ADYTON Reference Guide

Transcription

ADYTON Reference Guide
REFERENCE GUIDE
ADYTON
revolutionary
security
•••••• an atos company
ADYTON reference guide
Legal disclaimer and copyrights
The information in this document is subject to change without notice and shall not be construed as a
commitment by Atos Worldline S.A./N.V. (“Worldline”)
The content of this document, including but not limited to trademarks, designs, logos, text, images, is
the property of Worldline and is protected by the Belgian Act of 30.06.1994 related to author’s rights and
by the other applicable Acts.
The word ADYTON and other trademarks used in this document are the property of Worldline. Worldline
trademarks used in this document are indicated. Linux is a registered trademark of Linus Torvalds, Java
is a registered trademark of Sun Microsystems Inc. and ARM is a registered trademark of ARM Limited.
The contents of this document can be reproduced by or on behalf of third parties with the prior written
consent of Worldline and following its instructions. Worldline accepts no responsibility for errors and
omissions introduced when translating or reworking this document.
Except with respect to the limited licence to download and print certain material from this document for
non-commercial and personal use only, nothing contained in this document shall grant any licence or
right to use any of Worldline's proprietary material.
While Worldline has made every attempt to ensure that the information contained in this document is
correct, Worldline does not provide any legal or commercial warranty on the document that is described
in this specification. The technology is thus provided “as is” without warranties of any kind, expressed
or implied, included those of merchantability and fitness for a particular purpose. Worldline does not
warrant or assume any legal liability or responsibility for the accuracy, completeness, or usefulness of
any information, product or processes disclosed.
To the fullest extent permitted under applicable law, neither Worldline nor its affiliates, directors,
employees and agents shall be liable to any party for any damages that might result from the use of the
technology as described in this document (including without limitation direct, indirect, incidental, special,
consequential and punitive damages, lost profits).
These terms shall be governed by and construed in accordance with the laws of Belgium. You
irrevocably consent to the jurisdiction of the courts located in Brussels for any action arising from or
related to the use of this document.
Document information
document title
ADYTON reference guide
security
unrestricted
last modified
24 September 2014
owner
Filip Demaertelaere
author
Niels Grundtvig Nielsen
product version
1.0
document release 3.41
© Worldline 2013, 2014
ad_rfgCover.fm
last updated 24/9/14
public
document release 3.41
REFERENCE GUIDE
ADYTON
Contents
Introduction ............................................................................................................ 1
Design ................................................................................................................ 1
What’s new in this version .................................................................................. 2
Change log ......................................................................................................... 2
ADYTON overview.................................................................................................. 5
ADYTON rack..................................................................................................... 7
Accessories ........................................................................................................ 8
Chip card ...................................................................................................... 8
For standalone installation............................................................................ 8
Cables for rack installation ........................................................................... 8
USB stick (not included) ............................................................................... 8
User roles................................................................................................................ 9
Administrator ...................................................................................................... 9
Security Officer ................................................................................................... 9
Key custodian ................................................................................................... 10
Interfaces .............................................................................................................. 11
Display.............................................................................................................. 11
Keypad ............................................................................................................. 13
Authentication devices ..................................................................................... 14
Installing and setting up ADYTON...................................................................... 15
Standalone or rack-mounted ............................................................................ 15
Power up .......................................................................................................... 15
Insert ADYTON in rack ..................................................................................... 16
Remove ADYTON from rack ...................................................................... 16
Initial configuration ........................................................................................... 17
Operating ADYTON .............................................................................................. 21
Logging on........................................................................................................ 21
Logging off........................................................................................................ 21
Screensaver mode ........................................................................................... 21
Reboots and availability ................................................................................... 22
Filter ................................................................................................................. 23
Audit trail .......................................................................................................... 24
Warnings .......................................................................................................... 25
i
PUBLIC
adytonRFGTOC.fm
document release 3.41
last updated 24/9/14
REFERENCE GUIDE
ADYTON
Network services.................................................................................................. 27
Specifications....................................................................................................... 29
ADYTON module.............................................................................................. 29
Rack ................................................................................................................. 30
Interfaces (ADYTON and rack) ........................................................................ 30
Certification and compliance ............................................................................ 31
Menu tree .............................................................................................................. 33
Keys ................................................................................................................. 34
Users ................................................................................................................ 36
Device .............................................................................................................. 37
Network ............................................................................................................ 38
Status ............................................................................................................... 39
Update.............................................................................................................. 40
Downtime during reboot ............................................................................. 40
Appendix A. Working with the audit trail ........................................................... 41
Reading the audit trail ...................................................................................... 42
Verifying the audit trail...................................................................................... 43
Appendix B. Editing and updating the licence .................................................. 45
Editing .............................................................................................................. 46
Updating a licence............................................................................................ 47
Appendix C. Configuring an SSL connection ................................................... 49
Appendix D. Custody procedures and secure transport ................................. 51
Secure transport............................................................................................... 51
Appendix E. ADYTON MIB files .......................................................................... 53
Key information ................................................................................................ 53
Keyset footprint ................................................................................................ 53
Software footprint ............................................................................................. 54
Performance..................................................................................................... 54
SNMP Trap....................................................................................................... 54
ii
last updated 24/9/14
PUBLIC
document release 3.41
adytonRFGTOC.fm
REFERENCE GUIDE
ADYTON
Introduction
Secure data transaction systems – including token generation, transaction processing,
digital signatures, data protection – rely on a fast and powerful Hardware Security
Module (encryption device). The ADYTON from Worldline offers a revolutionary solution,
with a radically new hardware-based cryptographic accelerator providing unprecedented
security, speed and user-friendliness.
ADYTON adds a new dimension to overall security by including three authentication
methods: fingerprint, chip-card and password, all easily accessible at the front of the
device. ADYTON guarantees dual control for Administrators and Security Officers.
Meeting all current international standards, ADYTON is also ready to match future
regulatory requirements.
Design
The styling combines fashion and functional perfection – it is the product of ingenious
minds. The aluminium housing removes the need for active cooling such as a fan,
meaning a lower energy footprint, lower noise and higher reliability. The design includes
capacitive keys with distinct illumination, a fingerprint-reader, chip-card-reader, USB
connectors and a high-resolution colour display.
With the robust guide rails on each side, ADYTON easily slides into the ADYTON Rack
frame for simple, secure installation in IT-cabinets. This particular rack features two
physical locks, covered mounting holes, two hot-swappable power supplies and 1-gigabit
LAN connectors.
The design quality of the ADYTON has been recognised by awards including:
•
red dot design award 2012
The red dot is acknowledged as the seal of quality for exceptional product design.
•
IF award 2013
The iF product design award has been an internationally recognized label for
award-winning design for 60 years, a symbol for outstanding design.
1
PUBLIC
ad_rfg_introduction.fm
document release 3.41
last updated 24/9/14
REFERENCE GUIDE
ADYTON
What’s new in this version
When a generated key is shared between key custodians, a timestamp now provides an
additional level of verification. See Key custodian, on page 10.
