Information in this document is subject to change without notice.
Reproduction in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden.
Trademarks used in this text: Dell, the DELL logo and PowerVault are trademarks of Dell Inc.
Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks
and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other than
its own.
Contents
Figures ...............v
Tables ...............vii
Preface ...............ix
About this Book .............ix
Who Should Read this Book ........ix
Conventions and Terminology Used in this Bookix
Attention Notice .............ix
Related Publications ............x
Linux Information...........x
Microsoft Windows Information .......x
Online Support............x
Read this First............xi
Contacting Dell .............xi
Chapter 1. Tape Encryption Overview1-1
Components ..............1-1
Managing Encryption ...........1-2
Application-Managed Tape Encryption ....1-4
Library-Managed Tape Encryption .....1-5
About Encryption Keys ..........1-5
Chapter 2. Planning Your Encryption
Key Manager Environment ......2-1
Encryption Setup Tasks at a Glance ......2-1
Encryption Key Manager Setup Tasks ....2-1
Planning for Library-Managed Tape Encryption2-1
Hardware and Software Requirements .....2-2
Linux Solution Components.......2-2
Windows Solution Components ......2-3
Keystore Considerations ..........2-3
The JCEKS Keystore ..........2-3
Encryption Keys and the LTO 4 and LTO 5 Tape
|
Drives ...............2-4
Backing up Keystore Data ........2-5
Multiple Key Managers for Redundancy . . . 2-7
Encryption Key Manager Server Configurations 2-7
Disaster Recovery Site Considerations .....2-9
Considerations for Sharing Encrypted Tapes Offsite 2-9
Federal Information Processing Standard 140-2
Considerations.............2-10
Chapter 3. Installing the Encryption
Key Manager and Keystores .....3-1
Downloading the Latest Version Key Manager ISO
|
Image................3-1
|
Installing the Encryption Key Manager on Linux3-1
Installing the Encryption Key Manager on
Windows ...............3-2
Using the GUI to Create a Configuration File,
Keystore, and Certificates .........3-5
Generating Keys and Aliases for Encryption on
LTO4andLTO5............3-9
|
Creating and Managing Key Groups .....3-14
Chapter 4. Configuring the Encryption
Key Manager ............4-1
Using the GUI to Configure the Encryption Key
Manager ...............4-1
Configuration Strategies ..........4-1
Automatically Update Tape Drive Table....4-1
Synchronizing Data Between Two Key Manager
Servers..............4-2
Configuration Basics ...........4-3
Chapter 5. Administering the
Encryption Key Manager.......5-1
Starting, Refreshing, and Stopping the Key
Manager Server .............5-1
The Command Line Interface Client ......5-5
CLI Commands .............5-7
Chapter 6. Problem Determination. . 6-1
Check These Important Files for Encryption Key
Manager Server Problems .........6-1
Debugging Communication Problems Between the
CLI Client and the EKM Server .......6-2
Debugging Key Manager Server Problems ....6-2
Encryption Key Manager-Reported Errors ....6-5
Messages ...............6-9
Config File not Specified .........6-9
Failed to Add Drive ..........6-10
Failed to Archive the Log File......6-10
Failed to Delete the Configuration .....6-10
Failed to Delete the Drive Entry ......6-11
Failed to Import ...........6-11
Failed to Modify the Configuration .....6-11
File Name Cannot be Null ........6-11
File Size Limit Cannot be a Negative Number6-12
No Data to be Synchronized .......6-12
Invalid Input ............6-12
Invalid SSL Port Number in Configuration File 6-13
Invalid TCP Port Number in Configuration File 6-13
Must Specify SSL Port Number in
Configuration File..........6-13
Must Specify TCP Port Number in
Configuration File..........6-14
Server Failed to Start.........6-14
Sync Failed .............6-14
The Specified Audit Log File is Read Only . . 6-15
Unable to Load the Admin Keystore ....6-15
Unable to load the keystore .......6-16
Unable to Load the Transport Keystore . . . 6-16
Unsupported Action ..........6-16
iii
Chapter 7. Audit Records......7-1
Audit Overview............7-1
Audit Configuration Parameters .......7-1
Audit.event.types ...........7-1
Audit.event.outcome ..........7-2
Audit.eventQueue.max .........7-2
Audit.handler.file.directory ........7-2
Audit.handler.file.size..........7-3
Audit.handler.file.name .........7-3
Audit.handler.file.multithreads .......7-4
Audit.handler.file.threadlifespan ......7-4
Audit Record Format ...........7-4
Audit Points in the Encryption Key Manager . . 7-5
Audit Record Attributes .........7-5
Audited Events .............7-7
Linux Platforms ...........A-1
Sample Configuration Files.........A-1
Appendix B. Encryption Key Manager
Configuration Properties Files ....B-1
Encryption Key Manager Server Configuration
Properties File .............B-1
CLI Client Configuration Properties File ....B-9
Appendix C. Frequently Asked
Questions .............C-1
Notices ..............D-1
Trademarks ..............D-1
Chapter 8. Using Metadata ......8-1
Appendix A. Sample Files ......A-1
Sample startup daemon script ........A-1
Glossary.............E-1
Index ...............X-1
iv
Dell Encryption Key Mgr User's Guide
Figures
1-1.The Encryption Key Manager’s four main
components...........1-2
1-2.Two possible locations for encryption policy
engine and key management......1-4
1-3.Encryption Using Symmetric Encryption
|
|
|
|
||
||
|
||
Keys..............1-6
2-1.LTO 4 or LTO 5 Tape Drive Request for
Encryption Write Operation ......2-4
2-2.LTO 4 or LTO 5 Tape Drive Request for
Encryption Read Operation ......2-5
2-3.Backup Critical Files Window .....2-6
