This is a text-only version of the following page on https://raymii.org:
---
Title : Get started with the Nitrokey HSM or SmartCard-HSM
Author : Remy van Elst
Date : 19-06-2016
Last update : 20-06-2021
URL : https://raymii.org/s/articles/Get_Started_With_The_Nitrokey_HSM.html
Format : Markdown/HTML
---
This is a guide to get started with the Nitrokey HSM (or SmartCard-HSM). It
covers what a HSM is and what it can be used for. It also goes over software
installation and initializing the device including backups of the device and
keys. Finally we do some actual crypto operatons via pkcs11, OpenSSH, Apache and
OpenSSL. We also cover usage in Thunderbird (S/MIME), Elementary Files (EF), a
Web cluster with Apache and mod_nss and the decryption of the keys.
Recently I removed all Google Ads from this site due to their invasive tracking, as well as Google Analytics. Please, if you found this content useful, consider a small donation using any of the options below:
I'm developing an open source monitoring app called Leaf Node Monitoring, for windows, linux & android. Go check it out!
Consider sponsoring me on Github. It means the world to me if you show your appreciation and you'll help pay the server costs.
You can also sponsor me by getting a Digital Ocean VPS. With this referral link you'll get $100 credit for 60 days.
![][2]
> The Nitrokey HSM in a sealed package
![][3]
> The Nitrokey HSM and the SmartCard-HSM
![][4]
> The SmartCard-HSM
### Changelog
#### 2021-06-20
Jan-Piet Mens has written an article on using the HSM with OpenSSH
and EC keys. When I wrote this article, OpenSSH `PKCS#11` had no
support, he has figured out how to get it working. It does involve
compiling your own (newer) OpenSSH build. [Article is here: https://jpmens.net/2021/06/16/ssh-with-a-smartcard-hsm/](https://jpmens.net/2021/06/16/ssh-with-a-smartcard-hsm/).
### What is an HSM (Hardware Security Module)
A Hardware Security Module, HSM, is a device where secure key material is
stored. This private data only be accessed by the HSM, it can never leave the
device. Most HSM devices are also tamper-resistant. This means that when opened,
moved or otherwise (software) tampered with, they wipe the key material. HSM's
come in a variety of formfactors, ranging from SmartCards and small USB devices,
to full size PCI cards and even 19" rackmountable server-like devices. The
difference between all those devices is speed and storage capacity. Most
commercial HSM's are certified to the [FIPS-140-2][5] standard.
![][6]
> An Eracom HSM PCI card
Since the private key material never leaves the device, all crypto operations
are done on the device as well. The software usually communicates via
[PKCS#11][7], sometimes named `Cryptoki`. PKCS#11 is a software API for
accessing cryptographic hardware like smart cards or HSM. PKCS#11 is NOT a
hardware standard or hardware interface. PKCS#15 is a format of on-card
structures that defines a "filesystem layout" for smart cards. PKCS#15 does not
define how those structures are generated or written to the card. `OpenSSL`
supports this, as well as CA software like `Dogtag/Redhat Certificate System`
and `EJBCA` by using a driver/module. The software doesn't use the actual key
files themselves but asks the device to do the operation. For example, the
software asks the HSM to sign this data with the private key and the HSM returns
the signed data. It can also encrypt and decrypt data using the keys. In most
HSM's you have one or more so called `slots`. Each slot can have a keypair, RSA,
EC, DSA, depending on the software on the HSM.
![][8]
> An Ultimaco HSM device
For example, when you [generate a certificate for your website with OpenSSL][9]
you get both a private key and a certificate. The latter might also be called
the public key (RSA). By using the public key, others can verify that the
connection is signed and encrypted with the private key. The server software,
Apache for example, uses the two files directly to do the crypto. Now, when a
HSM is used, the webserver has a driver loaded and asks the HSM to do the
operation (signing, encrypting) instead of doing it itself. It uses the data the
HSM returned, and thus never has access to the private key.
![][10]
> An SafeNet Luna PCI 7000 HSM
All major Certificate Authorities use HSM's to store their private keys. By
doing so, they make sure the private keys used to sign certificates never get
stolen or leak out. [Let's Encrypt][11] uses Gemalto HSM's. I've worked at a
dutch certificate authority where [Safenet Protectserver][12] devices were used.
Actually, Eracom Protectserver, before they got bought up, then Safenet
Protectserver. For this dutch CA, it was required to store keying material in an
HSM by the CA/Browser forum and the [Staat Der Nederlanden CA hierarchy,
PKIOverheid][13]. A company doing public traffic transaction management (OV
Chipkaart) uses devices by Thales, [nShield HSM's][14].
![][15]
> An SafeNet Luna 19" rack model HSM
As you can see on the pictures, most HSM's have a COM port. These COM ports can
be used to attach a smartcard reader. Most HSM's offer the option to backup the
keying material inside the HSM to a smartcard.
![][16]
> An Omnikey 3121 USB Smartcard reader
These backups are made in such a way that only another HSM, often only the same
type of HSM device, can import these keys with a special password. The Safenet
Protectservers called this a Transport Key, which was a long (32 bit) password
used to export and import the key.
### Nitrokey and SmartCard HSM
![][17]
> The Nitrokey HSM plugged into my ThinkPad
The [Nitrokey HSM][18] is an open hardware and open software device. It is a USB
version of the [SmartCard-HSM][19]. Both the [SmartCard-HSM][20] as the
[Nitrokey HSM][21] have sources available and are fully supported by the
[OpenSC][22] project.
The Nitrokey is as far as I know one of the few fully open source devices. All
the big HSM's I've used were either under NDA or completely closed source. In my
opinion a device like this can only be secure when they are open source. The
device supports up to 60 ECC GF(p) 256-bit keys and up to 48 RSA 2048-bit keys.
The device came in a sealed bag. The bag has only the device in it and a link to
[www.nitrokey.com/start][23] printed on it. The size is about that of an AA
battery in height and around 1.5 cm width. It is black, the back has the FCC and
CE logo's printed in white and the front has the Nitrokey logo and the text
"Nitrokey HSM" printed. The device feels like a quality product and is very
sturdy. Inserting the device in a USB port also keeps it secure and still, it
all fits very well. Not loose or wiggly at all. When the device is inserted a
red LED blinks once.