Audit verification has been simplified. See Working with the audit trail, on page 41. The
Audit trail now includes:
•
•
information on all failed user authentication attempts
every cloning operation
Option 4 View configuration from the Network menu now displays additional information
on SSL authentication failures. See page 38.
Option 7 from the Status menu has been renamed 7 Footprints, and displays an
additional software version checksum. See page 39.
The ADYTON now supports SSL connections on port 4002; see Network services, on
page 27. When using an SSL connection on this port, all exchanges between the
ADYTON and the client are authenticated and may also be encrypted. You can also
select one of three security levels. See Configuring an SSL connection, on page 49.
Information about data elements used by SNMP is now included in ADYTON MIB files,
on page 53. Some extra features have been added to the SNMP functions.
An OID for performance is now provided. See Performance, on page 54.
Changes/updates in this version are highlighted in green and with a change bar.
Significant deletions are struck through in grey.
Change log
document release 3.2
Initial configuration now lets you update software, licences or both; see Step 6.
Update software, on page 19
New options for exporting symmetric keys are described under Keys, on
page 34.
The menu options 1 Push configuration and 2 Pull configuration have been
renamed, though the functionality remains unchanged: see Update, on page 40.
Licence files now include a fixed flag for key-tables: see Editing and updating
the licence, on page 45, which also includes a whitelist of flags that may be
changed.
document release 3.1
More information about how to read an audit trail is included under Reading the
audit trail, on page 42
Information on firewall settings for using network services is in Ports and
services, on page 27.
2
last updated 24/9/14
PUBLIC
document release 3.41
ad_rfg_introduction.fm
REFERENCE GUIDE
ADYTON
document release 3.0
Access to cryptographic services is now licence-based. Each ADYTON licence
specifies the list of available services, and the System Administrator can restrict
availability by turning off one or more services in the list. See Appendix B.
Editing and updating the licence, on page 45, for more information.
document release 2.1
Version 2.1 includes a new menu option to activate/deactivate SNMP traps.
3
PUBLIC
ad_rfg_introduction.fm
document release 3.41
last updated 24/9/14
REFERENCE GUIDE
ADYTON
4
ad_rfg_introduction.fm
– empty for double-sided printing –
REFERENCE GUIDE
ADYTON
ADYTON overview
The ADYTON front panel integrates a high-resolution colour display, a touch-sensitive
keypad, a USB port, a fingerprint reader and a chip-card reader. For more information on
the keypad, including the shift/shortcut functions, see Keypad, on page 13.
abc
def
ghi
jkl
mno
pqrs
tuv
wxyz
1
2
4
8
6
A
B
D
E
i
C
F
9
[
7
5
3
0
Figure 1.
OK
Front panel
Power and networking connectors are easily accessible whether the ADYTON is used
standalone or rack-mounted.
5
PUBLIC
ad_rfg_overview.fm
document release 3.41
last updated 24/9/14
REFERENCE GUIDE
ADYTON
Clearly visible security stickers let you check the integrity of the unit before mounting it
in a rack.
1
7
2
3
6
4
5
Figure 2.
Connectors and security stickers
1
Tamper-evident, holographic sticker (second sticker on underside of
ADYTON)
2
anti-removal lug
3
power supply socket
4
1Gb Ethernet connection
5
USB B (device) connection
6
ADYTON rack interface
7
Kensington lock point
There are two tamper-evident stickers (see Figure 2. Connectors and security stickers,
on page 6) on every ADYTON. Every sticker has its own unique security number, and
uses an extensive range of holographic techniques including:
•
•
•
microtext (for example, the word GENUINE on the crossbar of the A of Atos)
3D and lens effects
rainbow colours that change with the viewing angle
The stickers are also printed on a special backing, so that any attempt to peel them off
or re-use them leaves a visible tear.
6
last updated 24/9/14
PUBLIC
document release 3.41
ad_rfg_overview.fm
ADYTON rack
The 19” rack was specifically designed to reach a high security level and fit in standard
IT cabinets. The lockable security clips (each with its own key) to either side hold the
ADYTON securely in place thanks to its integrated anti-removal lugs. Closed, the
security clips hide the fixation points, front plate screws and rack fixing screws. The USB
connector on the ADYTON remains available.
Figure 3.
ADYTON rack with ADYTON – front view, security clips open
1
2
Figure 4.
ADYTON rack – back view
1
two 1 Gigabit Ethernet connectors
Note: Ethernet IP1 connector is positioned to the RIGHT of Ethernet IP2
connector.
2
two power connectors for redundant, hot-swappable 12V power supply
ADYTON is immediately powered up when inserted into the rack
To remove a power connector, push the locking lever to the right and pull the connector
from its socket.
7
PUBLIC
ad_rfg_overview.fm
document release 3.41
last updated 24/9/14
REFERENCE GUIDE
ADYTON
Accessories
ADYTON chip cards and cables are available as accessories.
Chip card
Figure 5.
Chip card
Chip cards are used for
•
•
user authentication
storing key components
You are recommended to use separate chip cards for user authentication and storage.
Every chip card has a unique serial number.
For standalone installation
•
•
•
1x power adaptor (Mean Well, model no. GS60A12)
input: 100-240VAC, 50/60Hz, 1.4A
output: 12V, 5.0 A, max. 60W
Cables for rack installation
2 x power cords with IEC 60320 C14 power plugs
USB stick (not included)
ADYTON supports standard USB sticks formatted as FAT16 and FAT32.
8
last updated 24/9/14
PUBLIC
document release 3.41
ad_rfg_overview.fm
REFERENCE GUIDE
ADYTON
User roles
ADYTON works with only two user roles: Administrators and Security Officers. The
minimum requirement is to have two Administrators and two Security Officers (A and B;
one per group) enrolled in ADYTON.
Dual authentication is required for most operations, but there are also some freely
accessible functions such as view settings or performance. When dual authentication is
required, the wizards will indicate which user role has to log on.
We recommend enrolling more than two users in each group, to make sure back-ups are
available.
Administrator
The Administrator role is used to enrol users (but not security officers) and perform
configuration tasks. Administrators are grouped together in one single group, indicated
by the icon in the title bar. The title bar also shows the number of logged on
Administrators (0-n).
After two administrators have logged on, tasks that require dual authentication can be
performed without entering the credentials again. The same person may be enrolled both
as an Administrator and as a Security Officer, but must set up different accounts (with
different user names, fingerprints and chip cards) for each role.
The Administrator is also responsible for managing the audit trail; see Audit trail, on
page 24.
While the ADYTON is being configured, the first two administrator accounts can be set
up without logging on. After this, additional administrators can only be enrolled with two
administrators logged on.
Security Officer
The Security Officer role is used for all key management tasks. Security Officer users are
divided into group A and B, indicated by the two icons in the title bar. The icon on the left
refers to Security Officers A and the icon on the right to Security Officers B. The number
of users logged on is indicated in the icons (0-n).
Dual authentication means that at least one Security Officer from each group has to be
logged on.
It is mandatory to use two different security officers (one for each group) to guarantee
dual control. The same individual may be enrolled both as an Administrator and as a
Security Officer, but must set up different accounts (with different user names) for each
role.
