Hello, The manual explains how to configure apache with mod_ssl. We want to use mode_nss with apache.
Also we tried disabling the softtoken by giving modutil -disable "sun crypto accelerator" -slot "sun pkcs11 softtoken" but it doesn't seem working, it again shows as enabled!!! Also the sca manual mentions that you can configure metaslot to use the h/w by using Cryptoadm enable metaslot token=ks This also we did but same result. Are we missing any more config here? ( the aes jobs are getting incremented in the kstat, so aes jobs are done in the card) On 19-Aug-09, at 8:56 PM, Gary.Morton at Sun.COM wrote: > Look at the the SCA 6000 user's guide - configuring apache is > documented. > > http://docs.sun.com/app/docs/prod/accel.600.brd?l=en&a=view > > -gary > > On 08/19/09 09:16, Gary.Morton at Sun.COM wrote: >> It looks like you are configured to use softtoken so the rsa >> private requests are handled there rather than the sca6000 >> -gary >> On 08/19/09 07:34, Rishi Renjith wrote: >>> Hello, I tried creating a NSS database, linking it with crypto >>> card and connecting using apache mod_nss. Everything works fine, >>> except that the *rsaprivate *jobs are not getting increased in the >>> kstat of the card. >>> This is what I did. >>> *bash-3.00# cd ../nssdb* *bash-3.00# rm ** *bash-3.00# certutil -N >>> -d .* Enter a password which will be used to encrypt your keys. >>> The password should be at least 8 characters long, and should >>> contain at least one non-alphabetic character. >>> Enter new password: Re-enter password: * * >>> *bash-3.00# ls* cert8.db key3.db secmod.db *bash-3.00# chmod >>> 777 ** *bash-3.00# modutil -dbdir . -nocertdb -force -add "Sun >>> Crypto Accelerator" -libfile /usr/lib/libpkcs11.so -mechanisms >>> RSA:DSA:RC4:DES* Module "Sun Crypto Accelerator" added to >>> database. *bash-3.00# modutil -list -dbdir . * Listing of PKCS #11 >>> Modules >>> ----------------------------------------------------------- 1. >>> NSS Internal PKCS #11 Module slots: 2 slots >>> attached status: loaded >>> slot: NSS Internal Cryptographic Services token: >>> NSS Generic Crypto Services >>> slot: NSS User Private Key and Certificate >>> Services token: NSS Certificate DB >>> 2. Sun Crypto Accelerator library name: /usr/lib/ >>> libpkcs11.so slots: 2 slots attached status: loaded >>> slot: Sun Metaslot token: Sun Metaslot >>> slot: Sun Crypto Softtoken token: Sun Software >>> PKCS#11 softtoken >>> ----------------------------------------------------------- >>> *bash-3.00# certutil -S -x -n "cert309" -t "u,u,u" -k rsa -g 1024 - >>> v 120 -s "cn=nobody,ou=Org,o=Sun,L=Santa Clara,ST=California,C=US" >>> -d . -h "Sun Metaslot"* *Enter Password or Pin for "Sun Metaslot":* >>> A random seed must be generated that will be used in the creation >>> of your key. One of the easiest ways to create a random seed is >>> to use the timing of keystrokes on a keyboard. >>> To begin, type keys on the keyboard until this progress meter is >>> full. DO NOT USE THE AUTOREPEAT FUNCTION ON YOUR KEYBOARD! >>> Continue typing until the progress meter is full: >>> |************************************************************| >>> Finished. Press enter to continue: >>> Generating key. This may take a few moments... >>> Enter Password or Pin for "Sun Software PKCS#11 softtoken": >>> *bash-3.00# certutil -K -d .