guide This guide is organized as follows: • Process Overview of SSL Monitoring [p. 9] contains an overview of issues and considerations on monitoring of secure traffic based on SSL (Secure Socket Layer). • Configuring SSL Monitoring on the AMD [p. 11] contains information about preparing private RSA keys, installing and configuring hardware accelerator cards, using OpenSSL, and migrating from OpenSSL to hardware SSL acceleration. It also includes information on monitoring SSL traffic without decryption. • Server-Based SSL Monitoring Configuration [p. 49] explains changing the SSL monitoring related properties that affect DC RUM reports. • Tuning Configuration and Troubleshooting Problems [p. 55] addresses various configuration issues often encountered in SSL monitoring. Data Center Real User Monitoring SSL Monitoring Administration Guide 5 Introduction • SSL-Related rcon Commands [p. 67] is a collection of rcon commands related to SSL monitoring. • Extracting Web Server Private SSL Keys [p. 79] explains in detail how to extract private SSL keys from different web servers. • SSL Support [p. 87] provides reference information about hardware and software SSL support in DC RUM. Customer Support Information Dynatrace Community For product information, go to https://community.compuwareapm.com/ and click Support. You can review frequently asked questions, access the training resources in the APM University, and post a question or comment to the product forums. You must register and log in to access the Community. Corporate Website To access the corporate website, go to http://www.dynatrace.com. The Dynatrace site provides a variety of product and support information. Reporting a Problem Use these guidelines when contacting APM Customer Support. When submitting a problem, log on to the Dynatrace Support Portal at https://support.compuwareapm.com/, click the Open Ticket button and select Data Center Real User Monitoring from the Product list. Refer to the DC RUM FAQ article at https://community.compuwareapm.com/community/display/DL/DCRUM+Data+Collection+Guide to learn know how to provide accurate diagnostics data for your DC RUM components. Most of the required data can be retrieved using RUM Console. Documentation Conventions The following font conventions are used throughout documentation: 6 This font Indicates Bold Terms, commands, and references to names of screen controls and user interface elements. Citation Emphasized text, inline citations, titles of external books or articles. Documentation Conventions [p. 6] Links to Internet resources and linked references to titles in documentation. Fixed width Cited contents of text files, inline examples of code, command line inputs or system outputs. Also file and path names. Data Center Real User Monitoring SSL Monitoring Administration Guide Introduction This font Indicates Fixed width bold User input in console commands. Fixed width italic Place holders for values of strings, for example as in the command: cd directory_name Menu ➤ Item Menu items. Text screen shots. Screen Code block Blocks of code or fragments of text files. Data Center Real User Monitoring SSL Monitoring Administration Guide 7 Introduction 8 Data Center Real User Monitoring SSL Monitoring Administration Guide CHAPTER 1 Process Overview of SSL Monitoring Monitoring of secure traffic requires more attention and preparation than monitoring of non-secure protocols. In addition, if the AMD is to decrypt SSL traffic, it needs third-party components, such as hardware or software SSL accelerators, preconfigured to seamlessly work with Data Center Real User Monitoring. Before You Begin Before you start configuration process: • You should be familiar with DC RUM components and basic monitoring concepts. Refer to the Data Center Real User Monitoring Getting Started. • You need to identify your monitoring goals. For more information, see Define and Prioritize Goals, Objectives, and Requirements in the Data Center Real User Monitoring Getting Started. • You need to install the following DC RUM components: ◦ The latest version of AMD Refer to the Data Center Real User Monitoring Agentless Monitoring Device Installation Guide. ◦ The latest version of RUM Console Refer to the Data Center Real User Monitoring RUM Console Installation Guide. ◦ The latest version of CAS Refer to the Data Center Real User Monitoring Central Analysis Server Installation Guide. ◦ Optionally: The latest version of ADS Refer to the Data Center Real User Monitoring Advanced Diagnostics Server Installation Guide. • Make sure you have prepared your RSA keys and documentation on your SSL accelerator. Data Center Real User Monitoring SSL Monitoring Administration Guide 9 Chapter 1 ∙ Process Overview of SSL Monitoring The process of configuration of SSL monitoring with decryption consists of the following tasks. Note that you may want to monitor SSL traffic without decryption. For more information, see Monitoring SSL-encoded Traffic without Decryption [p. 46]. SSL-Related Configuration 1. Prepare the RSA private keys for servers that are to be monitored. Apply the private keys in PEM format to the AMD in order to decrypt secure sessions. For more information, see Configuring and Using RSA Private Keys [p. 11] and Extracting Web Server Private SSL Keys [p. 79]. 2. Select the mode of RSA key management on the AMD. For more information, see Management of RSA Private Keys on AMD [p. 12]. 3. Install and configure a hardware SSL accelerator, if a hardware accelerator is to be used. In most deployments, hardware SSL accelerators are used because of performance reasons. However, there is an option to use a software alternative, OpenSSL. Depending on your SSL acceleration approach, refer to the topic appropriate for your hardware accelerator or use OpenSSL, the default cost-free SSL acceleration mode on the AMD. 4. Optional: Migrate from OpenSSL to an SSL hardware accelerator. While OpenSSL is a cost-free solution to SSL decryption, it may not be sufficient in terms of performance. When your secure traffic stream overwhelms the AMD's software capabilities, consider deploying hardware SSL accelerators. For more information, see Migrating from OpenSSL to Using SSL Hardware Accelerator [p. 45]. Monitoring Configuration 5. Set up software service monitoring Monitoring SSL traffic requires that you select an appropriate analyzer while defining a software service. For example, if you want to monitor an HTTPS (secure HTTP) software service, and you comply with the previous configuration steps, select the “SSL Decrypted” analyzer for such a service. Apart from selecting the analyzer for your software service, you can also configure more advanced features of HTTP analysis, such as user recognition, URL parameter parsing, and so on. Refer to the Data Center Real User Monitoring Web Application Monitoring User Guide. HTTPS, while the most dominant protocol, when considering SSL monitoring, is not the only protocol that can be encrypted with SSL. For more information, see Protocols Supported by CAS in the Data Center Real User Monitoring Administration Guide and Protocols Supported by ADS in the Data Center Real User Monitoring Administration Guide. What to Do Next In case of issues observed during monitoring of SSL traffic, consult the SSL-related FAQ to diagnose your problems before you contact Customer Support. For more information, see Troubleshooting SSL Monitoring Issues [p. 57] and SSL-Related rcon Commands [p. 67]. 10 Data Center Real User Monitoring SSL Monitoring Administration Guide CHAPTER 2 Configuring SSL Monitoring on the AMD Configuring SSL monitoring with decryption requires you to extract and apply the RSA private keys and install and configure the SSL hardware accelerator cards. Configuring and Using RSA Private Keys To process SSL decryption, an AMD needs to use RSA private keys for each monitored server. The keys need to be extracted from the monitored servers and can then be used either as PEM files or be stored on the accelerator card. Key extraction is described in Extracting Web Server Private SSL Keys [p. 79]. NOTE • In the case of keys generated with OpenSSL, the keys are already in PEM format. If keys come from a Microsoft IIS or Netscape Web server, they are usually stored in hardware accelerators and must be exported to PEM format. • A key can be encrypted with a password. For more information, see Using KPA to Make Keys Available to the AMD Process [p. 45]. SSL decryption can be performed either in the AMD software using OpenSSL or in a hardware SSL accelerator. • If SSL decryption is performed in the AMD software, the AMD reads RSA private keys from PEM-encoded disk files during startup. • If SSL decryption is performed in a hardware SSL accelerator, the keys may need to be stored in the accelerator card first: after extracting the keys from their servers as PEM-encoded disk files and writing them to the accelerator, the PEM files should be deleted for security reasons. The commands used for managing—listing, organizing, and storing—keys on an accelerator card are specific to the card and are described in topics dedicated to individual cards: Installing and Configuring NITROX XL FIPS Acceleration Board [p. 20], Installing and Configuring an nCipher SSL Card on a 32-bit AMD [p. 26] Installing and Configuring an nCipher SSL Card on a 64-bit AMD [p. 31] Data Center Real User Monitoring SSL Monitoring Administration Guide 11 Chapter 2 ∙ Configuring SSL Monitoring on the AMD Installing and Configuring Sun Crypto Accelerator 6000 PCIe Card [p. 36] Management of RSA Private Keys on AMD The AMD supports two mutually exclusive modes of using RSA private keys. • A list of the private keys that are to be used for encryption can be contained in a text file on the AMD, with each entry containing a reference to a PEM-encoded file or a key stored on the accelerator card. • The AMD can extract all keys from the accelerator card and use those for a pool of available keys. These two mutually exclusive modes of operation are governed by the following configuration properties in the rtm.config configuration file: server.key.dir The directory in which to store PEM-encoded key files (by default, this is /usr/adlex/config/keys). server.key.list The file in the above directory that describes what keys are to be used for the monitored servers. The default name of the file is keylist. Note that the file lists keys to be used, but does not provide a mapping of servers to keys. This is because the AMD is able to match keys to SSL sessions automatically. The advantage of this approach (of not mapping a specific IP address of the server to the private key) is that servers residing behind load balancers can also be monitored, even though the same IP address is then apparently using a number of different SSL private keys. ssl.import.all.keys.from.token Mode selector: • Setting this configuration property to true overrides the settings specified in server.key.list and makes the AMD read the keys from the accelerator card. This is supported only for ssl.engine settings of nitroxfips, sca6000, or ncipher_pkcs11. For more information on setting ssl.engine, see Selecting and Configuring SSL Engine [p. 18]. • Setting this property to false enables key resolution based on the information provided by the server.key.dir and server.key.list configuration properties. The file listing the keys, as specified in server.key.list, is a plain-text file with each line describing a single key and being composed of the following fields. Note that the square brackets (“[ ]”) imply that the given item is optional and that the brackets themselves should not be included in the actual entry. Note also that this file may also be used by other protocols, so entries of other types may also appear there. key_type, [app_name:]key_identifier[, comment] where: • key_type specifies whether the private key is contained in a PEM-encoded file or in a hardware accelerator token: 12 Data Center Real User Monitoring SSL Monitoring Administration Guide Chapter 2 ∙ Configuring SSL Monitoring on the AMD file key_type value file means that the private key is stored in a PEM-encoded file (possibly encrypted). token key_type value token means that the private key is stored in a hardware accelerator. • app_name is the application name within the nCipher context. The value of this parameter depends on, among other things, the method used for writing the key to the card. For example, if the following method is used: ./generatekey --import simple pemreadfile=/usr/adlex/config/keys/s1.key protect=module ident=s1 the application name is “simple” and the syntax of the entries in the list is: token, simple:key_identifier[, comment] To determine the value you need to enter for each key on the card, use the rocs command provided with your nCipher card. For example: # cd /opt/nfast/bin # ./rocs `rocs' key recovery tool Useful commands: `help', `help intro', `quit'. rocs> list keys No. Name App Protected by 1 k1 simple module rocs> exit For other accelerator cards, leave this field empty and do not include the colon in the syntax. • key_identifier identifies the key: ◦ For keys stored in files, it is the name of the PEM-encoded file that contains an RSA private key. ◦ For keys stored on the accelerator card, it is the key identifier as given by the utilities that list keys. Note that some engines distinguish between key identifiers and key labels. Both of these identification methods can be used in the keylist file. However, you may need to specify the type of identification used, by setting the searchKeyBy parameter of the ssl.engine.param property to id or label, as appropriate. See Selecting and Configuring SSL Engine [p. 18] for more information on configuring this option. For nCipher SSL cards, the identifier is an 8-digit hexadecimal value. For a NITROX XL FIPS Acceleration Board, the length of the identifier can vary. • The comment part in square brackets “[ ]” is an optional comment describing the entry in the line. Data Center Real User Monitoring SSL Monitoring Administration Guide 13 Chapter 2 ∙ Configuring SSL Monitoring on the AMD Table 1. RSA Key Handling Methods The following table lists the possible RSA key handling methods for the supported SSL engines. SSL Engine Entry of Type “file” in Entry of Type “token” keylist in keylist openssl YES nfast YES nshield YES Can Import All Keys from Token YES ncipher_pkcs11 YES YES nitrox YES YES sca6000 YES YES Example 1. Sample Entries with RSA Private Keys token,0A0412DC,key for 10.1.1.12 stored in hardware file,server1.pem,key for 10.1.1.36 on port 443 file,server2.pem,key for 10.1.1.36 on port 444 file,server2.pem,key for 10.1.1.36 on port 445 If the AMD is connected to a Central Analysis Server installation, then, for SSL decryption to be used for selected servers, add the service definitions for these servers using the report server graphical user interface, Monitoring Configuration. Add an application named, for example, “SSL decoded” and specify that the SSL (with decryption) analyzer is to be used for that application. Using a List File to Specify RSA Private Keys Create a text file containing the list of the private keys that are to be used for encryption on the AMD, with each entry containing a reference to a PEM-encoded file or a key stored on the accelerator card. Before You Begin For the purpose of this procedure, it is assumed that you are using OpenSSL and have the required PEM-encoded keys ready. Key extraction is described in Extracting Web Server Private SSL Keys [p. 79]. To use a list file to specify RSA private keys: 1. Ensure that the AMD is configured to use keys listed in the list file. Edit the rtm.config configuration file and make sure that the ssl.import.all.keys.from.token configuration property is set to false: ssl.import.all.keys.from.token=false 2. 14 Optional: Specify the directory to store the list file and the PEM-encoded key files. Data Center Real User Monitoring SSL Monitoring Administration Guide Chapter 2 ∙ Configuring SSL Monitoring on the AMD This directory is, by default, /usr/adlex/config/keys. You do not need to modify this setting unless you want to store the files in a different location. To change the configuration, edit the rtm.config configuration file and modify the server.key.dir configuration property. The following example line shows the default setting: server.key.dir=/usr/adlex/config/keys 3. Optional: Specify the name of the list file. The default name of the file listing the keys is keylist. You do not need to modify this setting unless you want to use a different file name. To change the configuration, edit the rtm.config configuration file and modify the server.key.list configuration property. The following example line shows the default setting: server.key.list=keylist Note that the file lists the keys to be used, but does not provide a mapping of servers to keys. This is because the AMD is able to match keys to SSL sessions automatically. The advantage of this approach—of not mapping a specific IP address of the server to the private key—is that servers residing behind load balancers can also be monitored, even though the same IP address is then apparently using a number of different SSL private keys. 4. Optional: Copy all key PEM-encoded key files to the correct directory. All the PEM-encoded key files—if any are to be used—should be copied to the directory specified in the server.key.dir configuration property. Example 2. Copying RSA Key Files Copying an individual file: # cp key1.pem /usr/adlex/config/keys/ or all the *.pem files in the current working directory: # cp *.pem /usr/adlex/config/keys/ 5. Optional: Write keys to the accelerator card. If an accelerator card is to be used, you may need to write the keys to the card before they can be used for encryption. Keys written to the card are referred to as “tokens”. Using tokens is more secure and therefore is recommended if the accelerator cards supports this option. For more information, see Management of RSA Private Keys on AMD [p. 12]. The commands used for managing – listing, organizing, and storing – keys on an accelerator card are specific to the card and are described in topics dedicated to individual cards: Installing and Configuring NITROX XL FIPS Acceleration Board [p. 20], Installing and Configuring an nCipher SSL Card on a 32-bit AMD [p. 26] Installing and Configuring an nCipher SSL Card on a 64-bit AMD [p. 31] Installing and Configuring Sun Crypto Accelerator 6000 PCIe Card [p. 36] 6. Optional: For nCipher cards on a 32-bit platform only, determine the values of the key application names. Data Center Real User Monitoring SSL Monitoring Administration Guide 15 Chapter 2 ∙ Configuring SSL Monitoring on the AMD These parameters are used only for nCipher keys on 32-bit platforms. To determine the value of the nCipher application name, use the rocs command provided with your nCipher card. For example: # cd /opt/nfast/bin # ./rocs `rocs' key recovery tool Useful commands: `help', `help intro', `quit'. rocs> list keys No. Name App Protected by 1 k1 simple module rocs> exit In the above example, the name of the application is “simple”. 7. Optional: Specify the type of identification to be used as id or label. For engine values of ncipher_pkcs11 and sca6000, the searchKeyBy parameter of the ssl.engine.param property can be set to id or label with the following default values for the respective engines: ncipher_pkcs11 Default key identification is by label. sca6000 Default key identification is by key identifier. Example 3. Specify the Type of Identification to be Used ssl.engine.param=searchKeyBy:id 8. Determine the values of the key identifiers for keys stored on the accelerator card. For keys stored in files, it is the name of the PEM-encoded file that contains an RSA private key. For keys stored on the accelerator card, it is the key identifier as given by the utilities that list keys. For the appropriate engines, distinguish between key identifiers and key labels as specified in Step 7 [p. 16]. For CryptoSwift and nCipher SSL cards, the identifier is an 8-digit hexadecimal value. For a NITROX XL FIPS Acceleration Board, the length of the identifier can vary. The commands used for managing – listing, organizing, and storing – keys on an accelerator card, are specific to the card and are described in topics dedicated to individual cards: Installing and Configuring NITROX XL FIPS Acceleration Board [p. 20], Installing and Configuring an nCipher SSL Card on a 32-bit AMD [p. 26] Installing and Configuring an nCipher SSL Card on a 64-bit AMD [p. 31] Installing and Configuring Sun Crypto Accelerator 6000 PCIe Card [p. 36] 9. Create the list file. Use a text editor to create and edit the list file as a plain text file. The file should be located in the directory specified in the server.key.dir configuration property and named as specified in the server.key.list configuration property. 16 Data Center Real User Monitoring SSL Monitoring Administration Guide Chapter 2 ∙ Configuring SSL Monitoring on the AMD Each line should describe a single key and be composed of the following fields. Note that the square brackets (“[ ]”) imply that the given item is optional, and the brackets themselves should not be included in the actual entry. key_type, [app_name:]key_identifier[, comment] where: • key_type specifies whether the private key is contained in a PEM-encoded file or in a hardware accelerator token: file key_type value file means that the private key is stored in a PEM-encoded file (possibly encrypted). token key_type value token means that the private key is stored in a hardware accelerator. • app_name is the application name within the nCipher context. NOTE Specify this field only for nCipher cards, as explained in Step 6 [p. 15], and only in the case of files stored on the accelerator card. For other accelerator cards, or for files stored in PEM-encoded files, leave this field empty and do not include the colon in the syntax. • • key_identifier identifies the key: ◦ For keys stored in files, it is the name of the PEM-encoded file that contains an RSA private key. ◦ For keys stored on the accelerator card, it is the key identifier as given by the utilities that list keys. The comment part is optional. Example 4. Sample Entries Listing RSA Private Keys token,0A0412DC,key for 10.1.1.12 stored in file,server1.pem,key for 10.1.1.36 on port file,server2.pem,key for 10.1.1.36 on port file,server2.pem,key for 10.1.1.36 on port hardware 443 444 445 10. Optional: Delete PEM files after keys have been loaded into the accelerator. After the keys have been loaded into the accelerator, it is advised, for security reasons, that the PEM files be deleted. You can securely delete the source files, by means of the shred command. This is a Linux command that allows secure deletion so that the information stored in the deleted file is not simply un-referenced by the file system but is actually overwritten. This makes it impossible for any disk recovery tool to re-create the deleted file. Use the -fuz options to the shred command to hide the shredding operation by overwriting the file with 0s and to Data Center Real User Monitoring SSL Monitoring Administration Guide 17 Chapter 2 ∙ Configuring SSL Monitoring on the AMD actually delete the file name form the directory listing while overriding any read protection. For example: [root@amd-35 keys]# shred -fuz my.pem CAUTION Secure deletion is not a necessary step. This is a security measure that you can follow if you do not want the un-encrypted file to remain on the system. Remember that this command removes the file without any means of recovering the removed information. 