Using Fortanix Data Security Manager for NGINX and Apache TLS Keys

1.0 Introduction

Fortanix-Data-Security-Manager (DSM) can be used to protect the TLS private key for your NGINX and Apache server, keeping the private key secure even if the host running these servers is compromised.

This article describes how to set up your NGINX and Apache server running on Red Hat to use a TLS private key stored in Fortanix DSM.

2.0 Prerequisites

The following software components are required. The procedure described here was tested with the versions mentioned below:

  • NGINX:

    • Red Hat Enterprise Linux Server (7.6)

    • NGINX (1.18.0)

    • OpenSSL (1.0.2-k)

    • OpenSC (0.19.0)

    • OpenSSL PKCS11 engine (0.4.10)

  • Apache:

    • Red Hat Enterprise Linux Server (8.2)

      • Apache (2.4.37)

      • mod_ssl (2.4.37)

      • OpenSSL (1.1.1-c)

      • OpenSC (0.19.0)

      • OpenSSL PKCS11 engine (0.4.10)

    • Red Hat Enterprise Linux Server (7.8)

      • Apache (2.4.6)

      • mod_nss (1.0.14)

      • nss-tools (3.44.0)

      • OpenSSL (1.0.2k)

      • OpenSC (0.19.0)

      • OpenSSL PKCS11 engine (0.4.10)

  • Fortanix PKCS11 library (3.19.1348)

2.1 Installing Prerequisites

  • NGINX
    If you need to install NGINX, please refer to the instructions in the URL:
    https://www.nginx.com/resources/wiki/start/topics/tutorials/install/

  • Apache and mod_ssl
    If you need to install Apache, install it by running:
    On Red Hat 8 you will need to install “mod_ssl” and on Red Hat 7 you will need to install “mod_nss”.

    sudo yum install httpd
    Red Hat 8
    sudo yum install mod_ssl
    
    Red Hat 7
    sudo yum install mod_nss
    sudo yum install nss-tools
    
  • OpenSC
    Run the following command to run OpenSC. This package provides PKCS#11 tools and PKCS#11 engine plugin for the OpenSSL library which allows accessing PKCS#11 modules in a semi-transparent way.

    sudo yum install opensc
  • Install OpenSSL PKCS#11 engine using the following command:

    wget https://download-ib01.fedoraproject.org/pub/epel/7/x86_64/Packages/o/openssl-pkcs11-0.4.10-1.el7.x86_64.rpm
    sudo rpm -i openssl-pkcs11-0.4.10-1.el7.x86_64.rpm
  • Fortanix PKCS#11 library
    Download the latest Fortanix PKCS#11 library RPM package from the following URL:
    PKCS#11 
    Install it by running the following command:

    sudo rpm -i <package name>, for example
    sudo rpm -i fortanix-pkcs11-3.19.1348-0.x86_64.rpm

3.0 Configure Fortanix DSM

A Fortanix DSM service must be configured, and the URL must be accessible. To create a Fortanix DSM account and group, refer to the following sections:

3.1 Signing Up

To get started with the Fortanix Data Security Manager (DSM) cloud service, you must register an account at <Your_DSM_Service_URL>. For example, https://eu.smartkey.io.

For detailed steps on how to set up the Fortanix DSM, refer to the User's Guide: Sign Up for Fortanix Data Security Manager SaaS documentation.

3.2 Creating an Account

Access the <Your_DSM_Service_URL> on the web browser and enter your credentials to log in to the Fortanix DSM.

Figure 1: Logging In

3.3 Creating a Group

Perform the following steps to create a group in the Fortanix DSM:

  1. Click the Groups menu item in the DSM left navigation bar and click the + button on the Groups page to add a new group.

    Figure 2: Add Groups

  2. On the Adding new group page, enter the following details:

    • Title: Enter a title for your group.

    • Description (optional): Enter a short description for the group.

  3. Click the SAVE button to create the new group.

The new group has been added to the Fortanix DSM successfully.

3.4 Creating an Application

Perform the following steps to create an application (app) in the Fortanix DSM:

  1. Click the Apps menu item in the DSM left navigation bar and click the + button on the Apps page to add a new app.

    Figure 3: Add Application

  2. On the Adding new app page, enter the following details:

    • App name: Enter the name of your application.

