adyton
Transcription
adyton
REFERENCE GUIDE ADYTON revolutionary security Transactional services. Powering progress. Legal disclaimer and copyrights The information in this document is subject to change without notice and shall not be construed as a commitment by Atos Worldline S.A./N.V. The content of this document, including but not limited to trademarks, designs, logos, text, images, is the property of Atos Worldline S.A/N.V. and is protected by the Belgian Act of 30.06.1994 related to author’s right and by the other applicable Acts. ADYTON and the Atos Worldline logo are trademarks of Atos Worldline. Linux is a registered trademark of Linus Torvalds, Java is a registered trademark of Sun Microsystems Inc. and ARM is a registered trademark of ARM Limited. The contents of this document can be reproduced by or on behalf of third parties with the prior written consent of Atos Worldline S.A./N.V and following its instructions. Atos Worldline S.A/ N.V. accepts no responsibility for errors and omissions introduced when translating this document. Except with respect to the limited license to download and print certain material from this document for non-commercial and personal use only, nothing contained in this document shall grant any license or right to use any of Atos Worldline S.A./N.V's. proprietary material. While Atos Worldline S.A./N.V. has made every attempt to ensure that the information contained in this document is correct, Atos Worldline S.A./N.V. does not provide any legal of commercial warranty on the document that is described in this specification. The technology is thus provided “as is” without warranties of any kind, expressed or implied, included those of merchantability and fitness for a particular purpose. Atos Worldline S.A./N.V. does not warrant or assume any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, product or processes disclosed. To the fullest extent permitted under applicable law, neither Atos Worldline S.A./N.V. nor its affiliates, directors, employees and agents shall be liable to any party for any damages that might result from the use of the technology as described in this document (including without limitation direct, indirect, incidental, special, consequential and punitive damages, lost profits). These terms shall be governed by and construed in accordance with the laws of Belgium. You irrevocably consent to the jurisdiction of the courts located in Brussels for any action arising from or related to the use of this document. Document information document title ADYTON reference guide security unrestricted last modified 18 July 2013 owner Baudouin Nyssen author Niels Grundtvig Nielsen product version 2.1 © Atos Worldline 2013 REFERENCE GUIDE ADYTON Contents Introduction ............................................................................................................ 1 Design ................................................................................................................ 1 What’s new in this version .................................................................................. 1 ADYTON overview.................................................................................................. 3 ADYTON rack..................................................................................................... 5 Accessories ........................................................................................................ 6 Chip card ...................................................................................................... 6 For standalone installation............................................................................ 6 Cables for rack installation ........................................................................... 6 USB stick (not included) ............................................................................... 6 User Roles............................................................................................................... 7 Administrator ...................................................................................................... 7 Security Officer ................................................................................................... 7 Key custodian ..................................................................................................... 8 Interfaces ................................................................................................................ 9 Display................................................................................................................ 9 Keypad ............................................................................................................. 11 Authentication devices ..................................................................................... 12 Operating ADYTON .............................................................................................. 13 Power up .......................................................................................................... 13 Insert ADYTON in rack ..................................................................................... 13 Remove ADYTON from rack ............................................................................ 14 Initial configuration ........................................................................................... 14 Logging on........................................................................................................ 17 Logging off........................................................................................................ 17 Screensaver mode ........................................................................................... 