11. Optional: If using OpenSSL and the kpadmin utility, re-start the kpa daemon and re-run the kpadmin. After updating the keylist file you need to re-start the kpa daemon and re-run the kpadmin utility. For more information, see Using KPA to Make Keys Available to the AMD Process [p. 45]. 12. Apply the configuration changes. When the configuration is changed, apply the changes to the AMD. To do so, log on to the AMD as user root and execute the following commands: # ndstop # ndstart This restarts the AMD and applies the configuration changes. What to Do Next If the AMD is connected to a Central Analysis Server installation, then, for SSL decryption to be used for selected servers, add software service definitions for these servers using RUM Console. Add a software service (named, for example, “SSL decoded”) and specify that the SSL (with decryption) analyzer is to be used for that definition. SSL Hardware Accelerator Cards If the SSL card has been installed in the AMD during the manufacturing process, the software is also installed and it detects the card without the need for additional configuration. If, however, the AMD is upgraded and a new SSL accelerator card is added, you must install and configure the device driver. For the list of supported hardware accelerator cards see Tested Cards in the Data Center Real User Monitoring Hardware Recommendations. Selecting and Configuring SSL Engine To configure SSL monitoring, you must select the SSL engine to be used, which defines the type of accelerator card used or refers to software decryption. 18 Data Center Real User Monitoring SSL Monitoring Administration Guide Chapter 2 ∙ Configuring SSL Monitoring on the AMD Selecting Engine Type The type of the accelerator card is set in the configuration file rtm.config, in the configuration property named ssl.engine. The value to use depends on the accelerator card: openssl (for OpenSSL) nshield (for nShield 32-bit platform) nfast (for nFast 32-bit platform) ncipher_pkcs11 (for nShield 64-bit platform) nitroxfips (for NITROX) sca6000 (for Sun Crypto Accelerator 6000 – supported but not recommended) Example usage: ssl.engine=nitroxfips Specifying the Number of Dedicated Threads For the SSL cards that operate in synchronous mode, AMD spawns dedicated threads to wait for SSL operations on the accelerator. You can increase the number of threads to be executed for the given SSL engine by setting the ssl.engine.param=threads:number configuration property in the rtm.config file. Specifying more than one thread may improve performance, depending on the performance capacity of the card. The SSL engines for which this setting is supported are: openssl ncipher_pkcs11 sca6000 Specifying the Key Search Criteria for the SSL Engine The following engines distinguish between key identifiers and key labels. Both of these identification methods can be used to identify the keys in the keylist file. However, you may need to specify the type of identification to be used by editing the rtm.config file and setting the searchKeyBy parameter of the ssl.engine.param property to id or label, as appropriate. ncipher_pkcs11 Default key identification is by label. sca6000 Default key identification is by key identifier. Example usage: ssl.engine.param=searchKeyBy:id Applying the Configuration Changes When the SSL engine type is chosen and other configuration changed according to your SSL accelerator, apply the changes to the AMD. To do so, log on to the AMD as user root and execute the following commands: # ndstop # ndstart Data Center Real User Monitoring SSL Monitoring Administration Guide 19 Chapter 2 ∙ Configuring SSL Monitoring on the AMD This restarts the AMD and applies all of the configuration changes. You can also verify that the changes are applied correctly by using the command show SHOW SSLDECR STATUS. For more information, see SHOW SSLDECR STATUS [p. 76] and SSL-Related rcon Commands [p. 67]. Installing and Configuring NITROX XL FIPS Acceleration Board If a new NITROX XL FIPS Acceleration Board has been added to your AMD (inserted into a free PCI slot), you need to install the appropriate software. See Upgrading the AMD Software in the Data Center Real User Monitoring Agentless Monitoring Device Installation Guide for information about upgrading the AMD. In addition to ensuring that the driver software is installed on the AMD, the accelerator card has to be initialized by creating superuser and user accounts, each with a password, as explained below. The configuration is performed using the nitrox-setup command line utility. NOTE • NITROX XL FIPS Acceleration Board is referred to as “Cavium NITROX XL CN1120-NFB Hardware Security Module” or just “HSM”, in the configuration utility user interface, as described below. All of these names refer to the same entity. • FIPS mode 140-2 Level 3 is referred to as “FIPS mode: on” in the configuration utility user interface. • FIPS mode 140-2 Level 2 is referred to as “FIPS mode: off” in the configuration utility user interface. Supported NITROX XL FIPS Acceleration Board Security Levels The NITROX XL FIPS Acceleration Board, model CN1120-350-NFB-1.1-G, can be configured to operate in the following security modes: FIPS 140-2 Level 3 high security mode where it requires to be connected to a Pin Entry Device (PED). FIPS 140-2 Level 2 mode, also referred to as the non-FIPS mode where connection to a PED device is not required and all operations on the card are performed solely through the hosting computer, that is through your AMD. You can use either of these modes for NITROX XL FIPS Acceleration Boards installed in an AMD. Decide which mode to use, based on your specific security needs. For further information about security levels, refer to the Cavium Networks NITROX documentation. Invoking Acceleration Board Management Utility The nitrox-setup utility, located in /opt/nitrox_fips/bin, is used to perform configuration and management operations on the hardware security module as well as to facilitate actual card operation. In addition to this software management utility, a Pin Entry Device (PED) might also be required to configure and operate the hardware security module, depending on the selected security level. 20 Data Center Real User Monitoring SSL Monitoring Administration Guide Chapter 2 ∙ Configuring SSL Monitoring on the AMD To invoke the hardware security module management utility, log in to the AMD and execute the command: /opt/nitrox_fips/bin/nitrox-setup On startup, the utility displays a menu and information about the current hardware security module label and security level. Example 5. NITROX Setup Menu and Configuration Information Agentless Monitoring Configuration and management of Cavium NITROX XL FIPS Hardware Security Module (HSM) HSM label: testLabel1, HSM FIPS mode: off, USER logged in: no 1 - Display HSM status 2 - Initialize HSM 3 - Login as USER 4 - Logout USER 5 - Add RSA private key 6 - Remove RSA private key 7 - List RSA private keys X - Exit Select option and press [ENTER]: The exact function of the menu items is as follows: Display HSM Status Displays current status information, including serial number, firmware version, memory size, capabilities, and policies. Initialize HSM Initializes the card. This includes defining the security level, specifying SO and USER passwords or configuring and initializing PED keys. It also involves deleting all of the RSA keys currently stored on the card. Login as USER Logs into the card as USER. Logout USER Logs USER out of the card. Add RSA private key Imports an RSA private key to the hardware security module. Remove RSA private key Deletes an RSA private key from the hardware security module. List RSA private keys Lists RSA private keys stored on the hardware security module. Exit Exits the hardware security module management utility. Initializing the NITROX XL FIPS Acceleration Board Before the card can be used, it has to be initialized. This includes defining the security level, specifying SO and USER passwords, or configuring and initializing the PED keys. It also involves deleting all of the keys currently stored on the card. Data Center Real User Monitoring SSL Monitoring Administration Guide 21 Chapter 2 ∙ Configuring SSL Monitoring on the AMD The actual operation of writing initialization information to the acceleration board or deletion of RSA key information is performed in the last step of the initialization dialog. It is therefore possible to abort the initialization process at any point before the final confirmation. Initializing the hardware security module card will result in the deletion of all currently stored key information. To abort initialization before the final confirmation, type [Ctrl-C] to exit the hardware security module management utility. To initialize the NITROX XL FIPS accelerator: 1. Select the initialization option from the menu. To initialize the card, select the Initialize HSM option from the nitrox-setup menu. 2. Select the security level. You are prompted whether the hardware security module is to be initialized in the FIPS high security mode (mode 140-2 Level 3) requiring the use of a PED device. The selection depends on your particular security requirements. Answer “y” for Yes or “n” for No, as appropriate. If you select the FIPS high security mode, you are prompted to initialize the PED keys. Refer to Cavium Network PED documentation for information about how to use PED and PED keys. If you select the non-FIPS mode, FIPS mode 140-2 Level 2, you are prompted to type the new SO and USER passwords. 3. Provide a new acceleration board label. You are prompted for a new acceleration board label. This is an identification string written to the acceleration board. 4. Log in as the security officer (user SO). To proceed with further initialization steps, nitrox-setup attempts to log you onto the card as the security officer (user SO). So, depending on the current security level (not the level you have just selected, but the currently active one) you will either supply the current SO password or the SO (blue) PED key with a PIN. The factory default setting is non-FIPS, FIPS mode 140-2 Level 2. The default password can be found in the card manufacturer's documentation or in the /opt/nitrox_fips/doc/Utils_README.txt file, in the section entitled Initializing the board. If the FIPS high security (140-2 Level 3) mode is used, all PED operations, including SO identification, are deferred until you confirm initialization (see the last step of this procedure). CAUTION Three consecutive unsuccessful entries of the SO password cause a hardware security module reset. 5. Provide new SO and USER passwords. As part of initialization, you are prompted to supply a new security identification for user SO and user USER. If you are using the non-FIPS mode (FIPS mode 140-2 Level 2), enter the new passwords for each of these users. In the FIPS high security mode 140-2 Level 3, use a PED device and the appropriate keys. 6. 22 Confirm initialization. Data Center Real User Monitoring SSL Monitoring Administration Guide Chapter 2 ∙ Configuring SSL Monitoring on the AMD Finally, you are prompted to confirm all of the above settings. Confirming initialization at this stage causes the hardware security module to be initialized as specified. If there were any PED operations pending, such as SO authorization or initialization of PED keys, they are performed now. Refer to the PED manufacturer's documentation for information about initializing and using PED keys. Note that the security officer (SO) will be logged out automatically as part of the initialization step. CAUTION The initialization process must not be aborted after the above (final) confirmation, or the hardware security module may be left in an undefined state, particularly if PED keys are being used. To remedy this situation, the manufacturer of the card has provided the Cfm1Util utility. Once the card falls in the indeterminate state, this tool can be used to reinitialize the card. The Cfm1Util utility is provided with the card software and usage syntax is described in the card's documentation. Example 6. Initializing Hardware Security Module in non-FIPS mode (FIPS mode 140-2 Level 2) Agentless Monitoring Configuration and management of Cavium NITROX XL FIPS Hardware Security Module (HSM) HSM label: testLabel1, HSM FIPS mode: off, USER logged in: no 1 - Display HSM status 2 - Initialize HSM 3 - Login as USER 4 - Logout USER 5 - Add RSA private key 6 - Remove RSA private key 7 - List RSA private keys X - Exit Select option and press [ENTER]: 2 Initializing HSM... This step defines a new HSM label, security level and passwords and removes all RSA key information. Continue? (y or n): y Initialize HSM in FIPS mode (use of PIN Entry Device required)? (y or n): n Enter a new HSM label: testLabel1 ***************************************************************************** *** You need to enter the current HSM Security Officer (SO) password. *** *** WARNING: three consecutive unsuccessful entries will cause HSM reset! *** ***************************************************************************** Enter current HSM SO password: Enter a new HSM SO password (8 to 12 characters): Retype HSM SO password: Enter a new HSM USER password (8 to 12 characters, must be different from SO password): Retype HSM USER password: *** WARNING: all key information will be deleted from HSM. *** Continue? (y or n): y Starting HSM initialization... Login successful. Initialization successful. Press [ENTER] to continue... Data Center Real User Monitoring SSL Monitoring Administration Guide 23 Chapter 2 ∙ Configuring SSL Monitoring on the AMD Logging In and Out of the NITROX XL FIPS Acceleration Board The user USER must remain logged in order for AMD traffic monitoring software to be able to use the HSM card. Therefore, logging in is usually the first operation performed after AMD is re-started. Use the HSM management utility, nitrox-setup to log in and out of the HSM card as USER. HSM management operations, such as listing keys or adding or removing keys can only be performed if USER is logged in. Note that USER remains logged in after the nitrox-setup management utility exits, so you can exit the menu without causing USER to be logged out. To log in or out of the card, select Login as USER or Logout USER from the nitrox-setup menu. CAUTION For security reasons, ten consecutive unsuccessful login attempts disables the USER account. RSA Key Management on NITROX XL FIPS RSA key operations, including adding, deleting and listing stored keys, are performed using the nitrox-setup utility. Import the keys from unencrypted PEM files. Note that AMD with the hardware security module supports 1024-bit or 2048-bit RSA keys, even though 4096-bit keys can be stored on the hardware security module. For this reason, it is good practice, before loading they keys, to check the size of the keys, using the command: openssl rsa -in keyfile.pem -text Once keys are stored on the hardware security module, they are identified by hexadecimal numbers. Importing a Key to the Acceleration Board To import a new RSA key, select the Add RSA private key option from the nitrox-setup menu. Provide the appropriate PEM file name when prompted. If the specified file exists and contains a valid key, the key is imported with the default label PRV_KEY_IMPORT and a new key identifier is generated and displayed. Example 7. Importing an RSA Private Key Agentless Monitoring Configuration and management of Cavium NITROX XL FIPS Hardware Security Module (HSM) HSM label: testLabel1, HSM FIPS mode: off, USER logged in: yes 1 - Display HSM status 2 - Initialize HSM 3 - Login as USER 4 - Logout USER 5 - Add RSA private key 6 - Remove RSA private key 7 - List RSA private keys X - Exit Select option and press [ENTER]: 5 24 Data Center Real User Monitoring SSL Monitoring Administration Guide Chapter 2 ∙ Configuring SSL Monitoring on the AMD Enter the name of the file containing the RSA private key in PEM format: /usr/testuser/ssl/key1.pem Importing RSA private key from /user/testuser/ssl/key1.pem (key size 1024 bits)... RSA key imported successfully, key ID = 0x8 Press [ENTER] to continue... Listing the Keys Currently Stored on NITROX XL FIPS Acceleration Board To list the keys currently stored on the card, choose the List RSA private keys option from the menu. All currently stored private keys are listed. Each key is denoted by one line showing key identifier, label and size in bits. Note that when quoting the identifiers in the AMD configuration, you can use the identifier number with or without the leading 0x. Example 8. Listing All RSA Keys Agentless Monitoring Configuration and management of Cavium NITROX XL FIPS Hardware Security Module (HSM) HSM label: testLabel1, HSM FIPS mode: off, USER logged in: yes 1 - Display HSM status 2 - Initialize HSM 3 - Login as USER 4 - Logout USER 5 - Add RSA private key 6 - Remove RSA private key 7 - List RSA private keys X - Exit Select option and press [ENTER]: 7 Installed keys: key: 0x8, label: PRV_KEY_IMPORT, size: 1024 Command completed successfully Press [ENTER] to continue... Deleting a Key from the Acceleration Board To delete an RSA key from the hardware security module, select the Remove RSA private key option from menu. Example 9. Deleting an RSA Private Key Agentless Monitoring Configuration and management of Cavium NITROX XL FIPS Hardware Security Module (HSM) HSM label: testLabel1, HSM FIPS mode: off, USER logged in: yes 1 - Display HSM status 2 - Initialize HSM 3 - Login as USER 4 - Logout USER 5 - Add RSA private key 6 - Remove RSA private key 7 - List RSA private keys X - Exit Select option and press [ENTER]: 6 Enter hexadecimal ID (with optional 0x prefix) of the key to remove: 8 Removing key 0x8. Command completed successfully Press [ENTER] to continue... Data Center Real User Monitoring SSL Monitoring Administration Guide 25 Chapter 2 ∙ Configuring SSL Monitoring on the AMD RoHS Directive Compliance The RoHS Directive stands for “the restriction of the use of certain hazardous substances in electrical and electronic equipment”. The NITROX XL CN1120-350-NFB-1.1-G cards comply with the requirements of this directive, as opposed to the previous version of NITROX XL cards, marked with the symbol CN1120-NFB. Installing and Configuring an nCipher SSL Card on a 32-bit AMD You can install the nCipher nShield or nFast cards on a 32-bit AMD. Before You Begin • If a new nCipher accelerator card has been added to your AMD (inserted into a free PCI slot), you must install the appropriate software. See Upgrading the AMD Software in the Data Center Real User Monitoring Agentless Monitoring Device Installation Guide for information about upgrading your AMD. Execute the upgrade with the nCipher card already physically present in the machine. If the appropriate upgrade is executed, but without the physical card being present, and the card is added later, you will need to execute the /opt/nfast/sbin/install command as user root: NFAST_USER=root NFAST_GROUP=root /opt/nfast/sbin/install • The nCipher nShield requires that the computer on which they are installed has a security world installed on it, which is a collection of security files. The following procedure includes creating security world files for the nCipher card and initializing the card with the security world. If you have already created a suitable security world on another computer, you can copy the files to the AMD. You can also initialize the card on the other system before installing it in the AMD. For details about creating a security world and initializing an accelerator card with a given security world, refer to the nCipher documentation. You must also add a dedicated boot parameter. To configure a newly installed nCipher SSL accelerator: 1. Add a kernel boot parameter. Edit the /boot/grub/grub.conf file and append the pci=nommconf string to the end of each kernel line. For example: #boot=/dev/hda default=0 timeout=5 splashimage=(hd0,0)/grub/splash.xpm.gz hiddenmenu title Red Hat Enterprise Linux Client (2.6.18-92.el5PAE) root (hd0,0) kernel /boot/vmlinuz-2.6.18-53.el5 ro root=/dev/VolGroup00/LogVol00 pci=nommconf initrd /boot/initrd-2.6.18-53.el5.img Save the file and reboot the AMD. 2. Configure the security world and initialize the card (for nShield only). To copy the security world from another system, copy the host data directory, kmdata, from that system to the /opt/nfast directory on the AMD machine. 