    • Interface (optional): Select the PKCS#11 option as interface type from the drop down menu.

    • ADD DESCRIPTION (optional): Enter a short description for the application.

    • Authentication method: Select the default API Key as the method of authentication from the drop down menu. For more information on these authentication methods, refer to User's Guide: Authentication documentation.

    • Assigning the new app to groups: Select the group created in Section 3.3: Creating a Group from the list.

  3. Click the SAVE button to add the new application. 

The new application has been added to the Fortanix DSM successfully.

3.5 Copying the API Key

Perform the following steps to copy the API key from the Fortanix DSM:

  1. Click the Apps menu item in the DSM left navigation bar and click the app created in Section 3.4: Creating an Application to go to the detailed view of the app.

  2. On the INFO tab, click the VIEW API KEY DETAILS button.

  3. From the API Key Details dialog box, copy the API Key of the app to be used later.

4.0 Setting Up OpenSSL to Use PKCS#11

  1. Save the current OpenSSL configuration file (openssl.cnf) before making changes:

    sudo cp /etc/pki/tls/openssl.cnf /etc/pki/tls/openssl.cnf.bak
  2. Now set up OpenSSL configuration file as follows to have the PKCS#11 engine section.

    # PKCS11 engine config
    openssl_conf = openssl_def
    [openssl_def]
    engines = engine_section
    [req]
    distinguished_name = req_distinguished_name
    [req_distinguished_name]
    # empty
    [engine_section]
    pkcs11 = pkcs11_section
    [pkcs11_section]
    engine_id = pkcs11
    dynamic_path = /usr/lib64/openssl/engines/libpkcs11.so
    MODULE_PATH = /opt/fortanix/pkcs11/fortanix_pkcs11.so
    PIN = API_KEY
    init = 1

    NOTE

    Replace API_KEY in the highlighted line with the API key of the app you created earlier.

5.0 Testing Setup

Use the following commands to verify the setup is correct:

5.1 Testing the Engine Operation

  1. To verify that the engine is properly operating run the following command.

    openssl engine pkcs11 -t

    This should return:

    (pkcs11) pkcs11 engine
         [ available ]

5.2 Testing the PKCS#11 Library

  1. Export the following environment variables (replace values as appropriate for your environment) and use pkcs11-tool as shown below:

    export OPENSSL_CONF=/etc/pki/tls/openssl.cnf
    export FORTANIX_API_ENDPOINT=https://<fortanix_dsm_url>/
    export FORTANIX_API_KEY=API_KEY

    NOTE

    Replace API_KEY with the API key of the app you created earlier.

5.2.1 Verify PKCS#11 Library

Run the following command to verify if the PKCS#11 library works correctly:

pkcs11-tool --module /opt/fortanix/pkcs11/fortanix_pkcs11.so -I

This should return the output as follows:

*** Cryptoki library has already been initialized ***
Cryptoki version 2.40
Manufacturer     Fortanix
Library          Fortanix PKCS11 3.19.1348 (ver 3.19)
Using slot 0 with a present token (0x0)

5.2.2 List Keys from Fortanix DSM

Run the following command to list keys from Fortanix DSM.
This should return keys that are already there in the group:

pkcs11-tool --module /opt/fortanix/pkcs11/fortanix_pkcs11.so --login --pin $FORTANIX_API_KEY -O

5.2.3 Generate a Key in Fortanix DSM

Run the following command to generate an RSA key in Fortanix DSM:

pkcs11-tool --module /opt/fortanix/pkcs11/fortanix_pkcs11.so --login --pin $FORTANIX_API_KEY -k --id `uuidgen | tr -d -` --label "Test RSA key" --key-type rsa:2048

On success the output will be as follows:

*** Cryptoki library has already been initialized ***
Using slot 0 with a present token (0x0)
Key pair generated:
Private Key Object; RSA 
  label:      Test RSA key
  ID:         bc017c71c51447aeaa3af6c38a42f810
  Usage:      decrypt, sign, unwrap
Public Key Object; RSA 2048 bits
  label:      Test RSA key
  ID:         bc017c71c51447aeaa3af6c38a42f810
  Usage:      encrypt, verify, wrap

Verify that this command succeeds, and the RSA key is generated in Fortanix DSM. You can verify by looking at the Security Objects page in the WebUI or running the pkcs11-tool command mentioned earlier.