Do note that I'm not sponsored nor endorsed by Nitrokey or CardContact. [If you
like this article, consider sponsoring me by trying out a Digital Ocean VPS.
With this link you'll get a $5 VPS for 2 months free (as in, you get $10
credit). (referral link)][1]
### Software installation
On Arch Linux you need to install the following packages:
pacman -Sy ccid opensc pcsc-tools
Afterwards you need to start the `pcscd` service:
systemctl enable pcscd
systemctl start pcscd
If you forgot to do so and already insterted the HSM, remove it, start pcscd and
plug the device back in.
See the [Arch Wiki][24] for more information.
On Ubuntu you need to install some software as well:
apt-get install ccid pcscd pcsc-tools
See the [Ubuntu Wiki][25] for more info.
After you've installed all the software and started services, plug the device in
and check if it all went well.
`dmesg` output when inserting the device:
[701858.879567] usbhid: USB HID core driver
[701858.890463] input: Nitrokey Nitrokey HSM as /devices/pci0000:00/0000:00:1a.0/usb1/1-1/1-1.1/1-1.1:1.0/0003:20A0:4230.0001/input/input20
[701858.942115] hid-generic 0003:20A0:4230.0001: input,hidraw0: USB HID v1.10 Keyboard [Nitrokey Nitrokey HSM] on usb-0000:00:1a.0-1.1/input0
`pcsc_scan` output on my laptop which also has a built-in Lenovo cardreader:
# pcsc_scan
PC/SC device scanner
V 1.4.26 (c) 2001-2011, Ludovic Rousseau
Compiled with PC/SC lite version: 1.8.16
Using reader plug'n play mechanism
Scanning present readers...
0: Nitrokey Nitrokey HSM (010000000000000000000000) 00 00
1: Lenovo Integrated Smart Card Reader 01 00
Fri Jun 17 19:55:36 2016
Reader 0: Nitrokey Nitrokey HSM (010000000000000000000000) 00 00
Card state: Card inserted,
`opensc-tool` output:
# opensc-tool --list-readers
# Detected readers (pcsc)
Nr. Card Features Name
0 Yes Nitrokey Nitrokey HSM (010000000000000000000000) 00 00
1 No Lenovo Integrated Smart Card Reader 01 00
If you get no output but an error like:
No smart card readers found.
It might mean that `pcscd` is not running. Make sure it's started.
You can check the exact hardware and software revision of the device using the
`pkcs11-tool --list-slots` command:
# pkcs11-tool --list-slots
Available slots:
Slot 0 (0xffffffffffffffff): Virtual hotplug slot
(empty)
Slot 1 (0x1): Lenovo Integrated Smart Card Reader 00 00
(empty)
Slot 2 (0x5): Nitrokey Nitrokey HSM (010000000000000000000000) 01 00
token label : SmartCard-HSM (UserPIN)
token manufacturer : www.CardContact.de
token model : PKCS#15 emulated
token flags : rng, login required, PIN initialized, token initialized
hardware version : 24.13
firmware version : 2.0
serial num : DENK0100186
### PKCS#11, #15 and OpenSC
PKCS#11 is, as said, a software API for accessing cryptographic hardware like
smart cards or HSM. PKCS#11 is NOT a hardware standard or hardware interface.
PKCS#15 is a format of on-card structures that defines a "filesystem layout" for
smart cards. PKCS#15 does not define how those structures are generated or
written to the card.
### SO and User Pins
Some functions on the HSM are protected by PIN codes. There are different access
levels, most common SO (security officer) and user. Each slot can have a
different user pin, but the SO pin remains the same for the HSM. You could say
that the SO pin is like the root user.
An HSM needs to be initialized before it can be used. Initialization is a
factory reset, where all keys, certificates and data elements are erased and you
set up a new SO pin. When you receive an HSM it has factory default settings.
For the Nitrokey HSM the SO pin is `3537363231383830`. This is not secure since
it's a publicly known code. Therefore it needs to be changed to something else.
But before we do that, first a few warnings.
### Warnings
Please read the below parts. You might render your device bricked if you use it
wrong, and there is no way of recovering a blocked/bricked Nitrokey HSM.
* The SO pin must be exactly 16 hexadecimal characters. It will be stored internally as an 8-byte key.
* Store the SO pin in a safe place.
* The user pin can be any length from 4 up to 16 ASCII characters.
* You need the SO pin to (re)-initialize the device.
* Wrong SO pins are counted. When you have entered 15 wrong SO pins, the device is forever blocked and unusable. This is non-recoverable. The counter can not be reset as well.
* HSM firmware versions up to 1.0 will not allow you to change this SO PIN ever again. Check with `pkcs11-tool --list-slots`.
So, TL;DR: NEVER ENTER THE WRONG SO PIN AND NEVER FORGET THE SO PIN.
### HSM Backups with a DKEK
As said earlier, most HSM's offer a backup option. You can export the key
material in a specific format readably by other HSM's of that type. The Safenet
Protectserver wraps the material with a Transport Key.
The Nitrokey HSM and the SmartCard-HSM use a 'Device Key Encryption Key'. The
DKEK is a 256-Bit AES key.
The DKEK must be set during initialization and before any other keys are
generated. For a device initialized without a DKEK, keys can never be exported.
A DKEK is imported into a SmartCard-HSM using a preselected number of key
shares. Each key share is given to a key custodian and only all key shares
together assemble the DKEK. Key shares are individually imported and are
assembled within the SmartCard-HSM. Key shares can be imported independently of
time and location, allowing to pass a half-initialized device between key
custodians until all shares have been imported.
The HSM supports an arbitrary number of DKEK shares. Typical values for the
number of shares are:
* 0: The HSM generates an internal DKEK (no backups).
* 1: The HSM requests one external DKEK share to be imported.
* 3: The HSM requests three external DKEK shares to be imported by three different key custodians.