17 Reboots and availability ................................................................................... 17 Filter ................................................................................................................. 18 Audit trail .......................................................................................................... 18 Warnings .......................................................................................................... 20 Transport and security...................................................................................... 21 PCI SSC ..................................................................................................... 21 Specifications ....................................................................................................... 23 ADYTON module.............................................................................................. 23 Rack ................................................................................................................. 24 Interfaces (ADYTON and rack) ........................................................................ 24 Certification and compliance ............................................................................ 24 i PUBLIC adytonRFGTOC.fm version 2.1 last updated 18/7/13 REFERENCE GUIDE ADYTON Menu tree .............................................................................................................. 25 Keys ................................................................................................................. 25 Users ................................................................................................................ 26 Device .............................................................................................................. 27 Network ............................................................................................................ 28 Status ............................................................................................................... 29 Update.............................................................................................................. 30 Downtime during reboot ............................................................................. 30 Verifying the audit trail with Open SSL .............................................................. 31 ii last updated 18/7/13 PUBLIC version 2.1 adytonRFGTOC.fm REFERENCE GUIDE ADYTON Introduction Secure data transaction systems – including token generation, transaction processing, digital signatures, data protection – are built around a Hardware Security Module (encryption device). With ADYTON Atos Worldline now offers a revolutionary solution. This radically new hardware-based cryptographic accelerator provides unprecedented security, speed and user-friendliness. ADYTON adds a new dimension to the overall security by including three authentication methods: the fingerprint, chip-card and password authentication, all of which are perfectly accessible at the front of the device. ADYTON guarantees dual control for Administrators and Security Officers. Meeting all current international standards such as FIPS 140-2 and PCI HSM, ADYTON is also ready to match future regulatory requirements. Design The styling combines fashion and functional perfection – it is the product of ingenious minds. The housing is aluminium, a perfect heat conductor which allows for passive cooling. Removing the need for active cooling such as a fan means a lower energy footprint, lower noise and higher reliability. ADYTON also hosts the latest technology, like capacitive keys with distinct illumination, a fingerprint-reader, chip-card-reader, USB connectors and a high-resolution colour display. With the robust guide rails on each side, ADYTON easily slides into the ADYTON Rack frame for simple, secure installation in IT-cabinets. This particular rack features two physical locks, covered mounting holes, two hot-swappable power supplies and 1-gigabit LAN connectors. The design quality of the ADYTON has been recognised by awards including: • red dot design award 2012 The red dot is acknowledged as the seal of quality for exceptional product design. • IF award 2013 The iF product design award has been an internationally recognized label for award-winning design for 60 years. The iF brand has become a symbol for outstanding achievements in design. What’s new in this version Version 2.1 includes a new menu option to activate/deactivate SNMP traps, described on page 27. 1 PUBLIC ad_rfg_introduction.fm version 2.1 last updated 18/7/13 REFERENCE GUIDE ADYTON 2 ad_rfg_introduction.fm – empty for double-sided printing – REFERENCE GUIDE ADYTON ADYTON overview The ADYTON front panel integrates a high-resolution colour display, a touch-sensitive keypad, a USB port, a fingerprint reader and a chip-card reader. For more information on the keypad, including the shift/shortcut functions, see Keypad, on page 11. abc def ghi jkl mno pqrs tuv wxyz 1 4 5 8 3 6 A B D E i C F 9 [ 7 2 0 Figure 1. OK Front panel Power and networking connectors are easily accessible whether the ADYTON is used standalone or rack-mounted. 