9
PUBLIC
ad_rfg_roles.fm
document release 3.41
last updated 24/9/14
REFERENCE GUIDE
ADYTON
While the ADYTON is being configured, the first two security officer accounts can be set
up without logging in. After this, additional security officers can only be enrolled with two
security officers logged in; at least one of them must belong to the same group as the
new security officer.
Key custodian
Key custodians are responsible for key components, including their secure storage.
Their intervention is required when importing cleartext key components (Load Key) or
exporting cleartext key components (Output Key).
Keys are either encrypted or split into two/three components before being handed to key
custodians. When keys are split correctly in a single operation, the same timestamp is
displayed at the start and end of the operation. Each custodian is responsible for only
one component of any key.
Key Custodians do not normally need to be enrolled in ADYTON, though customer
procedures may make it a requirement. They operate under the control of the Security
Officers (dual control).
10
last updated 24/9/14
PUBLIC
document release 3.41
ad_rfg_roles.fm
REFERENCE GUIDE
ADYTON
Interfaces
Thanks to its well-designed interfaces, using ADYTON is as simple as using a smartphone.
•
•
•
•
wizards guide the user through each menu
menu titles and short menu trees help navigating through the menus
icons show the available functions corresponding to a key on the keypad
authentication devices are easily accessible and work very fast
Display
ADYTON uses a high-resolution LCD colour display and a consistent structure for menu
screens.
Figure 6. Display
The display is NOT a touch screen.
title bar
The title bar contains the title of the active menu, and shows which users are
logged on. They are identified by icons on the right-hand end of the title bar.
Icons on the left-hand end of the title bar identify the active menu; there is more
information on menu icons under Menu tree, on page 33.
Table 1 Title bar icons
icon
description
Administrators – the number shows how many administrators are
logged on.
1
Security Officers – Left: Security Officer A; Right: Security Officer B.
The numbers show how many security officers are logged on in each
group.
11
PUBLIC
ad_rfg_interfaces.fm
document release 3.41
last updated 24/9/14
REFERENCE GUIDE
ADYTON
main window
To navigate through the main window use the cursors, shortcut keys or the Back
command. To confirm a selection, touch OK.
function bar
The function bar shows icons for the available functions. Touch the
corresponding key or follow the on-screen instructions to perform the function.
Table 2 Function bar icons
icon
description
Back to main menu. All other shortcuts are also available when this
icon is shown.
OK key
previous page / one step back
left/right cursor (for example, to scroll through keys)
up/down cursor
alphabetic input, lower case (ASCII keys)
alphabetic input, upper case (ASCII keys)
numeric input (ASCII keys)
hexadecimal input (HEX and numeric keys available)
insert ADYTON chip card
remove ADYTON chip card
place finger on fingerprint reader
insert USB device
remove USB device
12
last updated 24/9/14
PUBLIC
document release 3.41
ad_rfg_interfaces.fm
REFERENCE GUIDE
ADYTON
Keypad
The ADYTON touch-sensitive keypad is made up of:
•
•
•
•
•
•
alphanumeric keys (phone-style)
HEX keys, also used as shortcut keys
cursor keys
Shift / Shortcut key
backspace / Back key
OK key (also for use with checkboxes)
abc
def
ghi
jkl
mno
pqrs
tuv
wxyz
1
4
5
8
3
6
A
B
D
E
i
C
F
9
[
7
2
0
OK
Figure 7. Keypad
Touch Shift/Shortcut to:
•
•
enter an upper-case letter from the alphanumeric keys
use a shortcut function (shown in blue) from the HEX keys
The Shift/Shortcut key changes from white to blue. After you enter an upper-case
letter or touch a shortcut key, the Shift/Shortcut key changes back to white.
The following shortcuts are available.
Table 3 Shortcut keys
normal shifted
description
A
Log off (Exit)
Log off users. The Log off menu opens
B
Information
Open the General Information menu and view serial number,
owner name, firmware and package name
C
Main Menu
Back to the main menu
D
View Keys
Display the list of security keys currently loaded
13
PUBLIC
ad_rfg_interfaces.fm
document release 3.41
last updated 24/9/14
REFERENCE GUIDE
ADYTON
Table 3 Shortcut keys (continued)
normal shifted
description
E
Network
View the network configuration
F
Performance
View the current performance values (for example,
commands, used capacity)
Back
Go back one page / one step
OK
Select
select a radio button; select/clear a checkbox
Authentication devices
ADYTON offers three authentication devices on the front panel:
•
Fingerprint reader
The thumbprint is probably the most convenient. When enrolling a user, ADYTON
will need several passes to read the print completely. Do not change fingers while
registering a fingerprint!
Local legislation may restrict the use of biometric data.
•
Chip-card reader
Insert the card with the chip facing to the left.
•
ASCII keypad
Users can enter case-sensitive passwords on the keypad.
Note: When enrolling a user you have to define all three authentication tokens. For
logging on later, the user only needs to use two of them.
14
last updated 24/9/14
PUBLIC
document release 3.41
ad_rfg_interfaces.fm
REFERENCE GUIDE
ADYTON
Installing and setting up ADYTON
To meet PCI SSC requirements for secure transport of cryptographic devices, you must
work with clear procedures that guarantee the chain of custody at all times. An overview
(and a link to the detailed PCI SSC requirements) is included in Custody procedures and
secure transport, on page 51.
Standalone or rack-mounted
ADYTON can be operated as a standalone device on a desktop, or integrated into in ITcabinets with the ADYTON Rack.
Table 4 Characteristics
standalone
Touch
rack-mounted
to switch on ADYTON
one 1Gb Ethernet
ADYTON automatically switched on
two 1Gb Ethernet
power supply via separate 12V adaptor two hot-swappable power supplies
(redundant)
USB device connector on the side of
the module
USB device connector on the front of
the rack
Power up
To power up ADYTON in standalone configuration:
1. plug the power supply cable from the adaptor into the power supply socket on
ADYTON
2. connect the adaptor to a mains power socket
3. touch the power button on the front panel
In rack configuration, ADYTON is powered instantaneously when fully inserted into the
rack.
15
PUBLIC
ad_rfg_setup.fm
document release 3.41
last updated 24/9/14
REFERENCE GUIDE
ADYTON
Insert ADYTON in rack
ADYTON has two guide rails on each side for installing the device in the ADYTON rack.
To insert ADYTON into the rack:
1. open the rack doors fully
2. carefully slide the ADYTON into the rack
3. connect the two redundant power supplies
You can also connect the power supplies before inserting the ADYTON into the
rack.
4. close and lock the doors
Remove ADYTON from rack
To remove ADYTON from the rack:
1. unlock and open the rack doors
2. carefully slide the ADYTON out of the rack
3. close the doors
16
last updated 24/9/14
PUBLIC
document release 3.41
ad_rfg_setup.fm
REFERENCE GUIDE
ADYTON
Initial configuration
At the first power up, ADYTON will start the initialisation wizard, which will guide you
through the process. The initialisation status is indicated by the Wizard icon in the title
bar.
