Telecommunication Laboratories Chunghwa Telecom CHTS200202 HARDWARE SECURE MODULE User Manual SafGuard200 user guide for FCC

Telecommunication Laboratories , Chunghwa Telecom Co., Ltd HARDWARE SECURE MODULE SafGuard200 user guide for FCC

Contents

USERS MANUAL 2

Download: Telecommunication Laboratories Chunghwa Telecom CHTS200202 HARDWARE SECURE MODULE User Manual SafGuard200 user guide for FCC
Mirror Download [FCC.gov]Telecommunication Laboratories Chunghwa Telecom CHTS200202 HARDWARE SECURE MODULE User Manual SafGuard200 user guide for FCC
Document ID389628
Application IDHeUKl+J6AZcjkX74b1WZGg==
Document DescriptionUSERS MANUAL 2
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize195.39kB (2442408 bits)
Date Submitted2004-01-16 00:00:00
Date Available2004-01-16 00:00:00
Creation Date2004-01-12 06:04:48
Producing SoftwareAcrobat Distiller 5.0 (Windows)
Document Lastmod2004-01-16 09:44:29
Document TitleSafGuard200 user guide for FCC..PDF
Document CreatorPScript5.dll Version 5.2
Document Author: BETTY

Fig. 4-32 Deactivate an APKey(User Logout)
4.2.7.3. Produce PKCS10 Request File
Selecting the AP Key from the List to produce its PKCS10 request
file, then pressȜproduce PKCS10 request fileȝǶ
Figure 4-33 Produce PKCS10 Request File
4.2.8 Enable or Disable Key (UNIX_LIKE)
You need toexecute the SafGuard200service program (Reference5.2
Solaris/Linux driver installation manual), then the UNIX KeyManagement
Toolcan be executed.
The execute file of UNIX KeyManagement Tool is KeyMng which has two
operation mode.
1.
KeyMng –wǺFrame/Win mode
In this mode, the program can be operated by using the key (ʅ
ʆ ʇ ʈ), or directly press “1”, ”2” ,”3”…and so on.
Fig. 4-34 The screen of Frame Mode operation
2.
KeyMng –cǺCommand line mode
In this mode its operatoion is like mode 1, and the only
difference is that mode 2 can not be operated by using the key (ʅ
ʆ ʇ ʈ)
Figure 4-35 the screen of Command mode operation
The screen of UNIX KeyManagement Tool is explained by Command
mode.
4.2.8.1 Enable Key
1.
Selecting 1)Enable Key on the main screen (Reference
2.
Figure 4-35)Ƕ
Selecting the type of the key you want to enable
Fig. 4-36 Selecting the type of key
3.
Selecting the key you want to enable, and displaying the key
information according to .ini file. You need to make sure that
apkfile.ini file has been updated.
Fig. 4-37 Enable Key
4.2.8.2 Disable Key
In this section, disable key is also called key Logout
1.
2.
3.
Selecting 2)Key Logout (Reference Figure 4-35)Ƕ
Selecting the type of the key, reference Figure 4-36Ƕ
Selecting the key
Fig. 4-38 Key Logout
5. SafGuard200 Installation
5.1 Installation of Windows2000 Driver
5.1.1
Installation
First, install SafGuard200 driver and key management tool to Win2000Ǻ
The program for SafGuard200 driver
Hsm_Server.exe: Win2000 Service program, SafGuard200 driver
The program for Key management:
KeyManage.exe: Key Management Tool
Findptrs.avi: pictures for key management program
BfiveUcs.dll ᆶ Mfc42.dll: Programs used for dynamic linking
Execute the Hsm_Server.exe in the installation directory
Fig. 5-1 The screen for executing Hsm_Service.exe
Gvodujpo efubjmt ;
Jotubmmjoh!tfswjdf!qsphsbn!!Ǻ!
jotubmmjoh!TbgHvbse311!tfswjdf!qsphsbnt!!
Jotubmmjoh!boe!fobcmf!tfswjdf!qsphsbnǺ!!
Jotubmmjoh!tfswjdf!qsphsbn!jo!uif!tztufn!boe!fyfdvuf!uif!tfswjdf!
qsphsbn/!