2-4.Single Server Configuration ......2-7
2-5.Two Servers with Shared Configurations2-8
2-6.Two Servers with Different Configurations
Accessing the Same Devices ......2-9
3-1.Choose Destination Location window3-3
3-2.Set this version of JVM to default3-3
3-3.Start Copying Files window ......3-4
3-4.EKM Server Configuration Page.....3-6
3-5.EKM Server Certificate Configuration Page3-7
3-6.Backup Critical Files Window .....3-8
3-7.Create a Group of Keys .......3-15
3-8.Change Default Write Key Group3-16
3-9.Assign Group to Drive .......3-17
3-10.Delete Drive ...........3-18
5-1.Server Status ...........5-1
5-2.Login Window ..........5-2
v
viDell Encryption Key Mgr User's Guide
Tables
1.Typographic Conventions used in this Bookix
1-1.Encryption Key Summary .......1-7
2-1.Minimum Software Requirements for Linux 2-2
2-2.Minimum Software Requirements for
Windows ............2-3
6-1.Errors that are reported by the encryption
key manager ...........6-5
7-1.Audit record types that the Encryption Key
Manager writes to audit files ......7-5
7-2.Audit record types by audited event7-7
8-1.Metadata Query Output Format .....8-2
vii
viiiDell Encryption Key Mgr User's Guide
Preface
About this Book
This manual contains information and instructions necessary for the installation
and operation of the Dell
procedures pertaining to:
|
v Encryption-capable LTO 4 and LTO 5 Tape Drives
v Cryptographic keys
v Digital certificates
™
Encryption Key Manager. It includes concepts and
Who Should Read this Book
This book is intended for storage and security administrators responsible for
security and backup of vital data, and anyone assisting in the setup and
maintenance of Encryption Key Manager servers in the operating environment. It
assumes the reader has a working knowledge of storage devices and networks.
Conventions and Terminology Used in this Book
This book uses the following typographic conventions:
Table 1. Typographic Conventions used in this Book
ConventionUsage
boldBold words or characters represent system
elements that you must use literally, such as
command names, file names, flag names,
path names, and selected menu options.
constant widthExamples, text specified by the user, and
information that the system displays appear
in constant width typeface.
italicItalicized words or characters represent
variable values that you must supply.
[item]Indicates optional items.
{item}Encloses a list from which you must choose
an item in format and syntax descriptions.
|A vertical bar separates items in a list of
choices.
<Key>Indicates keys you press.
Attention Notice
An attention notice indicates the possibility of damage to a program, device,
system, or to data. An exclamation point symbol may accompany an attention
notice, but is not required. Sample attention notices follow:
Attention: If you use a power screwdriver to perform this
procedure it could destroy the tape.
ix
Related Publications
Refer to the following publications for more information:
v Getting Started with the Dell™PowerVault™TL2000 and TL4000 Tape Libraries
provides installation information.
™
v Dell
provides supported SCSI commands and protocol governing the behavior of
SCSI interface.
Linux Information
Red Hat Information
The following URL relates to Red Hat Linux®systems:
v http://www.redhat.com
SuSE Information
The following URL relates to SuSE Linux systems:
v http://www.suse.com
Microsoft Windows Information
The following URL provides access to information about Microsoft®Windows
systems:
v http://www.microsoft.com
PowerVault™TL2000 Tape Library and TL4000 Tape Library SCSI Reference
®
Online Support
Visit http://support.dell.com for the following related publication:
Dell Encryption Key Manager Quick Start Guide provides information for setting
up a basic configuration.
Visit http://www.dell.com for the following related publication:
The Library Managed Encryption for Tape white paper suggests best practices for
LTO tape encryption.
xDell Encryption Key Mgr User's Guide
Read this First
Contacting Dell
For customers in the United States, call 800-WWW-DELL (800-999-3355).
Note: If you do not have an active Internet connection, you can find contact
Dell provides several online and telephone-based support and service options.
Availability varies by country and product, and some services may not be available
in your area. To contact Dell for sales, technical support, or customer service
issues:
1. Visit http://support.dell.com.
2. Verify your country or region in the Choose A Country/Region drop-down
3. Click Contact Us on the left side of the page.
4. Select the appropriate service or support link based on your need.
5. Choose the method of contacting Dell that is convenient for you.
information on your purchase invoice, packing slip, bill, or Dell product
catalog.
menu at the bottom of the page.
xi
xiiDell Encryption Key Mgr User's Guide
Chapter 1. Tape Encryption Overview
Data is one of the most highly valued resources in a competitive business
environment. Protecting that data, controlling access to it, and verifying its
authenticity while maintaining its availability are priorities in our
security-conscious world. Data encryption is a tool that answers many of these
needs. The Dell Encryption Key Manager (referred to as the Encryption Key
Manager from this point forward) simplifies encryption tasks.
|
|
|
|
The LTO 4 and LTO 5 drives are capable of encrypting data as it is written to any
LTO 4 and LTO 5 Data Cartridges. This new capability adds a strong measure of
security to stored data without the processing overhead and performance
degradation associated with encryption performed on the server or the expense of
a dedicated appliance.