26 Data Center Real User Monitoring SSL Monitoring Administration Guide Chapter 2 ∙ Configuring SSL Monitoring on the AMD To define a new security world perform the following actions. NOTE To configure the card, change the settings of the M-O-I slider on the outside of the card to make the card go into pre-initialization mode or operational mode. However, the function of the slider may be overridden by an M-O-I override mechanism, that is found on the card itself, in the form of two little (most likely yellow) switches. When they are in the On position, the M-O-I slider switch on the outside of the card is not functional and the card is locked in operational mode. The M-O-I override switches are intended to prevent switching the card into a different mode by accident. When you are configuring the card, the override switches must be in the Off position. More details about the override switches can be found in the nCipher Hardware Installation guide. a. Log in to the host computer as user root. b. Select pre-initialization mode. Set the module switch on the back panel of the card to the I position. c. Clear the module. /opt/nfast/bin/nopclearfail ca d. Create the security world. /opt/nfast/bin/new-world -m 1 -s 0 -Q 2/3 -k rijndael The above command creates a FIPS Level 2 compliant security world with OCS recovery and replacement enabled and a 2/3 ACS. The security world is protected by an AES key. NOTE If the new-world or nopclearfail utility returns an error, check that the mode switch on the back panel is fully in the correct position and then re-run the command. If the error is persistent, reboot the AMD device. The new-world utility prompts you to insert a smart card to be written as an Administrator Card. e. f. Insert a blank smart card and then press [Enter]. Enter the pass phrase. When prompted by the new-world utility, type a pass phrase for the Administrator Card and then press [Enter]. g. Confirm the pass phrase. When prompted by the new-world utility, confirm the pass phrase. The new-world utility displays a message confirming that the card has been written and prompts you to insert the next smart card. h. Continue the process until the required number of smart cards are written. After the required number of smart cards are written, the new-world utility displays a message saying that the security world has been generated. Data Center Real User Monitoring SSL Monitoring Administration Guide 27 Chapter 2 ∙ Configuring SSL Monitoring on the AMD i. Select operational mode. Set the module switch on the back panel of the card to the O position. j. Clear the module. /opt/nfast/bin/nopclearfail ca For additional details about creating a security world and initializing an accelerator card with a given security world, refer to the nCipher documentation. k. Check the status of the security world. /opt/nfast/bin/nfkminfo The World and Module should show as Usable in the state field, as on the following example output: [root@vantageamd bin]# /opt/nfast/bin/nfkminfo World generation 2 state 0x17270000 Initialized Usable Recovery !PINRecovery !ExistingClient RTC NVRAM FTO SEEDebug n_modules 1 hknso 2f8bd0927068618e257a4560ff713840f741dd57 hkm 86cb6d0125ae2e00b19e8ce2cfce55c7a7383ced (type Rijndael) hkmwk 1d572201be233ebc89f30fdd8f3fac6ca3395bf0 hkre ff96d3d69cc320ab6888cef38dfeac8e7875c2d4 hkra a228ebadeec32ce65bc47787dd85ce4d4b1e295b hkmc ec303befbdae88b3d241fe8399fcccf7183f6741 hkrtc 1ee7f656958c74f7ab435bbbd292859825939f69 hknv 93a18da953d98850137dfe241c0b660ebde73417 hkdsee c40cd7127ebc544d162681db602a8b10cd2d8b9d hkfto c0b65dfe6ce2ae268b3ba4683f2a282c1ce07ae3 hkmnull 0100000000000000000000000000000000000000 ex.client none k-out-of-n 1/1 other quora m=1 r=1 nv=1 rtc=1 dsee=1 fto=1 createtime 2010-10-19 12:39:46 nso timeout 10 min Module #1 generation state flags n_slots esn hkml 2 0x2 Usable 0x10000 ShareTarget 2 77C2-2D3A-808B b09f35252189ecf88857c3cb21b53d2276eb7382 Module #1 Slot #0 IC 0 3. Add SSL private keys to the card (for nShield only). To add SSL private keys to an nShield accelerator card (to a card that is capable of storing SSL key information), use the generatekey command. For details about using this command, refer to the nCipher documentation. Example 10. Example of adding a new private key to an nCipher card a. Place the file containing the key (for example, s1.key) in /usr/adlex/config/keys b. Change directory to /opt/nfast/bin: cd /opt/nfast/bin c. 28 Run the command to store the key on the card: Data Center Real User Monitoring SSL Monitoring Administration Guide Chapter 2 ∙ Configuring SSL Monitoring on the AMD ./generatekey --import simple pemreadfile=/usr/adlex/config/keys/s1.key protect=module ident=s1 pemreadfile (entered as /usr/adlex/config/keys/s1.key in the above example) is the path to the SSL key you are importing. ident (entered as s1 in the above example) is the key identifier: it can be composed of any number of digits and lowercase letters; it cannot contain spaces, underscores (_), or hyphens (-). After executing the above command, you are presented with the following prompts that require input: Key type? (RSA, DES3, DES2) [RSA] > Input the type of key you are importing. Typically this is an RSA key, so type RSA, then press [Enter]. Key name? [] > Enter a name for the key you are importing and press [Enter]. Blob in NVRAM (needs ACS)? (yes/no) [no] > You are prompted to save the key blob in NVRAM. It is recommended that you answer no, then press [Enter]. This is for ease and simplicity of administration. Answering yes requires you to insert the Administrator smart card for this step and potentially any subsequent operation performed on this key. After answering all the above prompts correctly, the following message appears: Key successfully imported 4. List the keys stored on the card (for nShield only). To obtain a key identifier for the AMD configuration, you need to list the keys currently stored on the card and in the security world. Use the following utilities to obtain the information about available keys: • The list keys command from the command-line utility /opt/nfast/bin/rocs. Example 11. Example Output of the list keys Command rocs> list keys No. Name App Protected by 1 s1name simple module 2 s2name simple module • The nfkminfo command. Example 12. Example Output of the nfkminfo Command /opt/nfast/bin/nfkminfo -k Key list - 1 keys AppName simple Ident s1 5. Modify AMD configuration settings. Data Center Real User Monitoring SSL Monitoring Administration Guide 29 Chapter 2 ∙ Configuring SSL Monitoring on the AMD a. Verify SSL engine setting If the AMD software has been upgraded correctly for the given nCipher card (see prerequisites above), the configuration file /usr/adlex/config/rtm.config contains the appropriate engine name: nshield or nfast. For example, for nShield it is: ssl.engine=nshield Verify that this entry has been set correctly. b. Append a new entry for your key in the /usr/adlex/config/keys/keylist file. Set the KEY_TYPE attribute as token for a hardware key stored on the accelerator card or file for keys stored in disk files. All of the above nCipher cards (nShield and nFast) can use keys of type file, but only nShield can store keys on the card. The KEY_IDENTIFIER should be specified as given by the utilities that list keys. See Step 4 [p. 29] for details. For more information, see Management of RSA Private Keys on AMD [p. 12]. 6. Verify the installation. nCipher accelerator cards require the presence of two services: the nc_drivers service loads and unloads the nfp driver and the nc_hardserver service starts and stops the hardserver module. These services are installed as part of the upgrade procedure; see the prerequisites at the start of this topic. The installation process also scheduled the services to be started automatically on system startup. You can use the ntsysv and chkconfig commands to verify that this has been configured correctly. If you need to stop or start the services manually, use the standard Linux service commands. For example, to start the services, run the commands: service nc_drivers start and service nc_hardserver start You can also use the following single command to complete both actions: /opt/nfast/sbin/init.d-ncipher start To confirm that the services are running, use the lsmod command to check if the module nfp has been correctly loaded and use the /opt/nfast/bin/chkserv or /opt/nfast/bin/enquiry command to confirm that the hardserver module has been executed. If the modules are not loaded, contact Customer Support. Example output from the lsmod command with the nfp module listed as loaded: Module nfp e1000_rtm audit tg3 floppy sg microcode keybdev mousedev hid input ehci-hcd 30 Size 22880 209856 90840 68936 57520 37388 6912 2944 5688 22532 6176 20776 Used by Not tainted 2 (autoclean) 2 2 (autoclean) 1 0 (autoclean) 0 (autoclean) 0 (autoclean) 0 (unused) 0 (unused) 0 (unused) 0 [keybdev mousedev hid] 0 (unused) Data Center Real User Monitoring SSL Monitoring Administration Guide Chapter 2 ∙ Configuring SSL Monitoring on the AMD usb-uhci usbcore ext3 jbd ips sd_mod scsi_mod 26796 81152 89896 55092 45348 14160 115496 0 1 2 2 3 6 3 (unused) [hid ehci-hcd usb-uhci] [ext3] [sg ips sd_mod] Example output from the chkserv command with the hardserver module loaded: nCipher server running Example output from the enquiry command with the hardserver module loaded: nServer: enquiry reply flags enquiry reply level serial number.... ... Module #1: enquiry reply flags enquiry reply level serial number... ... none Six none Six Installing and Configuring an nCipher SSL Card on a 64-bit AMD For the nCipher SSL accelerator cards, currently only the nShield card is supported under 64-bit AMD. Before You Begin • If a new nCipher accelerator card has been added to your AMD (inserted into a free PCI slot), you must install the appropriate software. See Upgrading the AMD Software in the Data Center Real User Monitoring Agentless Monitoring Device Installation Guide for information about upgrading your AMD. Execute the upgrade with the nCipher card already physically present in the machine. If the appropriate upgrade is executed, but without the physical card being present, and the card is added later, you will need to execute the /opt/nfast/sbin/install command as user root: NFAST_USER=root NFAST_GROUP=root /opt/nfast/sbin/install • The nCipher nShield requires that the computer on which they are installed has a security world installed on it, which is a collection of security files. The following procedure includes creating security world files for the nCipher card and initializing the card with the security world. If you have already created a suitable security world on another computer, you can copy the files to the AMD. You can also initialize the card on the other system before installing it in the AMD. For details about creating a security world and initializing an accelerator card with a given security world, refer to the nCipher documentation. You must also add a dedicated boot parameter. To configure a newly installed nCipher SSL accelerator: 1. Add a kernel boot parameter. Data Center Real User Monitoring SSL Monitoring Administration Guide 31 Chapter 2 ∙ Configuring SSL Monitoring on the AMD Edit the /boot/grub/grub.conf file and append the pci=nommconf string to the end of each kernel line. For example: #boot=/dev/hda default=0 timeout=5 splashimage=(hd0,0)/grub/splash.xpm.gz hiddenmenu title Red Hat Enterprise Linux Client (2.6.18-92.el5PAE) root (hd0,0) kernel /boot/vmlinuz-2.6.18-53.el5 ro root=/dev/VolGroup00/LogVol00 pci=nommconf initrd /boot/initrd-2.6.18-53.el5.img Save the file and reboot the AMD. 2. Configure the security world and initialize the card (for nShield only). To copy the security world from another system, copy the host data directory, kmdata, from that system to the /opt/nfast directory on the AMD machine. To define a new security world perform the following actions. NOTE To configure the card, change the settings of the M-O-I slider on the outside of the card to make the card go into pre-initialization mode or operational mode. However, the function of the slider may be overridden by an M-O-I override mechanism, that is found on the card itself, in the form of two little (most likely yellow) switches. When they are in the On position, the M-O-I slider switch on the outside of the card is not functional and the card is locked in operational mode. The M-O-I override switches are intended to prevent switching the card into a different mode by accident. When you are configuring the card, the override switches must be in the Off position. More details about the override switches can be found in the nCipher Hardware Installation guide. a. Log in to the host computer as user root. b. Select pre-initialization mode. Set the module switch on the back panel of the card to the I position. c. Clear the module. /opt/nfast/bin/nopclearfail ca d. Create the security world. /opt/nfast/bin/new-world -m 1 -s 0 -Q 2/3 -k rijndael The above command creates a FIPS Level 2 compliant security world with OCS recovery and replacement enabled and a 2/3 ACS. The security world is protected by an AES key. NOTE If the new-world or nopclearfail utility returns an error, check that the mode switch on the back panel is fully in the correct position and then re-run the command. If the error is persistent, reboot the AMD device. 32 Data Center Real User Monitoring SSL Monitoring Administration Guide Chapter 2 ∙ Configuring SSL Monitoring on the AMD The new-world utility prompts you to insert a smart card to be written as an Administrator Card. e. f. Insert a blank smart card and then press [Enter]. Enter the pass phrase. When prompted by the new-world utility, type a pass phrase for the Administrator Card and then press [Enter]. g. Confirm the pass phrase. When prompted by the new-world utility, confirm the pass phrase. The new-world utility displays a message confirming that the card has been written and prompts you to insert the next smart card. h. Continue the process until the required number of smart cards are written. After the required number of smart cards are written, the new-world utility displays a message saying that the security world has been generated. i. Select operational mode. Set the module switch on the back panel of the card to the O position. j. Clear the module. /opt/nfast/bin/nopclearfail ca For additional details about creating a security world and initializing an accelerator card with a given security world, refer to the nCipher documentation. k. Check the status of the security world. /opt/nfast/bin/nfkminfo The World and Module should show as Usable in the state field, as on the following example output: [root@vantageamd bin]# /opt/nfast/bin/nfkminfo World generation 2 state 0x17270000 Initialized Usable Recovery !PINRecovery !ExistingClient RTC NVRAM FTO SEEDebug n_modules 1 hknso 2f8bd0927068618e257a4560ff713840f741dd57 hkm 86cb6d0125ae2e00b19e8ce2cfce55c7a7383ced (type Rijndael) hkmwk 1d572201be233ebc89f30fdd8f3fac6ca3395bf0 hkre ff96d3d69cc320ab6888cef38dfeac8e7875c2d4 hkra a228ebadeec32ce65bc47787dd85ce4d4b1e295b hkmc ec303befbdae88b3d241fe8399fcccf7183f6741 hkrtc 1ee7f656958c74f7ab435bbbd292859825939f69 hknv 93a18da953d98850137dfe241c0b660ebde73417 hkdsee c40cd7127ebc544d162681db602a8b10cd2d8b9d hkfto c0b65dfe6ce2ae268b3ba4683f2a282c1ce07ae3 hkmnull 0100000000000000000000000000000000000000 ex.client none k-out-of-n 1/1 other quora m=1 r=1 nv=1 rtc=1 dsee=1 fto=1 createtime 2010-10-19 12:39:46 nso timeout 10 min Module #1 generation state flags n_slots esn hkml 2 0x2 Usable 0x10000 ShareTarget 2 77C2-2D3A-808B b09f35252189ecf88857c3cb21b53d2276eb7382 Data Center Real User Monitoring SSL Monitoring Administration Guide 33 Chapter 2 ∙ Configuring SSL Monitoring on the AMD Module #1 Slot #0 IC 0 3. Add SSL private keys to the card. To add SSL private keys to an nShield accelerator card (to a card that is capable of storing SSL key information), use the generatekey command. For details on how to use this command, please refer to the nCipher documentation. Example 13. Example of Adding a New Private Key to an nCipher Card a. Place the file containing the key (for example, s1.key) in /usr/adlex/config/keys b. Change directory to /opt/nfast/bin: cd /opt/nfast/bin c. Run the command to store the key on the card: ./generatekey --import pkcs11 pemreadfile=/usr/adlex/config/keys/s1.key plainname=s1name ident=s1 protect=module type=RSA nvram=no pemreadfile (entered as /usr/adlex/config/keys/s1.key in the above example) is the path to the SSL key you are importing. The value of plainname can then be used for the creation of a keylist file, if the search mechanism is set to label (searchKeyBy parameter set to label). It can be composed of any number of digits and lowercase letters; it cannot contain spaces, underscores (_), or hyphens (-). The above command produces output of the following layout: key generation parameters: operation Operation to perform import application Application pkcs11 verify Verify security of key yes type Key type RSA pemreadfile PEM file containing RSA key /usr/adlex/config/keys/s1.key ident unknown parameter s1 plainname Key name s1name nvram Blob in NVRAM (needs ACS) no Key successfully imported. Path to key: /opt/nfast/kmdata/local/key_pkcs11_uacce696c77c25cbb1fecbecef0adbac4bae54e63b If you do not supply all of the necessary parameters to the above command, you are prompted for additional information. For example: Key type? (RSA, DES3, DES2) [RSA] > Input the type of key you are importing. Most commonly this is an RSA key, so type RSA, then press [Enter]. plainname key name? [] > Enter a name for the key you are importing and press [Enter]. Blob in NVRAM (needs ACS)? (yes/no) [no] > 34 Data Center Real User Monitoring SSL Monitoring Administration Guide Chapter 2 ∙ Configuring SSL Monitoring on the AMD You are prompted if you need to save the key blob in NVRAM. It is recommended that you answer no, then press [Enter]. This is for ease and simplicity of administration. Answering yes requires you to insert the Administrator smart card for this step and potentially any subsequent operation performed on this key. After answering all the above prompts correctly, a message appears: Key successfully imported 4. List the keys stored on the card (for nShield only). To obtain a key identifier for the AMD configuration, list the keys currently stored on the card and in the security world. Use the following utilities to obtain the information about available keys: • The list keys command from the command-line utility /opt/nfast/bin/rocs. Example 14. Example Output of the list keys Command rocs> list keys No. Name App Protected by 1 s1name pkcs11 module 2 s2name pkcs11 module • The pkcsmgr command. Example 15. Example Output of the pkcsmgr Command # /usr/adlex/rtm/bin/pkcsmgr list Using PKCS11 engine: ncipher_pkcs11 getting slotId from slotNum pkcsmgr slot #492971157, token (accelerator) listing keys type: CKO_PRIVATE_KEY/CKK_RSA, id: 2235e9df23d481260323868b77ce5bb134d97f1c, label: host2048-2, size: 256B type: CKO_PRIVATE_KEY/CKK_RSA, id: aa8458ed54ff9cf0a73a20aec4364aaaa32dea15, label: b02, size: 512B 5. Modify AMD configuration settings. a. Verify the SSL engine setting. If the AMD software has been upgraded correctly for the given nCipher card (see prerequisites above), the configuration file /usr/adlex/config/rtm.config contains the appropriate engine name: ssl.engine=ncipher_pkcs11 Verify that this entry has been set correctly. b. Append a new entry for your key in the /usr/adlex/config/keys/keylist file. If you have configured your AMD to use the keylist file to store the list of keys, append a new entry for your key to the file. The default full path to the file is /usr/adlex/config/keys/keylist. In the keylist file, set the key_type attribute as token for a hardware key stored on the accelerator card. The key identifier value should be specified as given by the utilities Data Center Real User Monitoring SSL Monitoring Administration Guide 35 Chapter 2 ∙ Configuring SSL Monitoring on the AMD that list keys. Note that the ncipher_pkcs11 engine distinguishes between key identifiers and key labels. Both of these identification methods can be used in the keylist file. However, you may need to specify the type of identification used by setting the searchKeyBy parameter of the ssl.engine.param property to id or label, as appropriate. For ncipher_pkcs11 the default is label. See Management of RSA Private Keys on AMD [p. 12] for information on configuring the AMD to use the keylist file or token and for information on how to format entries in the keylist file. See Selecting and Configuring SSL Engine [p. 18] for information on configuring the ssl.engine.param property. 6. Verify the installation Example output from the enquiry command; the hardserver module is loaded: nServer: enquiry reply flags enquiry reply level serial number.... ... Module #1: enquiry reply flags enquiry reply level serial number... ... none Six none Six Removing nCipher Security World To removed the security world, follow one of the two recommended procedures, depending if you need to create a new security world afterwards or not. If you need to remove a security world and replace it with a new one: 1. Delete the files in the directory to which the NFAST_KMDATA environment variable points. 2. Create a new security world. 3. Add all your modules to this world. If you need to remove completely a security world, without replacing it with a new one: 1. Remove all the modules from the security world. 2. Delete the files in the directory to which the NFAST_KMDATA environment variable points. For additional information refer to nCipher documentation. Installing and Configuring Sun Crypto Accelerator 6000 PCIe Card If a new Sun Crypto Accelerator 6000 PCIe card has been added to your AMD (inserted into a free PCI slot), you must install the appropriate software. See Upgrading the AMD Software in the Data Center Real User Monitoring Agentless Monitoring Device Installation Guide for information about upgrading your AMD. 36 Data Center Real User Monitoring SSL Monitoring Administration Guide Chapter 2 ∙ Configuring SSL Monitoring on the AMD In addition to ensuring that the driver software is present on the AMD, the accelerator card has to be configured. Initializing the Sun Crypto Accelerator 6000 PCIe Card Before the Sun Crypto Accelerator 6000 PCIe card can be used, it has to be initialized. Refer to the card manufacturer's instructions for details. The initialization procedure is thoroughly described in the card's user guide. The tool used to initialize the card is called scamgr. The command performs the following types of actions: • Initializes the card for first time use • Creates keystore • Creates security officer (SO) account • Creates ordinary user accounts The initialization process is performed in the following order: 1. Upon first invocation, the scamgr utility recognizes the card and asks for initialization. 2. The card can be initialized with a newly created keystore or with an existing one. 3. Keystore name and FIPS mode is defined. 4. Security Officer (SO) name and password are set. 5. Having accepted user choice, the card then takes several seconds to perform the actual initialization. 