If you want to enable the option to create a backup, you must do so first,
before initializing the HSM. In this example I will create one key share, but
repeating the commands allows you to create more.
Create a DKEK share with the following command:
sc-hsm-tool --create-dkek-share dkek-share-1.pbe
Output:
Using reader with a card: Nitrokey Nitrokey HSM (010000000000000000000000) 00 00
The DKEK share will be enciphered using a key derived from a user supplied password.
The security of the DKEK share relies on a well chosen and sufficiently long password.
The recommended length is more than 10 characters, which are mixed letters, numbers and
symbols.
Please keep the generated DKEK share file in a safe location. We also recommend to keep a
paper printout, in case the electronic version becomes unavailable. A printable version
of the file can be generated using "openssl base64 -in ".
Enter password to encrypt DKEK share :
Please retype password to confirm :
Enciphering DKEK share, please wait...
DKEK share created and saved to dkek-share-1.pbe
The printable version looks like this:
# openssl base64 -in dkek-share-1.pbe
U2FsdGVkX19TK+VuViUAPOKAfVPE9puwK7yvJSInvPeBSld+Uh2hHli8RazbFVd3
dGgOu7ahEjm6YzzYWtxMnA==
For testing purposes, the password used above is: 123456789.
Create more key shares if needed.
### Initialize the HSM
The following command initializes the HSM. The default SO pin for the Nitrokey
HSM is `3537363231383830`. The initialization will be done with one DKEK share
as described above.
Use the following command to initialize the HSM. If you have a different SO pin,
please change the command. The user pin we provide will be set as the user pin.
sc-hsm-tool --initialize --so-pin 3537363231383830 --pin 648219 --dkek-shares 1
Output:
Using reader with a card: Nitrokey Nitrokey HSM (010000000000000000000000) 00 00
The card is not initialized yet if you enabled DKEK shares. You can check how
many DKEK shares need to be imported using the below command:
# sc-hsm-tool
Output:
Using reader with a card: Nitrokey Nitrokey HSM (010000000000000000000000) 00 00
Version : 2.0
User PIN tries left : 3
DKEK shares : 1
DKEK import pending, 1 share(s) still missing
Import the share(s) with the following command:
# sc-hsm-tool --import-dkek-share dkek-share-1.pbe
Output:
Using reader with a card: Nitrokey Nitrokey HSM (010000000000000000000000) 00 00
Enter password to decrypt DKEK share :
Deciphering DKEK share, please wait...
DKEK share imported
DKEK shares : 1
DKEK key check value : 53CA37CEED5B227F
The HSM is initialized now:
# sc-hsm-tool
Output:
Using reader with a card: Nitrokey Nitrokey HSM (010000000000000000000000) 00 00
Version : 2.0
User PIN tries left : 3
DKEK shares : 1
DKEK key check value : 53CA37CEED5B227F
Now that the HSM is initialized, we can start using it.
### Create a keypair
The HSM supports the [following][26] key types:
RSA:
* 1024 bit
* 2048 bit
ECDSA GF(p) 192-320 bit, elliptic curves:
* secp192r1 (aka prime192v1)
* secp256r1 (aka prime256v1)
* brainpoolP192r1
* brainpoolP224r1
* brainpoolP256r1
* brainpoolP320r1
* secp192k1
* secp256k1 (the Bitcoin curve)
Use the below command to generate an 2048 bit RSA keypair in the HSM:
pkcs11-tool --module opensc-pkcs11.so --login --pin 648219 --keypairgen --key-type rsa:2048 --id 10 --label "HSM RSA Key Remy"
Output:
Using slot 1 with a present token (0x1)
Logging in to "SmartCard-HSM (UserPIN)".
Key pair generated:
Private Key Object; RSA
label: HSM RSA Key Remy
ID: 10
Usage: decrypt, sign, unwrap
Public Key Object; RSA 2048 bits
label: HSM RSA Key Remy
ID: 10
Usage: encrypt, verify, wrap
If you want to generate an EC key, you can do that as well:
pkcs11-tool --module opensc-pkcs11.so -l --keypairgen --key-type EC:prime256v1 --id 20 --label "HSM EC Key Remy"
Output:
Using slot 1 with a present token (0x1)
Logging in to "SmartCard-HSM (UserPIN)".
Please enter User PIN:
Key pair generated:
Private Key Object; EC
label: HSM EC Key Remy
ID: 20
Usage: sign, derive
Public Key Object; EC EC_POINT 256 bits
EC_POINT: 044104a98140c570507d0fcd9e0d3bbe2b2eea22a591b5b1862a700d1bddfebd85b3708744c870da457f45c23bef634a941ab344b933a74bbf8e3772b77150afcc4f08
EC_PARAMS: 06082a8648ce3d030107
label: HSM EC Key Remy
ID: 20
Usage: verify
You can save more than one key by specifying a different ID. You can list all
the current objects as well:
# pkcs11-tool --list-objects
Output:
Using slot 1 with a present token (0x1)
Public Key Object; RSA 2048 bits
label: HSM RSA Key Remy
ID: 10
Usage: none
Public Key Object; EC EC_POINT 256 bits
EC_POINT: 044104a98140c570507d0fcd9e0d3bbe2b2eea22a591b5b1862a700d1bddfebd85b3708744c870da457f45c23bef634a941ab344b933a74bbf8e3772b77150afcc4f08
EC_PARAMS: 06082a8648ce3d030107
label: HSM EC Key Remy
ID: 20
Usage: none
You can use the `test` option as well to make sure everything works correctly:
pkcs11-tool --test --login --pin 648219
Output:
Using slot 1 with a present token (0x1)
C_SeedRandom() and C_GenerateRandom():
seeding (C_SeedRandom) not supported
seems to be OK
Digests:
all 4 digest functions seem to work
MD5: OK
SHA-1: OK
RIPEMD160: OK
Signatures (currently only RSA signatures)
testing key 0 (HSM RSA Key Remy)
all 4 signature functions seem to work
testing signature mechanisms:
RSA-X-509: OK
RSA-PKCS: OK
SHA1-RSA-PKCS: OK
MD5-RSA-PKCS: OK
RIPEMD160-RSA-PKCS: OK
SHA256-RSA-PKCS: OK
warning: PKCS11 function C_GetAttributeValue(MODULUS_BITS) failed: rv = CKR_ATTRIBUTE_TYPE_INVALID (0x12)
testing key 1 (0 bits, label=HSM EC Key Remy) with 1 signature mechanism -- can't be used to sign/verify, skipping: can't obtain modulus
Verify (currently only for RSA):
testing key 0 (HSM RSA Key Remy)
RSA-X-509: OK
RSA-PKCS: OK
SHA1-RSA-PKCS: OK
MD5-RSA-PKCS: OK
RIPEMD160-RSA-PKCS: OK
testing key 1 (HSM EC Key Remy) with 1 mechanism
warning: PKCS11 function C_GetAttributeValue(MODULUS_BITS) failed: rv = CKR_ATTRIBUTE_TYPE_INVALID (0x12)
-- can't get the modulus length, skipping
Unwrap: not implemented
Decryption (RSA)
testing key 0 (HSM RSA Key Remy)
RSA-X-509: OK
RSA-PKCS: OK
testing key 1 (HSM EC Key Remy) -- can't be used to decrypt, skipping
No errors
### Backing up and restoring the keys with a DKEK
Now that we have some keys in the HSM, we want to make a backup. Since we've
generated a DKEK earlier, we can use that to create a backup of the material in
the HSM. If you are restoring a backup to another HSM, make sure you
(re)initialize the HSM and import the correct DKEK first.