The tape drive encryption solution comprises three major elements:
The Encryption-Enabled Tape Drive
All LTO 4 and LTO 5 Tape Drives must be enabled through the library
interface.
See “Hardware and Software Requirements” on page 2-2 for more information
on tape drives.
Encryption Key Management
Encryption involves the use of several kinds of keys, in successive layers. The
generation, maintenance, control, and transmission of these keys depends upon
the operating environment where the encrypting tape drive is installed. Some
applications are capable of performing key management. For environments
without such applications or those where application-agnostic encryption is
desired, Dell Encryption Key Manager performs all necessary key management
tasks. “Managing Encryption” on page 1-2 describes these tasks in more detail.
Encryption Policy
This is the method used to implement encryption. It includes the rules that
govern which volumes are encrypted and the mechanism for key selection.
How and where these rules are set up depends on the operating environment.
See “Managing Encryption” on page 1-2 for more information.
Components
The Encryption Key Manager is part of the Java environment and uses the Java
Security components for its cryptographic capabilities. (For more information on
the Java Security components please see the related publications section.) The
Encryption Key Manager has three main components that are used to control its
behavior. These components are:
Java security keystore
The keystore is defined as part of the Java Cryptography Extension (JCE)
and an element of the Java Security components, which are, in turn, part of
the Java runtime environment. A keystore holds the certificates and keys
(or pointers to the certificates and keys) used by the Encryption Key
Manager to perform cryptographic operations. Several types of Java
keystores are supported offering different operational characteristics to
meet your needs. These characteristics are discussed in detail in “Keystore
1-1
Considerations” on page 2-3.
It is impossible to overstate the importance of preserving your keystore data.
Without access to your keystore you will be unable to decrypt your
encrypted tapes. Please carefully read the topics below to understand the
methods available for protecting your keystore data.
Configuration files
The configuration files allow you to customize the behavior of the
Encryption Key Manager to meet the needs of your organization. These
behavioral choices are described extensively in this document, first in
Chapter 2, “Planning Your Encryption Key Manager Environment,” on
page 2-1, then in the Chapter 4, “Configuring the Encryption Key
Manager,” on page 4-1, and later in Appendix B where the full set of
configuration options is described.
Tape drive table
The tape drive table is used by the Encryption Key Manager to keep track
of the tape devices it supports. The tape drive table is a non-editable,
binary file whose location is specified in the configuration file. You can
change its location to meet your needs.
KeyGroups.xml file
This password-protected file contains the names of all encryption key
groups and the aliases of the encryption keys associated with each key
group.
Encryption Key Manager
Generates encryption keys
and manages their transfer
to and from tape devices
Config
File
Holds public/private key
pairs and certificates
Figure 1-1. The Encryption Key Manager’s four main components
Key
store
Key
Groups
Organizes
encryption
keys into
groups
Managing Encryption
The Dell Encryption Key Manager is a Java™software program that assists
encryption-enabled tape drives in generating, protecting, storing, and maintaining
encryption keys that are used to encrypt information being written to, and decrypt
information being read from, tape media (tape and cartridge formats). The
Encryption Key Manager operates on Linux (SLES and RHEL) and Windows, and
is designed to run in the background as a shared resource deployed in several
Records Keystore location and
defines
Encryption Key
Manager
behavior
Drive
Table
Tracks which tape
devices
Manager
Encryption Key
supports
a14m0234
1-2Dell Encryption Key Mgr User's Guide
locations within an enterprise. A command line interface client provides a robust
set of commands to customize the Encryption Key Manager for your environment
and monitor its operation. Many customization and monitoring functions are also
available on the Dell Encryption Key Manager graphical user interface (GUI). The
Encryption Key Manager uses one or more keystores to hold the certificates and
keys (or pointers to the certificates and keys) required for all encryption tasks. See
“Keystore Considerations” on page 2-3 for detailed information.
IMPORTANT Encryption Key Manager HOST SERVER CONFIGURATION
INFORMATION: It is recommended that machines hosting the Dell
Encryption Key Manager program use ECC memory in order to minimize
the risk of data loss. The Encryption Key Manager performs the function of
requesting the generation of encryption keys and passing those keys to the
|
LTO 4 and LTO 5 tape drives. The key material, in wrapped (encrypted
form) resides in system memory during processing by the Encryption Key
Manager. Note that the key material must be transferred without error to the
appropriate tape drive so that data written on a cartridge may be recovered
(decrypted). If for some reason key material is corrupted due to a bit error in
system memory, and that key material is used to write data to a cartridge,
then the data written to that cartridge will not be recoverable (i.e. decrypted
at a later date). There are safeguards in place to make sure that such data
errors do not occur. However, if the machine hosting the Encryption Key
Manager is not using Error Correction Code (ECC) memory there remains a
possibility that the key material may become corrupted while in system
memory and the corruption could then cause data loss. The chance of this
occurrence is small, but it is always recommended that machines hosting
critical applications (like the Encryption Key Manager) use ECC memory.