Note the Key ID returned from this command. We will need it in the next steps for verification.

5.3 Testing the OpenSSL with PKCS#11 Library

Now we will verify if OpenSSL with Fortanix PKCS#11 library is working correcting by performing some cryptographic operations using the key we generated earlier in Fortanix DSM.

5.3.1 Encrypting Data with the Key in Fortanix DSM

Run the following command to encrypt some data with the key we created in the previous step. For ID here, use the Key ID you got in the previous step (in this example, it is bc017c71c51447aeaa3af6c38a42f810).

  1. Create an input text file that will be used for encryption. For example, you can do the following:

    cat > input.txt
  2. Test the encryption.

  3. Press CTRL+C to complete the creation of the file.

  4. Run the following command to encrypt the file:

    openssl pkeyutl -engine pkcs11 -in input.txt -out cipher.data -encrypt -keyform engine -inkey 1:bc017c71c51447aeaa3af6c38a42f810

    This should succeed and create a file “cipher.data” which contains the encrypted data. You can also verify that the key in Fortanix DSM was used for this operation by looking at the event log for the key.

  5. You can also use the following command to decrypt the data and verify that decryption also works:

    openssl pkeyutl -engine pkcs11 -in cipher.data -out output.txt -decrypt -keyform engine -inkey 1:bc017c71c51447aeaa3af6c38a42f810

6.0 Importing TLS Key and Certificate into Fortanix DSM

You can import your existing TLS key and certificate into Fortanix DSM either using WebUI or using the pkcs11-tool.

6.1 Import a Security Object

Perform the following steps to import an RSA key in the Fortanix DSM:

  1. Click the Security Objects menu item in the DSM left navigation bar and click the button on the Security Objects page to add a security object.

    Figure 4: Add Security Object

  2. On the Add New Security Object page, enter the following details:

    • Security Object name: Enter the name of your security object. 

      NOTE

      Note this name as it will be used later in the NGINX configuration file.

    • Group: Select the group as created in Section 3.3: Creating a Group.

    • Select the IMPORT radio button.

    • Choose a type: Select the RSA key type.

    • Key Size: Indicates the size of the key in bits.

    • In the Place value here or import from file section, select the value format type as Base64 and click the UPLOAD A FILE button to upload the key file.

    • Key operations permitted: Select the required operations to define the actions that can be performed with the cryptographic keys, such as encryption, decryption, signing, and verifying.

  3. Click the IMPORT button to create the new security object.

The new security object is added to the Fortanix DSM successfully.

6.2 Import Using PKCS#11-Tool

To import using the pkcs11-tool, do the following:

Assuming that you have the private key in a file key.pem, you can use the following commands to import the key into Fortanix DSM.

openssl rsa -inform pem -outform der -in key.pem -out key.der

pkcs11-tool --module $PKCS11_LIBRARY --login --pin <API key> --write-object key.der --type privkey --id `uuidgen | tr -d -` --label "YOUR_PRIVATE_KEY_LABEL"

Note the Key ID value from the output of this command. You will need it when importing a TLS certificate. For the examples mentioned in this document, the key label value will be “SDKMS_Nginx_Private_Key”.

For Apache running on Red Hat 7, you will also need to import your TLS certificate and associate this certificate to the private key you imported. Assuming that you have the certificate in a file cert.pem, you can use the following commands to import the certificate into Fortanix DSM. Please note the ID_VALUE in this command is the Key ID that was displayed when you imported the private key in the previous command.

openssl rsa -inform pem -outform der -in cert.pem -out cert.der

pkcs11-tool --module /opt/fortanix/pkcs11/fortanix_pkcs11.so --login --pin <API Key> --write-object cert.der --type cert --id ID_VALUE --label "SDKMS_Apache_Certificate"

For the examples mentioned in this document, the key label value will be “SDKMS_Nginx_Private_Key”.