The backup and restore require that we know the key reference identifier (key
ref). We can find that with the `pkcs15-dump` command:
pkcs15-tool --dump
Output:
Using reader with a card: Nitrokey Nitrokey HSM (010000000000000000000000) 00 00
PKCS#15 Card [SmartCard-HSM]:
Version : 0
Serial number : DENK0100186
Manufacturer ID: www.CardContact.de
Flags :
[...]
Private RSA Key [HSM RSA Key Remy]
Object Flags : [0x3], private, modifiable
Usage : [0x2E], decrypt, sign, signRecover, unwrap
Access Flags : [0x1D], sensitive, alwaysSensitive, neverExtract, local
ModLength : 2048
Key ref : 1 (0x1)
Native : yes
Path : e82b0601040181c31f0201::
Auth ID : 01
ID : 10
MD:guid : {984bcc96-6524-74f8-535a-83c920612f39}
:cmap flags : 0x0
:sign : 0
:key-exchange: 0
Private EC Key [HSM EC Key Remy]
Object Flags : [0x3], private, modifiable
Usage : [0x10C], sign, signRecover, derive
Access Flags : [0x1D], sensitive, alwaysSensitive, neverExtract, local
FieldLength : 256
Key ref : 2 (0x2)
Native : yes
Path : e82b0601040181c31f0201::
Auth ID : 01
ID : 20
MD:guid : {5c924cee-37e3-865e-951b-975cfaf95cad}
:cmap flags : 0x0
:sign : 0
:key-exchange: 0
[...]
In my example the RSA keypair has key ref 1 and the EC keypair has key ref 2. To
wrap key 1 to an encrypted file use the following command:
sc-hsm-tool --wrap-key wrap-key-1.bin --key-reference 1 --pin 648219
To restore the key, use the unwap command:
sc-hsm-tool --unwrap-key wrap-key-1.bin --key-reference 1 --pin 648219
Replace the key ref to backup other keys.
We can test the backup by, after creating a backup first, deleting the key
material in the slot:
pkcs11-tool --module opensc-pkcs11.so --login --pin 648219 --delete-object --type cert --id 10
pkcs11-tool --module opensc-pkcs11.so --login --pin 648219 --delete-object --type privkey --id 10
pkcs11-tool --module opensc-pkcs11.so --login --pin 648219 --delete-object --type data --label "HSM RSA Key Remy"
If you use the `pkcs15-tool --dump` command or the `pkcs11-tool --list-objects`
command you see that the key is gone:
pkcs11-tool --list-objects
Output:
Using slot 1 with a present token (0x1)
Public Key Object; EC EC_POINT 256 bits
EC_POINT: 044104a98140c570507d0fcd9e0d3bbe2b2eea22a591b5b1862a700d1bddfebd85b3708744c870da457f45c23bef634a941ab344b933a74bbf8e3772b77150afcc4f08
EC_PARAMS: 06082a8648ce3d030107
label: HSM EC Key Remy
ID: 20
Usage: none
Restore the key using the above command and it should be back:
sc-hsm-tool --unwrap-key wrap-key-1.bin --key-reference 1 --pin 648219
Output:
Using reader with a card: Nitrokey Nitrokey HSM (010000000000000000000000) 00 00
Wrapped key contains:
Key blob
Private Key Description (PRKD)
Certificate
Key successfully imported
The restore worked, the key is back an can be used again:
pkcs11-tool --list-objects
Output:
Using slot 1 with a present token (0x1)
Public Key Object; RSA 2048 bits
label: HSM RSA Key Remy
ID: 10
Usage: none
Public Key Object; EC EC_POINT 256 bits
EC_POINT: 044104a98140c570507d0fcd9e0d3bbe2b2eea22a591b5b1862a700d1bddfebd85b3708744c870da457f45c23bef634a941ab344b933a74bbf8e3772b77150afcc4f08
EC_PARAMS: 06082a8648ce3d030107
label: HSM EC Key Remy
ID: 20
Usage: none
### Using the keys
You can get the public keys out of the device by using the `pkcs15-tool`
command:
# pkcs15-tool --read-public-key 10
Output:
Using reader with a card: Nitrokey Nitrokey HSM (010000000000000000000000) 00 00
-----BEGIN PUBLIC KEY-----
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAzmCaH0j9ujAo83EIZBlK
U7rJGcoKd4l93HJd7flufUlrwN7QaGuyzO4scgUps97fgWFML7ZIn1RJaJBIPExb
Mh9dHRlxsAmJoPNmiqFD86wbegRZJsvsfe/HlEZDUuDa25Ef52cOLipetJ7dUWP8
rsXART+7Ferl9yjMEMcfciaTPGuyo5V1Jvk1xh7DR5pMk0YGk5ZZVbIha79Ya8ut
gj3nxR58Je63iHcY9RGpb/96UpRKJ2D98LCTQKPUZvF6wY3PPkWroLdZIvwZGd3D
HgSw/bw9nFTgMXHbvw/xJ2B4aDmnRlY27gKzMXicEEbEqZcuMWVOKaatcaD+kmOV
cQIDAQAB
-----END PUBLIC KEY-----
EC Key:
# pkcs15-tool --read-public-key 20
Output:
Using reader with a card: Nitrokey Nitrokey HSM (010000000000000000000000) 00 00
-----BEGIN PUBLIC KEY-----
MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEqYFAxXBQfQ/Nng07visu6iKlkbWx
hipwDRvd/r2Fs3CHRMhw2kV/RcI772NKlBqzRLkzp0u/jjdyt3FQr8xPCA==
-----END PUBLIC KEY-----
To use the HSM with OpenSSL we need to create a config file first. Plate the
contents of the below file in, for example, `hsm.conf`:
# PKCS11 engine config
openssl_conf = openssl_def
[openssl_def]
engines = engine_section
[req]
distinguished_name = req_distinguished_name
[req_distinguished_name]