The first three screens in the initialisation process are:
•
Welcome screen
From any point in the wizard you can go back to this screen by touching Shift/
Shortcuts and then the Main menu shortcut.
•
General Information screen
Displays the serial number, owner name, firmware and installed package. You
cannot modify this information, but it may be used for audit purposes (serial number,
version).
•
ADYTON name screen
Enter a name with the ASCII-Keys. Use the [Shift]-key for upper case. The setting
is displayed in the function bar by ABC or abc
If you make a mistake during initialisation, touch Shift/Shortcuts and then the Main menu
shortcut to go back to the Welcome screen and start again. Any information you had
already entered will be discarded. You cannot go back one step.
If you reboot during the initialisation, ADYTON will go to the step where you rebooted.
After the first three screens the initialisation wizard guides you through the six steps of
the initial configuration.
Note: after you configure the network connection or connections, you can complete
the ADYTON configuration manually or duplicate the configuration of another
ADYTON.
Step 1.
Configure network connection
Prepare the following information: IP-address, Subnet Mask and Gateway.
•
Standalone
In standalone configuration there is only one Ethernet connector available. The
wizard will only guide you through the setup of IP1.
When placed in an ADYTON rack, ADYTON will ask you for the IP2 configuration
after starting up.
•
Rack configuration
In the rack, ADYTON can use two Ethernet connections (IP1 and IP2). The wizard
guides you through the setup of IP1 and IP2.
17
PUBLIC
ad_rfg_setup.fm
document release 3.41
last updated 24/9/14
REFERENCE GUIDE
ADYTON
Using the network services provided by ADYTON requires access to a number of
different ports. See Network services, on page 27.
You can now select:
ᆦ 0DQXDOO\, to configure the ADYTON manually by continuing with steps 2 to 6
ᆧ &ORQLQJIURPPDVWHU, to duplicate the configuration of another ADYTON as
described under 2 Pull cloning, on page 40.
Step 2.
Enroll user (Administrators)
In this step the wizard asks you to enroll at least two administrators. For each
administrator, you need:
•
•
an ADYTON chip card
an individual who will record a fingerprint and define a password
Use at least two different people, to guarantee dual control.
Step 3.
Configure date/time
In this step the wizard prompts you to select the time zone before you set the time and
date.
•
Select the time zone and touch OK.
Use the ASCII keys to select a city/country. You can use the cursor keys to scroll
through the list, or enter all or part of the name with the alphanumeric keys. The list
is refreshed each time you add a letter, to show the nearest match.
•
Step 4.
Use the ASCII keys to enter the date and time, then touch OK
Enroll user (Security Officers)
In this step the wizard asks you to enroll at least two different security officers. You need:
•
•
two ADYTON chip cards
two security officers – each of them will record a fingerprint and define a password
It is mandatory to use two different security officers (one for group A and group B)
to guarantee dual control.
Step 5.
Load key
In this step the wizard asks you if you want to load a key (Yes or No). If you select Yes,
you have to select the key usage, put in a key name and enter the key components.
18
last updated 24/9/14
PUBLIC
document release 3.41
ad_rfg_setup.fm
REFERENCE GUIDE
ADYTON
Step 6.
Update software
The wizard asks you if you want to update the software (Yes or No), the licence, or both.
If you select Yes for either update, be ready to insert the USB storage device with the
updates.
See also Configuring an SSL connection, on page 49.
19
PUBLIC
ad_rfg_setup.fm
document release 3.41
last updated 24/9/14
REFERENCE GUIDE
ADYTON
20
ad_rfg_setup.fm
– empty for double-sided printing –
REFERENCE GUIDE
ADYTON
Operating ADYTON
To power up ADYTON in standalone configuration:
1. plug the power supply cable from the adaptor into the power supply socket on
ADYTON
2. connect the adaptor to a mains power socket
3. touch the power button on the front panel
In rack configuration, ADYTON is powered instantaneously when fully inserted into the
rack.
Logging on
Users only need to log on to ADYTON when prompted. Since most operations require
dual authentication, people with the right roles should be present. Logging on requires
two of the three authentication tokens:
•
•
•
chip card
fingerprint
password
Logging off
There are three ways to log off users:
•
open the User management menu and select 5 Log off user; then select the
corresponding user and touch OK to confirm
•
•
use the shortcut to go directly to the Log off menu
wait 15 minutes until ADYTON switches into screensaver mode, where ALL users
will be logged off automatically
Users are also logged off automatically when the ADYTON reboots; see Reboots
and availability, on page 22.
Screensaver mode
15 minutes after the last input, ADYTON switches into screensaver mode:
•
•
•
•
display is OFF
keypad illumination is OFF
users are LOGGED OFF automatically
the power LED (green) remains ON
To return to normal mode, tap anywhere on the keypad or touch the power button.
21
PUBLIC
ad_rfg_operating.fm
document release 3.41
last updated 24/9/14
REFERENCE GUIDE
ADYTON
Reboots and availability
While operating ADYTON, the device remains available for all cryptographic services
accessed by the Ethernet ports (host communication). The exception is when the device
needs to be rebooted due to a software upgrade: while rebooting, the host needs to set
up the ADYTON connection again.
Users are logged off automatically when the ADYTON reboots. They receive a warning
in advance before any operation that will require a reboot.
Example: a master ADYTON remains 100% available for cryptographic services while
it is being cloned. The slave ADYTON continues to deliver cryptographic services during
the cloning, unless the software version on the clone and master is different. In this case,
cryptographic services will be unavailable from the slave while it reboots at the end of the
cloning. When cloning involves a software update on the slave, the operator will be
warned about a reboot before starting the cloning.
22
last updated 24/9/14
PUBLIC
document release 3.41
ad_rfg_operating.fm
REFERENCE GUIDE
ADYTON
Filter
The text entry field at the top of the screen is a filter with auto-complete. As you add
characters to the field, the filter redefines the list of options to show only words including
those characters.
Consider the following list of cities:
Amsterdam
Brussels
Frankfurt
Antwerp
Bucharest
Glasgow
Athens
Budapest
Hamburg
Barcelona
Cardiff
Helsinki
Berlin
Copenhagen
Istanbul
Bremen
Donetsk
Kiev
Bristol
Dublin
Melmby
•
•
if you enter B, the list is refreshed to show Barcelona, Berlin, Bremen, Bristol…
if you enter en, the list is refreshed to show Athens, Bremen, Copenhagen
You can then use the arrow keys to move the selection highlight up and down the list.
23
PUBLIC
ad_rfg_operating.fm
document release 3.41
last updated 24/9/14
REFERENCE GUIDE
ADYTON
Audit trail
The audit trail is digitally signed by ADYTON to guarantee integrity and authenticity. It
contains a record of:
•
•
•
every change to the configuration of the ADYTON
every unsuccessful attempt at user authentication
every cloning operation
It is not possible to deactivate this functionality.
The Administrator is warned when the audit trail buffer is 60% full. If the audit trail
reaches 90% full, ADYTON is restricted to Export audit trail.
You are recommended to check the audit trail regularly. You can export the audit trail as
a delimited text file and read it in a spreadsheet or a text editor:
•
From the Device menu, select 3 Export audit trail
This function copies the complete audit trail to a USB device and resets the audit
trail on ADYTON.