7.0 Configuring NGINX to Use Key From Fortanix DSM

Assuming you already have NGINX server configured to use TLS keys, the following steps will guide to you to make changes so that while the certificate file is stored locally, (in this example - /etc/nginx/certificate.crt) the corresponding key is securely stored in Fortanix DSM and all crypto operations with this private key are offloaded to Fortanix DSM.

If you do not already have TLS keys and would like to generate TLS keys in Fortanix DSM and generate CSR, you can use OpenSSL and pkcs11-tool to accomplish that. Please see the details at Generating a TLS key and importing a CA-issued certificate.

7.1 Update NGINX Configuration File

Update the NGINX configuration file (/etc/nginx/nginx.conf ) file to specify the SSL private key which needs to be accessed using the PKCS#11 engine. The highlighted key name after the word ‘label’ corresponds to the name of the key in Fortanix DSM when you imported it (in this example : SDKMS_Nginx_Private_Key). The lines to be edited are shown in the following snippet:

##
# SSL Settings
##
ssl_certificate /etc/nginx/certificate.crt;
ssl_certificate_key engine:pkcs11:label_key_name;
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
ssl_prefer_server_ciphers on;

NOTE

Only the line “ssl_certificate_key” needs to be changed as the certificate file can stay on the server.

7.2 Update NGINX Startup File

Update the NGINX service start-up file to pass the necessary environment variables for integration with Fortanix DSM. These environment variables allow the PKCS#11 engine and PKCS#11 library to work and point to your Fortanix DSM URL.

Edit the file /usr/lib/systemd/system/nginx.service and add the environment variables under the “service” section as follows (see highlighted text). Please update the value of FORTANIX_API_ENDPOINT to point to your instance of Fortanix DSM.

[Unit] 
Description=nginx - high performance web server
Documentation=http://nginx.org/en/docs/
After=network-online.target remote-fs.target nss-lookup.target
Wants=network-online.target
[Service]
Environment="OPENSSL_CONF=/etc/pki/tls/openssl.cnf"
Environment="FORTANIX_API_ENDPOINT=https://YOUR DSM URL/"
Type=forking
PIDFile=/var/run/nginx.pid
ExecStart=/usr/sbin/nginx -c /etc/nginx/nginx.conf
ExecReload=/bin/kill -s HUP $MAINPID
ExecStop=/bin/kill -s TERM $MAINPID
[Install]
WantedBy=multi-user.target

7.3 Restarting NGINX

Now, to restart NGINX and make it use the key stored in Fortanix DSM, do the following:

sudo systemctl daemon-reload
sudo systemctl restart nginx

7.4 Verification

To verify that the configuration is working correctly, connect to your NGINX server using a browser. You should be able to connect successfully. You can also check the key usage event logs in Fortanix DSM to verify that the key is being used as you connect to your NGINX server.

8.0 Configuring Apache to Use Key From Fortanix DSM

This section describes how to configure Apache on Red Hat 8 using mod_ssl and on Red Hat 7 using mod_nss.

Assuming that you already have an Apache server configured to use TLS keys, the following steps will guide you to make changes so that the private key is securely stored in Fortanix DSM and all crypto operations with this private key are offloaded to Fortanix DSM.

  • In case of Red Hat 8, in this example certificate file is stored locally, (/etc/pki/tls/certs/localhost.crt)

  • In case of Red Hat 7, in this example, we store certificates as well in Fortanix DSM.

If you do not already have TLS keys and would like to generate TLS keys in Fortanix DSM and generate CSR, you can use OpenSSL and pkcs11-tool to accomplish that. Please see the details at Generating a TLS key and importing a CA-issued certificate.

8.1 Create PKCS11 Config File

Create PKCS11 config file /etc/pkcs11/pkcs11.conf  and add the following configuration:

api_key = "Your App API Key"
api_endpoint = "Your DSM URL" 

8.2 Red Hat 7 - Set up Mod nss and Update nss Configuration File

On Red Hat 7 mod_nss is used. You need to set up NSS and update the Apache mod_nss configuration file (/etc/httpd/conf.d/nss.conf ) to specify the SSL certificate and the key needs to be fetched using the PKCS#11 engine.