Fobcmf!TbgHvbse311!tfswjdf!qsphsbn!Ǻ!!
Fyfdvuf!tfswjdf!qsphsbn!
Sfnpwf!Tfswjdf!qsphsbn!!!!!!!Ǻ!!
Sfnpwf!uif!tfswjdf!qsphsbn!gspn!uif!tztufn/!
Shut down service program
Ǻ
Shut down the service program!
After executing Hsm_Server.exe, click [Installing SafGuard200 service
program] or [Installing and enable SafGuard200 service program], then press ok
button, as shown in the following Figure. If you click[Installing and
enableSafeGuard200 service program], the service program will be executed after
installion.
Fig. 5-2 The screen of installing service program
5.1.2
Enable Service Program
After installition, click [EnableSafGuard200 service program] , then click ok
button, the service program can be enabled.
Gjh/6.4!Uif!tdsffo!pg!fobcmf!uif!tfswjdf!qsphsbn
After completing all previous tasks, you can find the icon of running
HSM_Server at right bottom corner of Win2000. If the color of this icon is
, it means that the SafGuard200 has been connected, otherwise the
green, like
. At this point, you can press right button of
color of the icon will be red like
the mouse to quit HSM_Server. Its function as shown in the following
Fig. 5-4 The Screen fo enabling HSM_Server
Function details:
SafGuard IP Address : Displaying theGroup name and IP address of SafGuard200
as shown in the followingǺ
Fig. 5-5 SafGuard IP Address
The modifyingbutton can only be used when the SafGuard200 is disconnected.
The screen is given as the following:
Fig. 5-6 Modifying the SafGuard200 IP Address
Ping HSM_IP : Executing ping program as the following
Fig. 5-7 Ping HSM_IP
KEY_MANAGER : Executing Key_Managerprogram
Figure 5-8 KeyManager
Connecting SafGuard200 : connecting to SafGuard200
Fig. 5-9 Connecting Successfully
Fig. 5-10 Connecting fail
Disconnect SafGuard200 : disconnecting SafGuard200
Fig. 5-11
Disconnecting Successfully
About : Displaying the version and date of HSM_Sever program
Figure 5-12 About
Eixt : Quit the HSM_Server program.
5.1.3
Remove Service Program
(1)
Executing HSM_Server.exe in the installing directory, click [Remove
service program] and then click ok button. the service program, HSM_Server,
will be removed from the system.
Fig. 5-13 The screen of removing service program
(2) Bgufs!sfnpwf!bmm!gjmf!jo!uif!jotubmmjoh!ejsfdupsz-!uif!pqfsbujpo!
pg!sfnpwjoh!jt!dpnqmfufe/
5.2 Installation of Solaris/Linux driver
(1) First copy the SafGuard200 drivre to UNIX- like system, includingǺ
1. HSMDriver.sh (batch file, start/stop command file)
2. server (main program)
3. SafeGuardStop (stoping running executing file)
4. safeguard.ini ( information about SafGuard200)
Safeguard.ini need to be replaced by safeguard.ini generatred by previous
key management tool.
(2) Exectuing in the installation directory
HSMDriver.sh –s : Start SafGarud200 driver program
HSMDriver.sh –stop SafGurad200 driver program
HSMDriver.sh –i : check the state of connecting
betwenSafGuard200 ad driver.
Fig. 5-14 The service program on UNIX-Like system
5.3 Active_Ap_Key_file Directory
The Active_Ap_Key_file directory is used to store parameters for enabling
key, the file name is assigned as the following
AP_UseKey_ (the type of the Key: RSA_1024o r RSA_4096 )_(store in
SafGuard200).iniǶTherefore, if AP_KEY is RSA4096, and it is stored at location
1 of SafGuard200, then its parameter file name is AP_UseKey_RSA_4096_1.ini.
Besides Ǵthis file will be fail whenever the hardware is reset. So you need to
check the parameter file and make sure it is the latest version. ( Please copy the
parameter file to your AP directory.