# empty.
[engine_section]
pkcs11 = pkcs11_section
[pkcs11_section]
engine_id = pkcs11
dynamic_path = /usr/lib/engines/engine_pkcs11.so
MODULE_PATH = /usr/lib/opensc-pkcs11.so
PIN = 648219
init = 0
You can omit the `PIN` variable if you don't want to include that in a config
file. I had to check the filenames in `/usr/lib/engines/` to make sure that the
correct one was loaded. Test it using OpenSSL:
OPENSSL_CONF=./hsm.conf openssl engine
Output:
(dynamic) Dynamic engine loading support
(pkcs11) pkcs11 engine
We can create a new certificate signing request, The `1:10` is a form of
`slotid:keyid`.
OPENSSL_CONF=./hsm.conf openssl req -engine pkcs11 -keyform engine -new -key 1:10 -sha256 -out "raymii.org.csr" -subj "/C=NL/ST=Zuid Holland/L=Rotterdam/O=Sparkling Network/OU=IT Dept/CN=raymii.org"
Change the parameters to fit your subject. You can send this CSR to a CA to get
it signed, but you can also generate a self signed certificate:
OPENSSL_CONF=./hsm.conf openssl req -engine pkcs11 -keyform engine -new -key 1:10 -nodes -days 3560 -x509 -sha256 -out "raymii.org.pem" -subj "/C=NL/ST=Zuid Holland/L=Rotterdam/O=Sparkling Network/OU=IT Dept/CN=raymii.org"
The difference in the last command is that the `-nodes`, `-x509` and -`days`
parameters are added, which generate a self singed certificate instead of a CSR.
You can view the CSR with the following command:
openssl req -noout -text -in raymii.org.csr
Output:
Certificate Request:
Data:
Version: 0 (0x0)
Subject: C=NL, ST=Zuid Holland, L=Rotterdam, O=Sparkling Network, OU=IT Dept, CN=raymii.org
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
[...]
You can view the self signed certificate with the following command:
openssl x509 -noout -text -in raymii.org.pem
Output:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 18137581533109102111 (0xfbb5a24eada7261f)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=NL, ST=Zuid Holland, L=Rotterdam, O=Sparkling Network, OU=IT Dept, CN=raymii.org
Validity
Not Before: Jun 18 09:26:45 2016 GMT
Not After : Mar 18 09:26:45 2026 GMT
Subject: C=NL, ST=Zuid Holland, L=Rotterdam, O=Sparkling Network, OU=IT Dept, CN=raymii.org
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
[...]
Sadly, both Apache and NGINX do not support PKCS#11 in their ssl module. For
Apache you can use `mod_nss` to use the certificates from the HSM.
You can however use the HSM to encrypt and decrypt data. Please [read my article
on encryption with OpenSSL first][27] since that covers basics like why an RSA
key is not suitable for large files.
I've also written an article on [Signing data with OpenSSL][28]. Read that as
well.
To encrypt data using your HSM public key (which we exported earlier with
`pkcs15-tool --read-public-key 10`), use the following command:
openssl rsautl -inkey publickey.pem -pubin -encrypt -pkcs -in smallfile -out encryptedsmallfile.pkcs1
The data will be wrapped in a PKCS#1 (binary) format.
If you want to decrypt the data, use the following command:
pkcs15-crypt --decipher --key 10 --input encryptedsmallfile.pkcs1 --pkcs1 --raw > decryptedsmallfile
Output:
Using reader with a card: Nitrokey Nitrokey HSM (010000000000000000000000) 00 00
Enter PIN [UserPIN]: <648219>
The two files should be the same:
$ sha256sum decryptedsmallfile
609ac352197628e57552aac9e66562be9bb8d746826107e15ff4b04e0efdcbdb decryptedsmallfile
$ sha256sum smallfile
609ac352197628e57552aac9e66562be9bb8d746826107e15ff4b04e0efdcbdb smallfile
As described in the two articles, you need to create a small random file and use
that as the key to encrypt a file using symmetric encryption. asymmetric
encryption like RSA is not suitable for large files. Please make sure you read
both the articles to understand the subject, and then use this article to use
the HSM.
### SSH Keys with the HSM
OpenSSH has support for PKCS#11, so we can use the HSM for SSH Key based
authentication. The private key never leaves the HSM so this is more secure than
a password on a file. You will know when someone is brute forcing your HSM,
because you lost possession of it. When someone steals your private key, you
might not even know it. [Remember the firefox exploit][29] that steals private
keys and passwords? If you are using the HSM this will never be possible.