•
From the Status menu select 5 Audit trail
The function copies the complete audit trail to a USB device but does not reset the
audit trail on ADYTON or clear the buffer. The screen shows how much of the audit
trail buffer is occupied (in %).
24
last updated 24/9/14
PUBLIC
document release 3.41
ad_rfg_operating.fm
REFERENCE GUIDE
ADYTON
Warnings
!
Read this section carefully before deleting administrators or security officers, reverting
the ADYTON to default settings, or using the Decommission option.
Remember that to continue normal operations, you need:
•
•
at least two security officers, from different groups
at least two administrators
Deleting security officers
–
there must always be at least two security officers defined, one security
officer group A and one security officer group B
–
if you delete the security officer from a group with only one member, all
keys will be erased.
At the initial configuration, you define at least two security officers: one for group
A and one for group B. Key management operations always require dual
authentication by two security officers, from different groups. If one or other
group does not include a security officer, dual authentication is no longer
possible and ADYTON will erase all keys.
Deleting administrators
At the initial configuration, you define at least two administrators. As soon as
there is only one administrator defined, ADYTON restarts with the factory
default settings. All the configuration information you have entered is lost.
Decommission
Use this option only at end-of-life, when you no longer require the ADYTON unit.
This option destroys all data, keys and software, and the ADYTON will no longer
boot up.
Back to default settings
Use this option only when you want to erase all data you have entered. This
option has no effect on software upgrades.
After resetting the ADYTON, you will need to run the installation wizard again to
set up administrators and security officers.
25
PUBLIC
ad_rfg_operating.fm
document release 3.41
last updated 24/9/14
REFERENCE GUIDE
ADYTON
26
ad_rfg_operating.fm
– empty for double-sided printing –
REFERENCE GUIDE
ADYTON
Network services
Using the network services provided by ADYTON requires access to a number of
different ports. Make sure the ports for any service you want to use are not blocked by a
firewall.
Table 5 Ports and services
service
protocol
port
cryptographic services (SSL)
SSL
4002
cryptographic services (TCP/IP)
TCP
4000
cryptographic services (http) *
TCP
8080
SNMP
UDP
161
SNMP-trap
UDP
162
cloning
TCP
6000
* note that http access to cryptographic services may be disabled by the
licence
cryptographic services (SSL)
These services are accessible through the network interface, using Transport
Layer Security (TLS) v1.2 with mutual authentication. Three different
configurations are supported, allowing an optimal balance between speed and
security.
–
for more information on SSL security levels,see Configuring an SSL
connection, on page 49
–
for more information on TLS, see the IETF memo at tools.ietf.org/html/
rfc5246
cryptographic services (TCP/IP)
These services are accessible through the network interface using native TCP/
IP calls. See the ADYTON Software Documentation (delivered with every
ADYTON licence) for more information, in particular sections DS2 to DS5.
cryptographic services (http)
These services are intended for cryptographic operations on large amounts of
data processed in a single HTTP post, for example file encryption. See the
ADYTON Software Documentation (delivered with every ADYTON licence) for
more information, in particular the section HTTP.
27
PUBLIC
ad_rfg_services.fm
document release 3.41
last updated 24/9/14
REFERENCE GUIDE
ADYTON
SNMP and SNMP-trap
ADYTON supports version 3 of the Simple Network Management Protocol
(SNMP v3) for obtaining information using SNMP Get and SNMP Traps. Any
standard SNMP tool can be used with ADYTON, but the user name must always
be adyton – lower-case.
For a list of the data elements that can be retrieved, see ADYTON MIB files, on
page 53.
cloning
For information on cloning, see 1 Push cloning and 2 Pull cloning, on page 40.
28
last updated 24/9/14
PUBLIC
document release 3.41
ad_rfg_services.fm
REFERENCE GUIDE
ADYTON
Specifications
Table 6 DEP and ADYTON at a glance
DEP
ADYTON
movement alarm
yes
no
entry of backup key
yes (DMK)
yes (DMK or ABK)
off-line mode
yes
no (see note)
connection to port
1000
4000
support for DCC cards
yes
no
support for DCS cards
yes
yes (reading only)
ADYTON chip card (stores key components)
no
yes
•
•
A key backup created on a DEP can be restored on an ADYTON, but an ADYTON
backup cannot be used on a DEP.
ADYTON off-line mode: local operations have no impact on host connections, except
when the ADYTON is rebooted after a software update. See also Reboots and
availability, on page 22.
ADYTON module
general specifications
–
–
tamper-evident, tamper-responsive and tamper-proof design
–
around 7,000 digital RSA private key and over 10,000 symmetric key
transactions per second
–
–
–
–
host authentication through SSL (optional)
colour display, fingerprint reader (FIPS 201), chip-card reader, USB-Host,
HEX-keypad
push/pull cloning
dimensions: 24 cm wide x 7 cm high x 18.5 cm deep
power supply 100-240 VAC, 50/60Hz, 1.4A
operating conditions
–
–
operating temperature: 0°C – 35°C
relative humidity: 10% – 90% (non-condensing)
communications
–
–
USB device
1 gigabit LAN connector
29
PUBLIC
ad_rfg_specifications.fm
document release 3.41
last updated 24/9/14
REFERENCE GUIDE
ADYTON
basic cryptographics
–
–
–
–
–
–
–
–
–
random generator (SP800-90)
RSA (X9.31 key generation, encrypt/decrypt, sign/verify)
ECC (key generation, encrypt/decrypt, sign/verify)
(T)DES (encrypt/decrypt, MAC)
AES (encrypt/decrypt, MAC)
HMAC
MD5, SHA1, SHA2, SHA256, SHA512
X509
All functions supported by OpenSSL Crypto Library (www.openssl.org)
Rack
The optional ADYTON rack farther increases the reliability of the module, and makes it
possible to hot-swap ADYTON.
•
19" rack for integration in standard IT cabinets – 2U High
actual measurements 48 cm wide x 8.8 cm high x 43 cm deep; weight ~15 kg
•
•
•
•
2 redundant hot-swappable power supplies (100-240 VAC, 47-63Hz, 1.5-1A)
2 redundant 1Gb Ethernet
2 physical locks (different keys) to prevent unauthorised removal of ADYTON
USB device connector on front
Interfaces (ADYTON and rack)
•
•
•
•
•
•
•
Dedicated API – for a list of the complete API, please contact your account manager
PKCS #11
JCE (Java Cryptographic Extension)
EJBCA
IAIK-JCE
OpenSSL Engine
SNMP
30
last updated 24/9/14
PUBLIC
document release 3.41
ad_rfg_specifications.fm
Certification and compliance
•
•
•
•
•
FIPS 140-2 Level 3 certified
Hardware FIPS 140-2 Level 4 certified
FIPS 140-3 (draft) compliant
Fingerprint reader FIPS 201 certified
FCC and EC certified, ROHS compliant
31
PUBLIC
ad_rfg_specifications.fm
document release 3.41
last updated 24/9/14
REFERENCE GUIDE
ADYTON
32
ad_rfg_specifications.fm
– empty for double-sided printing –
REFERENCE GUIDE
ADYTON
Menu tree
If you are reading this document on-line, click on any command name to see related
access rights and brief notes.