6. SO is asked to log in. After initialization, an ordinary user must be created. The user account is used to access keys and perform cryptographic operations. Note that to reinitialize the card, it must first be cleaned or zeroed to remove all key and user information using the scamgr or scadiag tool. If this is not possible, and as a last resort, the card can be cleaned by replacing a hardware jumper on the card, as described in card's user guide. Before moving the card to another system, it has to be zeroed on the system on which it was initialized. NOTE With this particular card, because of problems related to the card or card software, it may occasionally be necessary to reboot the system. Therefore, if any of the above actions fail, try restarting the system and then try the particular operation again. Example Zeroing and Initialization The following example shows how a card can be zeroed and then initialized and a security officer account created. cd /opt/sun/sca6000/sbin ./scadiag -z mca0 cd /opt/sun/sca6000/bin [root@x3650 bin]# ./scamgr Data Center Real User Monitoring SSL Monitoring Administration Guide 37 Chapter 2 ∙ Configuring SSL Monitoring on the AMD This board is uninitialized. You will now initialize the board. You may either initialize the board with a new configuration or restore the configuration from a device backup file. 1. Initialize board with new configuration 2. Initialize board from device backup file Your Choice (0 to exit) --> 1 Run in FIPS 140-2 mode? (Y/Yes/N/No) [No]: y Initial Security Officer Name: so1 Initial Security Officer Password: Confirm password: Board initialization parameters: ---------------------------------------------------------------Initial Security Officer Name: so1 Run in FIPS 140-2 Mode: Yes ---------------------------------------------------------------Is this correct? (Y/Yes/N/No) [No]: y Initializing crypto accelerator board. This may take a few minutes...The board is ready to be administered. As part of the initialization process, a new remote access key has been generated. The key fingerprint is listed below. This should be the fingerprint presented by the board the next time you connect to it. Key Fingerprint: f6f9-404e-5742-637c-1674-8465-11ca-3d1d-d731-e17b Security Officer Login: so1 Security Officer Password: scamgr{mca0@localhost, so1}> exit Example Keystore Creation The following example shows how a local keystore is created. [root@x3650 bin]# ./scamgr No keystore data returned by card Select Keystore: 1. Create new keystore 2. Load keystore from backup Selection (0 to exit)-> 1 FIPS Keystore Name: key1 Keystore type ([L]ocal/[C]entralized) [Local]: Initial Security Officer Name: so1 Initial Security Officer Password: Confirm password: Keystore creation parameters: ---------------------------------------------------------------Keystore Name: key1 Keystore Type: Local Initial Security Officer Name: so1 Run in FIPS 140-2 Mode: Yes ---------------------------------------------------------------Is this correct? (Y/Yes/N/No) [No]: y Creating keystore... key1.600321.{bd50fe75} successfully created. Example Creation of a User Account The following example shows how a user is created and enabled. [root@x3650 bin]# ./scamgr Select Keystore: 1. Create new keystore 38 Data Center Real User Monitoring SSL Monitoring Administration Guide Chapter 2 ∙ Configuring SSL Monitoring on the AMD 2. Load keystore from backup 3. key1.600321.{bd50fe75} (local) Selection (0 to exit)-> 3 Security Officer Login: so1 Security Officer Password: scamgr{mca0@localhost, so1}> create user user1 Enter new user password: Confirm password: User user1 created successfully. scamgr{mca0@localhost, so1}> scamgr{mca0@localhost, so1}> enable user User name: user1 User user1 enabled. scamgr{mca0@localhost, so1}> exit Sun Crypto Accelerator 6000 PCIe Card - Key and Card Management Key management is performed using the pkcsmgr utility that accesses the card though the openCryptoki framework. Invoking the pkcsmgr Utility The pkcsmgr utility is located in /usr/adlex/rtm/bin/pkcsmgr. You can invoke it from the operating system command line, either directly, by specifying the absolute path, or you can first modify your PATH environment variable to include the appropriate directory. Syntax of the pkcsmgr Utility Invoking the utility without any command line options and arguments, or with the -h option, displays the command syntax, explaining the available functionality, as shown below. [root@personal5 rtm-32bit]# ./bin/pkcsmgr -h Usage: pkcsmgr [-sSprwnNflvh] info|list|import|remove|login|logout|decrypt [command-options] Common options: -s slotid use PKCS11 slot ID -S slotnum use PKCS11 slot number (Execute 'pkcsmgr info' for a list of slots and IDs) -p passwd authenticate using 'passwd' password -r open read-only session -w open read-write session (default) -n open public session, do not authenticate -N open authenticated session (default) -f [long|hex] present/accept key ID as hexadecimal value (default) or as hexadecimal string -l path use specified PKCS11 library -v[v] be more verbose -h display this help message Commands: info display slot and token information list list all keys import import key from PEM file remove remove key decrypt decrypt a file with given key login login user logout logout user Note the following additional information: Data Center Real User Monitoring SSL Monitoring Administration Guide 39 Chapter 2 ∙ Configuring SSL Monitoring on the AMD • It is not necessary to log in to the card separately by specifying the login argument, in order to perform different operations. If you do not log in explicitly in such a way, you are prompted for a password every time you perform an operation. • Providing the -p password option eliminates the password prompt later, but does not log you in to the card for the purpose of subsequent commands • You must log in to the card as a user before the card can be used by the AMD traffic monitoring software. See detailed explanation below. • The -n option, to open a public session, is ignored if supplied together with the login command, since the latter opens a specific user session. • The -n option, to open a public session is used only for the software emulator and has no meaning for hardware accelerator cards. • Run the decrypt command to verify a key (to use a private key to decrypt a file encrypted with a public key). Each of the above command parameters, such as info, list, import and others, can accept additional options and arguments to perform the specified action. To display syntax for these specific commands, run the pkcsmgr utility and supply the given command, followed by the -h option, for example: pkcsmgr decrypt -h Following is a list of the individual commands and their specific options: info [-lh] -l long format list [-hlv] -l use long format -v display more details import -k file -I id -k file PEM file to read key from -I ID Hexadecimal ID of the key to create, specified with or without the leading 0x remove -I id -I ID Hexadecimal ID of the key to remove, specified with or without the leading 0x decrypt -f file -I id -f file file to decrypt -I ID Hexadecimal ID of the key to use, specified with or without the leading 0x login this command has no specific options logout this command has no specific options Logging In to the Card to Enable Traffic Monitoring You must log in to the card as a user before the card can be used by the AMD traffic monitoring software. Also note that logging in to the card, before performing other user actions, enables you to execute those actions without being prompted for password every time. In cases when you receive system error message: error validating password you must restart the AMD machine to be able to log in. 40 Data Center Real User Monitoring SSL Monitoring Administration Guide Chapter 2 ∙ Configuring SSL Monitoring on the AMD To log in to the card after machine restart, you have to stop the monitoring process first. Then, having logged in to the card, you need to restart the monitoring. The actions of stopping and re-starting monitoring can be performed using the ndstop and ndstart commands, though it is recommended that stopping and starting the rtm service is used instead as it is less intrusive for the operation of the AMD. After a system re-start, perform the following actions: • Stop the monitoring process by executing: /etc/init.d/rtm stop • Run the pkcsmgr command to log in to the card: pkcsmgr login • Start the monitoring process by executing: /etc/init.d/rtm start Example 16. Example of Logging In to the Card [root]# cd /usr/adlex/rtm/bin [root]# ./pkcsmgr login pkcsmgr slot #0, token sca6000 (user1) Enter the USER PIN: ************* login successful NOTE The USER PIN is entered in the following format: username:password Example of Displaying Slot and Token Information [root]# cd /usr/adlex/rtm/bin [root]# ./pkcsmgr info -l pkcsmgr slot #0, token sca6000 (user1) listing slots slot: #0, type: hardware, model: sca6000, label: zso, login: yes slot: #1, type: software, model: IBM SoftTok, label: IBM OS PKCS#11, login: no found 2 slot(s) Note the software token in slot #1: If you follow a standard installation procedure to configure your AMD and all its components, slot 0 is the actual hardware accelerator card, while a software token (emulator) is present in the logical slot 1. Example of Listing All of the Keys Currently on the Card [root]# cd /usr/adlex/rtm/bin [root]# ./pkcsmgr list -l pkcsmgr slot #0, token sca6000 (user1) listing keys type: CKO_PRIVATE_KEY/CKK_RSA, id: 0x1, label: s1, size: 128B found 1 key(s) Example of Removing the Keys from the Card [root]# cd /usr/adlex/rtm/bin [root]# ./pkcsmgr remove -i 1 pkcsmgr slot #0, token sca6000 (user1) removing key id 0x1 key 0x1 removed Data Center Real User Monitoring SSL Monitoring Administration Guide 41 Chapter 2 ∙ Configuring SSL Monitoring on the AMD Example of Importing Keys from PEM Files [root]# cd /usr/adlex/rtm/bin [root]# ./pkcsmgr import -k /var/pld/config/keys/s1.key -i 1 pkcsmgr slot #0, token sca6000 (user1) importing key key imported successfully Example of Logging Out of the Card [root]# cd /usr/adlex/rtm/bin [root]# ./pkcsmgr logout pkcsmgr slot #0, token sca6000 (user1) logout successful Additional Configuration Settings and Administration for Sun Crypto Accelerator 6000 PCIe Card The following information is of particular relevance to Customer Support and should be used to diagnose problems with your installation of the accelerator card. There should be no need to manually re-start the service or alter any of the following settings, if your system is functioning normally. Starting, Stopping, and Monitoring the Service To operate card the sca service should be started, using /etc/init.d/sca. The script performs the following actions: • loads sca modules, • starts sca, scakiod, and scad services, • configures the openCryptoki framework by invoking customized version of pkcs11_startup script, • starts openCryptoki pkcsslotd daemon. Stopping the sca service stops daemons and unloads drivers. The sca service has no dedicated status command. Therefore, to verify the status of the service, use the lsmod command. This command should produce the following output: mcactl mca scaf Also, use the ps -ax command, which should produce the following output: /opt/sun/sca6000/sbin/scakiod /opt/sun/sca6000/sbin/scad /usr/local/sbin/pkcsslotd The file /proc/driver/mca0 should be present and contain the accelerator board status. Additional Configuration Settings for Sun Crypto Accelerator 6000 PCIe Card The Sun Crypto Accelerator 6000 PCIe card is visible to the AMD as a token in a certain logical slot. For more information on these concepts, refer to PKCS#11 or openCryptoki documentation. 42 Data Center Real User Monitoring SSL Monitoring Administration Guide Chapter 2 ∙ Configuring SSL Monitoring on the AMD The following configuration property, in the rtm.config configuration file, defines the slot ID number to be used for by the traffic monitoring software. If you follow a standard installation procedure to configure your AMD and all its components, slot 0 is the actual hardware accelerator card, while a software token (emulator) is present in the logical slot 1. If the actual openCryptoki configuration is different on your particular AMD, you can use this configuration property to indicate the correct slot number to the AMD. ssl.engine.param=slotid:0 Reference Information for Sun Crypto Accelerator 6000 PCIe Card PKCS 11 The board functionality is managed according to PKCS#11: Cryptoki (Cryptographic Token Interface) Standard. The board support software uses openCryptoki as a PKCS#11 implementation. Please refer to the following web resources for further information: • PKCS#11: http://www.rsa.com/rsalabs/node.asp?id=2133 • openCryptoki: http://www.ibm.com/developerworks/library/s-pkcs/ and /usr/share/doc/openCryptoki-2.2.4/openCryptoki-HOWTO.pdf Using lspci Command To determine if the card is installed in the system, issue the lspci -v command. The output should appear as follows: 0d:0e.0 Network and computing encryption device: Sun Microsystems Computer Corp. Unknown device 5ca0 Flags: bus master, stepping, fast Back2Back, 66MHz, medium devsel, latency 64, IRQ 106 Memory at f8000000 Memory at cc000000 Capabilities: [c0] Capabilities: [d0] Capabilities: [e0] (64-bit, prefetchable) [size=1M] (32-bit, non-prefetchable) [size=64M] Power Management version 2 Message Signalled Interrupts: 64bit+ Queue=0/1 EnablePCI-X non-bridge device Sun Crypto Accelerator 6000 PCIe Card Known Issues There are a number of known issues with the Sun Crypto Accelerator 6000 PCIe Card and with the openCryptoki software. The following sections give a brief description of common problems and suggested workarounds. If the measures described below do not resolve a problem, contact Customer Support. sca Service Hangs Up The sca service can hang up occasionally when stopping or starting. There is no known remedy for this problem. Ensure all applications using the accelerator card are stopped and try to repeat the operation. If the sca service hangs up, try restarting the rtm process: 1. Stop the rtm service service rtm stop 2. Restart the sca service. Data Center Real User Monitoring SSL Monitoring Administration Guide 43 Chapter 2 ∙ Configuring SSL Monitoring on the AMD For more information, see Starting, Stopping, and Monitoring the Service [p. 42]. 3. Start the rtm service. service rtm start Do not use the pkcsmgr and scamgr tools when restarting the sca service. sca Service Fails to Stop The sca service sometimes fails to stop. The sca service does not stop properly and does not unload drivers if it is in use at the time (for example, while AMD is running). Stop all programs using the sca service and then try to stop it again. 1. Stop the rtm service service rtm stop 2. Restart the sca service. For more information, see Starting, Stopping, and Monitoring the Service [p. 42]. 3. Start the rtm service. service rtm start Do not use the pkcsmgr and scamgr tools when restarting the sca service. Slot Manager Cannot Create Shared Memory The slot manager (the pkcsslotd daemon) is sometimes unable to allocate shared memory when starting. This may happen because the slot manager was not stopped properly and it has left its shared memory region allocated. In such cases, it is not able to start again and displays a message similar to the following: ERROR pkcsslotd-log.o[6386.-1208592704]: Shared memory creation failed (0x11) ERROR pkcsslotd-log.o[6386.-1208592704]: perform ipcrm -M 0x620131DA To resolve this situation, remove the shared memory segment as indicated by the log message. In this example, run the command: ipcrm -M 0x620131DA Key Manager Fails to Initialize The key manager may fail to initialize, showing the following message: Error initializing the PKCS11 library: 0x2 Check if the pkcsslotd daemon is running (see /var/log/messages for possible pkcsslotd errors) Typically this message indicates that the manager is not running. In this case, the sca service must be restarted. Board Zeroing and Initialization Problems Zeroing is performed using the scamgr or scadiag tool. If this does not work, and as a last resort, the card can be cleaned by replacing a hardware jumper on the card as described in the card's user guide. 44 Data Center Real User Monitoring SSL Monitoring Administration Guide Chapter 2 ∙ Configuring SSL Monitoring on the AMD Using KPA to Make Keys Available to the AMD Process To make keys available to the AMD at run time, the administrator has to arrange for the keys to be decrypted, if they are stored in an encrypted form, then to be loaded into shared memory. Decryption requires a password – one per encrypted key file – and is accomplished using the kpadmin utility. The procedure is the same for all the types of encrypted keys used by the AMD, such as OpenSSL or Kerberos for SAP. The kpadmin utility is a binary file accessible through the path /usr/adlex/rtm/bin/kpadmin. It accepts no command line options and is executed as: kpadmin Alternatively, to execute kpadmin, log in as the kpadmin user. The kpadmin utility reads the keys from the disk according to the contents of the file named in server.key.list, prompts the administrator for a password to decrypt each file and then stores them in the AMD RAM memory, visible to the kpa daemon. After successfully decrypting all keys and saving them in the AMD RAM memory, kpadmin restarts the AMD process, which then obtains new key information via the kpa daemon. The decrypted keys are stored in the AMD RAM only. They are not written on the disk at any time. This increases the security of the system but means that after a reboot of the AMD, they have to be re-loaded to memory. NOTE The keylist file is shared by all analyzers requiring key storage. Therefore when executing the kpadmin command, you will be prompted for passwords for all of the listed keys, for example for OpenSSL keys. If a particular key is not stored in an encrypted form and does not require a password, it is sufficient to press [Enter] in response to the password request. Migrating from OpenSSL to Using SSL Hardware Accelerator Before You Begin If you have been using OpenSSL decoding on the AMD to perform analysis of SSL traffic, and have subsequently upgraded your AMD to support an SSL hardware accelerator card, you need to re-configure the AMD to use the new card. The following steps outline the required procedure to perform after the AMD has been upgraded. Refer to Upgrading the AMD Software in the Data Center Real User Monitoring Agentless Monitoring Device Installation Guide and to SSL Hardware Accelerator Cards [p. 18] for details of how to upgrade the AMD and install and configure a particular hardware accelerator card. The benefits of using a hardware accelerator card are, among others, increased speed and security. Note, however, that some cards have limited ability to export RSA private keys, thus making it difficult to re-migrate back to OpenSSL or to another card. 1. Upgrade your AMD to support the new hardware accelerator card. Data Center Real User Monitoring SSL Monitoring Administration Guide 45 Chapter 2 ∙ Configuring SSL Monitoring on the AMD For information about upgrading the AMD, refer to Upgrading the AMD Software in the Data Center Real User Monitoring Agentless Monitoring Device Installation Guide. 2. Install and configure a hardware accelerator card. For information about installing and configuring a hardware accelerator card, refer to SSL Hardware Accelerator Cards [p. 18]. 3. Configure AMD to use the installed accelerator card for SSL decryption. Configure the AMD to use the card, by specifying to SSL engine name in the AMD configuration. For more information, see Selecting and Configuring SSL Engine [p. 18] and SSL Hardware Accelerator Cards [p. 18]. 4. Import RSA private keys to the accelerator cards. The RSA private keys, as used by OpenSSL are stored in the directory indicated in the AMD configuration, as explained in Management of RSA Private Keys on AMD [p. 12]. Import these keys into the given hardware card, as described in SSL Hardware Accelerator Cards [p. 18] Monitoring SSL-encoded Traffic without Decryption There are alternatives on the market to installing private keys on AMDs, including dedicated SSL accelerators and SSL-terminating load balancers. If the AMD is connected to the network behind an SSL terminating device, the AMD sees plain and unencrypted traffic that can be analyzed without any additional setup. Data Center Real User Monitoring provides a subset of SSL-specific metrics for SSL traffic with no decryption required. This includes SSL Connection Setup Time, SSL Handshake Errors, and performance gauge metrics that estimate Operation Time and Server Think Time. Also, all the network performance and usage metrics are available, such as RTT, loss rate, bandwidth usage, and throughput. When SSL private keys are installed, the AMD is able to perform three additional tasks: • Report HTTP errors and application-specific errors signaled in HTML content. • Identify and count unique website users by user name. • Report performance metrics for identified, designated, SSL-encoded URLs, and application functions such as forms. Using AMD with nShield Connect HSM AMD is capable of receiving the secure cryptographic processing from The nShield Connect™ hardware security module (HSM). AMD 12.3 was tested to be used with nShield Connect HSM 1.2. AMD acts as an nShield Connect client. There are two expected configuration scenarios: • 46 Setting up an nShield Connect from scratch and connecting the AMD as a client. For more information, see Setting Up nShield Connect [p. 47]. Data Center Real User Monitoring SSL Monitoring Administration Guide Chapter 2 ∙ Configuring SSL Monitoring on the AMD • Connecting the AMD to an existing nShield Connect installation. For more information, see Connecting AMD to Existing nShield Connect [p. 47]. Setting Up nShield Connect Refer to the procedure below when setting up the nShield Connect HSM from scratch and connecting the AMD as its client. The procedure provides an outline of general steps required to connect the AMD and nShield Connect. Refer to Thales provided nShield Connect HSM documentation for detailed instructions: nShield Connect Quick Start Guide and nShield Connect and netHSM User Guide for Unix-based OS 1. 2. 3. 4. 5. Set up and configure nShield Connect. Create a Remote File System (RFS) on a machine of your choice. Connect RFS to nShield Connect. Connect AMD to nShield Connect. Create Security World on nShield Connect. Connecting AMD to Existing nShield Connect Refer to the procedure below when connecting an AMD to existing nShield Connect HSM installation. The procedure provides an outline of general steps required to connect the AMD and nShield Connect. Refer to Thales provided nShield Connect HSM documentation for detailed instructions: nShield Connect and netHSM User Guide for Unix-based OS 1. 