It's best to create a seperate key for SSH:
pkcs11-tool --module opensc-pkcs11.so --login --pin 648219 --keypairgen --key-type rsa:2048 --id 30 --label "HSM SSH Key Remy"
Output:
Using slot 1 with a present token (0x1)
Logging in to "SmartCard-HSM (UserPIN)".
Key pair generated:
Private Key Object; RSA
label: HSM SSH Key Remy
ID: 30
Usage: decrypt, sign, unwrap
Public Key Object; RSA 2048 bits
label: HSM SSH Key Remy
ID: 30
Usage: encrypt, verify, wrap
We need to use `pkcs15-tool` to get the public key in a format usable by
openSSH. 30 is the ID we gave, you might need to use the `pkcs15-tool --dump`
command to lookup the ID if you don't know it.
pkcs15-tool --read-ssh-key 30
Output:
Using reader with a card: Nitrokey Nitrokey HSM (010000000000000000000000) 00 00
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC/HG1cG6ecGnadde9g4aZCWuL1dzsgOKUstyP7yUAclEtd1GwgQKSrVPixp7jllvoW0kCCtvsT8JMV+pEytcenOpfO06n4DvqjJ1aNMqQK6xw3CeJXz1TXJe7Z7L722/w96bHioZuSRBWumAAcGUoANd/WQ3MXNAmocgvW/WGSnl3kb9Vif7hzirecmcFSaU3djeEXpu42wZG6GGdw9WlvrXV1AsrE0mLQxyZmCEOs6CF0/cyaHuUE24Jz6oOfKkeYjCQgvBUK0D1MU3odnisbvfVLGJuF9RPMBY20Hey8z6dUXQV2WMeknV9/vN2n7Nk7pxOSViIQQ3w9rc7y1f4J HSM SSH Key Remy
#### EC keys to OpenSSH
For EC generated keys the `pkcs15-tool` doesn't seem to work. However, because
all keys can be converted one way or another we can dump the EC public key and
convert it into an SSH compatible key. First dump the EC public key to a file.
In this case I generated an EC private key with ID 2 and used the following
command to get the public key:
pkcs15-tool --read-public-key 2 > eckey.pub
Then convert the `eckey.pub` file into something OpenSSH can handle:
ssh-keygen -i -m PKCS8 -f eckey.pub
Output:
ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBKsWLJkl1Dr7IdLPrLpCBtoEFy+qYd/fEu9Mpga1utwMbCU671NWGH3Ppo2q/tzYFq4Fm/jgRHBHFGJ5HrwL1nM= hsm
Although using that doesn't seem to work:
$ pkcs15-tool --verbose --read-ssh-key 2
Using reader with a card: Nitrokey Nitrokey HSM (010000000000000000000000) 00 00
Connecting to card in reader Nitrokey Nitrokey HSM (010000000000000000000000) 00 00...
Using card driver SmartCard-HSM.
Trying to find a PKCS#15 compatible card...
Found SmartCard-HSM!
Reading ssh key with ID '2'
And logging in fails as well with EC keys:
$ ssh -o "PKCS11Provider opensc-pkcs11.so" root@server
C_GetAttributeValue failed: 18
no keys
root@server's password:
I've [raised an issue][30] to see how to get EC keys and OpenSSH working.
**Update:** `Unfortunately OpenSSH PKCS#11 interface does not support ECC`. The
issue was updated and we now know that OpenSSH doesn't support ECC via PKCS#11.
**Update 2**: [Jan-Piet Mens has figured out how to get EC keys working with OpenSSH. Article is here: https://jpmens.net/2021/06/16/ssh-with-a-smartcard-hsm/](https://jpmens.net/2021/06/16/ssh-with-a-smartcard-hsm/).
This public key can be placed in the `~/.ssh/authorized_keys` file on your
servers. I spun up a new [Digital Ocean VPS to test it.][1]
Digital Ocean automatically places the ssh key in the authorized_keys file, if
you need to do that yourself you can use the following command:
echo 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC/HG1cG6ecGnadde9g4aZCWuL1dzsgOKUstyP7yUAclEtd1GwgQKSrVPixp7jllvoW0kCCtvsT8JMV+pEytcenOpfO06n4DvqjJ1aNMqQK6xw3CeJXz1TXJe7Z7L722/w96bHioZuSRBWumAAcGUoANd/WQ3MXNAmocgvW/WGSnl3kb9Vif7hzirecmcFSaU3djeEXpu42wZG6GGdw9WlvrXV1AsrE0mLQxyZmCEOs6CF0/cyaHuUE24Jz6oOfKkeYjCQgvBUK0D1MU3odnisbvfVLGJuF9RPMBY20Hey8z6dUXQV2WMeknV9/vN2n7Nk7pxOSViIQQ3w9rc7y1f4J HSM SSH Key Remy' >> ~/.ssh/authorized_keys
If I try to login without specifying the HSM I will be prompted for a password
or be rejected:
When we tell OpenSSH to use the HSM, we get asked for the HSM pin and are logged
in:
$ ssh -o "PKCS11Provider opensc-pkcs11.so" root@testdroplet
C_GetAttributeValue failed: 18
Enter PIN for 'SmartCard-HSM (UserPIN)': <648219>
Welcome to Ubuntu 16.04 LTS (GNU/Linux 4.4.0-22-generic x86_64)
* Documentation: https://help.ubuntu.com/
The programs included with the Ubuntu system are free software;
the exact distribution terms for each program are described in the
individual files in /usr/share/doc/*/copyright.
Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by
applicable law.
root@hsmtest:~#
If you add the below line to the top of your `~/.ssh/config` file, OpenSSH will
automatically use the HSM if needed:
# vim ~/.ssh/config
PKCS11Provider opensc-pkcs11.so
A short form for the command line is the `-I` flag, which is the same as the
long `-o` flag:
ssh -I opensc-pkcs11.so root@testdroplet
You can also add the key to your `ssh-agent` if you happen to use an agent:
ssh-add -s opensc-pkcs11.so
Output:
Enter passphrase for PKCS#11: <648219>
Card added: opensc-pkcs11.so
The passphrase is the user pin. You can now login to machines without entering
the HSM pin every time. Check all the keys in the agent with the following
command:
ssh-add -l
Output:
2048 SHA256:ycaGD3Sdnt82yTnPs14uncaGDjDwEqCMOdnVM /home/remy/.ssh/id_rsa (RSA)
2048 SHA256:gRJCXat84Ad56Q8qtLxdNjswdZDFLy8w/7N3ObreV5M opensc-pkcs11.so (RSA)
2048 SHA256:eXXaUUVJzjI6rm8H9/qIB51UWhZCIp+hqi5JEhVGB40 opensc-pkcs11.so (RSA)
My own private key is in there as well as the two slots we created earlier.