The Encryption Key Manager acts as a background process awaiting key
generation or key retrieval requests sent to it through a TCP/IP communication
path between itself and the tape library. When a tape drive writes encrypted data,
it first requests an encryption key from the Encryption Key Manager. Upon receipt
of the request, the Encryption Key Manager performs the following tasks.
The Encryption Key Manager fetches an existing AES key from a keystore and
wraps it for secure transfer to the tape drive where it is unwrapped upon arrival
and used to encrypt the data being written to tape.
|
When an encrypted tape is read by an LTO 4 or LTO 5 drive, the Encryption Key
Manager fetches the required key from the keystore, based on the information in
the Key ID on the tape, and serves it to the tape drive wrapped for secure transfer.
There are two methods of encryption management to choose from. These methods
differ in where the encryption policy engine resides, where key management is
performed for your solution, as well as how the Encryption Key Manager is
connected to the drive. Your operating environment determines which is the best
for you. Key management and the encryption policy engine may be located in any
one of the following two environmental layers.
Chapter 1. Tape Encryption Overview1-3
Policy
Application
Data Path
or
Library
Policy
Library Drive Interface
Figure 1-2. Two possible locations for encryption policy engine and key management.
Application Layer
An application program, separate from the key manager, initiates data transfer
for tape storage. See “Application-Managed Tape Encryption” for supported
applications.
Library Layer
The enclosure for tape storage, such as the Dell PowerVault TL2000/TL4000
and ML6000 family. A modern tape library contains an internal interface to
each tape drive within it.
Data Path
a14m0252
Application-Managed Tape Encryption
This method is best where operating environments run an application already
capable of generating and managing encryption policies and keys. Policies
specifying when encryption is to be used are defined through the application
interface. The policies and keys pass through the data path between the application
layer and the encrypting tape drives. Encryption is the result of interaction
between the application and the encryption-enabled tape drive, and does not
require any changes to the system and library layers. Since the application
manages the encryption keys, volumes written and encrypted using the application
method can only be read using the application-managed encryption method, by
the same application that wrote them.
Encryption Key Manager is not required by, or used by, application-managed
tape encryption.
The following minimum version applications can be used to manage encryption:
v CommVault Galaxy 7.0 SP1
v Symantec Backup Exec 12
1-4Dell Encryption Key Mgr User's Guide
|
Application-managed tape encryption is supported in LTO 4 and LTO 5 Tape
Drives in:
v Dell
v Dell
v Dell™PowerVault™ML6000 Tape Library
See your tape backup software application documentation to learn how to manage
encryption policies and keys.
Library-Managed Tape Encryption
|
Use this method for LTO 4 and LTO 5 tape drives in the Dell™PowerVault
TL2000 Tape Library, Dell™PowerVault™TL4000 Tape Library, or Dell
PowerVault™ML6000 Tape Library. Key generation and management is performed
by the Encryption Key Manager, a Java application running on a library-attached
host. Policy control and keys pass through the library-to-drive interface, therefore
encryption is transparent to the applications.
About Encryption Keys
An encryption key is a random string of bits generated specifically to scramble and
unscramble data. Encryption keys are created using algorithms designed to ensure
that each key is unique and unpredictable. The longer the key constructed this
way, the harder it is to break the encryption code. Both the IBM and T10 methods
of encryption use 256-bit AES algorithm keys to encrypt data. 256-bit AES is the
encryption standard currently recognized and recommended by the U.S.
government, which allows three different key lengths. 256-bit keys are the longest
allowed by AES.
™
PowerVault™TL2000 Tape Library
™
PowerVault™TL4000 Tape Library
™
™
Two types of encryption algorithms are used by the Encryption Key Manager:
symmetric algorithms and asymmetric algorithms. Symmetric, or secret key
encryption, uses a single key for both encryption and decryption. Symmetric key
encryption is generally used for encrypting large amounts of data in an efficient
manner. 256-bit AES keys are symmetric keys. Asymmetric, or public/private
encryption, uses a pair of keys. Data encrypted using one key can only be
decrypted using the other key in the public/private key pair. When an asymmetric
key pair is generated, the public key is used to encrypt, and the private key is
used to decrypt.
The Encryption Key Manager uses both symmetric and asymmetric keys;
symmetric encryption for high-speed encryption of user or host data, and
asymmetric encryption (which is necessarily slower) for protecting the symmetric
key.
Encryption keys may be generated for the Encryption Key Manager by a utility
such as keytool. The responsibility for generating AES keys and the manner in
which they are transferred to the tape drive depends on the method of encryption
management. However, it may be helpful to understand the difference between
how the Encryption Key Manager uses encryption keys and how other applications
use them.