Keys
1 Load key
2 Generate key
3 Delete key
4 View keys
5 Backup keys
6 Restore keys
7 Output key
Network
1 Configure IP1
2 Configure IP2
3 Configure SSL
4 View configuration
Users
1 Enroll user
2 View users
3 Modify user
4 Delete user
5 Log off users
Status
1 General information
2 Logged on users
3 Date/time
4 Licence
5 Audit trail
6 Performance
7 Footprints
1 Set ADYTON name
2 Activate traces
3 Activate SNMP traps
4 Export audit trail
5 Set date/time
6 Back to default settings
7 Decommission
ADYTON
Update
1 Push cloning
2 Pull cloning
3 Update licence
4 Update software
33
PUBLIC
ad_rfg_menuTree.fm
Device
document release 3.41
last updated 24/9/14
REFERENCE GUIDE
ADYTON
Keys
For recommendations on all aspects of key management, see the Payment Card
Industry (PCI) PIN Security Requirements. (online document)
1 Load key
ACCESS
Dual security officer
Key names are used to identify the key in the server commands.
–
in DEP compatibility mode (DS2/DS3/DS4), certain restrictions apply. See
the section “ADYTON key-name restrictions” of the software
documentation.
–
In DS5, key names are free text but must match the names used by the
host application
2 Generate key
ACCESS
Dual security officer
3 Delete key
ACCESS
Dual security officer
4 View keys
ACCESS
No authentication required
–
–
Select a key and touch [OK] to show details
–
You can also use the shortcut
Scroll left/right to view details of the previous/next key.
to view the list of keys
5 Backup keys
ACCESS
Dual security officer or dual administrator
The ADYTON backup key is used to create a backup file containing all the keys.
–
–
all keys in ADYTON are backed up: partial/selective backup is not possible
it is not possible to make a backup protected by the DEP Master Key (DMK)
6 Restore keys
ACCESS
Dual security officer or dual administrator
Supports the restore of a key backup file (ADYTON or DEP)
–
when restoring an ADYTON key backup file, use the same key name as
used for the creation of the ADYTON key backup file
If keys are already present in ADYTON, the Restore operation will execute
replace and add.
–
when restoring a DEP key backup file, enter the correct value of the DEP
Master Key (DMK TDES or DMK AES)
34
last updated 24/9/14
PUBLIC
document release 3.41
ad_rfg_menuTree.fm
REFERENCE GUIDE
ADYTON
7 Output key
ACCESS
Key Custodian
Asymmetric keys can be exported as key cryptograms on a USB stick
Symmetric keys can be exported as:
–
–
a single key cryptogram stored on an ADYTON chip card or USB stick
two or three key components (plain text files) stored on separate ADYTON
chip cards
35
PUBLIC
ad_rfg_menuTree.fm
document release 3.41
last updated 24/9/14
REFERENCE GUIDE
ADYTON
Users
1 Enroll user
For initialisation: no authentication required.
Afterwards: Dual security officer or dual administrator
ACCESS
–
The first two Administrator accounts can be created without any operator
logon.
Once two Administrator accounts are in the user account table, additional
Administrators can only be enrolled under dual Administrator control.
–
The first Security Officer Group A account and the first Security Officer
Group B account can be created without any operator logon.
Additional Security Officers can only be enrolled under dual Security
Officer control. When at least one Security Officer from Group A and at
least one Security Officer from Group B are logged on, all dual control
Security Officer services are available.
When all the security officers logged on are from the same group, new
security officers can only be enrolled in that group.
2 View users
ACCESS
No authentication required
To show user details, select the user and touch [OK]. Use the arrow keys to
scroll.
3 Modify user
ACCESS
The user in question must be authenticated
After authentication (using two tokens) is accepted, the user can update
password, fingerprint or chip card.
4 Delete user
ACCESS
No authentication required
To avoid a situation where a user cannot be deleted, no authentication is
required.
For more details see Warnings, on page 25.
5 Log off users
ACCESS
No authentication required
You can also use the shortcut
36
last updated 24/9/14
PUBLIC
document release 3.41
ad_rfg_menuTree.fm
REFERENCE GUIDE
ADYTON
Device
1 Set ADYTON name
ACCESS
Dual administrator
2 Activate traces
ACCESS
Dual administrator
All inputs and outputs (server commands) are logged in clear text, even when
using SSL. In case of confidential information, procedural actions will be taken
to protect the data (for example, cardholder data in case of PCI DSS).
3 Activate SNMP traps
ACCESS
Dual administrator
Toggle between:
–
Activate SNMP traps; you will need to specify the IP address of the trap
receiver
–
Deactivate SNMP traps
4 Export audit trail
ACCESS
Dual administrator
The export function copies the audit trail to a USB device as a delimited text file
you can read in a spreadsheet or a text editor, together with a digital signature
and certificate tree, and resets the audit trail on ADYTON. See Working with the
audit trail, on page 41, for additional information.
If the buffer for the audit trail reaches 90% only the Export audit trail function can
be performed.
5 Set date/time
ACCESS
Dual administrator
Daylight saving time is automatically applied
!
6 Back to default settings
ACCESS
No authentication required
Deletes all keys and user entered data, but has no effect on date/time settings
or software updates. For more details see Warnings, on page 25.
!
7 Decommission ADYTON
ACCESS
Dual administrator
Decommissioning may only be used for an end of life ADYTON. After
decommissioning, ADYTON will not boot any more.
Undoing this action involves huge costs, due to hardware intervention in a repair
environment. For more details see Warnings, on page 25.
37
PUBLIC
ad_rfg_menuTree.fm
document release 3.41
last updated 24/9/14
REFERENCE GUIDE
ADYTON
Network
1 Configure IP1
ACCESS
No authentication required
2 Configure IP2
ACCESS
No authentication required
3 Configure SSL
ACCESS
Dual administrator
Select the level of encryption required, and load certificates if necessary.
See Configuring an SSL connection, on page 49.
4 View configuration
ACCESS
No authentication required
Scroll left/right to view details of IP1, details of IP2, counters for active sessions
and counters for sessions refused because of authentication failure.
ADYTON supports a maximum of 128 active sessions concurrently, including
up to 32 SSL sessions. The restriction on SSL sessions is for performance
reasons.
38
last updated 24/9/14
PUBLIC
document release 3.41
ad_rfg_menuTree.fm
REFERENCE GUIDE
ADYTON
Status
1 General information
ACCESS
No authentication required
2 Logged on users
ACCESS
No authentication required
To show the details, select the user and touch [OK]. Use the arrow keys to scroll.
3 Date/time
ACCESS
No authentication required
4 Licence
ACCESS
No authentication required
Copies the licence to a USB device as a file you can read in a text editor.
A licence file contains a list of cryptographic services, which can be edited to
enable or disable individual services.
See Editing and updating the licence, on page 45, for additional information.
