-
Notifications
You must be signed in to change notification settings - Fork 137
SoftHSM
Currently SoftHSM only works in self-signed CA installation. It doesn’t work in CA installation with externally-signed CA signing certificate due to file permission issues.
To install SoftHSM:
$ dnf install softhsm
It will install the following library:
-
/usr/lib64/pkcs11/libsofthsm2.so
Verify that NSS recognizes the library:
$ modutil -nocertdb -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal PKCS #11 Module uri: pkcs11:library-manufacturer=Mozilla%20Foundation;library-descrip tion=NSS%20Internal%20Crypto%20Services;library-version=3.43 slots: 2 slots attached status: loaded slot: NSS Internal Cryptographic Services token: NSS Generic Crypto Services uri: pkcs11:token=NSS%20Generic%20Crypto%20Services;manufacturer=Mozil la%20Foundation;serial=0000000000000000;model=NSS%203 slot: NSS User Private Key and Certificate Services token: NSS Certificate DB uri: pkcs11:token=NSS%20Certificate%20DB;manufacturer=Mozilla%20Founda tion;serial=0000000000000000;model=NSS%203 2. p11-kit-proxy library name: p11-kit-proxy.so uri: pkcs11:library-manufacturer=PKCS%2311%20Kit;library-description= PKCS%2311%20Kit%20Proxy%20Module;library-version=1.1 slots: 1 slot attached status: loaded slot: SoftHSM slot ID 0x0 token: uri: pkcs11:manufacturer=SoftHSM%20project;model=SoftHSM%20v2 -----------------------------------------------------------
The configuration file is located at:
-
system-wide configuration:
/etc/softhsm2.conf
-
user-specific configuration:
~/.config/softhsm2/softhsm2.conf
See also softhsm2.conf (5).
By default SoftHSM tokens are stored in a folder owned by ods
user and group:
$ ls -ld /var/lib/softhsm drwxr-x---. 3 ods ods 4096 Jun 6 20:03 /var/lib/softhsm $ ls -ld /var/lib/softhsm/tokens drwxrwx--T. 2 ods ods 4096 Nov 5 2018 /var/lib/softhsm/tokens
To let PKI server (which runs as pkiuser
) access SoftHSM tokens, add pkiuser
into ods
group:
$ usermod pkiuser -a -G ods
As pkiuser
, prepare a folder for PKI tokens:
$ mkdir -p /home/pkiuser/.config/softhsm2/tokens
Specify PKI token folder in /home/pkiuser/.config/softhsm2/softhsm2.conf
:
directories.tokendir = /home/pkiuser/.config/softhsm2/tokens
To list SoftHSM tokens for pkiuser
:
$ runuser -u pkiuser -- softhsm2-util --show-slots Available slots: Slot 0 Slot info: Description: SoftHSM slot ID 0x1 Manufacturer ID: SoftHSM project Hardware version: 2.3 Firmware version: 2.3 Token present: yes Token info: Manufacturer ID: SoftHSM project Model: SoftHSM v2 Hardware version: 2.3 Firmware version: 2.3 Serial number: Initialized: no User PIN init.: no Label:
To create a SoftHSM token for pkiuser
:
$ runuser -u pkiuser -- \ softhsm2-util --init-token --label HSM --so-pin Secret.HSM --pin Secret.HSM --free
The token will be created in /var/lib/softhsm/tokens
folder.
To remove a token:
$ runuser -u pkiuser -- \ softhsm2-util --delete-token --token HSM
Alternatively:
$ rm -rf /var/lib/softhsm/tokens/<token ID>
To create NSS database:
$ mkdir nssdb $ certutil -N -d nssdb --empty-password
On some systems it may be necessary to add the SoftHSM module:
$ modutil -dbdir nssdb -add softhsm -libfile /usr/lib64/pkcs11/libsofthsm2.so -force
To list certificates in the token:
$ certutil -L -d nssdb -h HSM -f password.txt Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI HSM:ca_signing u,u,u HSM:sslserver u,u,u
To list keys in the token:
$ certutil -K -d nssdb -h HSM < 1> rsa b0bb70560aed2c6a4880f5c165fb9169f8767e67 ca_signing < 2> rsa e53bdd18f57201bade4625e037d29703c4e0eb7e HSM:sslserver
$ openssl engine pkcs11 -pre MODULE_PATH:/usr/lib/libsofthsm.so -c -t
See also https://developers.yubico.com/YubiHSM2/Usage_Guides/OpenSSL_with_pkcs11_engine.html (replace yubikey with softhsm).
To list certificates:
$ pki --token HSM -c Secret.HSM pkcs11-cert-find Type: X.509 Serial Number: 0x1 Subject DN: CN=CA Signing Certificate,OU=pki-tomcat,O=EXAMPLE Issuer DN: CN=CA Signing Certificate,OU=pki-tomcat,O=EXAMPLE Cert ID: HSM:sslserver Type: X.509 Serial Number: 0x3 Subject DN: CN=localhost.localdomain,OU=pki-tomcat,O=EXAMPLE Issuer DN: CN=CA Signing Certificate,OU=pki-tomcat,O=EXAMPLE
To list keys:
$ pki --token HSM -c Secret.HSM pkcs11-key-find Key ID: HSM:b0bb70560aed2c6a4880f5c165fb9169f8767e67 Type: RSA Algorithm: RSA Key ID: HSM:e53bdd18f57201bade4625e037d29703c4e0eb7e Type: RSA Algorithm: RSA
Tip
|
To find a page in the Wiki, enter the keywords in search field, press Enter, then click Wikis. |