Note : this directory can be created only after the key management tool has
beenexecuted. About how to enable the keys, please reference to manual
4.2key management tool
5.4 The Directory PubKey_file
PubKey_file: the directory for storing public key
Pubkey_file\*.inf
sub publickey info
Pubkey_file\*_CertReq.PKCS10
PKCS10 Certification Request
Pubkey_file\*_CertReqSign.b64
B64 encoded PKCS10 Certification
Request file (with digital signature)
Pubkey_file\*_CertReqSign.PKCS10
PKCS10 Certification Request with
digital signature
Pubkey_file\*_dn.hex
The necessary DN hex values to
enable CA
Table 5-1 Filesabout public keys
Note * represents the name of AP_KEY
Note : This directory can be created only when KeyManagerTool has been
executed. About the way to generation please reference to manual 4.2Key
management functionǶ
6. The Installation And Operation Of The
Auditing Server
6.1 Installation
6.1.1
Step 1. :
Decompress the AuditingServer.zip file into a temporary directory, eg. C:\TMPǶ
6.1.2
Step 2. :
Change to the directory containing the decompressed files, and double click
Setup.exe to start the installation procedure.
6.1.3
Step 3. :
Follow the prompts and instructions of Setup.exe to install Auditing ServerǶ
6.2 Activation
6.2.1
Step 1. :
Click the ”Start” button of Windows and from the “Program” menu, select the
“HSM_Audit_Server “ item in the “Secure Hardware 2.0 Auditing Server” group
to activate the Auditing Server.
6.2.2
Step 2. :
After the activation, an icon of the Auditing Server located on the right- lower
corner of Windows task bar can be seen.
This represents that the Auditing Server has been successfully activated and is
running well.
6.3 Install As A Service
Click the ”Start” button of Windows and from the “Program” menu, select
the ”service” item inside the ”Install HSM_Audit_Server as a Service” of the
“Secure Hardware 2.0 Auditing Server” group, this installs the Auditing Server as
a service of Windows. Thereafter the Auditing Server will be activated each time
Windows boots.
If an immediate activation of the Auditing Server is required, click “Run
HSM_Audit_Server Service” item in the same group.
6.4 Show The Status Of the Auditing Server
1. When there is no Secure Hardware connected with the Auditing Server, the
icon located on the right-lower corner of Windows is gray. The icon turns green
while there is any Secure Hardware connection. Locate the mouse cursor above
the icon, and the IP address of the connected Secure Hardware will be displayed
accordingly.
2. Double click the icon, or click the right button of the mouse on the icon and
select ”Show Operating State”, the Operating state information between Secure
Hardware and Auditing Server will be shown.
3. On the icon click the right button of the mouse and select ” Connected HSM
IP” to display the IP address of the connected Secure Hardware.
4. On the icon click the right button of the mouse and select ” LogViewer” to
activate LogViewer and review the auditing logs. This can also be achieved by
clicking the ”Start” button of Windows, and from the “Program” menu select
the ”Logviewer” item in the “Secure Hardware 2.0 Auditing Server” group.
6.5 Stop The Auditing Server
On the icon click the right button of the mouse and select ”Exit” to stop the
Auditing Server.
6.6 Stop And Remove The Auditing Server Service
Click the ”Start” button of Windows, and from the “Program” menu select ”Stop
HSM_Audit_Server Service” item in the “Secure Hardware 2.0 Auditing Server”
group to stop the Auditing Server Service. Select ”Remove HSM_Audit_Server
Service” item in the same group to remove the Auditing Server Service.
6.7 Uninstall The Auditing Server
Click the ”Start” button of Windows, and from the “Program” menu
select ”Uninstall HSM_Audit_Server” item in the “Secure Hardware 2.0 Auditing
Server” group to uninstall the Auditing Server.
7. The Log Viewer
7.1 System Requirements
„
Hardware RequirementǺ
„
x86 PCǴ 256MB RAM or above
Operation SystemǺ
MS Windows NT 4.0 or later.
7.2 Operation
7.2.1
Start The Log Viewer
Execute LogViewer.exe and a Windows menu is shown as the following picture
depicts.