3 PUBLIC ad_rfg_overview.fm version 2.1 last updated 18/7/13 REFERENCE GUIDE ADYTON Clearly visible security stickers let you check the integrity of the unit before mounting it in a rack. 1 7 2 3 6 4 5 Figure 2. Connectors and security stickers 1 Tamper-evident, holographic sticker (second sticker on underside of ADYTON) 2 anti-removal lug 3 power supply socket 4 1Gb Ethernet connection 5 USB B (device) connection 6 ADYTON rack interface 7 Kensington lock point There are two tamper-evident stickers (see Figure 2. Connectors and security stickers, on page 4) on every ADYTON. Every sticker has its own unique security number, and uses an extensive range of holographic techniques including: • • • microtext (for example, the word GENUINE on the crossbar of the A of Atos) 3D and lens effects rainbow colours that change with the viewing angle The stickers are also printed on a special backing, so that any attempt to peel them off or re-use them leaves a visible tear. 4 last updated 18/7/13 PUBLIC version 2.1 ad_rfg_overview.fm ADYTON rack The 19” rack was specifically designed to reach a high security level and fit in standard IT cabinets. The lockable security clips (each with its own key) to either side hold the ADYTON securely in place thanks to its integrated anti-removal lugs. Closed, the security clips hide the fixation points, front plate screws and rack fixing screws. The USB connector on the ADYTON remains available. Figure 3. ADYTON rack with ADYTON – front view, security clips open 1 2 Figure 4. ADYTON rack – back view 1 two 1 Gigabit Ethernet connectors Note: Ethernet IP1 connector is positioned to the RIGHT of Ethernet IP2 connector. 2 two power connectors for redundant, hot-swappable 12V power supply ADYTON is immediately powered up when inserted into the rack To remove a power connector, push the locking lever to the right and pull the connector from its socket. 5 PUBLIC ad_rfg_overview.fm version 2.1 last updated 18/7/13 REFERENCE GUIDE ADYTON Accessories ADYTON chip cards and cables are available as accessories. Chip card Figure 5. Chip card Chip cards are used for • • user authentication storing key components You are recommended to use separate chip cards for user authentication and storage. Every chip card has a unique serial number. For standalone installation • • • 1x power adaptor (Mean Well, model no. GS60A12) input: 100-240VAC, 50/60Hz, 1.4A output: 12V, 5.0 A, max. 60W Cables for rack installation 2 x power cords with IEC 60320 C14 power plugs USB stick (not included) ADYTON supports standard USB sticks formatted as FAT16 and FAT32. 6 last updated 18/7/13 PUBLIC version 2.1 ad_rfg_overview.fm REFERENCE GUIDE ADYTON User roles ADYTON works with only two user roles: Administrators and Security Officers. The minimum requirement is to have two Administrators and two Security Officers (A and B; one per group) enrolled in ADYTON. Dual authentication is required for most operations, but there are also some freely accessible functions such as view settings or performance. When dual authentication is required, the wizards will indicate which user role has to log on. We recommend enrolling more than two users in each group, to make sure back-ups are available. Administrator The Administrator role is used to enrol users (but not security officers) and perform configuration tasks. Administrators are grouped together in one single group, indicated by the icon in the title bar. The title bar also shows the number of logged on Administrators (0-n). After two administrators have logged on, tasks that require dual authentication can be performed without entering the credentials again. The same person may be enrolled both as an Administrator and as a Security Officer, but must set up different accounts (with different user names, fingerprints and chip cards) for each role. The Administrator is also responsible for managing the audit trail; see Audit trail, on page 18. While the ADYTON is being configured, the first two administrator accounts can be set up without logging on. After this, additional administrators can only be enrolled with two administrators logged on. Security Officer The Security Officer role is used for all key management tasks. Security Officer users are divided into group A and B, indicated by the two icons in the title bar. The icon on the left refers to Security Officers A and the icon on the right to Security Officers B. The number of users logged on is indicated in the icons (0-n). Dual authentication means that at least one Security Officer from each group has to be logged on. It is mandatory to use two different security officers (one for each group) to guarantee dual control. The same individual may be enrolled both as an Administrator and as a Security Officer, but must set up different accounts (with different user names) for each role. 7 PUBLIC ad_rfg_roles.fm version 2.1 last updated 18/7/13 REFERENCE GUIDE ADYTON While the ADYTON is being configured, the first two security officer accounts can be set up without logging in. After this, additional security officers can only be enrolled with two security officers logged in; at least one of them must belong to the same group as the new security officer. Key custodian Key custodians are responsible for key components, including their secure storage. Their intervention is required when importing cleartext key components (Load Key) or exporting cleartext key components (Output Key). Key Custodians do not normally need to be enrolled in ADYTON. They operate under the control of the Security Officers (dual control). 