2. 3. Configure nShield Connect to enable connection from the AMD Connect AMD to nShield Connect. Configure Remote File System (RFS) to allow AMD to receive the Security World data. Data Center Real User Monitoring SSL Monitoring Administration Guide 47 Chapter 2 ∙ Configuring SSL Monitoring on the AMD 48 Data Center Real User Monitoring SSL Monitoring Administration Guide CHAPTER 3 Server-Based SSL Monitoring Configuration Apart from the installation and configuration performed on the AMD side, you can also customize the Central Analysis Server features related to SSL monitoring, such as reporting on SSL errors. In particular, if you are interested in the integration features of CAS, you can use the alert that is based on detection of SSL setup time for a specified software service. For more information, see SSL_APPL_INOPER in the Data Center Real User Monitoring Alert System Administration Guide. Defining SSL Error Names SSL connection setup errors are aggregated into groups by the AMD according to the AMD configuration. The aggregated errors appear on reports as “SSL error 1”, “SSL error 2”, and “Other SSL errors”. Before You Begin Administrative privileges are required to access the Advanced Properties Editor. Under normal circumstances, use the Customized names configuration tool to configure the SSL error names, but if that is not possible, use the Advanced Properties Editor on the report server instead. To customize these default names, change the report server configuration in the Advanced Properties Editor in Diagnostic Console: 1. 2. Open and log on to the report server. Open the Diagnostic Console. In your web browser address field, enter: http://[CAS_ADDRESS]/diagconsole 3. 4. 5. In the Diagnostic Console, select Advanced Properties Editor. Click the right arrow to page to the SSL error names section. Type the new error names. Other SSL Errors name (SSL_ERR.3) Data Center Real User Monitoring SSL Monitoring Administration Guide 49 Chapter 3 ∙ Server-Based SSL Monitoring Configuration SSL Error level 1 name (SSL_ERR.1) SSL Error level 2 name (SSL_ERR.2) 6. Click Save to save your changes. Managing SSL Alert Codes You can define new alert codes using the RUM Console, change predefined common SSL alert codes and decide which alert codes should be taken into account when calculating the failures (transport) metric.. By default, the most commonly used alert codes are already defined and divided into three groups: SSL Alerts A 10, 20, 21, 22, 30, 40, 49, 50, 51, 60, 70, 71, 110 This group is shown on Data Center Real User Monitoring reports as SSL Error 1, named SSL session fatal error by default.. SSL Alerts B 41, 42, 43, 44, 45, 46, 48, 111, 112. 113. 114. 115 This group is shown on Data Center Real User Monitoring reports as SSL Error 2., named SSL handshake fatal error by default. SSL Alerts N All alerts not mentioned above. This group is shown on Data Center Real User Monitoring reports as Other SSL Errors, named SSL warnings by default. The following table lists all SSL alerts that AMD can recognize: Table 2. SSL alert codes 50 SSL alert name SSL alert code Description close_notify 0 Notifies the recipient that the sender will not send any more messages on this connection. unexpected_message 10 Received an inappropriate message This alert should never be observed in communication between proper implementations. This message is always fatal. bad_record_mac 20 Received a record with an incorrect MAC. This message is always fatal. decryption_failed 21 Decryption of a TLSCiphertext record is decrypted in an invalid way: either it was not an even multiple of the block length or its padding values, when checked, were not correct. This message is always fatal. record_overflow 22 Received a TLSCiphertext record which had a length more than 2^14+2048 bytes, or a record decrypted to a TLSCompressed Data Center Real User Monitoring SSL Monitoring Administration Guide Chapter 3 ∙ Server-Based SSL Monitoring Configuration Table 2. SSL alert codes (continued) SSL alert name SSL alert code Description record with more than 2^14+1024 bytes. This message is always fatal. decompression_failure 30 Received improper input, such as data that would expand to excessive length, from the decompression function. This message is always fatal. handshake_failure 40 Indicates that the sender was unable to negotiate an acceptable set of security parameters given the options available. This is a fatal error. no_certificate_RESERVED 41 Send by a client to indicate that he does not have a proper certificate to fulfill a certificate request from the server. This alert description is no more used by TLS (now a client sets an empty certificate message if he does not have a proper certificate). bad_certificate 42 There is a problem with the certificate, for example, a certificate is corrupt, or a certificate contains signatures that cannot be verified. unsupported_certificate 43 Received an unsupported certificate type. certificate_revoked 44 Received a certificate that was revoked by its signer. certificate_expired 45 Received a certificate has expired or is not currently valid. certificate_unknown 46 An unspecified issue took place while processing the certificate that made it unacceptable. illegal_parameter 47 Violated security parameters, such as a field in the handshake was out of range or inconsistent with other fields. This is always fatal. unknown_ca 48 Received a valid certificate chain or partial chain, but the certificate was not accepted because the CA certificate could not be located or could not be matched with a known, trusted CA. This message is always fatal. access_denied 49 Received a valid certificate, but when access control was applied, the sender did not Data Center Real User Monitoring SSL Monitoring Administration Guide 51 Chapter 3 ∙ Server-Based SSL Monitoring Configuration Table 2. SSL alert codes (continued) SSL alert name SSL alert code Description proceed with negotiation. This message is always fatal. 52 decode_error 50 A message could not be decoded because some field was out of the specified range or the length of the message was incorrect. This message is always fatal. decrypt_error 51 Failed handshake cryptographic operation, including being unable to correctly verify a signature, decrypt a key exchange, or validate a finished message. export_restriction 60 Detected a negotiation that was not in compliance with export restrictions; for example, attempting to transfer a 1024 bit ephemeral RSA key for the RSA_EXPORThandshake method. This message is always fatal. protocol_version 70 The protocol version the client attempted to negotiate is recognized, but not supported. For example, old protocol versions might be avoided for security reasons. This message is always fatal. insufficient_security 71 Failed negotiation specifically because the server requires ciphers more secure than those supported by the client. Returned instead of handshake_failure. This message is always fatal. internal_error 80 An internal error unrelated to the peer or the correctness of the protocol makes it impossible to continue, such as a memory allocation failure. The error is not related to protocol. This message is always fatal. user_canceled 90 Cancelled handshake for a reason that is unrelated to a protocol failure. If the user cancels an operation after the handshake is complete, just closing the connection by sending a close_notify is more appropriate. This alert should be followed by a close_notify. This message is generally a warning. no_renegotiation 100 Sent by the client in response to a hello request or sent by the server in response to a client hello after initial handshaking. Either of these would normally lead to Data Center Real User Monitoring SSL Monitoring Administration Guide Chapter 3 ∙ Server-Based SSL Monitoring Configuration Table 2. SSL alert codes (continued) SSL alert name SSL alert code Description renegotiation; when that is not appropriate, the recipient should respond with this alert; at that point, the original requester can decide whether to proceed with the connection. One case where this would be appropriate would be where a server has spawned a process to satisfy a request; the process might receive security parameters (key length, authentication, and so on) at start-up and it might be difficult to communicate changes to these parameters after that point. This message is always a warning. unsupported_extension 110 Sent by the client if the ServerHello does contain an extension that the client did not requested in his ClientHello, fatal certificate_unobtainable 111 Sent by the server to indicate that he cannot obtain a certificate from the URL the client has sent within a ClientCertificateURL extension, maybe fatal unrecognized_name 112 Sent by the server if he does not recognize a server name included in the ServerNameList extension received from the client, maybe fatal bad_certificate_status_response 113 Sent by the client if he gets an invalid certificate status response after having sent a CertificateStatusRequest extension, fatal. bad_certificate_hash_value 114 Sent by the server if a certificate hash value does not match to the corresponding value received within a ClientCertificateURL extension message, Fatal unknown_PSK_identity 115 Indicates that the server does not recognize the PSK identify sent by the client. Fatal other ? other By default, the most commonly used alert codes are already defined, including the alert source: server, client or both. Use the SSL Alerts table to to indicate the codes that should be reported as failures (transport). For more information, see Calculating Availability in the Data Center Real User Monitoring Administration Guide.. 1. Start and log on to RUM Console. Data Center Real User Monitoring SSL Monitoring Administration Guide 53 Chapter 3 ∙ Server-Based SSL Monitoring Configuration 2. 3. Select Devices and Connections ➤ Manage Devices from the top menu, to display the current device list. Select Open Configuration from the context menu for an AMD. The AMD Configuration window appears. 4. Click Edit as Draft to set your configuration to draft mode (if you are not in draft mode already). 5. 6. Navigate the Configuration tree to Global ➤ Advanced ➤ SSL Options. Select the Report server name from SSL certificate check box to enable the AMD to extract the names from SSL certificates. These names are included with the monitored data along with the SSL setup time, protocol, and cipher. 7. Right-click and select Add or Delete to add or delete the SSL alert codes in the SSL Failures table. You can also choose the source of alert code to trigger an SSL failure: server, client or both. 8. Save or publish the configuration. • Click Save to save your changes and continue with configuration. • Click Save and Publish to immediately update the devices configuration. What to Do Next If the AMD is connected to CAS, SSL errors can be given customized names on the report server side. For more information, see Defining SSL Error Names [p. 49]. 54 Data Center Real User Monitoring SSL Monitoring Administration Guide CHAPTER 4 Tuning Configuration and Troubleshooting Problems Although SSL monitoring functionality is designed to be as fault tolerant as possible, it is possible that it may not work due to configuration issues. DC RUM is equipped with diagnostic and troubleshooting features that help resolve the most common problems with SSL monitoring. Verification of Traffic Monitoring Quality Use the RUM Console to verify the traffic monitoring quality using two tightly connected solutions: Sniffing Point Diagnostics and Application Overview. We highly recommend that you perform this step at the beginning of your DC RUM deployment to verify that your hardware is working properly and that the applications you intend to monitor are detected. You can verify the test results and repeat them as needed at any time and for any network conditions. IMPORTANT • All verification is based on a traffic recording, either manual or automatic. The outcome may not be representative if the target traffic is low at the time of recording or if you are unable to capture a satisfactory number of complete sessions. • Choose automatic or manual traffic recording to capture unfiltered or filtered traffic. Enable automatic recording only during the configuration process and then disable it. It can negatively affect the performance of the AMD during normal operations, especially if you are running a 32-bit AMD in a high-traffic environment or a 64-bit AMD with the native driver. • For the most complete and reliable statistics, use the 64-bit customized driver on the AMD. • The verification of traffic monitoring quality is possible only for AMD 11.7 or later. Data Center Real User Monitoring SSL Monitoring Administration Guide 55 Chapter 4 ∙ Tuning Configuration and Troubleshooting Problems SSL Diagnostics The traffic for this report is dependent on capturing complete sessions. Incomplete sessions, missing packets, or missed handshakes cause a large number of errors and a large number of errors results in unreliable reports. Always be sure to record enough traffic for an adequate length of time to allow you to capture complete sessions. The Statistics for encrypted traffic, SSL card and keys report is only available after the traffic trace recording is finished. Partial statistics for SSL are not provided for unfinished sessions. General Statistics for Encrypted Traffic For a given time range, defined by the scope of the recorded traffic traces, you can see the recognized SSL engine (for example, OpenSSL or nCipher) and the number of keys exchanged in the traffic. The remaining sections of this diagnostic report show the detailed information about the keys, the overall summary of the captured SSL traffic, and whether there are errors. The servers section shows information for all SSL traffic captured during the traffic trace recording. All of the detected encrypted protocols are listed together with their matching keys, if they are seen in the traffic. You can see whether the key exchange was successful; the matched keys are indicated by the icon. Key and certificate matching enables you to verify that certificates were found and were valid. No matching may indicate that the certificates are out of date. SSL Server Status The Status column shows whether there are errors or whether erroneous sessions prevail. A traffic capture sometimes does not contain session beginnings, or it contains incomplete handshakes, or it has no master session; these sessions are marked as ignored, as indicated by the gray ( ) color bar. The sessions with errors are marked by a red ( ) color bar. The main causes of errors are missing packets or missing keys. Other causes of errors are listed in detail on the Detailed SSL Statistics for servers report. Detailed SSL Statistics for Servers Detailed SSL statistics for servers are accessed from the Server or Status columns. This report shows: • The percentage of the sessions without error, with errors, or ignored. • The counts of each problem, in detail, for the error or ignored sessions. • The number of decrypted sessions if there are no problems. You can filter the results. 56 • Use Sessions finished to display the data for completed sessions. • Use Sessions in progress to display the sessions that are still in progress (sessions that did not end before the traffic capture stopped; to see those session statistics). Data Center Real User Monitoring SSL Monitoring Administration Guide Chapter 4 ∙ Tuning Configuration and Troubleshooting Problems Figure 17. Example of Detailed SSL Statistics for Server, Errors Detected Due to Private Key Mismatch SSL Keys Because invalid or outdated keys are usually not removed from SSL cards, the list of keys for which an error status is indicated may be considerably long. In such cases, sort by the Status column to see keys correctly matched. Note that it may be necessary to format the SSL card storage area to refresh the key list. Troubleshooting SSL Monitoring Issues The AMD provides a wide range of diagnostic information and tools that can help you resolve issues with SSL monitoring. Before trying to find an answer to a specific question regarding SSL-related issues, you can use the built-in system diagnostics of Data Center Real User Monitoring. Inspect the AMD log files, especially rtm_perf_curr.log and check the system health reports. For more information, see Diagnostic Tools in the Data Center Real User Monitoring Administration Guide and Interpreting a System Problem in the Data Center Real User Monitoring Administration Guide. Why, even though the Agentless Monitoring Device has an SSL accelerator card, and the SSL card has been initialized, SSL is not being decrypted. The SSL card needs to operate in the Logged on mode. For security reasons, after each machine reboot, the card reverts back to the Initialized mode. To re-activate the card, log in to the card using the user login and password. How can I check whether SSL decryption is functioning properly? • To see full status information about the current SSL operation, execute the SHOW SSLDECR STATUS rcon command. For more information, see SHOW SSLDECR STATUS [p. 76]. Data Center Real User Monitoring SSL Monitoring Administration Guide 57 Chapter 4 ∙ Tuning Configuration and Troubleshooting Problems • To see historical information about SSL decryption, open the /var/log/adlex/rtm_perf.log file. Output from the SHOW SSLDECR STATUS command is written there every monitoring interval (default: 5 minutes). • When viewing CAS reports, note the number of SSL errors reported. In particular, if the error breakdown information shows a large number of “Other SSL errors”, this indicates that SSL decryption errors are a problem. What should I do if the SHOW SSLDECR STATUS command does not return engine status as OK or if the incorrect engine is used? To operate correctly, the engine and accelerator card should match. For example, when using a NITROX accelerator card, use the nitroxfips engine. If the engine status is not OK or an incorrect engine is listed as being in use, check the following: • Installation: perhaps the wrong upgrade file has been installed. For more information, see Installing the AMD Software in the Data Center Real User Monitoring Agentless Monitoring Device Installation Guide. • Engine configuration. For more information, see Selecting and Configuring SSL Engine [p. 18]. • Authentication: some cards require that you perform a login action before they can operate. Refer to the configuration instructions for the card. My SSL engine status is OK, but SSL decryption fails entirely, with no keys recognized. What is the likely cause? The AMD requires that the SSL card be in an authenticated mode. This allows the AMD to gain access to RSA private keys stored in the card. One common problem is that when an AMD is restarted, the user forgets to log in to the AMD and launch the SSL card configuration utility to authenticate user access (unlock access to RSA keys). The engine status will be given as OK, meaning that the card itself is functioning correctly and the correct system driver is loaded, but the number of keys recognized will be 0 because the AMD is not able to retrieve key information from the card. >$ SHOW SSLDECR STATUS SSL DECRYPTION STATUS: CONFIGURATION: Engine:openssl(thread) status:OK Keys: recognized=0 not recognized=18 SESSIONS: ... To avoid this problem, remember to log in to the AMD and launch the SSL card configuration utility to authenticate user access (unlock access to RSA keys) after you restart the AMD. What should I do if the SHOW SSLDECR STATUS command reports that some keys were not recognized? This can happen if RSA private keys stored in .pem files or on the accelerator card do not match the keys used by the SSL servers being monitored. Private keys used by servers can change. Investigate the problem further by executing the SHOW SSLDECR KEYS command in rcon and check which keys have an error status. For example: >$ show ssldecr keys Configuration of SSL private keys: 58 Data Center Real User Monitoring SSL Monitoring Administration Guide Chapter 4 ∙ Tuning Configuration and Troubleshooting Problems <key: s1.key, status: error (reading failed)> <key: strange.key, type: file, size: 1024, status: OK (matched)> Keys total: 2, ok: 1, failed: 1, matched: 1 If there are errors, check the following: • Is the keylist file in the correct format? If not, correct the entries. For more information, see Management of RSA Private Keys on AMD [p. 12]. • If .pem files are to be used, are there the correct .pem files in /usr/adlex/config/keys? If not, supply the missing files. • If .pem files are to be used, are there any typos in the file names in the keylist file? Correct the file names or paths as needed. • Are the .pem files encrypted? Open a key file and see whether the word ENCRYPTED appears near the top of the file. The keys stored on the disk may be in encrypted form. In this case, to make the keys available the administrator has to arrange for the keys to be decrypted before they can be read by the AMD process. This requires a password (one per key file) and is accomplished using the kpadmin utility and the KPA daemon. For more information, see Using KPA to Make Keys Available to the AMD Process [p. 45]. • If keys from the accelerator card are used, are the key IDs and names given in the proper format in keylist? For more information, see Management of RSA Private Keys on AMD [p. 12]. • If only keys from the accelerator are to be used, consider not using the keylist file at all by setting the ssl.import.all.keys.from.token configuration property to true. This ensures that all the keys on the card will be seen correctly regardless of any entries you might make in the keylist file. For more information, see Management of RSA Private Keys on AMD [p. 12]. What should I do if the SHOW SSLDECR STATUS command reports no sessions? If the number of sessions is reported as 0, check the following: • Does your AMD installation have a license for SSL decryption? If not, you need to obtain one. For more information, see Licensing Data Center Real User Monitoring Components in the Data Center Real User Monitoring Administration Guide. • Are there any SSL services defined? Remember that you need to define a service before you can monitor it. You can execute the SHOW SSLDECR SERVERS command in rcon to list all the servers for which SSL decryption is active. The analyzer for the software service must specify “SSL with decryption”. For more information, see SHOW SSLDECR SERVERS [p. 75] and Configuring User-Defined Software Services in the RUM Console Online Help. • Is there any actual traffic for the servers for which SSL decryption is active? To find out, use the tcpdump command on the AMD. For example: tcpdump 1000 "/ssl.tcp" "host 10.102.10.133 and port 443" or tcpdump 1000 "/ssl.tcp" "vlan and host 10.102.10.133 and port 443" Data Center Real User Monitoring SSL Monitoring Administration Guide 59 Chapter 4 ∙ Tuning Configuration and Troubleshooting Problems and check whether there is any traffic captured in the /ssl.tcp file. If SHOW SSLDECR STATUS reports decryption errors, what do they mean and what can I do to fix the problem? The following decryption errors can be reported: • packet lost during payload data exchange Your network may be losing packets; check mirrored ports. • corrupted payload data packet Some of the traffic is corrupted and may be incorrectly received by the AMD, potentially because of network problems. • decryption failed during payload data exchange The symmetric decryption failed. • no private key found You do not have a private key for this session or you have not listed it correctly in the keylist file. • packet lost during handshake It may mean that your network is losing packets; check mirrored ports. • corrupted handshake packet or incorrect handshake sequence Some of the traffic is corrupted and may be incorrectly received by the AMD. • decryption broken during handshake The symmetric decryption failed. • unsupported SSL version Traffic encrypted with SSL 2.0 has been encountered. These protocol versions are not supported by the AMD. • unsupported SSL feature An unsupported SSL feature has been encountered. The area the feature relates to and the count of occurrences is in brackets: unsupported cipher, compression, server key exchange. • re-used sessions with no matching master session seen before A so-called “short handshake” (a session with re-used ID) was observed, but the AMD has no record of the original session (“long handshake”) that established the security credentials. Note that some such errors are normal if you restart the AMD, which may cause some traffic not to be observed by the AMD. • incomplete SSL handshake A TCP session was observed to terminate before a complete SSL handshake was seen. The server can refuse a connection and close the TCP session for various reasons. For example, this can occur if the client requested a particular version of SSL but the server requires a different version. • terminated by alert A fatal SSL alert arrived. Technically, this is alert detection and not an error. 