When you are done, remove the key from the ssh-agent:
ssh-add -e opensc-pkcs11.so
Output:
Card removed: opensc-pkcs11.so
### Using the HSM for Thunderbird with S/MIME
If you want to sign your email using S/MIME and the HSM you need to generate a
keypair and a certificate. Make sure your email address is in the label:
pkcs11-tool --module opensc-pkcs11.so --login --pin 648219 --keypairgen --key-type rsa:2048 --id 40 --label "antispam@relst.nl"
Output:
Using slot 1 with a present token (0x1)
Logging in to "SmartCard-HSM (UserPIN)".
Key pair generated:
Private Key Object; RSA
label: antispam@relst.nl
ID: 40
Usage: decrypt, sign, unwrap
Public Key Object; RSA 2048 bits
label: antispam@relst.nl
ID: 40
Usage: encrypt, verify, wrap
Create a certficate signing request based on this key. Make sure you have the
`hsm.conf` file for OpenSSL loaded as we did above.
OPENSSL_CONF=./hsm.conf openssl req -engine pkcs11 -keyform engine -new -key 1:40 -sha256 -out "antispam.relst.nl.csr" -subj "/C=NL/ST=Zuid Holland/L=Rotterdam/O=Sparkling Network/OU=IT Dept/CN=relst.nl/emailAddress=antispam@relst.nl"
Note the extra `emailAddress` value in the certificate subject. Make sure that
the `CN` domain is the same as the domain in the email addres. Also make sure
you specify the correct `slot:id`, in our case, slot 1 and ID 40.
You can now send this certificate signing request to a certificate authority and
get an actual certificate back. Comodo and Globalsign provide certificates for
S/MIME.
If you want to generate a self singed certificate you can do that as well:
OPENSSL_CONF=./hsm.conf openssl req -engine pkcs11 -keyform engine -new -key 1:40 -nodes -x509 -days 3650 -sha256 -out "antispam.relst.nl.pem" -subj "/C=NL/ST=Zuid Holland/L=Rotterdam/O=Sparkling Network/OU=IT Dept/CN=relst.nl/emailAddress=antispam@relst.nl"
I've got an actual certificate from Comodo via [Xolphin][31], which you can
inspect with the following command:
openssl x509 -noout -text -inform der -in antispam.relst.nl.pem
Output:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
ff:93:fe:11:a3:e2:c2:58:a8:b3:e9:07:cb:d5:94:2b
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO SHA-256 Client Authentication and Secure Email CA
Validity
Not Before: Jun 18 00:00:00 2016 GMT
Not After : Jun 18 23:59:59 2017 GMT
Subject: C=NL, CN=Remy van Elst/emailAddress=antispam@relst.nl
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
If you have completed the validation of the certificate at the certificate
provider or you have the self signed certificate ready, we can proceed to load
the certificate into the HSM. We need to load the certificate in the HSM so that
Thunderbird is able to use it. Otherwise there would just be a public key.
The HSM only accepts `DER` format, so first convert the `PEM` file you generated
or received from your CA to `DER`:
openssl x509 -in antispam.relst.nl.pem -out antispam.relst.nl.der -outform der
The below command writes the certificate into the HSM:
pkcs11-tool --module opensc-pkcs11.so --login --pin 648219 --write-object antispam.relst.nl.der --type cert --id 40
Output:
Using slot 1 with a present token (0x1)
Created certificate:
Certificate Object, type = X.509 cert
label: Certificate
ID: 40
Make sure the ID is correct.
Start up Thunderbird and go to the `Settings/Preferences` menu. Open the
`Advanced` tab and select the `Security` Tab. Click the `Security Devices`
button:
![][32]
Select the `SmartCard-HSM (UserPIN)` under `opensc` and click the `Login`
button. Enter the User PIN (648219). The status should change from `Not logged
in` to `Logged in` Click the `OK` button.
![][33]
To view the certificate, select the `View Certificates` button. Your certificate
should be loaded under the `Your Certificates` tab, with `SmartCard-HSM` as it's
Security Device.
![][34]
Open up the `Account Settings` window and under the correct email account,
select `Security`. Under `Digital Signing` and `Encryption` select the correct
certificate in the HSM:
![][35]
Save all settings and send yourself a test email. You should be able to sign (or
encrypt if you have someone elses S/MIME key) the message and while sending your
HSM LED turns on.
### Deleting objects from the HSM
If you are done with testing or want to free up space on the HSM you can remove
objects from it. You can delete certificates and the private keys, either by ID
or label. For example, when your S/MIME certificate is expired and you need to
load up a new one, delete the old one first.
The below command removes a certificate from ID 10:
pkcs11-tool --module opensc-pkcs11.so --login --pin 648219 --delete-object --type cert --id 10
The below command removes a private key from ID 10:
pkcs11-tool --module opensc-pkcs11.so --login --pin 648219 --delete-object --type privkey --id 10
The below command removes the data from label 'HSMdata':
pkcs11-tool --module opensc-pkcs11.so --login --pin 648219 --delete-object --type data --label HSMdata
You can check before and after a delete command if the object is gone with the
below command:
pkcs11-tool --list-objects
Do note that when you remove a privkey you also remove the certificate and any
data.
### Apache with mod_nss
![][36]
I've written a seperate guide on using the HSM with Apache. Please [read the
full guide here][37].
There is a different module you can use next to the OpenSC module, named `sc-
hsm-embedded`. This module provides fast, read only access to the HSM, and is
better suited for production use, since on a production machine you don't need
to manage keys on the HSM, you do that on your offline management workstation.