Encryption Key Processing by the Dell Encryption Key Manager
|
|
In library-managed tape encryption, unencrypted data is sent to the LTO 4 or LTO
5 Tape Drive and converted to ciphertext using a pre-generated symmetric Data
Key (DK) from a keystore available to the Encryption Key Manager, and is then
Chapter 1. Tape Encryption Overview1-5
written to tape. The Encryption Key Manager selects a pre-generated DK in round
robin fashion. DKs are reused on multiple tape cartridges when an insufficient
|
number of DKs have been pre-generated. The DK is sent to the LTO 4 or the LTO 5
tape drive in encrypted or wrapped form by the Encryption Key Manager. The
|
|
|
LTO 4 and LTO 5 tape drives unwrap this DK and use it to perform encryption or
decryption. However, no wrapped key is stored anywhere on the LTO 4 or the
LTO 5 tape cartridges. After the encrypted volume is written, the DK must be
accessible based on the alias or key label, and available to the Encryption Key
Manager in order for the volume to be read. Figure 1-3 illustrates this process.
The Dell Encryption Key Manager also gives you the ability to organize your
symmetric keys for LTO encryption into key groups. In this way, you can group
keys according to the type of data they encrypt, the users who have access to
them, or by any other meaningful characteristic. See “Creating and Managing Key
Groups” on page 3-14 for more information.
Encryption Key Processing by Other Applications
|
|
In application-managed tape encryption, unencrypted data is sent to the LTO 4 and
LTO 5 Tape Drives and converted to ciphertext using a symmetric DK provided by
the application, and is then written to tape. The DK is not stored anywhere on the
tape cartridge. Once the encrypted volume is written, the DK must be in a location
available to the application, a server database, for example, in order for the volume
to be read.
|
LTO 4 and LTO 5 Tape Drives can use applications such as Yosemite (for Dell
PowerVault TL2000 and TL4000 Tape Libraries), CommVault, and Symantec
Backup Exec for application-managed encryption.
|
Alternatively, LTO 4 and LTO 5 Tape Drives can be used by applications that use
the T10 command set to perform encryption. The T10 command set uses symmetric
256-bit AES keys provided by the application. T10 can use multiple, unique DKs
per tape cartridge, and even write encrypted data and clear data to the same tape
cartridge. When the application encrypts a tape cartridge, it selects or generates a
DK using a method determined by the application and sends it to the tape drive.
The key is not wrapped with an asymmetric public key and it is not stored on the
tape cartridge. Once the encrypted data is written to tape, the DK must be in a
location available to the application in order for the data to be read.
The process for application-managed and library-managed encryption tape
encryption is shown in Figure 1-3.
Clear
Data
DK
Figure 1-3. Encryption Using Symmetric Encryption Keys. Library-Managed and Application-Managed Encryption on
LTO 4 and LTO 5 Tape Drives.
|
1-6Dell Encryption Key Mgr User's Guide
E{data,DK}
sym
Cipher
Tex t
Encrypted
Tape
a14m0236
In Summary
The number of encryption keys that may be used for each volume depends on the
tape drive, the encryption standard, and method used to manage the encryption.
|
||
For transparent encryption of LTO 4 and LTO 5, (that is, using library-managed
encryption with the Encryption Key Manager,) the uniqueness of DKs depends on
the availability of a sufficient number of pre-generated keys to the Encryption Key
Manager.
Table 1-1. Encryption Key Summary
Encryption Management
Method
Library-Managed Encryption1 DK / cartridgeN/A
Application-Managed
Encryption
DK= Symmetric AES 256-bit DK
IBM EncryptionT10 Encryption
Multiple DKs / cartridgeMultiple DKs / cartridge
Keys used by
Chapter 1. Tape Encryption Overview1-7
1-8Dell Encryption Key Mgr User's Guide
Chapter 2. Planning Your Encryption Key Manager
Environment
This section is intended to provide information to allow you to determine the best
Encryption Key Manager configuration for your needs. Many factors must be
considered when you are planning how to set up your encryption strategy.
Encryption Setup Tasks at a Glance
Before you can use the encryption capability of the tape drive, certain software and
hardware requirements must be met. The following checklists are intended to help
you meet these requirements.
Encryption Key Manager Setup Tasks
Before you can encrypt tapes, the Encryption Key Manager must first be
configured and running so that it can communicate with the encrypting tape
drives. The Encryption Key Manager need not be running while tape drives are
being installed, but it must be running in order to perform encryption.
v Decide what system platform(s) to use as Encryption Key Manager server(s).
v Upgrade server operating system if necessary. (See “Hardware and Software
Requirements” on page 2-2.)
v Install Java Unrestricted Policy Files. (See “Hardware and Software
Requirements” on page 2-2.)
v Upgrade the Encryption Key Manager JAR. (See “Downloading the Latest
|
Version Key Manager ISO Image” on page 3-1.)
v Create keys, certificates, and key groups.
“Using the GUI to Create a Configuration File, Keystore, and Certificates” on
page 3-5
“Creating and Managing Key Groups” on page 3-14
v These steps are not required if you follow the procedure in “Using the GUI to
Create a Configuration File, Keystore, and Certificates” on page 3-5, unless you
wish to take advantage of additional configuration options:
– If necessary, import keys and certificates. (See “Importing Data Keys Using
Keytool -importseckey ” on page 3-12.)