60 Data Center Real User Monitoring SSL Monitoring Administration Guide Chapter 4 ∙ Tuning Configuration and Troubleshooting Problems • session not seen from the beginning May be related to monitoring of sessions with missing start of session. Change your settings if required. For more information, see Monitoring of Persistent TCP Sessions in the RUM Console Online Help. I suspect that I do not have all the private keys necessary for decryption (for example, I observe sessions “with no private key found”). How can I ensure that all the servers have their matching keys? Execute the SHOW SSLDECR SERVERS command in rcon to list the decryption information for each server. For example: >$ SHOW SSLDECR SERVERS Configuration for SSL servers: <server: 10.102.10.133:443, certs seen: 1, keys used: 1, status: key(s) found> <cert: [/C=PL/ST=woj pomorskie/L=TRICIT,//OU=LAB/CN=sdfds/emailAddress=sdklj@sdkjw.com], sent: 4, key: strange.key> Servers total: 1, keys required: 1, keys found: 1, keys missing: 0 For all servers, ensure that their key status is found. Also note the last summary line of the output, which states how many keys were required and how many keys were found or were missing. For more information, see SHOW SSLDECR SERVERS [p. 75]. There appear to be missing keys, but I know that I have provided all the necessary keys. How can I verify that the keys I have are correct. A monitored server may change its private key, making the key used by the AMD obsolete. To prove that a key is correct, perform a test encryption/decryption using that key: 1. Use the SSLDECR CERTS rcon command to extract the public keys from the traffic being seen by the AMD For more information, see SHOW SSLDECR CERTS [p. 70]. 2. Perform a test encryption of a short text string, such as today's date, using extracted certificates. Use OpenSSL to encrypt the string. For example: # date > txt # cat txt Wed Feb 3 16:13:01 CET 2010 # openssl rsautl -inkey /cert_192.168.207.162\:443_1.der -keyform der -certin -in txt -encrypt -out txt.enc where /cert_192.168.207.162\:443_1.der is the file saved by the SSLDECR CERTS command used earlier. 3. Decrypt the encrypted file using the private key you want to test. For example, using OpenSSL: openssl rsautl -inkey /usr/adlex/config/keys/www2.prod.ramq.gov_decr1.pem -decrypt -out txt.decr -in txt.enc If the key is correct, there should be no difference between the files txt and txt.decr. You can also use the key stored on the card to decrypt the test file. To do that, use the rsautil utility residing in /usr/adlex/rtm/bin/. (For full usage syntax of the utility, type rsautil -?) Data Center Real User Monitoring SSL Monitoring Administration Guide 61 Chapter 4 ∙ Tuning Configuration and Troubleshooting Problems In the following example, the first decryption succeeds and the second one fails. Note the last line with decrypt simple failed: [root@hsekilx030 bin]# cd /usr/adlex/rtm/bin/ [root@hsekilx030 bin]# ./rsautil -e nitroxfips -t token -k 7 -f /root/DT_00000_42494/cert_153.88.134.201\:443_1.enc L3 2010-06-02 09:33:13.270 0@ssldecr/rsaeng.cpp:320 RSA engine mode auto set to native L2 2010-06-02 09:33:13.270 0@ssldecr/rsaeng.cpp:80 Openssl version: OpenSSL 0.9.8e-fips-rhel5 01 Jul 2008, L2 2010-06-02 09:33:13.270 0@ssldecr/rsaeng.cpp:84 Initializing OpenSSL in thread safe mode with 41 locks L3 2010-06-02 09:33:13.271 0@./ssldecr/sslnitroxfips.h:29 NitroxFips: blocking mode: 0 L1 2010-06-02 09:33:13.271 0@ssldecr/rsautil.cpp:322 OK L1 2010-06-02 09:33:13.271 0@ssldecr/rsautil.cpp:347 SSL RSA handler nitroxfips(native) created L3 2010-06-02 09:33:13.282 0@ssldecr/rsautil.cpp:394 key ok: 7 L1 2010-06-02 09:33:13.291 0@ssldecr/rsautil.cpp:67 30 (0x1e) bytes at 0xbfa71824 0000 4d 6f 6e 20 4d 61 79 20 33 31 20 31 33 3a 33 32 Mon May 31 13:32 0010 3a 30 39 20 43 45 53 54 20 32 30 31 30 0a :09 CEST 2010. [root@hsekilx030 bin]# ./rsautil -e nitroxfips -t token -k 8 -f /root/DT_00000_42494/cert_153.88.134.201\:443_1.enc L3 2010-06-02 09:33:20.125 0@ssldecr/rsaeng.cpp:320 RSA engine mode auto set to native L2 2010-06-02 09:33:20.125 0@ssldecr/rsaeng.cpp:80 Openssl version: OpenSSL 0.9.8e-fips-rhel5 01 Jul 2008, L2 2010-06-02 09:33:20.125 0@ssldecr/rsaeng.cpp:84 Initializing OpenSSL in thread safe mode with 41 locks L3 2010-06-02 09:33:20.125 0@./ssldecr/sslnitroxfips.h:29 NitroxFips: blocking mode: 0 L1 2010-06-02 09:33:20.125 0@ssldecr/rsautil.cpp:322 OK L1 2010-06-02 09:33:20.125 0@ssldecr/rsautil.cpp:347 SSL RSA handler nitroxfips(native) created L3 2010-06-02 09:33:20.137 0@ssldecr/rsautil.cpp:394 key ok: 8 L2 2010-06-02 09:33:20.152 0@ssldecr/rsautil.cpp:147 decrypt simple failed For more information on loaded keys, execute the SHOW SSLDECR KEYS command in rcon. Guided Configuration Issues After I upgraded to Data Center Real User Monitoring 11.5, why doesn't Guided Configuration work? On upgrade, the Guided Configuration connection is, by default, disabled on the AMDs. Enable the Guided Configuration connection on an AMD, see Adding Devices in RUM Console in the Data Center Real User Monitoring Administration Guide. Note that if you add an AMD after you upgrade to DC RUM 11.5, the connection will be enabled for you on the new device. Another reason that it does not work is that the number of AMDs in your network exceeds the maximum number (15) of devices with a Guided Configuration connection enabled. Also note that automatic trace recording is, by default, disabled in all installations, so to see data on the Guided Configuration perspective, either enable automatic trace recording or record a trace manually. For more information, see Capturing Traffic Traces in the Data Center Real User Monitoring Web Application Monitoring User Guide. 62 Data Center Real User Monitoring SSL Monitoring Administration Guide Chapter 4 ∙ Tuning Configuration and Troubleshooting Problems The Guided Configuration is incorrectly displayed after a period of user inactivity. The watchdog mechanism for RUM Console Server frequently polls the server process for its activity. If no activity is detected after a certain timeout (default is 30 seconds), the RUM Console Server process is restarted. This restart causes a connection break between the active RUM Console and the RUM Console Server. The connection is automatically reestablished after RUM Console restart, but the Guided Configuration process may have to be restarted. The JVM restart will result in an entry in log file platform-system.log (located in the ..\ProgramData\Application Data\Compuware\Vantage Agentless EUE Configuration\workspace\log\kernel\) similar to this: ERROR | wrapper signal from JVM. STATUS | wrapper ERROR | wrapper STATUS | wrapper | 2010/06/29 17:13:14 | JVM appears hung: Timed out waiting for | 2010/06/29 17:13:14 | Dumping JVM state. | 2010/06/29 17:13:19 | JVM did not exit on request, terminated | 2010/06/29 17:13:24 | Launching a JVM... This usually happens on overloaded systems when another process is using 100% of the CPU, caused by low system memory and high disc swapping. In this situation, it is recommended that RAM be increased on the machine. Why can't I record a new traffic trace? You can diagnose and solve the problem in several ways: • Read the message in the recording pop-up window. It may contain information about connection problems, the AMD receiving no traffic, or the Guided Configuration waiting for the top statistics data from the device. • Check the connection status for the selected AMDs in the Device Status section on the Devices screen. You cannot record new traces if the monitoring device experiences connection problems. • Issue the ndstat command on your AMD to check whether the CBA and the CBA Agent are working. The log should contain the following lines: === CBA watchdog process: 2018 ? S 0:00 /bin/sh /usr/adlex/cba/bin/cba.run === CBA module: 1 processes(threads) 20430 ? Sl 0:08 /usr/adlex/cba/bin/cba === CBA-Agent watchdog process: 2069 ? S 0:00 /bin/sh /usr/adlex/cba-agent/bin/cba-agent.run === CBA-Agent process: 2073 ? S 0:00 /bin/bash /usr/adlex/cba-agent/bin/cba-agent • Using the ls -l /var/spool/adlex/cba command, check whether a trace file with a given name exists and, if it does, check its size. • To determine whether an interface is configured and functioning, issue the ifconfig command two or more times and observe the number of packets. If there is traffic on the interface, this number should be non-zero and increasing from observation to observation. For example: [root@vantageamd ~]# ifconfig eth0 Link encap:Ethernet HWaddr 00:0C:29:7B:32:70 UP BROADCAST RUNNING PROMISC MULTICAST MTU:1500 Metric:1 RX packets:32692 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:16767433 (15.9 MiB) TX bytes:0 (0.0 b) Base address:0x1070 Memory:ec820000-ec840000 [root@vantageamd ~]# ifconfig eth0 Link encap:Ethernet HWaddr 00:0C:29:7B:32:70 Data Center Real User Monitoring SSL Monitoring Administration Guide 63 Chapter 4 ∙ Tuning Configuration and Troubleshooting Problems UP BROADCAST RUNNING PROMISC MULTICAST MTU:1500 Metric:1 RX packets:48991 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:20138709 (19.2 MiB) TX bytes:0 (0.0 b) Base address:0x1070 Memory:ec820000-ec840000 • You can also use the rcon tcdump command to check whether you can intercept any packets received through the traffic on the sniffing interfaces. • Disable and then enable the Guided Configuration connection in the monitoring device settings. For more information, see Adding an AMD to Devices List in the Data Center Real User Monitoring Web Application Monitoring User Guide. • Restart the CBA Agent with the service cba-agent restart Linux command. You can also search for exceptions and error information in the available logs: • cva\log\server.log in the RUM Console installation directory • /var/log/adlex/cba-agent.log in the AMD installation directory • /var/log/adlex/cba.log in the AMD installation directory This, however, requires advanced product knowledge. Why does the Guided Configuration experience connection problems? To diagnose this problem: • Check whether the default connection port (9094) is open on the firewall; this is required for the Guided Configuration to work. You can change the default port number if it is already used by another application or service. For more information, see Connection Settings for the CBA Agent and RUM Console Server in the Data Center Real User Monitoring Administration Guide. • Using the command netstat -nat | grep LISTEN | grep -v 127.0.0.1 to list the open external ports on the AMD. In the following screen output example, port 9094 is open: [root@vantageamd ~]# netstat -nat | grep LISTEN | grep -v 127.0.0.1 tcp 0 0 0.0.0.0:9091 0.0.0.0:* LISTEN tcp 0 0 0.0.0.0:9094 0.0.0.0:* LISTEN tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN Why can't I find a certain URL, parameter, or cookie in the traffic? (I am sure it is there). Most likely the searched element did not make it to the top statistics that are displayed on the Application Traffic Categories screen. To find a specific element, consider using a filtered traffic trace. You may also increase the number of items in each processed wizard request: 1. Open the cva\config\amd\cba-config.xml file in the RUM Console installation directory. 2. In the file, search for the <numberOfResults> element. The default setting is: <numberOfResults>100</numberOfResults> 64 Data Center Real User Monitoring SSL Monitoring Administration Guide Chapter 4 ∙ Tuning Configuration and Troubleshooting Problems 3. Change the default number to a new value. 4. Restart the CBA with the service cba restart Linux command. NOTE Increasing the number of items in each processed wizard request may negatively affect the overall system performance. Why can't I see the decrypted SSL traffic? First check whether there is any SSL (undecrypted) traffic detected. Select Devices and Connections ➤ Verify quality of monitored traffic, and select the Application Traffic Categories tab. If there are no results under SSL for a selected trace, it may indicate one of the following: • There are no SSL data in the recorded traffic trace, which may be due to insufficient trace length. For the SSL data to appear in the Guided Configuration perspective, the trace must contain the session beginning together with the SSL key handshake. • Your SSL port number is something other than 443, so change the configuration settings for Guided Configuration. For more information, see SSL Settings for the CBA Agent and RUM Console Server Connection in the Data Center Real User Monitoring Administration Guide. • Your SSL key configuration is invalid. Why is integration with Dynatrace Synthetic Monitoring not working? First, verify whether the Dynatrace connection settings are correct. For more information, see Configuring the DPN Connection in RUM Console in the Data Center Real User Monitoring Administration Guide. Remember that the only Dynatrace tests that are imported to DC RUM are active backbone tests. If your test definitions are of a different type, they will not be downloaded to DC RUM. Also note that to integrate Dynatrace and DC RUM performance measurements, you must have traffic traces with data corresponding to Dynatrace test definitions. If, after importing Dynatrace test definitions to DC RUM, no matching URLs are found, it may mean that the trace is too short and does not contain the matching data. The RUM Console uses too much memory. How can I solve the problem? You can control the amount of used memory in several ways: • Disable the automatic trace recording. For more information, see Capturing Traffic Traces in the Data Center Real User Monitoring Web Application Monitoring User Guide. • Disable the Guided Configuration connection on some of your AMDs. For more information, see Adding an AMD to Devices List in the Data Center Real User Monitoring Web Application Monitoring User Guide. • Reset the automatically recorded trace. Use this option carefully, because resetting the trace will cause all of the previously gathered statistics to be lost. For more information, see Capturing Traffic Traces in the Data Center Real User Monitoring Web Application Monitoring User Guide. Data Center Real User Monitoring SSL Monitoring Administration Guide 65 Chapter 4 ∙ Tuning Configuration and Troubleshooting Problems • Restart the Dynatrace RUM Console service using the Windows services.msc utility. 1. Select Start ➤ Run. 2. Type the services.msc utility name in the Open box. 3. Click OK. 4. On the list of the running services, right-click the Dynatrace RUM Console service and select Restart from the context menu. Why only one out of, for example two, web monitoring enabled AMDs are collecting the monitoring data? This issue appears when Linux is not configured properly. Specifically, the hostname configuration. The hostname of the machine must be mapped to either the localhost or to the machine's public IP address. To map the hostname perform the following steps: 1. Edit /etc/hosts file and make sure it looks similarly to this: #/etc/hosts # Do not remove the following line, or various programs # that require network functionality will fail. 127.0.0.1 localhost.localdomain localhost xxx.xxx.xxx.xxx servername.hummy.org servername someothernames 2. Edit /etc/sysconfig/network and change the value there: NETWORKING=yes HOSTNAME=servername NISDOMAIN=hummy.org GATEWAY=192.168.1.1 3. Restart the network: /etc/init.d/network restart 4. For these changes to take effect, either restart the machine or use the following command: echo servername >/proc/sys/kernel/hostname echo hummy.org >/proc/sys/kernel/domainname This command automatically loads the new hostname into memory. 66 Data Center Real User Monitoring SSL Monitoring Administration Guide APPENDIX A SSL-Related rcon Commands You can use the AMD console rcon to check on the operation of the decryption mechanism. SSLDECR CERTS Command SSLDECR CERTS writes seen server public key certificates to files in “.der” format in a specified directory. The certificates written are those seen since the last AMD restart, either for a specified server or for all servers. SSLDECR CERTS IPaddress:port “path” Where: IPaddressAn optional parameter giving the IP address of the server for which the certificates should be written. If no server is specified, the certificates written are for all servers seen in traffic. port An optional parameter giving the port number of the server for which the certificates should be written. This parameter can be supplied only if the IP address of the server is also specified. “path” The absolute path of the directory in which the files should be created. Note that the quotation marks around the path are necessary. Data Center Real User Monitoring SSL Monitoring Administration Guide 67 Appendix A ∙ SSL-Related rcon Commands NOTE Because of folder access permissions, those rcon commands that produce output files must use designated folders only. When specifying an output file path as a parameter to an rcon command, provide paths pointing to /var/spool/adlex/rtm or /tmp. It is recommended that, especially for larger output files, the former (spool folder) is used, where sufficient space should be available. For example: tcpdump 10000 "/var/spool/adlex/rtm/tcpdump.txt" ssldecr certs "/usr/tmp/certs.txt" Note that this limitation applies to files created by rcon commands internally, and not to redirected screen output. Redirected output can be stored in any suitable folder, subject to your current user permissions, though it is also recommended that the spool or tmp folders be used for this purpose. Output The command lists the certificate files it has created. Example >$ ssldecr certs "/certs" Wrote 713 bytes to /certs/cert_50.0.0.9:443_1.der Wrote 713 bytes to /certs/cert_50.0.0.8:443_1.der Wrote 713 bytes to /certs/cert_50.0.0.11:443_1.der Wrote 713 bytes to /certs/cert_50.0.0.10:443_1.der Wrote 713 bytes to /certs/cert_50.0.0.13:443_1.der Wrote 713 bytes to /certs/cert_50.0.0.12:443_1.der Wrote 713 bytes to /certs/cert_50.0.0.1:443_1.der Wrote 713 bytes to /certs/cert_50.0.0.0:443_1.der Wrote 713 bytes to /certs/cert_50.0.0.15:443_1.der Wrote 713 bytes to /certs/cert_50.0.0.14:443_1.der Wrote 713 bytes to /certs/cert_50.0.0.3:443_1.der Wrote 713 bytes to /certs/cert_50.0.0.2:443_1.der Wrote 713 bytes to /certs/cert_50.0.0.17:443_1.der Wrote 713 bytes to /certs/cert_50.0.0.16:443_1.der Wrote 713 bytes to /certs/cert_50.0.0.5:443_1.der Wrote 713 bytes to /certs/cert_50.0.0.4:443_1.der Wrote 713 bytes to /certs/cert_50.0.0.19:443_1.der Wrote 713 bytes to /certs/cert_50.0.0.18:443_1.der Wrote 713 bytes to /certs/cert_50.0.0.7:443_1.der Wrote 713 bytes to /certs/cert_50.0.0.6:443_1.der 20 certificates dumped SSLDECR HELP Command SSLDECR HELP displays help information for the SSLDECR family of commands. SSLDECR HELP Output The command outputs help information for the SSLDECR family of commands. 