Fig. 7.1 LogViewer.exe
7.2.2
Function Description
Open a directory to store the audit files:
52
-TL Proprietary-
Select a proper directory that can store the audit files, as the following picture depicts:
Fig. 7.2 Open a directory to store the audit files
And the audit files under that directory will be shown as the following picture depicts.
Fig. 7.3 Showing audit files
If there is no audit file under the selected directory, a warning message is shown as the
following picture depicts.
53
-TL Proprietary-
Fig . 7.4 No audit file is found under that directory
Refresh the auditing directory.
Read the information of the Public Key:
Select the secure hardware SO and the user’s public key files.
Fig. 7.5 Select the secure hardware SO and the user’s public key files
Fig. 7.6 List the secure hardware SO and the user’s public key
54
-TL Proprietary-
Reload the content of Audit files:
About:
LogViewer Copyright information.
Fig. 7.7 LogViewer Copyright information
7.3 View The Log
7.3.1
Select The Audit File To View:
Select the audit file of interest with the mouse, as the following picture depicts.
Gjh/!8/9!Select the audit file to view
55
-TL Proprietary-
7.3.2
View The Detailed Record:
Click on the selected audit record to view the detailed information, as the
following picture depicts.
Gjh/!8/:!View!the!detailed!record
7.3.3
Display the Apk public key:
Select the Apk public key from the detailed record menu, and the key value is
shown as the following picture depicts.
56
-TL Proprietary-
Gjh/!8/21!Display the Apk public key
Click on the Apk public key to view its value, as the following picture depicts.
Gjh/8/22!Apk public key
57
-TL Proprietary-
7.4 The Event Code Of Audit Records
Table 7.1 The data type and length of auditing records
Label
Type
Length (byte)
Length
Int
Event ID
Int
Audit Time
Char
14
HSM serial number
Int
HSM IP address
Char
Audit flag
Int
Audit server IP
Char
Audit server Port
Int
SO ID
Int (0-3)
SO public key
Char
128
User ID
Int (4-12)
User Public Key
Char
128
User Count
Int
AP key type
Int
AP key ID
Int
AP key ACL
Char
45
Ap key public key
Char
128,256,512
Hash (MK)
Char
20
HK public key
Char
128
Result
Int
Signature
Char
128
Table 7.2 Initial states of audit events
Event
Event
Data
code
Configure Real- Time Clock
0001
Length+ Event ID+ Audit Time+
HSM serial number+ Result
Generate Master Key
0002
Length+ Event ID+ Audit Time+
HSM serial number+ Hash(MK)+
Result
Import Master Key
0003
Length+ Event ID+ Audit Time+
HSM serial number+ Hash(MK)+
Result
Create Security Officer key
0004
Length+ Event ID+ Audit Time+
HSM serial number+ SO ID+ Result
Import Security Officer key
0005
Length+ Event ID+ Audit Time+
HSM serial number+ SO ID+ SO
public key+ Result
Generate Hardware key
0006
Length+ Event ID+ Audit Time+
HSM serial number+ HK public key+
58
-TL Proprietary-
Result
Configure HSM IP, Audit
0007
Length+ Event ID+ Audit Time+
flag, Audit server IP & port
HSM IP+ HSM serial number+ Audit
flag+ Audit IP+ Audit Port+ Result
Since there’s no operator ID for the initial state, the events on table 7.2 just send the event
code and data to the audit server, no signature attached.