8 last updated 18/7/13 PUBLIC version 2.1 ad_rfg_roles.fm REFERENCE GUIDE ADYTON Interfaces Thanks to its well-designed interfaces, using ADYTON is as simple as using a smartphone. • • • • wizards guide the user through each menu menu titles and short menu trees help navigating through the menus icons show the available functions corresponding to a key on the keypad authentication devices are easily accessible and work very fast Display ADYTON uses a high-resolution LCD colour display and a consistent structure for menu screens. Figure 6. Display The display is NOT a touch screen. title bar The title bar contains the title of the active menu, and shows which users are logged on. They are identified by icons on the right-hand end of the title bar. Icons on the left-hand end of the title bar identify the active menu; there is more information on menu icons under Menu tree, on page 25. Table 1 Title bar icons icon description Administrators – the number shows how many administrators are logged on. 1 Security Officers – Left: Security Officer A; Right: Security Officer B. The numbers show how many security officers are logged on in each group. 9 PUBLIC ad_rfg_interfaces.fm version 2.1 last updated 18/7/13 REFERENCE GUIDE ADYTON main window To navigate through the main window use the cursors, shortcut keys or the Back command. To confirm a selection, touch OK. function bar The function bar shows icons for the available functions. Touch the corresponding key or follow the on-screen instructions to perform the function. Table 2 Function bar icons icon description Back to main menu. All other shortcuts are also available when this icon is shown. OK key previous page / one step back left/right cursor (for example, to scroll through keys) up/down cursor alphabetic input, lower case (ASCII keys) alphabetic input, upper case (ASCII keys) numeric input (ASCII keys) hexadecimal input (HEX and numeric keys available) insert ADYTON chip card remove ADYTON chip card place finger on fingerprint reader insert USB device remove USB device 10 last updated 18/7/13 PUBLIC version 2.1 ad_rfg_interfaces.fm Keypad The ADYTON touch-sensitive keypad is made up of: • • • • • • alphanumeric keys (phone-style) HEX keys, also used as shortcut keys cursor keys Shift / Shortcut key backspace / Back key OK key (also for use with checkboxes) abc def ghi jkl mno pqrs tuv wxyz 1 4 5 8 3 6 A B D E i C F 9 [ 7 2 0 OK Figure 7. Keypad Touch Shift/Shortcut to: • • enter an upper-case letter from the alphanumeric keys use a shortcut function (shown in blue) from the HEX keys The Shift/Shortcut key changes from white to blue. After you enter an upper-case letter or touch a shortcut key, the Shift/Shortcut key changes back to white. The following shortcuts are available. Table 3 Shortcut keys normal shifted description A Log off (Exit) Log off users. The Log off menu opens B Information Open the General Information menu and view serial number, owner name, firmware and package name C Main Menu Back to the main menu D View Keys Display the list of security keys currently loaded 11 PUBLIC ad_rfg_interfaces.fm version 2.1 last updated 18/7/13 REFERENCE GUIDE ADYTON Table 3 Shortcut keys (continued) normal shifted description E Network View the network configuration F Performance View the current performance values (for example, commands, used capacity) Back Go back one page / one step OK Select select a radio button; select/clear a checkbox Authentication devices ADYTON offers three authentication devices on the front panel: • Fingerprint reader The thumbprint is probably the most convenient. When enrolling a user, ADYTON will need several passes to read the print completely. Do not change fingers while registering a fingerprint! • Chip-card reader Insert the card with the chip facing to the left. • ASCII keypad Users can enter case-sensitive passwords on the keypad. Note: When enrolling a user you have to define all three authentication tokens. For logging on later, the user only needs to use two of them. 12 last updated 18/7/13 PUBLIC version 2.1 ad_rfg_interfaces.fm REFERENCE GUIDE ADYTON Operating ADYTON ADYTON can be operated as a standalone device on a desktop, or integrated into in ITcabinets with the ADYTON Rack. Table 4 Characteristics standalone Touch rack-mounted to switch on ADYTON one 1Gb Ethernet ADYTON automatically switched on two 1Gb Ethernet power supply via separate 12V adaptor two hot-swappable power supplies (redundant) USB device connector on the side of the module USB device connector on the front of the rack Power up To power up ADYTON in standalone configuration: 1. plug the power supply cable from the adaptor into the power supply socket on ADYTON 2. connect the adaptor to a mains power socket 3. touch the power button on the front panel In rack configuration, ADYTON is powered instantaneously when fully inserted into the rack. Insert ADYTON in rack ADYTON has two guide rails on each side for installing the device in the ADYTON rack. To insert ADYTON into the rack: 1. open the rack doors fully 2. carefully slide the ADYTON into the rack 3. connect the two redundant power supplies You can also connect the power supplies before inserting the ADYTON into the rack. 4. close and lock the doors 13 PUBLIC ad_rfg_operating.fm version 2.1 last updated 18/7/13 REFERENCE GUIDE ADYTON Remove ADYTON from rack To remove ADYTON from the rack: 1. unlock and open the rack doors 2. carefully slide the ADYTON out of the rack 3. close the doors Initial configuration At the first power up, ADYTON will start the initialisation wizard, which will guide you through the process. The initialisation status is indicated by the Wizard icon in the title bar. The first three screens in the initialisation process are: • Welcome screen From any point in the wizard you can go back to this screen by touching Shift/ Shortcuts and then the Main menu shortcut. • General Information screen Displays the serial number, owner name, firmware and installed package. You cannot modify this information, but it may be used for audit purposes (serial number, version). • ADYTON name screen Enter a name with the ASCII-Keys. Use the [Shift]-key for upper case. The setting is displayed in the function bar by ABC or abc If you make a mistake during initialisation, touch Shift/Shortcuts and then the Main menu shortcut to go back to the Welcome screen and start again. Any information you had already entered will be discarded. You cannot go back one step. If you reboot during the initialisation, ADYTON will go to the step where you rebooted. After the first three screens the initialisation wizard guides you through the six steps of the initial configuration. Note: after you configure the network connection or connections, you can complete the ADYTON configuration manually or duplicate the configuration of another ADYTON. 