68 Data Center Real User Monitoring SSL Monitoring Administration Guide Appendix A ∙ SSL-Related rcon Commands Example >$ SSLDECR HELP SSLDECR HELP - display this help message SSLDECR CERTS [IP[:port]] "path" - write server certificates to files in directory "path" SSLDECR NAMES enable|disable - enable/disable logging of Distinguished Name content SSLDECR LOGLEVEL ALL - log SSL diagnostic information for all sessions SSLDECR LOGLEVEL DISABLE - turn off logging of SSL diagnostic information SSLDECR LOGLEVEL ERROR - log SSL diagnostic information for sessions with errors SSLDECR LOGLEVEL STATUS - display current level of logging SSL diagnostic information SSLDECR LOGLEVEL Command SSLDECR LOGLEVEL sets diagnostic tracing level to log SSL session history in /var/log/adlex/rtm.log. SSLDECR LOGLEVEL level Where level can be one of the following: DISABLE Turn off logging of SSL diagnostic information. No SSL diagnostic information is written to the log file. ERROR Log SSL diagnostic information only for sessions with errors. ALL Log SSL diagnostic information for all sessions. EVENTS Display detailed information about every event that will be logged. NOTE Since this option generates large log files, it is recommended that it should not be enabled in production environment. Output The command outputs the new level of diagnostic logging of SSL information. Example >$ SSLDECR LOGLEVEL STATUS SSL log turned on for all sessions >$ SSLDECR LOGLEVEL DISABLE SSL log turned off >$ SSLDECR LOGLEVEL STATUS SSL log turned off >$ SSLDECR LOGLEVEL ERROR SSL log turned on for sessions with errors >$ SSLDECR LOGLEVEL STATUS SSL log turned on for sessions with errors >$ SSLDECR LOGLEVEL ALL SSL log turned on for all sessions Data Center Real User Monitoring SSL Monitoring Administration Guide 69 Appendix A ∙ SSL-Related rcon Commands >$ SSLDECR LOGLEVEL EVENTS SSL log turned on for all sessions SSLDECR NAMES Command SSLDECR NAMES enables or disables logging of Distinguished Name information from observed client and server certificates. SSLDECR NAMES option Where option can be: ENABLE to enable logging of Distinguished Name information. DISABLE to disable logging of Distinguished Name information. NOTE if there is a very large number of clients, disabling logging of DN information will improve AMD performance. Output The message output by the command confirms that logging of Distinguished Names has been enabled or disabled, as appropriate. Example >$ SSLDECR NAMES DISABLE cert DN cache disabled >$ SSLDECR NAMES ENABLE cert DN cache enabled SHOW SSLDECR CERTS Command SHOW SSLDECR CERTS lists full text of all observed server certificates. The information displayed applies to the period of time since the last reset of the device. SHOW SSLDECR CERTS Output The command outputs the full text of each seen certificate. Example Certificates: Certificate: Data: Version: 3 (0x2) Serial Number: 0 (0x0) Signature Algorithm: md5WithRSAEncryption Issuer: CN=OpenSSL Test Certificate Validity Not Before: Aug 29 15:33:18 2006 GMT Not After : Aug 29 15:33:18 2007 GMT 70 Data Center Real User Monitoring SSL Monitoring Administration Guide Appendix A ∙ SSL-Related rcon Commands Subject: CN=OpenSSL Test Certificate Subject Public Key Info: Public Key Algorithm: rsaEncryption RSA Public Key: (1024 bit) Modulus (1024 bit): 00:cc:c7:83:e3:6e:62:38:d1:f1:63:5a:fe:54:29: 96:58:5a:e2:59:3e:9c:12:7e:bf:ff:4f:dc:2e:3d: d9:83:37:0a:79:da:d8:a0:aa:f8:83:d0:98:a9:b6: 1b:f0:f1:91:8c:9d:70:a1:bf:8b:93:98:ee:d4:ef: 09:b6:d4:5f:19:ee:e6:40:aa:b0:42:a2:5b:03:56: 1d:f2:3e:59:85:5c:7e:87:fa:21:5f:43:62:cf:3d: 32:fc:99:1a:49:33:b9:8b:f7:9d:e3:da:aa:f6:91: 91:32:c8:70:3a:3f:e4:44:88:4b:82:92:7f:1d:2c: 6b:6e:eb:a3:cc:20:7f:09:a7 Exponent: 65537 (0x10001) X509v3 extensions: X509v3 Subject Key Identifier: A2:57:FD:29:37:C9:1C:72:45:21:81:72:AE:71:31:CB:9E:BA:F8:CC X509v3 Authority Key Identifier: keyid:A2:57:FD:29:37:C9:1C:72:45:21:81:72:AE:71:31:CB:9E:BA:F8:CC DirName:/CN=OpenSSL Test Certificate serial:00 X509v3 Basic Constraints: CA:TRUE Signature Algorithm: md5WithRSAEncryption 74:8b:17:f9:fc:2c:16:a2:a7:b5:9d:2d:5d:1d:c4:f9:23:0c: f3:01:93:fe:98:ae:a8:75:d5:ff:15:72:14:98:7d:bc:cf:32: 38:8e:fe:38:fc:f6:77:fe:d5:c4:df:78:fd:8d:8e:c2:e4:11: 4f:2f:40:cb:32:c9:c7:95:73:b9:0c:49:a4:c8:59:a7:40:77: 5d:94:86:17:9e:2c:76:b7:fd:2f:55:26:ba:f3:b6:26:1f:f6: a2:83:41:59:59:59:f1:07:45:02:b0:a4:fb:cf:4b:12:8a:a3: e6:ca:e4:fd:3a:3a:55:0c:d8:cc:e8:9a:22:03:64:7a:0a:9d: 2e:0b SHOW SSLDECR CIPHERS Command SHOW SSLDECR CIPHERS displays information on the supported and unsupported cipher suites and statistics on cipher suite usage. The statistical information displayed applies to the period of time since the last reset of the device. SHOW SSLDECR CIPHERS Output The output lists cipher suites one per line. The list entitled SSL cipher-suites status lists all cipher suites known to the AMD and the list entitled ignored cipher-suites gives cipher suites that have been observed but have not been identified by the AMD. In the list of known cipher suites, the following designations are used: + Denotes supported suites. - Denotes unsupported suites. * Denotes conditionally supported suites, that is suites supported for key size not bigger than a defined upper limit. id The cipher suite identification represented in hexadecimal code. kex The key exchange algorithm. sig The authentication algorithm. enc The private key encryption algorithm. dig The digest algorithm. Data Center Real User Monitoring SSL Monitoring Administration Guide 71 Appendix A ∙ SSL-Related rcon Commands ref The number of times the cipher was observed. In the ignored cipher-suites list, the entry before the colon gives the cipher suite identification represented as a hexadecimal value (this corresponds to the id column in the first list), and the entry after the colon is the number of times the cipher was observed (this corresponds to the ref column in the first list). Example >$ SHOW SSLDECR ciphers SSL cipher-suites status: - UNKNOWN id=00 kex=UNKNOWN sig=UNKNOWN enc=MD5 + NULL-MD5 + NULL-SHA * EXP-RC4-MD5 + RC4-MD5 + RC4-SHA - EXP-RC2-CBC-MD5 - IDEA-CBC-SHA * EXP-DES-CBC-SHA + DES-CBC-SHA + DES-CBC3-SHA - EXP-DH-DSS-DES-CBC-SHA - DH-DSS-DES-CBC-SHA - DH-DSS-DES-CBC3-SHA - EXP-DH-RSA-DES-CBC-SHA - DH-RSA-DES-CBC-SHA - DH-RSA-DES-CBC3-SHA - EXP-EDH-DSS-DES-CBC-SHA - EDH-DSS-DES-CBC-SHA - EDH-DSS-DES-CBC3-SHA - EXP-EDH-RSA-DES-CBC-SHA - EDH-RSA-DES-CBC-SHA - EDH-RSA-DES-CBC3-SHA - EXP-ADH-RC4-MD5 - ADH-RC4-MD5 - EXP-ADH-DES-CBC-SHA - ADH-DES-CBC-SHA - ADH-DES-CBC3-SHA * EXP1024-RC4-MD5 - EXP1024-RC2-CBC-MD5 * EXP1024-DES-CBC-SHA - EXP1024-DHE-DSS-DES-CBC-SHA * EXP1024-RC4-SHA - EXP1024-DHE-DSS-RC4-SHA - DHE-DSS-RC4-SHA + AES128-SHA - DH-DSS-AES128-SHA - DH-RSA-AES128-SHA - DHE-DSS-AES128-SHA - DHE-RSA-AES128-SHA - ADH-AES128-SHA + AES256-SHA - DH-DSS-AES256-SHA - DH-RSA-AES256-SHA - DHE-DSS-AES256-SHA - DHE-RSA-AES256-SHA - ADH-AES256-SHA ignored cipher-suites: 0000222B:123 00000211:2 id=01 id=02 id=03 id=04 id=05 id=06 id=07 id=08 id=09 id=0A id=0B id=0C id=0D id=0E id=0F id=10 id=11 id=12 id=13 id=14 id=15 id=16 id=17 id=18 id=19 id=1A id=1B id=60 id=61 id=62 id=63 id=64 id=65 id=66 id=2F id=30 id=31 id=32 id=33 id=34 id=35 id=36 id=37 id=38 id=39 id=3A dig=NONE ref=0 kex=RSA sig=RSA enc=UNKNOWN dig=MD5 ref=0 kex=RSA sig=RSA enc=UNKNOWN dig=SHA ref=0 kex=RSA_EXP sig=RSA enc=RC4 dig=MD5 ref=0 kex=RSA sig=RSA enc=RC4 dig=MD5 ref=0 kex=RSA sig=RSA enc=RC4 dig=SHA ref=14218 kex=RSA_EXP sig=RSA enc=RC2 dig=SHA ref=0 kex=RSA sig=RSA enc=IDEA dig=SHA ref=0 kex=RSA_EXP sig=RSA enc=DES dig=SHA ref=0 kex=RSA sig=RSA enc=DES dig=SHA ref=0 kex=RSA sig=RSA enc=DES3 dig=SHA ref=7474 kex=DH sig=DSS enc=DES dig=SHA ref=0 kex=DH sig=DSS enc=DES dig=SHA ref=0 kex=DH sig=DSS enc=DES3 dig=SHA ref=0 kex=DH sig=RSA enc=DES dig=SHA ref=0 kex=DH sig=RSA enc=DES dig=SHA ref=0 kex=DH sig=RSA enc=DES3 dig=SHA ref=0 kex=DH sig=DSS enc=DES dig=SHA ref=0 kex=DH sig=DSS enc=DES dig=SHA ref=0 kex=DH sig=DSS enc=DES3 dig=SHA ref=0 kex=DH sig=RSA enc=DES dig=SHA ref=0 kex=DH sig=RSA enc=DES dig=SHA ref=0 kex=DH sig=RSA enc=DES3 dig=SHA ref=0 kex=DH sig=NONE enc=RC4 dig=MD5 ref=0 kex=DH sig=NONE enc=RC4 dig=MD5 ref=0 kex=DH sig=NONE enc=DES dig=MD5 ref=0 kex=DH sig=NONE enc=DES dig=MD5 ref=0 kex=DH sig=NONE enc=DES3 dig=MD5 ref=0 kex=RSA_EXP sig=RSA enc=RC4 dig=MD5 ref=0 kex=RSA_EXP sig=RSA enc=RC2 dig=MD5 ref=0 kex=RSA_EXP sig=RSA enc=DES dig=SHA ref=0 kex=DH sig=DSS enc=DES dig=SHA ref=0 kex=RSA_EXP sig=RSA enc=RC4 dig=SHA ref=0 kex=DH sig=DSS enc=RC2 dig=SHA ref=0 kex=DH sig=DSS enc=RC4 dig=SHA ref=0 kex=RSA sig=RSA enc=AES-128-CBC dig=SHA ref=0 kex=DH sig=DSS enc=AES-128-CBC dig=MD5 ref=0 kex=DH sig=RSA enc=AES-128-CBC dig=MD5 ref=0 kex=DH sig=DSS enc=AES-128-CBC dig=MD5 ref=0 kex=DH sig=RSA enc=AES-128-CBC dig=MD5 ref=0 kex=DH sig=RSA enc=AES-128-CBC dig=MD5 ref=0 kex=RSA sig=RSA enc=AES-256-CBC dig=SHA ref=0 kex=DH sig=DSS enc=AES-256-CBC dig=MD5 ref=0 kex=DH sig=RSA enc=AES-256-CBC dig=MD5 ref=0 kex=DH sig=DSS enc=AES-256-CBC dig=MD5 ref=0 kex=DH sig=RSA enc=AES-256-CBC dig=MD5 ref=0 kex=DH sig=RSA enc=AES-256-CBC dig=MD5 ref=0 SHOW SSLDECR HELP Command SHOW SSLDECR HELP displays help information for the SHOW SSLDECR family of commands. 72 Data Center Real User Monitoring SSL Monitoring Administration Guide Appendix A ∙ SSL-Related rcon Commands SHOW SSLDECR HELP Output The command outputs help information for the SHOW SSLDECR family of commands. Example >$ SHOW SSLDECR HELP SHOW SSLDECR HELP - display this help message SHOW SSLDECR CERTS - list full text of all observed certificates SHOW SSLDECR CIPHERS - displays information on the supported and unsupported cipher suites SHOW SSLDECR NAMES - display Distinguished Name content for all observed client and server certificates SHOW SSLDECR KEYS - display summary information for all private keys defined in configuration SHOW SSLDECR LOGLEVEL - display current level of logging SSL diagnostic information SHOW SSLDECR SERVERS - display summary information for all SSL servers defined in configuration SHOW SSLDECR STATUS - show general information about SSL decryption status SHOW SSLDECR KEYS Command SHOW SSLDECR KEYS displays summary information for all private keys listed in the AMD configuration. The statistical information displayed applies to the period of time since the last reset of the device. SHOW SSLDECR KEYS Output The output consists of one line for each key, with the key name, type, size, and status. For keys that were declared in the configuration (are present on the list of defined keys), but were not successfully read, the type and size are not available. The section ends with a summary line providing information about the total number of keys, the total number of valid keys read successfully, the total number of keys that failed to read, and the number of valid keys matched to certificates. The status value corresponds to one of the cases: • error (syntax error): error when reading key information from the list of configured keys. • error (unsupported type): key incompatible with decrypting engine. • error (reading failed): Reading of a key failed for some reason, such as key file not present or corrupt. • OK (read): The key has been read successfully. • OK (matched): The key has been read and matched to a certificate. Example Configuration for SSL private keys: <key: 0xc, status: type not supported> <key: s1.key, type: file, size: 1024, status: OK (read)> <key: k2key.pem, type: file, size: 2048, status: OK (matched)> Data Center Real User Monitoring SSL Monitoring Administration Guide 73 Appendix A ∙ SSL-Related rcon Commands <key: TT.key, type: file, size: 1024, status: OK (read)> <key: KK.key, status: read failed> <key: openssl.pem, type: file, size: 1024, status: OK (matched)> <key: tt22052.key, status: parse error> Keys total: 7, ok: 4, failed: 3, matched: 2 SHOW SSLDECR LOGLEVEL Command SHOW SSLDECR LOGLEVEL displays current level of logging SSL diagnostic information. This command is equivalent to SSLDECR LOGLEVEL STATUS. SHOW SSLDECR LOGLEVEL Output The following levels of logging can be returned by the command: • SSL log turned off • SSL log turned on for sessions with errors • SSL log turned on for all sessions Example >$ SHOW SSLDECR LOGLEVEL SSL log turned on for all sessions >$ SSLDECR LOGLEVEL DISABLE SSL log turned off >$ SHOW SSLDECR LOGLEVEL SSL log turned off >$ SSLDECR LOGLEVEL ERROR SSL log turned on for sessions with errors >$ SHOW SSLDECR LOGLEVEL SSL log turned on for sessions with errors >$ SSLDECR LOGLEVEL ALL SSL log turned on for all sessions >$ SHOW SSLDECR LOGLEVEL SSL log turned on for all sessions SHOW SSLDECR NAMES Command SHOW SSLDECR NAMES displays Distinguished Name content for all observed client and server certificates. SHOW SSLDECR NAMES Output The command outputs one line per certificate and for each certificate it shows Distinguished Name contents and the number of times the certificate was seen. 74 Data Center Real User Monitoring SSL Monitoring Administration Guide Appendix A ∙ SSL-Related rcon Commands Example >$ SHOW SSLDECR NAMES c:31900536 dn:=GB/S=Berkshire/L=Newbury/O=My Company Ltd> SHOW SSLDECR SERVERS Command SHOW SSLDECR SERVERS displays summary information for all SSL servers defined in configuration. The statistical information displayed applies to the period of time since the last reset of the device. SHOW SSLDECR SERVERS Output For each server, the IP and PORT is displayed with their corresponding certificates. Each server line is followed by a number of certificate lines, each of which corresponds to a certificate sent from this server, if any. A server line provides information about the server IP address and port number, the number of certificates seen for this server, the number of keys used for this server, and analyzer status for this server. The number of certificates for a server can be: • greater than zero and equal to the number of keys, meaning that all needed keys for this server are available (status is positive). • zero, with the number of keys also zero, meaning that no keys were needed for the given server (status is positive). • greater than zero and greater than the number of keys, meaning that a key or keys were missing for this server (status is negative). Each certificate line provides information about the certificate (the Subject field from certificate) and either a key identifier of a matching key or a question mark, if the certificate is not matched to a known key. The server status is concluded with a summary line giving the total number of servers, the total number of keys needed for those servers, the total number of keys found, and the total number for keys missing for those servers. Example <server: 10.10.10.10(443), certs seen: 1, keys used: 1, status: key(s) found> <cert: [/C=US/ST=Michigan/L=Detroit/O=Compuware Corporation/OU=Technology/OU=Hosted by Compuware Corporation/OU=PlatinumSSL SGC], sent: 5275, in progress: 12 key: jira> <cert: [/C=US2/ST=Michigan2/L=Detroit2/O=Compuware Corporation2/OU=Technology2/OU=Hosted by Compuware Corporation2/OU=PlatinumSSL SGC2], sent: 532135, in progress: 8 key: jira2> <server: 20.20.20.20(443), certs seen: 1, keys used: 1, status: key(s) found> <cert: [/C=US2/ST=Michigan2/L=Detroit2/O=Compuware Corporation2/OU=Technology2/OU=Hosted by Compuware Corporation2/OU=PlatinumSSL SGC2], sent: 532135, in progress: 8 key: jira2> <cert: [/C=US3/ST=Michigan3/L=Detroit3/O=Compuware Corporation3/OU=Technology3/OU=Hosted by Compuware Corporation3/OU=PlatinumSSL SGC3], sent: 2275, in progress: 12 key: jira3> Data Center Real User Monitoring SSL Monitoring Administration Guide 75 Appendix A ∙ SSL-Related rcon Commands SHOW SSLDECR STATUS Command SHOW SSLDECR STATUS gives the status information for the decryption engine and lists the statistics of the observed sessions. Internal decryptor diagnostics are also provided. SHOW SSLDECR STATUS SHOW SSLDECR STATUS IP address:port number Output All of the information and statistics given by the command relate to the period of time since the last restart of the device. NOTE Optionally indicating the IP address and the port number of a server limits the output to the specified server. The first section of the output gives status information for the decryption engine. Note the SSL engine mode (native, auto or thread) included in parentheses and statistics of how many private keys have been matched or failed to match. The second section gives session statistics. Note that there are no statistics for “partially decrypted session in progress” that is, for sessions with some errors but for which decryption is still continuing. This is because as soon as there is an error, the decryption process is terminated and the session is counted as “finished”, even though the actual transfer of data may still continue and byte and packet statistics are still counted. Note also the term “reused sessions”. This applies to sessions for which the server agrees to continue using an already established session key from earlier on. This is referred to as a short handshake, as compared to a long handshake when the entire process of establishing an SSL connection is started again. Example >$ SHOW SSLDECR STATUS SSL DECRYPTION STATUS: CONFIGURATION: Engine:openssl(thread) status:OK Keys: recognized=3 not recognized=0 SESSIONS: Total number of sessions=67741 (in progress=29952 finished=37789) SSL protocol version breakdown per number of sessions: supported versions= ssl3.0=21755 tls1.0=0 unsupported versions= ssl2.0=0 tls1.1=0 tls1.2=0 other versions=0 no version info=15743 New sessions=2336 Reused sessions=19419 Finished sessions decrypted with no errors=0 (0% of all finished sessions) Sessions in progress decrypting with no errors=2774 (9% of all sessions in progress) Finished sessions decrypted partially=187 (0% of all finished sessions) with a packet lost during payload data exchange=187 with a corrupted payload data packet=0 with decryption failed during payload data exchange=0 Finished sessions not decrypted=37602 (99% of all finished sessions) with no private key found=0 (new sessions=0 reused sessions=0) with a packet lost during handshake=364 (new sessions=364 reused sessions=0) with a corrupted handshake packet or incorrect handshake sequence=79 (new sessions=79 reused sessions=0) 76 Data Center Real User Monitoring SSL Monitoring Administration Guide Appendix A ∙ SSL-Related rcon Commands with decryption broken during handshake=15 (new sessions=15 reused sessions=0) with unsupported SSL version=0 (ssl2.0=0 tls1.1=0 tls1.2=0 other versions=0) with unsupported SSL feature=0 (unsupported cipher=0 unsupported compression=0 server key exchange=0) reused sessions with no matching master sessions seen before=15740 with incomplete SSL handshake=15511 (new sessions=15723 reused sessions=0) terminated by alert (during handshake=212 during payload data exchange=0) session not seen from the beginning=5681 with other errors=0 RSA DECRYPTOR INTERNAL DIAGNOSTICS: init/init errors (I=)2095/0 finalize/finalize errors (f=)1864/0 cancel/cancel errors =)0/0 parallel curr/avg/max (p=)231/115/231 sessions on hold total/curr/avg/max(h=)0/0/0/0 PMS CACHE INTERNAL DIAGNOSTICS: entries added (a=)10056 (initialized=1823 uninitialized=8209 error=24 ) entries changed =)155 (toInitialized=41 toUninitialized=0 toError=114 ) entries deleted (d=)0 total entries in cache (n=)10056 Optionally, the * parameter can be used in the command to display statistics grouped per server. >$ SHOW SSLDECR STATUS * SSL DECRYPTION STATUS for server 10.10.10.10 port 443: SESSIONS: Total number of sessions=51114 (inProgress=1 Finished=51113) SSL protocol version breakdown per number of sessions: supported versions: ssl3.0=620 tls1.0=28114 tls1.1=0 tls1.2=0 unsupported versions: ssl2.0=0 other versions=0 no version info=22372 Long handshakes=5275 Short handshakes=12288 SessionTkt reused=0 SessionId reused=22255 Finished sessions decrypted with no errors=13767 (26% of all finished sessions) Sessions in progress decrypting with no errors=0 (0% of all sessions in progress) Finished sessions decrypted partially=1292 (2% of all finished sessions) with a packet lost during payload data exchange=1292 with a corrupted payload data packet=0 with decryption failed during payload data exchange=0 terminated by alert during payload data exchange=0 Finished sessions not decrypted=36054 (70% of all finished sessions) with no private key found=0 (new sessions=0 reused sessions=0) with a packet lost during handshake=496 (new sessions=436 reused sessions=60) with a corrupted handshake packet or incorrect handshake sequence=0 (new sessions=0 reused sessions=0) with decryption broken during handshake=0 (new sessions=0 reused sessions=0) with unsupported SSL version=0 (ssl2.0=0 otherVersions=0) with unsupported SSL feature=11171 (unsupported cipher=11171 compression=0 server key exchange=0) reused sessions with no matching master session seen before=2178 with incomplete SSL handshake=97 (new sessions=97 reused sessions=0) terminated by alert during handshake=79 reuse errors when PMS identified with session id=2238, with session ticket=0 session not seen from the beginning=22033 with other errors=0 SSL cipher-suites status: + RC4-MD5 id=04 kex=RSA sig=RSA enc=RC4 + RC4-SHA id=05 kex=RSA sig=RSA enc=RC4 - DH-RSA-DES-CBC-SHA id=0F kex=DH sig=RSA enc=DES dig=MD5 ref=14590 dig=SHA ref=119 dig=SHA ref=4234 SSL DECRYPTION STATUS for server 50.50.50.50 port 443: SESSIONS: Total number of sessions=51114 (inProgress=1 Finished=51113) Data Center Real User Monitoring SSL Monitoring Administration Guide 77 Appendix A ∙ SSL-Related rcon Commands SSL protocol version breakdown per number of sessions: supported versions: ssl3.0=620 tls1.0=28114 tls1.1=0 tls1.2=0 unsupported versions: ssl2.0=0 other versions=0 no version info=22372 Long handshakes=5275 Short handshakes=12288 SessionTkt reused=0 SessionId reused=22255 Finished sessions decrypted with no errors=13767 (26% of all finished sessions) Sessions in progress decrypting with no errors=0 (0% of all sessions in progress) Finished sessions decrypted partially=1292 (2% of all finished sessions) with a packet lost during payload data exchange=1292 with a corrupted payload data packet=0 with decryption failed during payload data exchange=0 terminated by alert during payload data exchange=0 Finished sessions not decrypted=36054 (70% of all finished sessions) with no private key found=0 (new sessions=0 reused sessions=0) with a packet lost during handshake=496 (new sessions=436 reused sessions=60) with a corrupted handshake packet or incorrect handshake sequence=0 (new sessions=0 reused sessions=0) with decryption broken during handshake=0 (new sessions=0 reused sessions=0) with unsupported SSL version=0 (ssl2.0=0 otherVersions=0) with unsupported SSL feature=11171 (unsupported cipher=11171 compression=0 server key exchange=0) reused sessions with no matching master session seen before=2178 with incomplete SSL handshake=97 (new sessions=97 reused sessions=0) terminated by alert during handshake=79 reuse errors when PMS identified with session id=2238, with session ticket=0 session not seen from the beginning=22033 with other errors=0 SSL cipher-suites status: + RC4-MD5 id=04 kex=RSA sig=RSA enc=RC4 dig=MD5 ref=5345 + AES128-SHA id=2F kex=RSA sig=RSA enc=AES-128-CBC dig=SHA ref=2854 - DHE-RSA-AES128-SHA 78 id=33 kex=DH sig=RSA enc=AES-128-CBC dig=MD5 ref=11171 Data Center Real User Monitoring SSL Monitoring Administration Guide APPENDIX B Extracting Web Server Private SSL Keys There are three phases for extracting private keys: 1. Extract the key from the server configuration. 