On 08/19/09 10:49, Rishi Renjith wrote:
> Hello,
> The manual explains how to configure apache with mod_ssl. We want to use 
> mode_nss with apache.
> 
> Also we tried disabling the softtoken by giving
> modutil -disable "sun crypto accelerator" -slot "sun pkcs11 softtoken"
> 
> but it doesn't seem working, it again shows as enabled!!!
> 
> Also the sca manual mentions that you can configure metaslot to use the 
> h/w by using
> Cryptoadm enable metaslot token=ks
> This also we did but same result.
> 
> Are we missing any more config here?

Possibly - I haven't set up apache with mod_nss and our card so I can't 
answer that question.   Its odd that you can't seem to get away from 
using softtoken even though you've made the config changes I would have 
suggested... maybe someone from the solaris side will have an answer?

-gary

> ( the aes jobs are getting incremented in the kstat, so aes jobs are 
> done in the card)
> 
> On 19-Aug-09, at 8:56 PM, Gary.Morton at Sun.COM wrote:
> 
>> Look at the the SCA 6000 user's guide - configuring apache is documented.
>>
>> http://docs.sun.com/app/docs/prod/accel.600.brd?l=en&a=view
>>
>> -gary
>>
>> On 08/19/09 09:16, Gary.Morton at Sun.COM wrote:
>>> It looks like you are configured to use softtoken so the rsa private 
>>> requests are handled there rather than the sca6000
>>> -gary
>>> On 08/19/09 07:34, Rishi Renjith wrote:
>>>> Hello, I tried creating a NSS database, linking it with crypto card 
>>>> and connecting using apache mod_nss. Everything works fine, except 
>>>> that the *rsaprivate *jobs are not getting increased in the kstat of 
>>>> the card.
>>>> This is what I did.
>>>> *bash-3.00# cd ../nssdb* *bash-3.00# rm ** *bash-3.00# certutil -N 
>>>> -d .* Enter a password which will be used to encrypt your keys. The 
>>>> password should be at least 8 characters long, and should contain at 
>>>> least one non-alphabetic character.
>>>> Enter new password: Re-enter password: * *
>>>> *bash-3.00# ls* cert8.db   key3.db    secmod.db *bash-3.00# chmod 
>>>> 777 ** *bash-3.00# modutil -dbdir . -nocertdb -force -add "Sun 
>>>> Crypto Accelerator" -libfile /usr/lib/libpkcs11.so -mechanisms 
>>>> RSA:DSA:RC4:DES* Module "Sun Crypto Accelerator" added to database. 
>>>> *bash-3.00# modutil -list -dbdir . * Listing of PKCS #11 Modules 
>>>> -----------------------------------------------------------   1. NSS 
>>>> Internal PKCS #11 Module          slots: 2 slots attached         
>>>> status: loaded
>>>>         slot: NSS Internal Cryptographic Services         token: NSS 
>>>> Generic Crypto Services
>>>>         slot: NSS User Private Key and Certificate Services         
>>>> token: NSS Certificate DB
>>>>  2. Sun Crypto Accelerator         library name: 
>>>> /usr/lib/libpkcs11.so          slots: 2 slots attached         
>>>> status: loaded
>>>>         slot: Sun Metaslot         token: Sun Metaslot
>>>>         slot: Sun Crypto Softtoken         token: Sun Software 
>>>> PKCS#11 softtoken 
>>>> ----------------------------------------------------------- 
>>>> *bash-3.00# certutil -S -x -n "cert309" -t "u,u,u" -k rsa -g 1024 -v 
>>>> 120 -s "cn=nobody,ou=Org,o=Sun,L=Santa Clara,ST=California,C=US" -d 
>>>> . -h "Sun Metaslot"* *Enter Password or Pin for "Sun Metaslot":*
>>>> A random seed must be generated that will be used in the creation of 
>>>> your key.  One of the easiest ways to create a random seed is to use 
>>>> the timing of keystrokes on a keyboard.
>>>> To begin, type keys on the keyboard until this progress meter is 
>>>> full.  DO NOT USE THE AUTOREPEAT FUNCTION ON YOUR KEYBOARD!
>>>> Continue typing until the progress meter is full:
>>>> |************************************************************|
>>>> Finished.  Press enter to continue:
>>>> Generating key.  This may take a few moments...
>>>> Enter Password or Pin for "Sun Software PKCS#11 softtoken":
>>>> *bash-3.00# certutil -K -d .* certutil: Checking token "NSS 
>>>> Certificate DB" in slot "NSS User Private Key and Certificate 
>>>> Services" Enter Password or Pin for "NSS Certificate DB": certutil: 
>>>> no keys found *bash-3.00# certutil -K -d . -h "Sun Software PKCS#11 
>>>> softtoken"* certutil: Checking token "Sun Software PKCS#11 
>>>> softtoken" in slot "Sun Crypto Softtoken" Enter Password or Pin for 