The guide for mod_nss, Apache and the read-only-module `sc-hsm-embedded` is [on
a seperate page][38] as well.
### Decrypting the private keys of the HSM
This is a guide which shows you how to extract private RSA key material from the
Nitrokey HSM / SmartCard-HSM using the DKEK. This way you can get the private
key out of the HSM in an unencrypted form. It does require access to the HSM
device, all the DKEK share and their passwords. Do note that doing this defeats
the entire purpose of a HSM, namely that you never have access to the keys. In
the article I'll go over some explanation why this might be a feature you need
and why it might be a case of security over convinience.
*** This is not a vulnerability, zero day or exploit. The HSM provides a way to
do secure backups of private key material and we utilize that in this article.
To decrypt the keys you need to have all the DKEK files used when the HSM was
initialized, know all the DKEK passwords and have access to the HSM itself. **
You can prevent decryption by not setting up a DKEK, thus using the random
internal DKEK of the HSM.
This guide is on [a seperate page][39] as well.
### Storing arbitraty data in Elementary Files (EF)
This is a guide which shows you how to write small elementary files to a
nitrokey HSM. This can be usefull if you want to securely store data protected
by a user pin. You can enter the wrong pin only three times, so offline brute
forcing is out of the picture.
You could for example, store a file in the HSM and send it via the old-fashioned
mail to someone, without sending the required pin. You send that via a different
channel, preferably privately in person. The other person then can read the file
of the HSM using the PIN. Since you only have 3 tries for the correct PIN, you
know that an offline brute force attack is not likely to happen. If you
encrypted a file an placed it on a regular USB drive, the post could be
intercepted and stored for offline cracking by a government agency, without you
knowing it. Because the pin entries are recorded, you know immidiately when the
device has been tampered with.
This guide is on [a seperate page][40] like the others.
[1]: https://www.digitalocean.com/?refcode=7435ae6b8212
[2]: https://raymii.org/s/inc/img/nitrokey1.jpg
[3]: https://raymii.org/s/inc/img/sc-hsm-nitrokey.jpg
[4]: https://raymii.org/s/inc/img/sc-hsm.jpg
[5]: https://en.wikipedia.org/wiki/FIPS_140-2
[6]: https://raymii.org/s/inc/img/eracom.jpg
[7]: https://en.wikipedia.org/wiki/PKCS_11
[8]: https://raymii.org/s/inc/img/ultimaco.jpg
[9]: https://raymii.org/s/software/OpenSSL_Command_Generator.html
[10]: https://raymii.org/s/inc/img/safenetpci.jpg
[11]: https://community.letsencrypt.org/t/ca-software-and-hsms-used/14600
[12]: http://www.safenet-inc.com/data-encryption/hardware-security-modules-hsms/protectserver-security-module/#tab2
[13]: https://cert.pkioverheid.nl/
[14]: https://www.thales-esecurity.com/products-and-services/products-and-services/hardware-security-modules
[15]: https://raymii.org/s/inc/img/safenethsm.jpg
[16]: https://raymii.org/s/inc/img/omnikey.png
[17]: https://raymii.org/s/inc/img/nitrokey2.jpg
[18]: http://nitrokey.com
[19]: http://www.smartcard-hsm.com/
[20]: http://www.smartcard-hsm.com/opensource.html
[21]: https://github.com/nitrokey
[22]: https://github.com/OpenSC/OpenSC/wiki/SmartCardHSM
[23]: http://www.nitrokey.com/start
[24]: https://wiki.archlinux.org/index.php/Common_Access_Card
[25]: https://help.ubuntu.com/community/CommonAccessCard
[26]: https://www.nitrokey.com/documentation/frequently-asked-questions#which-algorithms-and-maximum-key-length-are-supported
[27]: https://raymii.org/s/tutorials/Encrypt_and_decrypt_files_to_public_keys_via_the_OpenSSL_Command_Line.html
[28]: https://raymii.org/s/tutorials/Sign_and_verify_text_files_to_public_keys_via_the_OpenSSL_Command_Line.html
[29]: https://blog.mozilla.org/security/2015/08/06/firefox-exploit-found-in-the-wild/
[30]: https://github.com/OpenSC/OpenSC/issues/803
[31]: https://xolphin.nl
[32]: https://raymii.org/s/inc/img/tbhsm2.png
[33]: https://raymii.org/s/inc/img/tbhsm1.png
[34]: https://raymii.org/s/inc/img/tbhsm3.png
[35]: https://raymii.org/s/inc/img/tbhsm4.png
[36]: https://raymii.org/s/inc/img/hsm-icon.png
[37]: https://raymii.org/s/articles/Nitrokey_HSM_in_Apache_with_mod_nss.html
[38]: https://raymii.org/s/articles/Use_the_Nitrokey_HSM_or_SmartCard-HSM_with_sc-hsm-embedded_mod_nss_and_Apache_read_only_module.html
[39]: https://raymii.org/s/articles/Decrypt_NitroKey_HSM_or_SmartCard-HSM_private_keys.html
[40]: https://raymii.org/s/articles/Storing_arbitraty_data_in_the_Nitrokey_HSM.html
---
License:
All the text on this website is free as in freedom unless stated otherwise.
This means you can use it in any way you want, you can copy it, change it
the way you like and republish it, as long as you release the (modified)
content under the same license to give others the same freedoms you've got
and place my name and a link to this site with the article as source.
This site uses Google Analytics for statistics and Google Adwords for
advertisements. You are tracked and Google knows everything about you.
Use an adblocker like ublock-origin if you don't want it.
All the code on this website is licensed under the GNU GPL v3 license
unless already licensed under a license which does not allows this form
of licensing or if another license is stated on that page / in that software:
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see .
Just to be clear, the information on this website is for meant for educational
purposes and you use it at your own risk. I do not take responsibility if you
screw something up. Use common sense, do not 'rm -rf /' as root for example.
If you have any questions then do not hesitate to contact me.
See https://raymii.org/s/static/About.html for details.