14 last updated 18/7/13 PUBLIC version 2.1 ad_rfg_operating.fm Step 1. Configure network connection Prepare the following information: IP-address, Subnet Mask and Gateway. • Standalone In standalone configuration there is only one Ethernet connector available. The wizard will only guide you through the setup of IP1. When placed in an ADYTON rack, ADYTON will ask you for the IP2 configuration after starting up. • Rack configuration In the rack, ADYTON can use two Ethernet connections (IP1 and IP2). The wizard guides you through the setup of IP1 and IP2. You can now select: ᆦ 0DQXDOO\, to configure the ADYTON manually by continuing with steps 2 to 6 ᆧ &ORQLQJIURPPDVWHU, to duplicate the configuration of another ADYTON as described under 2 Pull configuration, on page 30. Step 2. Enroll user (Administrators) In this step the wizard asks you to enroll at least two administrators. For each administrator, you need: • • an ADYTON chip card an individual who will record a fingerprint and define a password Use at least two different people, to guarantee dual control. Step 3. Configure date/time In this step the wizard prompts you to select the time zone before you set the time and date. • Select the time zone and touch OK. Use the ASCII keys to select a city/country. You can use the cursor keys to scroll through the list, or enter all or part of the name with the alphanumeric keys. The list is refreshed each time you add a letter, to show the nearest match. • Use the ASCII keys to enter the date and time, then touch OK 15 PUBLIC ad_rfg_operating.fm version 2.1 last updated 18/7/13 REFERENCE GUIDE ADYTON Step 4. Enroll user (Security Officers) In this step the wizard asks you to enroll at least two different security officers. You need: • • two ADYTON chip cards two security officers – each of them will record a fingerprint and define a password It is mandatory to use two different security officers (one for group A and group B) to guarantee dual control. Step 5. Load key In this step the wizard asks you if you want to load a key (Yes or No). If you select Yes, you have to select the key usage, put in a key name and enter the key components. Step 6. Update software The wizard asks you if you want to update the software (Yes or No). If you select Yes, be ready to insert the USB storage device with the updates. 16 last updated 18/7/13 PUBLIC version 2.1 ad_rfg_operating.fm Logging on Users only need to log on to ADYTON when prompted. Since most operations require dual authentication, people with the right roles should be present. Logging on requires two of the three authentication tokens: • • • chip card fingerprint password Logging off There are three ways to log off users: • open the User management menu and select 5 Log off user; then select the corresponding user and touch OK to confirm • • use the shortcut to go directly to the Log off menu wait 15 minutes until ADYTON switches into screensaver mode, where ALL users will be logged off automatically Screensaver mode 15 minutes after the last input, ADYTON switches into screensaver mode: • • • • display is OFF keypad illumination is OFF users are LOGGED OFF automatically the power LED (green) remains ON To return to normal mode, tap anywhere on the keypad or touch the power button. Reboots and availability While operating ADYTON, the device remains available for all cryptographic services accessed by the Ethernet ports (host communication). The exception is when the device needs to be rebooted due to a software upgrade: while rebooting, the host needs to set up the ADYTON connection again. Users are always warned in advance before any operation that will require a reboot. Example: a master ADYTON remains 100% available for cryptographic services while it is being cloned. The slave ADYTON continues to deliver cryptographic services during the cloning, unless the software version on the clone and master is different. In this case, cryptographic services will be unavailable from the slave while it reboots at the end of the cloning. When cloning involves a software update on the slave, the operator will be warned about a reboot before starting the cloning. 17 PUBLIC ad_rfg_operating.fm version 2.1 last updated 18/7/13 REFERENCE GUIDE ADYTON Filter The text entry field at the top of the screen is a filter with auto-complete. As you add characters to the field, the filter redefines the list of options to show only words including those characters. Consider the following list of cities: Amsterdam Brussels Frankfurt Antwerp Bucharest Glasgow Athens Budapest Hamburg Barcelona Cardiff Helsinki Berlin Copenhagen Istanbul Bremen Donetsk Kiev Bristol Dublin Melmby • • if you enter B, the list is refreshed to show Barcelona, Berlin, Bremen, Bristol… if you enter en, the list is refreshed to show Athens, Bremen, Copenhagen You can then use the arrow keys to move the selection highlight up and down the list. Audit trail Every change to the configuration of the ADYTON is logged in the audit trail, which is digitally signed by ADYTON to guarantee integrity and authenticity. If the audit trail reaches 90% full, ADYTON is restricted to Export audit trail. The Administrator is warned when the audit trail buffer is 60% full. You can export the audit trail as a delimited text file and read it in a spreadsheet or a text editor: • From the Device menu, select 3 Export audit trail This function copies the complete audit trail to a USB device and resets the audit trail on ADYTON. 