2. Encode the key into PEM format. 3. Decrypt the key's password. Extracting Web Server Private RSA Keys for Apache/OpenSSL Server Applicability This procedure has been tested on: • Apache versions apache-1.3.12-25 and above • openssl-0.9.5a-14 on Red Hat Enterprise Linux 6.2 Extracting the Key from the Server Configuration The Apache Web server already stores its server key in PEM-encoded format. The key is placed in a directory specified in the server configuration file (typically /etc/httpd/conf/httpd.conf) and is defined by the directives SSLCertificateFile or (if the server key is separated from its certificate) SSLCertificateKeyFile. The default location of the file is /etc/httpd/conf/ssl.key. Recoding the Key into PEM Format This is not required, because the key is already in PEM format. Decrypting the Key's Password You can decrypt the key with the openssl command: openssl rsa -in encrypted_key_filename -out decrypted_key_filename You are prompted for a password. Data Center Real User Monitoring SSL Monitoring Administration Guide 79 Appendix B ∙ Extracting Web Server Private SSL Keys Extracting Web Server Private RSA Keys for Microsoft IIS 4.0 Server Applicability This procedure has been tested on IIS 4.0/WinNT4.0 SP6a. Extracting the Key from the Server Configuration To extract the key, you must create a backup copy of your server certificate and the private key as follows: 1. Open Key Manager (from IIS management console or menu). 2. Select the key to export (under WWW) and select Key ➤ Export from the menu. 3. Choose a file (for example, temp.key) and click Finish. Now you have one file with the combined server key file and server certificate and you can extract the key. 4. Open the backup file (in this example, temp.key) in an editor in hexadecimal mode. 5. Find the string “private-key” in the file. 6. Scan back until you find the hex values “30 82”. 7. Write from that position to a new file (for example, tmp.bin). Figure 18. Extracting the Key from the Server Configuration For the above example, issue the following command: dd if=temp.key of=temp.bin bs=1 skip=29 This is because you have to write the new file beginning with the 29th (0x1d) octet. Recoding the Key into PEM Format and Decrypting the Password IIS stores its keys in NET format. To recode it in PEM format, use the following openssl command on the AMD: openssl rsa -inform NET -in tmp.bin -out key.pem You are prompted for a password. If you get an error after entering the password, try adding the -sgckey option to the openssl command. 80 Data Center Real User Monitoring SSL Monitoring Administration Guide Appendix B ∙ Extracting Web Server Private SSL Keys Extracting Web Server Private RSA Keys for Microsoft IIS 5.0 Server Applicability This procedure has been tested on IIS 5.0/Win2kPro SP2. Extracting the key from the server configuration In the 4.0 release of IIS, Key Manager was used to back up server certificates. In the IIS 5.0, Web Server Certificate Wizard replaces Key Manager. Because IIS works closely with Windows, you can use the Certificate Manager tool to export and back up your server certificates. This procedure requires Certificate Manager. If you do not have Certificate Manager installed in the MMC, you will need to install it (see To install Certificate Manager: [p. 81] below) and then go to To back up your server certificate: [p. 81]. If you already have Certificate Manager installed in the MMC, it will point to the correct Local Computer certificate store. In this case, skip directly to the To back up your server certificate: [p. 81] To install Certificate Manager: 1. Open an MMC console and select Add/Remove Snap-in from the Console menu. 2. Click Add. 3. Select Certificate Manager. 4. Click Add. 5. Select the Computer account option. 6. Select the Local Computer option. 7. Click Finish. To back up your server certificate: 1. Locate the correct certificate store. This is typically the Local Computer store in Certificate Manager. 2. Select the certificate in the Personal store. 3. Open the Action menu, point to All tasks, and click Export. 4. In the Certificate Manager Export Wizard, select Yes, export the private key. 5. Accept the wizard default settings and enter a password for the certificate backup file when prompted. CAUTION Do not select Delete the private key if export is successful, because this will disable your current server certificate. Be sure that PKCS12 format is chosen. 6. Use the wizard to export a backup copy of your server certificate. Data Center Real User Monitoring SSL Monitoring Administration Guide 81 Appendix B ∙ Extracting Web Server Private SSL Keys Now you have one file that combines a server key file and a server certificate in PKCS12 format. Recoding and Decrypting the Key into PEM Format To recode the key to PEM format, use the following openssl command on the AMD: openssl pkcs12 -nocerts -in key.pfx -out key.pem -nodes You are prompted for a password. Provide the same password you used during key backup. Extracting Web Server Private RSA Keys for Netscape (Old Format) Netscape stores keys in a database of a proprietary format and does not provide tools for exporting keys to known formats. However, the Netscape database format can be understood by Netscape Navigator 3.x. You will then have to move the database to Netscape 4.x, because 3.x does not have the key export feature. You need: • Netscape Navigator 3.x, • Netscape Communicator 4.x, • OpenSSL, • Server certificate issued for the key we are extracting (it may be the original certificate from the server or a new one signed by OpenSSL). Applicability This procedure has been tested on: • Netscape Communicator 4.08 Eng • Netscape Communicator 4.79 Eng • Netscape Navigator 3.0 Eng • Netscape Proxy 3.0 for WinNT • OpenSSL-0.9.5a-14 for Red Hat 6.2 Recoding and Decrypting the Key into PEM Format The exported key is in PKCS12 format. To re-code it to PEM format use the following openssl command on the AMD: openssl pkcs12 -nocerts -in key.p12 -out key.pem -nodes You are prompted for a password and must provide the same password as during key export under Netscape Communicator. Extracting the key from server configuration 1. 82 If your key database files (from %netscape_home%/alias) are: name-cert5.db and name-key.db, you have an old database format - follow this procedure from step 2. Data Center Real User Monitoring SSL Monitoring Administration Guide Appendix B ∙ Extracting Web Server Private SSL Keys If your key database files (from %netscape_home%/alias) are: name-cert7.db and name-key3.db, you have a new database format. For more information, see Extracting Web Server Private RSA Keys for Netscape (New Format) [p. 84]. 2. Install Netscape Navigator 3.x and Netscape Communicator 4.x in different directories. 3. Delete the files: key.db and cert5.db from the 3.x directory. 4. Start and exit NN 3.x to create a default key and a certificate database. 5. Overwrite the file key.db with the server key database file, which can be found in %netscape_home%/alias. Preserve the name of the file, that is, key.db. 6. Start NN 3.x and set the password (Options ➤ Security Preferences ➤ Passwords ➤ Set Password). CAUTION The password must be the same as the password you used with the key database, on the server. If you make an error during this step, the database will not be usable, though this will not become apparent until later. 7. Do the same as in step 5 but change the password to something else. This way you will verify that the database is properly imported into NN and can be read by NN. If you get an error this might mean that you have mistyped the password in the previous step. Exit NN 3.x. 8. Delete the files cert7.db and key3.db from the NC 4.x user directory (typically %NC_home%/Users/ user_name). 9. Copy the files key.db and cert5.db from the NN 3.x directory into the NC4.x user directory. 10. Start NC 4.x and change the password: To access Security Preferences click the lock icon. Change it again to something else to confirm that it is working correctly. There should be no errors. Exit NC 4.x. Now you have a database imported into NC 4.x. 11. You now need to get a certificate corresponding to the private key. You may be able to use the original server certificate (get it from the server administrator) or create a dummy certificate with OpenSSL (command openssl ca -policy policy_anything -infiles request.csr) based on a certificate-signing request (request.csr) generated on the server for the private key you are exporting. You can also use the Thawte Web page to generate a test certificate. 12. You install the certificate by sending it to the browser as an MIME type application "application/x-x509-user-cert": In the file user_home_directory /.mime.types, under Unix, add the following lines: type=application/x-x509-user-cert \ desc="Cert inst" \ exts="pem" 13. Under Windows, you can add a new MIME type in NC (Edit ➤ Preferences ➤ Navigator ➤ Application) with an appropriate extension and just point the browser at the file. The information you supply is the same as specified above. Data Center Real User Monitoring SSL Monitoring Administration Guide 83 Appendix B ∙ Extracting Web Server Private SSL Keys 14. Save the certificate as file cert.pem and open it in NC 4.x. You should be prompted for the password you last entered to protect the key database. After this, you should see it under Security ➤ Yours. 15. In Security Preferences click export and export the certificate to a file (key.p12). Extracting Web Server Private RSA Keys for Netscape (New Format) Applicability This procedure has been tested on: • iPlanet FastTrack 4.0 for WinNT and 6.0 for Solaris • Netscape Enterprise 4.1 SP5 for Solaris • Netscape Communicator 4.79 Eng • openSSL-0.9.5a-14 for Red Hat Enterprise Linux 6.2 Extracting the Key from Server Configuration 1. Check the names of your key database files. • If your key database files (from %netscape_home%\alias) are name-cert7.db and name-key3.db, you have the new database format and you are reading the right procedure. Go to the next step. • If your key database files (from %netscape_home%\alias) are name-cert5.db and name-key.db, you have the old database format. In this case, do not continue with the procedure you are currently reading. You should instead use the procedure described in Extracting Web Server Private RSA Keys for Netscape (Old Format) [p. 82]. 2. Install Netscape Communicator 4.x; use the Profile Manager to create a user profile. 3. Start and exit Netscape Communicator 4.x to create a default key and certificate database. 4. Delete the file cert5.db from the Netscape Communicator 4.x user directory ( %nc_home%\Users\user_name) 5. Overwrite the file key3.db with the server key database file (it can be found in %netscape_home%\alias\name-key3.db). Retain key3.db as the file name. Overwrite the file cert7.db with the server cert database file (it can be found in %netscape_home%\alias\name-cert7.db). Retain cert7.db as the file name. 6. Under Security Preferences, click Export and export the certificate to a file (key.p12). For a password, provide the password you use to start the Web server from which the key comes. 7. 84 Enter and confirm the export password. Data Center Real User Monitoring SSL Monitoring Administration Guide Appendix B ∙ Extracting Web Server Private SSL Keys Recoding and Decrypting the Key into PEM Format The exported key is in PKCS12 format. To recode it to PEM format, use the following openssl command on the AMD: openssl pkcs12 -nocerts -in key.p12 -out key.pem -nodes You are prompted for a password. Provide the same password you used during key extraction above. Extracting Web Server Private RSA Keys for Zeus Applicability This procedure has been tested on Zeus Web Server v4.0. Extracting the Key from the Server Configuration Zeus already stores its server key in PEM-encoded format. The key is placed in the directory specified in the configuration file (typically %zeushome%/webadmin/conf/ssl_config) and is defined by the directive [instance_name]!private. The default location is %zeushome%/web/ssl/ Recoding the Key into PEM Format This is not required, because the key is already in the PEM format. Decrypting the Key's Password This is not required, because Zeus does not support key password encryption. Extracting SSL Private Keys from an iPlanet Web Server Use the following procedure to extract the Verisign SSL private keys from an iPlanet Web Server to pk12 format. 1. Set up the environment and the current working directory. a. Set the LD_LIBRARY_PATH environment variable to <server_root>/bin/https/lib, for example: export LD_LIBRARY_PATH=$LD_LIBRARY_PATH:/opt/services/iplanet6sp5/bin/https/lib b. Add <server_root>/bin/https/admin/bin to the PATH environment variable, for example: export PATH=$PATH:/opt/services/iplanet6sp5/bin/https/admin/bin c. Locate the pk12util utility, for example: which pk12util /opt/services/iplanet6sp5/bin/https/admin/bin/pk12util Data Center Real User Monitoring SSL Monitoring Administration Guide 85 Appendix B ∙ Extracting Web Server Private SSL Keys d. Locate the certutil utility, for example: which certutil /opt/services/iplanet6sp5/bin/https/admin/bin/certutil e. Change the current working directory to the server root directory, for example: cd /opt/services/iplanet6sp5/ 2. Convert the .db files to PKCS12 format. a. Create a temporary directory, for example: mkdir /tmp/alias b. Change the current working directory to the <sever_root>/alias directory, for example: cd /opt/services/iplanet6sp5/alias c. Copy the .db files to the temporary directory, for example: cp https-pweb1.hap.org-pweb1-key3.db https-pweb1.hap.org-pweb1-cert7.db /tmp/alias d. Change the current working directory to the temporary directory, for example: cd /tmp/alias e. Create symbolic links of the files to be converted, for example: ln -s https-pweb1.hap.org-pweb1-key3.db key3.db ln -s https-pweb1.hap.org-pweb1-cert7.db cert7.db f. Run the certutil utility. The -K option lists the key ID of keys in the key database. A key ID is the modulus of the RSA key or the publicValue of the DSA key. IDs are displayed in hexadecimal (“0x” is not shown). The -d option specifies the database directory containing the certificate and key database files. This example uses the current directory “.” as the directory. certutil -K -d . Enter Password or Pin for "NSS Certificate DB": <0> Server-Cert The converted files reside in the current working directory, /tmp/alias, in this example. 3. Export the SSL certificate and key. Run the pk12util utility, supplying as arguments the directory containing the converted certificate .db file, the name of the export file to create and the certificate name, for example: pk12util -d /tmp/alias -o /tmp/pweb1_certpk12 -n Server-Cert Enter Password or Pin for 'NSS Certificate DB': Enter password for PKCS12 file: Re-enter password: pk12util: PKCS12 EXPORT SUCCESSFUL 86 Data Center Real User Monitoring SSL Monitoring Administration Guide APPENDIX C SSL Support The AMD can analyze traffic encrypted with SSL 3.0, TLS 1.0, TLS 1.1 and TLS 1.2. With the exception of compression, all other elements of the protocol are supported. Analysis can be performed using OpenSSL or any of a number of SSL accelerator cards. SSL Software Support Supported SSL Versions • SSL 3.0 • TLS 1.0 • TLS 1.1 • TLS 1.2 Unsupported Elements of the SSL Protocol • Compression Public Key Cryptography and Key Exchange Algorithm Support Supported: RSA Conditionally supported: RSA exported (depending on the key size. For more information, see Table 3. Cipher Suites Support on the AMD [p. 88].) Unsupported: DSA Diffie-Hellman Fortezza Data Center Real User Monitoring SSL Monitoring Administration Guide 87 Appendix C ∙ SSL Support Supported RSA Keys OpenSSL 1024, 2048, 4096, and 8192 bits in PEM format. nFast accelerator 1024, 2048, and 4096 bits in PEM format. nShield accelerator 1024, 2048, and 4096 bits embedded. NITROX XL FIPS Acceleration Board 1024 and 2048 bits embedded. Sun Crypto Accelerator 6000 1024 and 2048 bits embedded or in PEM format. FIPS 140-2 Level 3 Support FIPS 140-2 Level 3 is supported for the following cards: • NITROX XL FIPS Acceleration Board • nShield • Sun Crypto Accelerator 6000 Supported Symmetric Ciphers • RC2 (40, 56, 128) • RC4 (40, 56, 64, 128) • DES (40, 56) • 3DES (168) • AES (128, 256) Supported Hash Functions • MD5 • SHA1 Cipher Suites Support on the AMD Table 3. Cipher Suites Support on the AMD 88 OpenSSL Cipher Tag Key Exchange Symmetric Encryption Method Message AMD Support Authentication Code EXP-RC4-MD5 RSA_EXP(512) RC4 MD5 Yes* RC4-MD5 RSA RC4 MD5 Yes RC4-SHA RSA RC4 SHA Yes Data Center Real User Monitoring SSL Monitoring Administration Guide Appendix C ∙ SSL Support Table 3. Cipher Suites Support on the AMD (continued) OpenSSL Cipher Tag Key Exchange EXP-RC2-CBC-MD5 RSA_EXP(512) RC2 SHA No IDEA-CBC-SHA RSA SHA No EXP-DES-CBC-SHA RSA_EXP(512) DES SHA Yes* DES-CBC-SHA RSA DES SHA Yes DES-CBC3-SHA RSA DES3 SHA Yes EXP-DH-DSS-DES-CBC-SHA DH DES SHA No DH-DSS-DES-CBC-SHA DH DES SHA No DH-DSS-DES-CBC3-SHA DH DES3 SHA No EXP-DH-RSA-DES-CBC-SHA DH DES SHA No DH-RSA-DES-CBC-SHA DH DES SHA No DH-RSA-DES-CBC3-SHA DH DES3 SHA No EXP-EDH-DSS-DES-CBC-SHA DH DES SHA No EDH-DSS-DES-CBC-SHA DH DES SHA No EDH-DSS-DES-CBC3-SHA DH DES3 SHA No EXP-EDH-RSA-DES-CBC-SHA DH DES SHA No EDH-RSA-DES-CBC-SHA DH DES SHA No EDH-RSA-DES-CBC3-SHA DH DES3 SHA No EXP-ADH-RC4-MD5 DH RC4 MD5 No ADH-RC4-MD5 DH RC4 MD5 No EXP-ADH-DES-CBC-SHA DH DES MD5 No ADH-DES-CBC-SHA DH DES MD5 No ADH-DES-CBC3-SHA DH DES3 MD5 No EXP1024-RC4-MD5 RSA_EXP(1024) RC4 MD5 Yes* EXP1024-RC2-CBC-MD5 RSA_EXP(1024) RC2 MD5 No EXP1024-DES-CBC-SHA RSA_EXP(1024) DES SHA Yes* DES SHA No EXP1024-RC4-SHA RSA_EXP(1024) RC4 SHA Yes* EXP1024-DHE-DSS-RC4-SHA DH RC2 SHA No DHE-DSS-RC4-SHA DH RC4 SHA No EXP1024-DHE-DSS-DES-CBC-SHA DH Symmetric Encryption Method IDEA Message AMD Support Authentication Code Data Center Real User Monitoring SSL Monitoring Administration Guide 89 Appendix C ∙ SSL Support Table 3. Cipher Suites Support on the AMD (continued) OpenSSL Cipher Tag Key Exchange Symmetric Encryption Method AES128-SHA RSA AES-128-CBC SHA Yes AES128-SHA256 RSA AES-128-CBC SHA256 Yes DH-DSS-AES128-SHA DH AES-128-CBC MD5 No DH-RSA-AES128-SHA DH AES-128-CBC MD5 No DHE-DSS-AES128-SHA DH AES-128-CBC MD5 No DHE-RSA-AES128-SHA DH AES-128-CBC MD5 No ADH-AES128-SHA DH AES-128-CBC MD5 No AES256-SHA RSA AES-256-CBC SHA Yes AES256-SHA256 RSA AES-256-CBC SHA256 Yes DH-DSS-AES256-SHA DH AES-256-CBC MD5 No DH-RSA-AES256-SHA DH AES-256-CBC MD5 No DHE-DSS-AES256-SHA DH AES-256-CBC MD5 No DHE-RSA-AES256-SHA DH AES-256-CBC MD5 No ADH-AES256-SHA DH AES-256-CBC MD5 No CAMELLIA128-SHA RSA CAM128-CBC SHA Yes** CAMELLIA256-SHA RSA CAM256-CBC SHA Yes** SEED-SHA RSA SEED-CBC Yes** * Message AMD Support Authentication Code SHA Support for the key size within the imposed limit (see Key exchange column). ** Supported on both RHEL 5 and 6, but for RHEL 5 it depends on the OpenSSL version: Camellia requires ver. 0.9.8c, SEED requires ver. 0.9.8f. SSL Hardware Support The AMD supports a number of SSL accelerator cards. For the list of supported hardware accelerator cards see Tested Cards in the Data Center Real User Monitoring Hardware Recommendations. 90 Data Center Real User Monitoring SSL Monitoring Administration Guide Index Index A KPA accelerator cards 20, 36, 67 NITROX XL FIPS 20 Sun 36 troubleshooting 67 Apache 79 RSA key 79 M C commands 67 SHOW SSLDECR CERTS 67 SHOW SSLDECR CIPHERS 67 SHOW SSLDECR KEYS 67 SHOW SSLDECR SERVERS 67 SHOW SSLDECR STATUS 67 SSLDECR LOGLEVEL 67 contact information 6 Customer Support 6 D diagnostics 56 SSL 56 I initializing 21 NITROX XL FIPS accelerator 21 K Kerberos 45 45 daemon 45 kpadmin utility 45 Microsoft IIS 4.0 80 RSA key 80 Microsoft IIS 5.0 81 RSA key 81 migration 45 SSL analysis 45 monitoring diagnostics 55 N name setting 49 SSL errors 49 nCipher 26, 31, 36 security world 26, 31, 36 nCipher SSL Card 26, 31, 36 Netscape (new) 84 RSA key 84 Netscape (old) 82 RSA key 82 nFast SSL Card 26, 31, 36 NITROX XL FIPS 20–21, 24 configuration of accelerator card 20 initializing 21 logging in and out 24 managing 20 RSA key management 24 Data Center Real User Monitoring SSL Monitoring Administration Guide 91 Index NITROX XL FIPS (continued) security levels 20 nShield Connect 46–47 nShield SSL Card 26, 31, 36 O online support site 6 OpenSSL 11–12, 14, 45, 79 migrating from 45 RSA key 79 R RSA key 11–12, 14, 24, 79–82, 84–85 Apache 79 management on NITROX FIPS 24 Microsoft IIS 4.0 80 Microsoft IIS 5.0 81 Netscape (new) 84 Netscape (old) 82 OpenSSL 79 sample entries 11–12, 14 specifying on AMD 11–12, 14 Zeus 85 RSA keys 79 extracting 79 S security world 26, 31, 36 nCipher 26, 31, 36 SHOW SSLDECR CERTS 70 SHOW SSLDECR CIPHERS 71 SHOW SSLDECR HELP 72 SHOW SSLDECR KEYS 73 SHOW SSLDECR LOGLEVEL 74 SHOW SSLDECR NAMES 74 SHOW SSLDECR SERVERS 75 SHOW SSLDECR STATUS 76 SSL 11–12, 14, 18, 20, 36, 45, 49–50, 56–57, 67, 85, 87, 90 accelerator cards 18 alert codes 50 configuration 18 defining error labels 49 diagnostics 56 engine 18 errors 49 changing default names 49 92 SSL (continued) hardware 90 iPlanet Web Server 85 extracting private keys 85 NITROX XL FIPS 20 OpenSSL 45 RSA private keys 11–12, 14 sessions debug traces 67 software features 87 Sun Crypto accelerator card 36 supported features 87 troubleshooting 57, 67 decryption 67 SSL cards 26, 31, 36 nCipher 26, 31, 36 nFast 26, 31, 36 nShield 26, 31, 36 SSL keys 79 extracting 79 SSL monitoring 9, 11, 46, 49 alternatives 46 configuration on AMD 11 configuration on server side 49 decryption 46 process overview 9 SSLDECR CERTS 67 SSLDECR HELP 68 SSLDECR LOGLEVEL 69 SSLDECR NAMES 70 Sun Crypto Accelerator 36–37, 39, 42–43 additional configuration and administration 42 card management 39 configuration of accelerator card 36 initialization 37 key management 39 known issues 43 reference information 43 T traffic quality 55–56 troubleshooting 62, 67 SSL decryption 67 Z Zeus 85 RSA key 85 Data Center Real User Monitoring SSL Monitoring Administration Guide
Similar documents
Vantage Agentless Monitoring Device Installation Guide
.NET Monitoring, VantageView, Gomez, First Mile, and Gomez Private Network are trademarks or registered trademarks of Compuware Corporation. Cisco is a trademark or registered trademark of Cisco Sy...
More information