5 Audit trail
ACCESS
No authentication required
Copies the audit trail to a USB device as a delimited text file you can read in a
spreadsheet or a text editor, together with a digital signature and certificate tree,
but does not reset the audit trail on ADYTON. It also shows how much of the
audit trail buffer is still free, as a percentage.
See Working with the audit trail, on page 41, for additional information.
6 Performance
ACCESS
No authentication required
Shows the performance in real-time and an estimation of the available capacity
– can be used to scale an ADYTON park.
7 Footprints
ACCESS
No authentication required
Shows the number of keys installed, a checksum based on the key values and
a checksum based on the binaries and software package – can be used to
compare installations on different ADYTONs.
39
PUBLIC
ad_rfg_menuTree.fm
document release 3.41
last updated 24/9/14
REFERENCE GUIDE
ADYTON
Update
1 Push cloning
ACCESS
Dual administrator
Duplicate the configuration of a master ADYTON on one or more clone
ADYTONS, by pushing the configuration from master to clones.
•
the remote ADYTON or ADYTONS must be idle or displaying the main menu before
you can start pushing the configuration
•
if the clone ADYTON needs to reboot after the configuration has been duplicated,
you receive a warning
2 Pull cloning
ACCESS
Dual administrator (remote login)
Duplicate the configuration of a (remote) master ADYTON on a clone ADYTON,
by pulling the configuration from master to clone. This can also be done by
running the initialisation wizard on the slave ADYTON again.
•
the remote (master) ADYTON must be idle or displaying the main menu before you
can start pulling the configuration; you receive a warning if this is not the case
•
if a clone ADYTON needs to reboot after the configuration has been duplicated, you
receive a warning
3 Update licence
ACCESS
Dual administrator
Loads updated licence file from the USB stick. An administrator can edit the
licence file to enable/disable specific cryptographic services covered by the
licence.
See Editing and updating the licence, on page 45, for additional information.
!
The ADYTON will not run unless a valid licence is file installed.
4 Update software
ACCESS
Dual administrator
ADYTON has to be rebooted at the end of the software update, which causes a
short downtime.
Downtime during reboot
When the ADYTON needs to be rebooted because of a software upgrade, the host
needs to set up communications again; this involves a short downtime. See Reboots and
availability, on page 22.
40
last updated 24/9/14
PUBLIC
document release 3.41
ad_rfg_menuTree.fm
REFERENCE GUIDE
ADYTON
Appendix A. Working with the audit trail
Exporting the audit trail from ADYTON puts the following files on the USB stick:
file with a fixed name
•
•
•
AtosRootCa_FactIntCa.cer
AtosRootCa.cer
FactIntCa.cer
files with a variable name
•
certification tree
The filename starts with the ADYTON serial number; for example
8700C7D4091B415D_MmSign.cer
•
audit-trail log
The filename starts with the ADYTON serial number and ends with a timestamp; for
example
8700C7D4091B415D_adyton-audit-trail_20130201_114055.log
As described under Reading the audit trail, on page 42, you can read the audit trail
in a spreadsheet or a text editor.
•
audit-trail signature
The filename starts with the ADYTON serial number and includes a timestamp; for
example
8700C7D4091B415D_adyton-audit-trail_20130201_114055signature.bin
41
PUBLIC
ad_rfg_appxAudit.fm
document release 3.41
last updated 24/9/14
REFERENCE GUIDE
ADYTON
Reading the audit trail
Figure 8. Audit trail opened in spreadsheet
The general structure of each record is:
column A
unique, sequentially incremented record number
note: Resetting the log deletes all current entries, but does not reset the sequential
numbering.
columns B, C
date/time
column D
description of the operation
column E
users logged on at that moment
column F
integrity check (for internal use)
42
last updated 24/9/14
PUBLIC
document release 3.41
ad_rfg_appxAudit.fm
REFERENCE GUIDE
ADYTON
Verifying the audit trail
You can use OpenSSL (version 1.0.1c or higher) from a terminal window to verify the
signature of the audit trail, as follows.
Note that the verification process has been simplified, and now starts from a single
{fname}_MmSign.cer file instead of requiring the administrator to prepare a specific
.pem file.
Step 1.
verify the certificate tree
openssl verify -verbose -CAfile AtosRootCa_FactIntCa.cer {certificate tree}
When verification is successful, the message {certificate tree}: OK is displayed.
Step 2.
calculate hash over audit trail
openssl dgst -sha256 -binary < {audit-trail.log} > hash.bin
Step 3.
verify the audit trail signature
openssl pkeyutl -verify -in hash.bin -sigfile -pkeyopt digest:sha256 -pkeyopt
rsa_padding_mode:pss
openssl pkeyutl -verify -in hash.bin -sigfile {audit-trail signature}
-certin -inkey {certificate tree} -pkeyopt digest:sha256 -pkeyopt
rsa_padding_mode:pss
When verification is successful, the message Signature Verified Successfully
is displayed.
43
PUBLIC
ad_rfg_appxAudit.fm
document release 3.41
last updated 24/9/14
REFERENCE GUIDE
ADYTON
44
ad_rfg_appxAudit.fm
– empty for double-sided printing –
REFERENCE GUIDE
ADYTON
Appendix B. Editing and updating the
licence
As delivered by Worldline, each ADYTON contains a software licence that determines
which cryptographic services the ADYTON can run. It is not possible to add services to
the licence.
Exporting the licence from ADYTON puts a plain text file with the extension .lic on the
USB stick. An administrator can upload an edited .lic file to disable or enable one or
more services provided by the licence.
Using the services provided by ADYTON requires access to a number of different ports:
see Table 5 Ports and services, on page 27. Make sure the ports for any service you
want to use are not blocked by a firewall.
45
PUBLIC
ad_rfg_appxEditLicence.fm
document release 3.41
last updated 24/9/14
REFERENCE GUIDE
ADYTON
Editing
Step 1.
Open the .lic file in a text editor
owner = "Atos Worldline";
datetime = "29/07/2013 07:42:04";
mode = "gold";
version = "1.0";
allow_key_table_change_by_host = "yes";
ds3 :
{
i_std_echo = 1;
i_std_get_serial_nr = 1;
i_dukt_ver_mac_tdes = 1;
i_dukt_gen_mac_tdes = 1;
i_dukt_der_ipek_2 = 1;
i_dukt_der_ses_key_2 = 1;
};
ds5 :
{
rsa_generate_x9_31_key = 1;
rsa_generate_key = 1;
rsa_decrypt = 1;
};
http = 1;
-----BEGIN SIGNATURE----f374b96f82e4d78adc016a03429d972d90c62846b8c1b629b328ae5ddcc037a011340d9cee8
cb4820bfafba5f08660fbdfb9e01fbdcd8604cee1dd71a0e0ee129fc16475419455e129e255
000002008e052ccf9819d186b3208804238cf804f6fc522e7ec10a0206780eb2021fa832698
5b967c318f3a7f12bb92428619d579e40a6fe51376cbaf9e9c99cd784e869677822aedf5d86
7583bb5122c4b2338ce94f58ab894d534ee347542069901a1b3bcf3f3f0133bdc378eaefda4
697df320f8f5e6080612091e959d58b38f88648606adbec9daaa74d0a17f9dda7a7eab153b1
e60b089dc7a2637141578df8800a9a55c36193e8c06043abadfe113ebfd51ecf186f75367f9
1a193a46b6fbfe82e78a85264d24836a844e87079f8298c98023c0738091828666a83220a73
de77570ede15a1d1a15c1b481b01dadae0b6a2dcb7cc49063f0135c85b185bbe66038ccc2d6
41303a9e42b61713cf9b4f79eabe06120105400fb11b4679d23cc12837ab894d534ee34e660
-----END SIGNATURE-----
Step 2.