18 last updated 18/7/13 PUBLIC version 2.1 ad_rfg_operating.fm • From the Status menu select 5 Audit trail The function copies the complete audit trail to a USB device but does not reset the audit trail on ADYTON or clear the buffer. The screen shows how much of the audit trail buffer is occupied (in %). 19 PUBLIC ad_rfg_operating.fm version 2.1 last updated 18/7/13 REFERENCE GUIDE ADYTON Warnings ! Read this section carefully before deleting administrators or security officers, reverting the ADYTON to default settings, or using the Decommission option. Remember that to continue normal operations, you need: • • at least two security officers, from different groups at least two administrators Deleting security officers – there must always be at least two security officers defined, one security officer group A and one security officer group B – if you delete the security officer from a group with only one member, all keys will be erased. At the initial configuration, you define at least two security officers: one for group A and one for group B. Key management operations always require dual authentication by two security officers, from different groups. If one or other group does not include a security officer, dual authentication is no longer possible and ADYTON will erase all keys. Deleting administrators At the initial configuration, you define at least two administrators. As soon as there is only one administrator defined, ADYTON restarts with the factory default settings. All the configuration information you have entered is lost. Decommission Use this option only at end-of-life, when you no longer require the ADYTON unit. This option destroys all data, keys and software, and the ADYTON will no longer boot up. Back to default settings Use this option only when you want to erase all data you have entered. This option has no effect on software upgrades. After resetting the ADYTON, you will need to run the installation wizard again to set up administrators and security officers. 20 last updated 18/7/13 PUBLIC version 2.1 ad_rfg_operating.fm Transport and security Good practice for secure transport of an ADYTON includes the following: • • • • • log hardware serial number before transport transport rack and ADYTON separately copy the ADYTON audit trail before transport check audit trail after transport check the two tamper evident stickers before and after transport Verify both the authenticity and the integrity of the stickers: see page 4 for more information. • • check hardware serial number after transport boot up the ADYTON to check for tamper alarm The ADYTON has been transported securely if the tamper-evident stickers are OK, the audit trails before and after transport match, and no tamper alarm is given when you boot up the ADYTON. Make a full report after carrying out these checks. PCI SSC To meet PCI SSC requirements, you must work with clear procedures that guarantee the chain of custody at all times. A documented chain of custody must exist to ensure that all cryptographic hardware is controlled from its receipt through its installation and use. This means that it must be clear who has responsibility during all the phases: initial, transport, delivery … For more information, see the on-line document Payment Card Industry (PCI) PIN Security Requirements. 21 PUBLIC ad_rfg_operating.fm version 2.1 last updated 18/7/13 REFERENCE GUIDE ADYTON 22 ad_rfg_operating.fm – empty for double-sided printing – REFERENCE GUIDE ADYTON Specifications Table 5 DEP and ADYTON at a glance DEP ADYTON Movement alarm Yes No Entry of backup key Yes (DMK) Yes (DMK or ABK) Off-line mode Yes No (see note) Connection to port 1000 4000 • • A key backup created on a DEP can be restored on an ADYTON, but an ADYTON backup cannot be used on a DEP. ADYTON off-line mode: local operations have no impact on host connections, except when the ADYTON is rebooted after a software update. See also Reboots and availability, on page 17. ADYTON module general specifications – – tamper-evident, tamper-responsive and tamper-proof design – around 7,000 digital RSA private key and over 10,000 symmetric key transactions per second – – – – host authentication through SSL (optional) colour display, fingerprint reader (FIPS 201), chip-card reader, USB-Host, HEX-keypad push/pull cloning dimensions: 24 cm wide x 7 cm high x 18.5 cm deep power supply 100-240 VAC, 50/60Hz, 1.4A operating conditions – – operating temperature: 0°C – 35°C relative humidity: 10% – 90% (non-condensing) communications – – USB device 1 gigabit LAN connector basic cryptographics – – random generator (SP800-90) ad_rfg_specifications.fm version 2.1 RSA (X9.31 key generation, encrypt/decrypt, sign/verify) 23 PUBLIC last updated 18/7/13 REFERENCE GUIDE ADYTON – – – – – – – ECC (key generation, encrypt/decrypt, sign/verify) (T)DES (encrypt/decrypt, MAC) AES (encrypt/decrypt, MAC) HMAC MD5, SHA1, SHA2, SHA256, SHA512 X509 All functions supported by OpenSSL Crypto Library (www.openssl.org) Rack The optional ADYTON rack farther increases the reliability of the module, and makes it possible to hot-swap