Table 7.3 operational state audit events
Event
Data
code
Configure Real- Time Clock
0001
Length+ Event ID+ Audit Time+
HSM serial number+ Result
Generate Master Key
0002
Length+ Event ID+ Audit Time+
HSM serial number+ Hash(MK)+
Result
Import Master Key
0003
Length+ Event ID+ Audit Time+
HSM serial number+ Hash(MK)+
Result
Create Security Officer key
0004
Length+ Event ID+ Audit Time+
HSM serial number+ SO ID+ Result
Import Security Officer key
0005
Length+ Event ID+ Audit Time+
HSM serial number+ SO ID+ SO
public key+ Result
Generate Hardware key
0006
Length+ Event ID+ Audit Time+
HSM serial number+ HK public key+
Result
Configure HSM IP, Audit
0007
Length+ Event ID+ Audit Time+
flag, Audit server IP & port
HSM IP+ HSM serial number+ Audit
flag+ Audit IP+ Audit Port+ Result
Event
Set Network Configuration
1000
Change Real- Time Clock
1001
Create SO
1002
Generate Hardare key
1004
Create User
1006
Length+ Event ID+ SO ID+ SO ID+
Audit Time+ HSM serial number+
HSM IP+ HSM Port+ Result+
Signature (so id 1)+ Signature (so id
2)
Length+ Event ID+ SO ID+ SO ID+
Audit Time+ HSM serial number+
Change Time+ Result+ Signature (so
id 1)+ Signature (so id 2)
Length+ Event ID+ SO ID+ SO ID+
Audit Time+ HSM serial number+
Create SO ID+ Result+ Signature (so
id 1)+ Signature (so id 2)
Length+ Event ID+ SO ID+ SO ID+
Audit Time+ HSM serial number+
HK public key+ Result+ Signature
(so id 1)+ Signature (so id 2)
Length+ Event ID+ SO ID+ SO ID+
Audit Time+ HSM serial number+
59
-TL Proprietary-
Import User key
1007
Erase ALL AP key
1008
Switch to Initialization state
& Erase ALL keys
1009
Generate AP Key
2000
Import AP key
2001
Delete AP Key
2002
Backup APK shares onto IC
Card
2003
Set APK ACL
2004
Set APK active (User)
2005
User ID+ User Public key+ Result+
Signature (so id 1)+ Signature (so id
2)
Length+ Event ID+ SO ID+ SO ID+
Audit Time+ HSM serial number+
Import User ID+ User Public Key+
Result+ Signature (so id 1)+
Signature (so id 2)
Length+ Event ID+ SO ID+ SO ID+
Audit Time+ HSM serial number+
Result+ Signature (so id 1)+
Signature (so id 2)
Length+ Event ID+ SO ID+ SO ID+
Audit Time+ HSM serial number+
Result+ Signature (so id 1)+
Signature (so id 2)
Length+ Event ID+ SO ID+ SO ID+
Audit Time+ HSM serial number+
AP Key Type+ AP Key ID+ AP Key
Public Key+ Result+ Signature (so id
1)+ Signature (so id 2)
Length+ Event ID+ SO ID+ SO ID+
Audit Time+ HSM serial number+
AP Key Type+ AP Key ID+ Import
APK Public key+ Result+ Signature
(so id 1)+ Signature (so id 2)
Length+ Event ID+ SO ID+ SO ID+
Audit Time+ HSM serial number+
AP Key Type+ AP Key ID+ Result+
Signature (so id 1)+ Signature (so id
2)
Length+ Event ID+ SO ID+ SO ID+
Audit Time+ HSM serial number+
AP Key Type+ AP Key ID+ Result+
Signature (so id 1)+ Signature (so id
2)
Length+ Event ID+ SO ID+ SO ID+
Audit Time+ HSM serial number+
AP Key Type+ AP Key ID+ ACL+
Result+ Signature (so id 1)+
Signature (so id 2)
Length+ Event ID+ User Count+
User ID…. + Audit Time+ HSM
serial number+ AP Key Type+ AP
Key ID+ Result+ Signature (user id
1…. )
The events on table 7.3 require HSM to compute a SHA1 hash of the data (from Event ID to
Result), and then use the operator’s private key to sign the hash.
60
-TL Proprietary-

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.4
Linearized                      : No
Create Date                     : 2004:01:12 06:04:48Z
Modify Date                     : 2004:01:16 09:44:29+08:00
Page Count                      : 30
Creation Date                   : 2004:01:12 06:04:48Z
Mod Date                        : 2004:01:16 09:44:29+08:00
Producer                        : Acrobat Distiller 5.0 (Windows)
Author                          : BETTY
Metadata Date                   : 2004:01:16 09:44:29+08:00
Creator                         : BETTY
Title                           : SafGuard200 user guide for FCC..PDF
Has XFA                         : No
EXIF Metadata provided by EXIF.tools
FCC ID Filing: RPXCHTS200202

Navigation menu