Run the following commands to set up NSS:

sudo mkdir /etc/nss
sudo certutil -N -d /etc/nss --empty-password
sudo modutil -add pkcs11 -libfile /opt/fortanix/pkcs11/fortanix_pkcs11.so -dbdir /etc/nss -force
sudo modutil -enable pkcs11 -dbdir /etc/nss -force
sudo chown -R apache:apache /etc/nss

Create a PIN file that contains the Fortanix Token and its Pin by creating a file “etc/nss/pin.txt” with the content as follows:

Fortanix Token:API_KEY

For example,

sudo su
echo Fortanix Token: NmM4YjZhOTQtYmEzZS00N....h3 > /etc/nss/pin.txt

Edit the NSS configuration file (/etc/httpd/conf.d/nss.conf) and make the following changes:

  • Update the pass phrase gathering process by changing the value of “NSSPassPhraseDialog” as follows:

    NSSPassPhraseDialog file:/etc/nss/pin.txt
  • Update the server certificate database by changing the value of “NSSCertificateDatabase” as follows:

    NSSCertificateDatabase /etc/nss
  • Update the SSL certificate Nickname by changing the value of “NSSNickname” as follows:

    NSSNickname "Fortanix Token:Your Certificate Label"

    For example:

    NSSNickname "Fortanix Token:SDKMS_Apache_Certificate"

8.3 Red Hat - Update Apache SSL Configuration File

On Red Hat 8 mod_ssl is used. We need to update the Apache mod_ssl configuration file (/etc/httpd/conf.d/ssl.conf ) file to specify the SSL private key which needs to be accessed using PKCS#11 engine.

The highlighted Key ID after the word ‘id=’ corresponds to the CKA_ID of the key in Fortanix DSM when you imported or created it. As per the PKCS#11 URI format (RFC 7512), the value of ‘id’ must be percent-encoded. You can find the CKA_ID of the key from the WebUI, by going to the detailed view of the security object then click the “Attributes” tab as shown in the following screenshot.

Attributes.png

Figure 5: Attributes tab of security object

The lines to be edited are shown in the following snippet:

SSLCertificateFile /etc/pki/tls/certs/localhost.crt
SSLCertificateKeyFile pkcs11:id=%5A%59%6E;type=private

NOTE

  • Only the line “SSLCertificateKeyFile” needs to be changed as the certificate file can stay on the server.

  • Note the value specified in percent encoded format.

8.4 Update Apache Startup File

Update the Apache service start-up file to pass the necessary environment variables for integration with Fortanix DSM. These environment variables allow PKCS#11 engine and PKCS#11 library to work and point to your Fortanix DSM URL.

Edit the file /usr/lib/systemd/system/httpd.service and add the environment variables under the “Service” section as follows (see highlighted text). Please update the value of FORTANIX_API_ENDPOINT to point to your instance of Fortanix DSM.

[Unit]
Description=The Apache HTTP Server
Wants=httpd-init.service
After=network.target remote-fs.target nss-lookup.target httpd-init.service
Documentation=man:httpd.service(8)
 
[Service]
Type=notify
Environment=LANG=C
Environment="OPENSSL_CONF=/etc/pki/tls/openssl.cnf"
Environment="FORTANIX_API_ENDPOINT=YOUR DSM URL"
Environment="FORTANIX_PKCS11_NUM_SLOTS=1"
 
ExecStart=/usr/sbin/httpd $OPTIONS -DFOREGROUND
ExecReload=/usr/sbin/httpd $OPTIONS -k graceful
# Send SIGWINCH for graceful stop
KillSignal=SIGWINCH
KillMode=mixed
PrivateTmp=true
 
[Install]
WantedBy=multi-user.target

8.5 Restarting Apache

Now, to restart Apache and make it use the key stored in Fortanix DSM, do the following:

sudo systemctl daemon-reload
sudo systemctl restart httpd

8.6 Verification

To verify that the configuration is working correctly, connect to your Apache server using a browser. You should be able to connect successfully. You can also check the key usage event logs in Fortanix DSM to verify that the key is being used as you connect to your Apache server.

9.0 Troubleshooting

If you see any issues, please use the steps mentioned in the section Testing Setup to verify if each piece of integration is working correctly. If you still see issues, please look at the PKCS11 logs in /var/log/messages and share with the Fortanix support team: ([email protected]).