ADYTON. • 19" rack for integration in standard IT cabinets – 2U High actual measurements 48 cm wide x 8.8 cm high x 43 cm deep; weight ~15 kg • • • • 2 redundant hot-swappable power supplies (100-240 VAC, 47-63Hz, 1.5-1A) 2 redundant 1Gb Ethernet 2 physical locks (different keys) to prevent unauthorised removal of ADYTON USB device connector on front Interfaces (ADYTON and rack) • • • • • • • Dedicated API – for a list of the complete API, please contact your account manager PKCS #11 JCE (Java Cryptographic Extension) EJBCA IAIK-JCE OpenSSL Engine SNMP Certification and compliance • • • • • • FIPS 140-2 Level 3 certified Hardware FIPS 140-2 Level 4 certified FIPS 140-3 (draft) compliant Fingerprint reader FIPS 201 certified PCI HSM compliant FCC and EC certified, ROHS compliant 24 last updated 18/7/13 PUBLIC version 2.1 ad_rfg_specifications.fm REFERENCE GUIDE ADYTON Menu tree If you are reading this document on-line, click on any command name to see related access rights and brief notes. Users Keys 1 Load key 2 Generate key 3 Delete key 4 View keys 5 Backup keys 6 Restore keys 7 Output key 1 Enroll user 2 View users 3 Modify user 4 Delete user 5 Log off users Network 1 Configure IP1 2 Configure IP2 3 Configure SSL 4 View configuration Status 1 General information 2 Logged on users 3 Date/time 4 Licence 5 Audit trail 6 Performance 7 Footprints Device 1 Set ADYTON name 2 Activate traces 3 Activate SNMP traps 4 Export audit trail 5 Set date/time 6 Back to default settings 7 Decommission ADYTON Update 1 Push configuration 2 Pull configuration 3 Update licence 4 Update software Keys 1 Load key ACCESS Dual security officer Key names are used to identify the key in the server commands. – in DEP compatibility mode (DS2/DS3/DS4), the key name should match the last byte of the key tag – In DS5, key names are free text but must match the names used by the host application 2 Generate key ACCESS Dual security officer 3 Delete key ACCESS Dual security officer 25 PUBLIC ad_rfg_menuTree.fm version 2.1 last updated 18/7/13 REFERENCE GUIDE ADYTON 4 View keys ACCESS No authentication required – – Select a key and touch [OK] to show details – You can also use the shortcut Scroll left/right to view details of the previous/next key. to view the list of keys 5 Backup keys ACCESS Dual security officer or dual administrator The ADYTON backup key is used to create a backup file containing all the keys. – – all keys in ADYTON are backed up: partial/selective backup is not possible it is not possible to make a backup protected by the DEP Master Key (DMK) 6 Restore keys ACCESS Dual security officer or dual administrator Supports the restore of a key backup file (ADYTON or DEP) – when restoring an ADYTON key backup file, use the same key name as used for the creation of the ADYTON key backup file If keys are already present in ADYTON, the Restore operation will execute replace and add. – when restoring a DEP key backup file, enter the correct value of the DEP Master Key (DMK TDES or DMK AES) 7 Output key ACCESS Key Custodian Cleartext key components can be exported on Adyton chip card Key cryptograms (asymmetric keys) can be exported on USB Users 1 Enroll user For initialisation: no authentication required. Afterwards: Dual security officer or dual administrator ACCESS – The first two Administrator accounts can be created without any operator logon. Once two Administrator accounts are in the user account table, additional Administrators can only be enrolled under dual Administrator control. – The first Security Officer Group A account and the first Security Officer Group B account can be created without any operator logon. Additional Security Officers can only be enrolled under dual Security Officer control. When at least one Security Officer from Group A and at 26 last updated 18/7/13 PUBLIC version 2.1 ad_rfg_menuTree.fm least one Security Officer from Group B are logged on, all dual control Security Officer services are available. When all the security officers logged on are from the same group, new security officers can only be enrolled in that group. 2 View users ACCESS No authentication required To show user details, select the user and touch [OK]. Use the arrow keys to scroll. 3 Modify user ACCESS The user in question must be authenticated After authentication (using two tokens) is accepted, the user can update password, fingerprint or chip card. 4 Delete user ACCESS No authentication required To avoid a situation where a user cannot be deleted, no authentication is required. For more details see Warnings, on page 20. 5 Log off users ACCESS No authentication required You can also use the shortcut Device 1 Set ADYTON name ACCESS Dual administrator 2 Activate traces ACCESS Dual administrator All inputs and outputs (server commands) are logged in clear text, even when using SSL. In case of confidential information, procedural actions will be taken to protect the data (for example, cardholder data in case of PCI DSS). 3 Activate SNMP traps ACCESS Dual administrator Toggle between: – Activate SNMP traps; you will need to specify the IP address of the trap receiver – Deactivate SNMP traps 27 PUBLIC ad_rfg_menuTree.fm version 2.1 last updated 18/7/13 REFERENCE GUIDE ADYTON 4 Export audit trail ACCESS Dual administrator The export function copies the audit trail to a USB device as a delimited text file you can read in a spreadsheet or a text editor, together with a digital signature and certificate tree, and resets the audit trail on ADYTON. See Verifying the audit trail with Open SSL, on page 31, for additional information. If the buffer for the audit trail reaches 90% only the Export audit trail function can be performed. 