Enable/disable cryptographic services as required
•
•
to disable a service, locate its entry in the licence file and change = 1 to = 0
to enable a service, locate its entry in the licence file and change = 0 to = 1
Only integer values may be changed.
Step 3.
Save the updated file
46
last updated 24/9/14
PUBLIC
document release 3.41
ad_rfg_appxEditLicence.fm
REFERENCE GUIDE
ADYTON
Updating a licence
Step 1.
Select Update > Update licence
Enter credentials for two Administrators, if these have not been authenticated already.
Step 2.
Insert the USB stick with the updated licence file.
The update runs automatically. When it is completed, the system displays the message
Licence updated. Remove USB stick.
47
PUBLIC
ad_rfg_appxEditLicence.fm
document release 3.41
last updated 24/9/14
REFERENCE GUIDE
ADYTON
48
ad_rfg_appxEditLicence.fm
– empty for double-sided printing –
REFERENCE GUIDE
ADYTON
Appendix C. Configuring an SSL
connection
The ADYTON listens for SSL connections on port 4002. For this type of connection, the
ADYTON and its clients exchange and validate public keys before agreeing on a secure
session key and exchanging information. When using an SSL connection between
ADYTON and client, the client may choose how to achieve an optimal balance between
speed and security:
•
use port 4002, for an SSL connection with support authentication and (optionally)
encryption
•
use port 4000, for a non SSL connection without either authentication or encryption
The type of connection determines how requests for connection are handled. The
connection security level specified by the client requesting the connection must match or
exceed the security level specified by the ADYTON.
Step 1.
Select Network > Configure SSL
Enter credentials for two Administrators.
Step 2.
Set the level of security specified by the ADYTON
HIGH
On port 4002, the ADYTON and the client are authenticated. All exchanges
must be both authenticated and encrypted.
Port 4000 is blocked.
Loading a certificate file is mandatory for a high security setting.
MEDIUM
On port 4002, the ADYTON and the client are authenticated. All exchanges
must be authenticated, but encryption is optional.
Port 4000 is blocked.
Loading a certificate file is mandatory for a medium security setting.
LOW
On port 4002, the ADYTON and the client are authenticated. All exchanges
must be authenticated, but encryption is optional.
On port 4000, messages may be exchanged without authentication or
encryption.
Loading a certificate file is optional for a low security setting, but required in order
to establish connections using port 4002.
49
PUBLIC
ad_rfg_appxSSL.fm
document release 3.41
last updated 24/9/14
REFERENCE GUIDE
ADYTON
When you display the Configure SSL menu, the list always shows the current level of
security. To select a level, move the highlight with the up/down arrows and confirm your
selection with Shift + OK.
Step 3.
Load/overwrite certification file (optional)
When you use a certification file, you are prompted to insert a USB stick and select a
.pem file. The certification file needs to contain the whole certificate tree, and may also
contain a revocation list.
Any problem with the file is reported.
50
last updated 24/9/14
PUBLIC
document release 3.41
ad_rfg_appxSSL.fm
REFERENCE GUIDE
ADYTON
Appendix D. Custody procedures and
secure transport
To meet PCI SSC requirements, you must work with clear procedures that guarantee the
chain of custody at all times. A documented chain of custody must exist to ensure that
all cryptographic hardware is controlled from its receipt through its installation and use.
This means that it must be clear who has responsibility during all the phases: initial,
transport, delivery …
Before you start to install and set up the ADYTON, make sure the accompanying
documentation meets the Payment Card Industry (PCI) PIN Security Requirements.
(online document)
Secure transport
Good practice for secure transport of an ADYTON includes the following:
•
•
•
•
•
log hardware serial number before transport
transport rack and ADYTON separately
copy the ADYTON audit trail before transport
check audit trail after transport
check the two tamper evident stickers before and after transport
Verify both the authenticity and the integrity of the stickers: see page 6 for more
information.
•
•
•
check hardware serial number after transport
boot up the ADYTON to check for tamper alarm
from the Device menu, run 6 Back to default settings to clear all keys and user
information
The ADYTON has been transported securely if the tamper-evident stickers are OK, the
audit trails before and after transport match, and no tamper alarm is given when you boot
up the ADYTON. Make a full report after carrying out these checks.
51
PUBLIC
ad_rfg_appxSecureTransport.fm
document release 3.41
last updated 24/9/14
REFERENCE GUIDE
ADYTON
52
ad_rfg_appxSecureTransport.fm
– empty for double-sided printing –
REFERENCE GUIDE
ADYTON
Appendix E. ADYTON MIB files
ADYTON OID are presented in four groups:
•
•
•
•
key information
keyset footprint
software footprint
SNMP trap
The prefix for Worldline ADYTON object IDs (OID) is 1.3.6.1.4.1.18270.100
Key information
Values returned by a GET operation on an ADYTON.Keys OID can be used to retrieve
information about the whole key-table. This option is equivalent to using View Keys from
the ADYTON menu.
OID
description
returns
type
.1.1 key usage
description of key
display string
.1.2 key name
name associated with key
display string
.1.3 key type
type of key
display string
.1.4 key length
length of key
display string
.1.5 key check value
(CV)
check value computed over
the key value
octet string (size (0..6))
Keyset footprint
Shows the checksum based on the key values – can be used to compare installations on
different ADYTONs.
OID
description
returns
type
.2
keyset footprint
full keyset checksum over
the key-table (32 bytes)
octet string
(size (64))
53
PUBLIC
ad_rfg_appxMIBfiles.fm
document release 3.41
last updated 24/9/14
REFERENCE GUIDE
ADYTON
Software footprint
Shows the checksum based on the version of the software – can be used to compare
installations on different ADYTONs.
OID
description
returns
type
.3
software footprint
full software checksum (32 bytes)
over the ADYTON package on this
device
octet string
(size (64))
Performance
Shows the recent performance/load of the ADYTON as the average number of
transactions over the last 5 minutes.
OID
description
returns
type
.4
performance value number of transactions per second
averaged over the last 5 minutes
integer
SNMP Trap
Values sent to SNMP server can be used to monitor the health of the ADYTON power
supplies.
OID
description
sent
.10
trap notification activated
send this notification when trap functionality
has been activated
.11
power failure notification sent
send this notification when either of the
redundant power-supplies in an ADYTON
rack fails
54
last updated 24/9/14
PUBLIC
document release 3.41
ad_rfg_appxMIBfiles.fm