>>>> "Sun Software PKCS#11 softtoken": certutil: no keys found 
>>>> *bash-3.00# certutil -K -d . -h "Sun Metaslot"* certutil: Checking 
>>>> token "Sun Metaslot" in slot "Sun Metaslot" Enter Password or Pin 
>>>> for "Sun Metaslot": < 0> rsa      
>>>> 204a23dbb2e82d7d8c1495e3374dcd4462423e4c   Sun Metaslot:cert309 < 1> 
>>>> rsa      54ea6d93df1cfef13064aedc6f6c7f0dce34e7b6   Sun 
>>>> Metaslot:cert147 < 2> rsa      
>>>> 34d4a4974cf325e735dd23bb3a6b4680249f3550   (orphan) < 3> rsa      
>>>> 2018eecb4c05eb25cd30be4de6f13ccaeadcb43d   Sun Metaslot:cert1151 < 
>>>> 4> rsa      61932a2d796fd8f6e82949059176e980cde5c55a   sanCert < 5> 
>>>> rsa      4e752a9b4a76c1462d9aec76de1617e08d07ff42   Sun 
>>>> Metaslot:ismc_cert
>>>> *bash-3.00# certutil -L -d .*
>>>> Certificate Nickname                                         Trust 
>>>> Attributes
>>>> SSL,S/MIME,JAR/XPI
>>>> *bash-3.00# certutil -L -d . -h "Sun Software PKCS#11 softtoken"*
>>>> Certificate Nickname                                         Trust 
>>>> Attributes
>>>> SSL,S/MIME,JAR/XPI
>>>> Enter Password or Pin for "Sun Software PKCS#11 softtoken": 
>>>> *bash-3.00# certutil -L -d . -h "Sun Metaslot"*
>>>> Certificate Nickname                                         Trust 
>>>> Attributes
>>>> SSL,S/MIME,JAR/XPI
>>>> Enter Password or Pin for "Sun Metaslot": Sun 
>>>> Metaslot:cert309                                         u,u,u Sun 
>>>> Metaslot:cert147                                         u,u,u Sun 
>>>> Metaslot:cert1151                                        u,u,u Sun 
>>>> Metaslot:sanCert                                         u,u,u Sun 
>>>> Metaslot:CACERT CA                                       ,, Sun 
>>>> Metaslot:ismc_cert                                       u,u,u
>>>> * modutil -disable "NSS Internal PKCS #11 Module"  -dbdir .*
>>>> WARNING: Performing this operation while the browser is running 
>>>> could cause corruption of your security databases. If the browser is 
>>>> currently running, you should exit browser before continuing this 
>>>> operation. Type 'q <enter>' to abort, or <enter> to continue:
>>>> Slot "NSS Internal Cryptographic Services" disabled. Slot "NSS User 
>>>> Private Key and Certificate Services" disabled.
>>>> *bash-3.00# modutil -enable "Sun Crypto Accelerator"  -dbdir .*
>>>> WARNING: Performing this operation while the browser is running 
>>>> could cause corruption of your security databases. If the browser is 
>>>> currently running, you should exit browser before continuing this 
>>>> operation. Type 'q <enter>' to abort, or <enter> to continue:
>>>> Slot "Sun Metaslot" enabled. Slot "Sun Crypto Softtoken" enabled.
>>>> ---------------------------------------------------------------------------
>>>>  
>>>> -----------------------------------------------------------------------
>>>> Now when I check the kstat for each connection, the rsaprivate is 
>>>> not getting increased, only aesjobs are increased.  also tried this 
>>>> test. *cryptoadm disable provider=mca/0 mechanism=all*
>>>> In this case, the handshake fails.
>>>> But..., if i disable only RSA in the card, cryptoadm disable 
>>>> provider=mca/0 mechanism=<all RSA mechanisms> *it works, which means 
>>>> that the card is currently used for AES jobs and RSA joba are done 
>>>> at the software level. *
>>>>
>>>>
>>>> The cyrptoadm output is as below, which indicates the card is 
>>>> configured properly.
>>>> bash-3.00# cryptoadm list
>>>> User-level providers: Provider: 
>>>> /usr/lib/security/$ISA/pkcs11_kernel.so Provider: 
>>>> /usr/lib/security/$ISA/pkcs11_softtoken_extra.so
>>>> Kernel software providers:         des         aes256         
>>>> arcfour2048         blowfish448         sha1         sha2         
>>>> md5         swrand
>>>> Kernel hardware providers:         mca/0
>>>>
>>>>
>>>> Please suggest.
>>>>
>>>>
>>>> ------------------------------------------------------------------------ 
>>>>
>>>>
>>>> _______________________________________________
>>>> crypto-discuss mailing list
>>>> crypto-discuss at opensolaris.org
>>>> http://mail.opensolaris.org/mailman/listinfo/crypto-discuss
>>> _______________________________________________
>>> crypto-discuss mailing list
>>> crypto-discuss at opensolaris.org
>>> http://mail.opensolaris.org/mailman/listinfo/crypto-discuss
>>


Reply via email to