5 Set date/time ACCESS Dual administrator Daylight saving time is automatically applied ! 6 Back to default settings ACCESS No authentication required Deletes all keys and user entered data, but has no effect on date/time settings or software updates. For more details see Warnings, on page 20. ! 7 Decommission ADYTON ACCESS Dual administrator Decommissioning may only be used for an end of life ADYTON. After decommissioning, ADYTON will not boot any more. Undoing this action involves huge costs, due to hardware intervention in a repair environment. For more details see Warnings, on page 20. Network 1 Configure IP1 ACCESS No authentication required 2 Configure IP2 ACCESS No authentication required 3 Configure SSL ACCESS Dual administrator 4 View configuration ACCESS – No authentication required Scroll left/right to view details of other configurations 28 last updated 18/7/13 PUBLIC version 2.1 ad_rfg_menuTree.fm Status 1 General information ACCESS No authentication required 2 Logged on users ACCESS No authentication required To show the details, select the user and touch [OK]. Use the arrow keys to scroll. 3 Date/time ACCESS No authentication required 4 Licence ACCESS No authentication required 5 Audit trail ACCESS No authentication required Copies the audit trail to a USB device as a delimited text file you can read in a spreadsheet or a text editor, together with a digital signature and certificate tree, but does not reset the audit trail on ADYTON. It also shows how much of the audit trail buffer is still free, as a percentage. See Verifying the audit trail with Open SSL, on page 31, for additional information. 6 Performance ACCESS No authentication required Shows the performance in real-time and an estimation of the available capacity – can be used to scale an ADYTON park. 7 Footprints ACCESS No authentication required Shows information such as the number of keys installed, and a checksum based on the key values – can be used to compare installations on different ADYTONs. 29 PUBLIC ad_rfg_menuTree.fm version 2.1 last updated 18/7/13 REFERENCE GUIDE ADYTON Update 1 Push configuration ACCESS Dual administrator Duplicate the configuration of a master ADYTON on one or more clone ADYTONS, by pushing the configuration from master to clones. • the remote ADYTON or ADYTONS must be idle or displaying the main menu before you can start pushing the configuration • if the clone ADYTON needs to reboot after the configuration has been duplicated, you receive a warning 2 Pull configuration ACCESS Dual administrator (remote login) Duplicate the configuration of a (remote) master ADYTON on a clone ADYTON, by pulling the configuration from master to clone. This can also be done by running the initialisation wizard on the slave ADYTON again. • the remote (master) ADYTON must be idle or displaying the main menu before you can start pulling the configuration; you receive a warning if this is not the case • if a clone ADYTON needs to reboot after the configuration has been duplicated, you receive a warning 3 Update licence ACCESS Dual administrator 4 Update software ACCESS Dual administrator ADYTON has to be rebooted at the end of the software update, which causes a short downtime. Downtime during reboot When the ADYTON needs to be rebooted because of a software upgrade, the host needs to set up communications again; this involves a short downtime. See Reboots and availability, on page 17. 30 last updated 18/7/13 PUBLIC version 2.1 ad_rfg_menuTree.fm REFERENCE GUIDE ADYTON Verifying the audit trail with Open SSL Exporting the audit trail from ADYTON puts the following files on the USB stick: files with a fixed name • • AtosRootCa.cer FactIntCa.cer files with a variable name • MmSign.cer, prefixed with the ADYTON serial number: for example 8700C7D4091B415D_MmSign.cer • audit-trail.log, prefixed with the ADYTON serial number and including a timestamp: for example 8700C7D4091B415D_adyton-audit-trail_20130201_114055.log • audit-trail signature, prefixed with the ADYTON serial number and including a timestamp: for example 8700C7D4091B415D_adyton-audit-trail_20130201_114055signature.bin You can use OpenSSL (version 1.0.1c or higher) from a terminal window to verify the signature of the audit trail, as follows. Step 1. convert the three certificates to PEM-format openssl x509 -outform PEM -in AtosRootCa.cer -out AtosRootCa.pem openssl x509 -outform PEM -in FactIntCa.cer -out FactIntCa.pem openssl x509 -outform PEM -in {serial_}MmSign.cer -out {serial_}MmSign.pem} Step 2. Step 3. combine AtosRootCa.pem and FactIntCa.pem into a single file both.pem • on a Windows PC type AtosRootCa.pem FactIntCa.pem > both.pem • on a Linux PC cat AtosRootCa.pem FactIntCa.pem > both.pem verify the certificate tree openssl verify -verbose -CAfile both.pem {MmSign.pem} When verification is successful, the message {MmSign.pem}: OK is displayed. Step 4. calculate hash over audit trail openssl dgst -sha256 -binary < {audit-trail.log} > hash.bin Step 5. verify the audit trail signature 31 PUBLIC ad_rfg_appxAuditOpenSSL.fm version 2.1 last updated 18/7/13 REFERENCE GUIDE ADYTON openssl pkeyutl -verify -in hash.bin -sigfile {audit-trail-signature.bin} -certin -inkey {MmSign.pem} -pkeyopt digest:sha256 -pkeyopt rsa_padding_mode:pss When verification is successful, the message Signature Verified Successfully is displayed. 32 last updated 18/7/13 PUBLIC version 2.1 ad_rfg_appxAuditOpenSSL.fm
Similar documents
ADYTON Reference Guide
keypad, a USB port, a fingerprint reader and a chip-card reader. For more information on the keypad, including the shift/shortcut functions, see Keypad, on page 13.
More information