– Define the configuration properties file. (See Chapter 4, “Configuring the
Encryption Key Manager,” on page 4-1.)
– Define tape drives to the Encryption Key Manager or set
drive.acceptUnknownDrives configuration property value on. (See
“adddrive” on page 5-8 to define drives explicitly, or see “Automatically
Update Tape Drive Table” on page 4-1.)
– Start the Encryption Key Manager server. (See “Starting, Refreshing, and
Stopping the Key Manager Server” on page 5-1.)
– Start the command line interface client. (See “The Command Line Interface
Client” on page 5-5.)
Planning for Library-Managed Tape Encryption
In order to perform encryption, you require:
|
v Encryption-capable LTO 4 and LTO 5 Tape Drive(s)
2-1
v Keystore
v Dell Encryption Key Manager
Library-Managed Tape Encryption Tasks
|
|
1. Install and cable the LTO 4 and LTO 5 Tape Drive(s).
v Update library firmware (TL2000, TL4000, ML6000 where necessary). Visit
PowerVault™ML6000 Tape Library Family minimum required
firmware version = 415G.xxx.
v Update tape drive firmware if necessary The minimum required firmware
version is 77B5.
2. Enable LTO 4 and LTO 5 Tape Drives and Tape Library for library-managed
tape encryption (see your Dell tape library information for details).
v Add Encryption Key Manager Server IP addresses
3. Use library diagnostic functions to verify Encryption Key Manager paths and
encryption configuration (see your Dell tape library information for details).
Hardware and Software Requirements
Note: Only the IBM version of the Java Runtime Environment (JRE) for each of the
following platforms supports the Encryption Key Manager.
Linux Solution Components
Operating Systems
v RHEL 4
v RHEL 5
v SLES 9
v SLES 10
|
|
v SLES 11
Encryption Key Manager (Running on Linux)
Table 2-1. Minimum Software Requirements for Linux
IBM Software
Platform
64-bit AMD/Opteron/
EM64T
®
32-bit Intel
compatible
Developer KitAvailable at:
Java 6.0 SR5http://support.dell.com
Tape Libraries
|
|
|
For the Dell PowerVault TL2000 Tape Library, TL4000 Tape Library, and ML6000
Tape Library, assure that the firmware level is the latest available. For firmware
updates, visit http://support.dell.com.
2-2Dell Encryption Key Mgr User's Guide
Tape Drive
|
|
For the LTO 4 and LTO 5 Tape Drives, assure that the firmware level is the latest
available. For firmware updates, visit http://support.dell.com.
Windows Solution Components
Operating Systems
|
|
|
Windows Server 2003, 2008, and 2008 R2
Dell Encryption Key Manager
The minimum required version of the Encryption Key Manager is 2.1 with a build
date of 20070914 or later, and one of the following IBM Runtime Environments:
Table 2-2. Minimum Software Requirements for Windows
Operating
SystemIBM Runtime Environment
Windows 2003
Windows 2008
and 2008 R2
®
v IBM
v IBM 32-bit Runtime Environment for Windows, Java 2 Technology
IBM 64-bit Runtime Environment for Windows on AMD64/EM64T
architecture, Java 2 Technology Edition, Version 6.0 SR5
64-bit Runtime Environment for Windows on AMD64/EM64T
architecture, Java 2 Technology Edition, Version 5.0 SR5
Edition, Version 5.0 SR5
Tape Libraries
|
|
|
For the Dell™PowerVault™TL2000 Tape Library, Dell™PowerVault™TL4000 Tape
Library, and Dell™PowerVault™ML6000 Tape Library, assure that the firmware
level is the latest available. For firmware update, visit http://support.dell.com.
Tape Drive
|
|
For the LTO 4 and LTO 5 Tape Drives, assure that the firmware level is the latest
available. For firmware update, visit http://support.dell.com.
Keystore Considerations
The JCEKS Keystore
EKM supports the JCEKS keystore type.
JCEKS (Unix System Services file based) is a file-based keystore supported on all
platforms where EKM runs. Thus it is relatively easy to copy the contents of this
keystore for back up and recovery, and to keep two EKM instances synchronized
for failover. JCEKS provides password-based protection of the contents of the
keystore for security, and provides relatively good performance. File copy methods
such as FTP may be used.
It is impossible to overstate the importance of preserving your keystore data.
Without access to your keystore you will be unable to decrypt your
encrypted tapes. Carefully read the topics below to understand the methods
available for protecting your keystore data.
Chapter 2. Planning Your Encryption Key Manager Environment2-3
|
Encryption Keys and the LTO 4 and LTO 5 Tape Drives
The Dell Encryption Key Manager and its supported tape drives use symmetric,
256-bit AES keys to encrypt data. This topic explains what you should know about
these keys and certificates.
|
|
|
|
|
When performing encryption tasks on the LTO 4 or LTO 5 Tape Drives for LTO
tape cartridges, Encryption Key Manager uses 256-bit AES symmetric data keys
only.
