05 - Luna EFT2 Operation
05 - Luna EFT2 Operation
Operation
Assaf Cohen
Training Manager
Let’s talk about…
Key generation
Smartcard key transfer
Network package transfer
Upgrading the EFT
The UI
Key Generation
Key Generation
Luna EFT can generate two types of keys
HSM keys
Host keys
HSM keys are stored inside the HSM
Host keys are encrypted and stored on a remote host
The master key is used to encrypt host stored keys
Key Generation
You must login as the Partition Owner
Keys are entered directly to the HSM
Security standards dictate that keys cannot be created remotely
A physical keyboard must be attached to the HSM
All keys are entered via the console interface
Key Generation
Workflow
KeyMgmt
Generate
HSM Host
Key Type
Key Generation
Workflow
Keymgmt generate hsm km -index 1 –keybit 256 –keylen 2 –clearComp 2 –encryptedComp 0 –algo DES
Key Verification Codes (KVC)
Key Verification Codes (KVC)
Are used to verify, without compromising secrecy, that a key or a key
component has been entered correctly, or to confirm that the value of a
stored key is as expected.
During key entry at the Luna EFT console, a KVC is automatically
calculated and displayed for each key component and for the resultant key.
There are various methods used to calculate KVCs, consult the Console
User’s Guide for more info.
Example:
Key: 01 23 45 67 89 AB CD EF FE DC BA 98 76 54 32 10
Plaintext: 00 00 00 00 00 00 00 00
Ciphertext: 08 D7 B4 FB 62 9D 08 85
KVC: 08 D7 B4
Smartcard Key Transfer
Smartcard Transfer
Smartcards are used to store keys for transfer between Luna EFT
devices
A KTP must be created prior to smartcard transfer
This is a DES/AES Transfer Protect Key
Used to derive keys who protect data
Smartcard Transfer
The KTP
Site
Site Site
Central
Site Site
Site
Site
Site
Site
Network Key Transfer
Models – Peer to Peer
Source/Target Source/Target
Network Key Transfer
Process Workflow
* You can only add L3 routes and set web/SNMP services, not actual network configuration
Accessing the web UI
Partition Owner – Function Control
Host connections
Access to the Luna EFT is based on access control lists
You have to specify in advance which IP addresses are allowed to communicate
The Luna EFT can handle up to 128 simultaneous connections
These 128 connections can be allocated as you see fit between allows hosts
Services
Set on which NIC are host connections allowed
Default port is 1000
Set on which NIC 3rd party emulation is allowed
Default port is 1001
SSL
Set whether you want to secure host connections with SSL
Accessing the web UI
Partition Owner – Certificate Management