* certutil: Checking token "NSS >>> Certificate DB" in slot "NSS User Private Key and Certificate >>> Services" Enter Password or Pin for "NSS Certificate DB": >>> certutil: no keys found *bash-3.00# certutil -K -d . -h "Sun >>> Software PKCS#11 softtoken"* certutil: Checking token "Sun >>> Software PKCS#11 softtoken" in slot "Sun Crypto Softtoken" Enter >>> Password or Pin for "Sun Software PKCS#11 softtoken": certutil: no >>> keys found *bash-3.00# certutil -K -d . -h "Sun Metaslot"* >>> certutil: Checking token "Sun Metaslot" in slot "Sun Metaslot" >>> Enter Password or Pin for "Sun Metaslot": < 0> rsa >>> 204a23dbb2e82d7d8c1495e3374dcd4462423e4c Sun Metaslot:cert309 < >>> 1> rsa 54ea6d93df1cfef13064aedc6f6c7f0dce34e7b6 Sun >>> Metaslot:cert147 < 2> rsa >>> 34d4a4974cf325e735dd23bb3a6b4680249f3550 (orphan) < 3> rsa >>> 2018eecb4c05eb25cd30be4de6f13ccaeadcb43d Sun Metaslot:cert1151 < >>> 4> rsa 61932a2d796fd8f6e82949059176e980cde5c55a sanCert < >>> 5> rsa 4e752a9b4a76c1462d9aec76de1617e08d07ff42 Sun >>> Metaslot:ismc_cert >>> *bash-3.00# certutil -L -d .* >>> Certificate Nickname Trust >>> Attributes >>> SSL,S/MIME,JAR/XPI >>> *bash-3.00# certutil -L -d . -h "Sun Software PKCS#11 softtoken"* >>> Certificate Nickname Trust >>> Attributes >>> SSL,S/MIME,JAR/XPI >>> Enter Password or Pin for "Sun Software PKCS#11 softtoken": >>> *bash-3.00# certutil -L -d . -h "Sun Metaslot"* >>> Certificate Nickname Trust >>> Attributes >>> SSL,S/MIME,JAR/XPI >>> Enter Password or Pin for "Sun Metaslot": Sun >>> Metaslot:cert309 u,u,u Sun >>> Metaslot:cert147 u,u,u Sun >>> Metaslot:cert1151 u,u,u Sun >>> Metaslot:sanCert u,u,u Sun >>> Metaslot:CACERT CA ,, Sun >>> Metaslot:ismc_cert u,u,u >>> * modutil -disable "NSS Internal PKCS #11 Module" -dbdir .* >>> WARNING: Performing this operation while the browser is running >>> could cause corruption of your security databases. If the browser >>> is currently running, you should exit browser before continuing >>> this operation. Type 'q <enter>' to abort, or <enter> to continue: >>> Slot "NSS Internal Cryptographic Services" disabled. Slot "NSS >>> User Private Key and Certificate Services" disabled. >>> *bash-3.00# modutil -enable "Sun Crypto Accelerator" -dbdir .* >>> WARNING: Performing this operation while the browser is running >>> could cause corruption of your security databases. If the browser >>> is currently running, you should exit browser before continuing >>> this operation. Type 'q <enter>' to abort, or <enter> to continue: >>> Slot "Sun Metaslot" enabled. Slot "Sun Crypto Softtoken" enabled. >>> --- >>> --- >>> --- >>> ------------------------------------------------------------------ >>> --- >>> -------------------------------------------------------------------- >>> Now when I check the kstat for each connection, the rsaprivate is >>> not getting increased, only aesjobs are increased. also tried >>> this test. *cryptoadm disable provider=mca/0 mechanism=all* >>> In this case, the handshake fails. >>> But..., if i disable only RSA in the card, cryptoadm disable >>> provider=mca/0 mechanism=<all RSA mechanisms> *it works, which >>> means that the card is currently used for AES jobs and RSA joba >>> are done at the software level. * >>> >>> >>> The cyrptoadm output is as below, which indicates the card is >>> configured properly. >>> bash-3.00# cryptoadm list >>> User-level providers: Provider: /usr/lib/security/$ISA/ >>> pkcs11_kernel.so Provider: /usr/lib/security/$ISA/ >>> pkcs11_softtoken_extra.so >>> Kernel software providers: des aes256 >>> arcfour2048 blowfish448 sha1 sha2 >>> md5 swrand >>> Kernel hardware providers: mca/0 >>> >>> >>> Please suggest. >>> >>> >>> --- >>> --- >>> ------------------------------------------------------------------ >>> >>> _______________________________________________ >>> crypto-discuss mailing list >>> crypto-discuss at opensolaris.org >>> http://mail.opensolaris.org/mailman/listinfo/crypto-discuss >> _______________________________________________ >> crypto-discuss mailing list >> crypto-discuss at opensolaris.org >> http://mail.opensolaris.org/mailman/listinfo/crypto-discuss >