When an LTO 4 or LTO 5 requests a key, Encryption Key Manager uses the alias
specified for the tape drive. If no alias was specified for the tape drive, an alias
from a key group, key alias list, or range of key aliases specified in the
symmetricKeySet configuration property is used. Lacking a specific alias for the
tape drive, aliases are selected from the other entities in round robin fashion to
balance the use of keys evenly.
The selected alias is associated with a symmetric Data Key (DK) that was
preloaded in the keystore. Encryption Key Manager sends this DK, wrapped with
a different key that the tape drive can decrypt, to the LTO 4 or LTO 5 tape drive to
encrypt the data. The DK is not transmitted through TCP/IP in the clear. The
selected alias is also converted to an entity called Data Key identifier (DKi), which
is written to tape with the encrypted data. In this way, Encryption Key Manager
can use the DKi to identify the correct DK needed to decrypt the data when the
LTO 4 or LTO 5 tape is read.
The adddrive and moddrive topics in “CLI Commands” on page 5-7 show how to
specify an alias for a tape drive. See “Generating Keys and Aliases for Encryption
on LTO 4 and LTO 5” on page 3-9, which includes information on importing keys,
exporting keys, and specifying default aliases in the symmetricKeySet
configuration property. “Creating and Managing Key Groups” on page 3-14 shows
how to define a key group and populate it with aliases from your keystore.
Figure 2-1 shows how keys are processed for encrypted write operation.
5
DK, DKi
6
Key Manager
alias
3
DK
1
Config
File
4
Key
store
Figure 2-1. LTO 4 or LTO 5 Tape Drive Request for Encryption Write Operation
|
1. Tape drive requests key to encrypt tape
2. Encryption Key Manager verifies tape device in Drive Table
2
Drive
Table
7
2-4Dell Encryption Key Mgr User's Guide
3. If no alias is specified in the request and no alias is specified in the drive table,
Encryption Key Manager selects an alias from the set of aliases or the key
group in the keyAliasList.
4. Encryption Key Manager fetches a corresponding DK from the keystore.
5. Encryption Key Manager converts the alias to a DKi and wraps the DK with a
key the drive can decrypt
6. Encryption Key Manager sends the DK and DKi to the tape drive
7. Tape drive unwraps the DK and writes encrypted data and DKi to tape
Figure 2-2 shows how keys are processed for encrypted read operation.
4
DK
5
Key Manager
3
DKiAlias
1
Config
File
2
Key
store
Figure 2-2. LTO 4 or LTO 5 Tape Drive Request for Encryption Read Operation
|
1. Tape drive receives read request and sends DKi to Encryption Key Manager
2. Encryption Key Manager verifies tape device in Drive Table
3. Encryption Key Manager translates DKi to alias and fetches corresponding DK
from keystore
4. Encryption Key Manager wraps the DK with a key the drive can decrypt
5. Encryption Key Manager sends the wrapped DK to tape drive
6. Tape drive unwraps the DK and uses it to decrypt the data
Drive
Table
6
Backing up Keystore Data
Note: Due to the critical nature of the keys in your keystore, it is vital that you
back up this data on a non-encrypted device so that you can recover it as
needed and be able to read the tapes that were encrypted using those
certificates associated with that tape drive or library. Failure to backup
your keystore properly will result in irrevocably losing all access to your
encrypted data.
There are many ways to backup this keystore information. Each keystore type has
it own unique characteristics. These general guidelines apply to all:
v Keep a copy of all certificates loaded into the keystore (usually a PKCS12 format
file).
v Use system backup capabilities (such as RACF) to create a backup copy of the
keystore information (be careful not to encrypt this copy using the encrypting
tape drives as it would impossible to decrypt it for recovery).
Chapter 2. Planning Your Encryption Key Manager Environment2-5
v Maintain a primary and secondary Encryption Key Manager and keystore copy
(for backup as well as failover redundancy). Back up the keystores for both
primary and secondary for added redundancy.
v For a JCEKS keystore, simply copy the keystore file and store the clear
(unencrypted) copy in a secure location such as a vault (be careful not to encrypt
this copy using the encrypting tape drives as it would be impossible to decrypt
it for recovery).
At a minimum, you should back up your keystore data whenever you change it.
The Encryption Key Manager does not modify keystore data. The only changes to
the keystore are those that you apply, so be sure to copy the keystore as soon as
you change it.
Backing up Your Files Using the GUI
1. Open the GUI if it is not yet started:
On Windows
Navigate to c:\ekm\gui and click LaunchEKMGui.bat
On Linux platforms
Navigate to /var/ekm/gui and enter . ./LaunchEKMGui.sh
2. Select Backup Critical Files in the navigator on the left of the Encryption Key
Manager GUI.
3. Enter the path for your backup data in the displayed dialog (Figure 2-3).
Figure 2-3. Backup Critical Files Window
4. Click Backup Files.
5. An information message displays the results.
2-6Dell Encryption Key Mgr User's Guide
a14m0241
Multiple Key Managers for Redundancy
The Encryption Key Manager is designed to work with tape drives and libraries to
allow redundancy, and thus high availability, so you can have multiple key
managers servicing the same tape drives and libraries. Moreover, these key
managers need not be on the same systems as the tape drives and libraries. The
maximum number of key managers depends on your library or proxy. The only
requirement is that they be available to the tape drives through TCP/IP
connectivity.
This allows you to have two Encryption Key Managers that are mirror images of
each other with built-in backup of the critical information about your keystores, as
well as a failover in the event one key manager becomes unavailable. When you
configure your device (or proxy) you can point it to two key managers. If one key
manager becomes unavailable for any reason, your device (or library) will simply
use the alternate key manager.
You also have the capability to keep the two Encryption Key Managers
synchronized. It is critical that you take advantage of this important function when
needed, both for its inherent backup of critical data and also for its failover
capability to avoid any outages in your tape operations. Refer to “Synchronizing
Data Between Two Key Manager Servers” on page 4-2.
Note: Synchronization does not include keystores. They must be copied manually.
Encryption Key Manager Server Configurations
The Encryption Key Manager may be installed on a single-server or on multiple
servers. The following examples show one- and two-key manager configurations
but your library may allow more.
Single-Server Configuration
A single-server configuration, shown in Figure 2-4, is the simplest Encryption Key
Manager configuration. However, because of the lack of redundancy it is not
recommended. In this configuration, all tape drives rely on a single key manager
server with no backup. Should the server go down, the keystore, configuration file,
KeyGroups.xml file, and drive table would be unavailable, making any encrypted
tape unreadable. In a single-server configuration you must ensure that backup
copies of the keystore, configuration file, KeyGroups.xml file, and drive table are
maintained in a safe place, separate from the Encryption Key Manager, so its
function can be rebuilt on a replacement server if the server copies are lost.
|
|
Figure 2-4. Single Server Configuration
|
|
Tape Library
A
Encryption
Key
Manager
Tape Library
B
Key Store
Drive Table
Config File
Key Groups
Tape Library
C
a14m0256
Chapter 2. Planning Your Encryption Key Manager Environment2-7
Two-Server Configurations
A two-server configuration is recommended. This Encryption Key Manager
configuration will automatically failover to the secondary key manager should the
primary be inaccessible for any reason.
Note: When different Encryption Key Manager servers are used to handle requests
from the same set of tape drives, the information in the associated keystores
MUST be identical. This is required so that regardless which key manager
server is contacted, the necessary information is available to support
requests from the tape drives.
Identical configurations: In an environment with two Encryption Key Manager
servers having identical configurations, such as those shown in Figure 2-5,
processing will automatically failover to the secondary key manager should the
primary go down. In such a configuration it is essential that the two key manager
servers be synchronized. Updates to the configuration file and drive table of one
key manager server can be duplicated on the other automatically using the sync
command, but updates to one keystore must be copied to the other using methods
specific to the keystore(s) being used. The keystores and key groups XML file must
be copied manually. Refer to “Synchronizing Data Between Two Key Manager
Servers” on page 4-2 for more information.
|
Primary
Encryption
Key Manager
Tape Library
A
|
Figure 2-5. Two Servers with Shared Configurations
|
Key Store
Drive Table
Config File
Key Groups
|
Separate configurations: Two Encryption Key Manager servers may share a
common keystore and drive table yet have two different configuration files and
two different sets of key groups defined in their XML files. The only requirement is
that the keys used to serve the common tape drives must be the same for each
server. This allows each key manager server to have its own set of properties. In
this type of configuration, shown in Figure 2-6 on page 2-9, only the drive table
should be synchronized between key manager servers. (Refer to “Synchronizing
Data Between Two Key Manager Servers” on page 4-2 for more information.) Be
sure to specify sync.type = drivetab (do not specify config or all) to prevent the
configuration files from being overwritten.
Note: There is no way to partially share the configuration between servers.
=
=
Drive Table
=
Config File
=
Key Groups
Tape Library
B
Key Store
Secondary
Encryption
Key Manager
Tape Library
C
a14m0254
2-8Dell Encryption Key Mgr User's Guide
|
Primary
Encryption
Key Manager
Key Store
Drive Table
Config File
Key Groups
=
=
=
Key Store
Drive Table
Config File
Key Groups
Secondary
Encryption
Key Manager
Tape Library
A
|
Figure 2-6. Two Servers with Different Configurations Accessing the Same Devices
|
Tape Library
B
|
Disaster Recovery Site Considerations
If you plan to use a disaster recovery (DR) site, the Encryption Key Manager
provides a number of options to enable that site to read and write encrypted tapes.
These are:
v Create a duplicate Encryption Key Manager at the DR site.
Set up a duplicate Encryption Key Manager at the DR site with the same
information as your local Encryption Key Manager (configuration file, tape drive
table, key groups XML file, and keystore). This key manager would then be in
place and capable of taking over for one of your existing production key
managers to read and write encrypted tapes.
v Create a backup copy of the three Encryption Key Manager data files to be able
to recover as needed.
If you create a current copy of the four data elements needed by the Encryption
Key Manager (configuration file, tape drive table, key groups XML file, and
keystore) then you would be able to start a key manager at any time to act as a
duplicate at the DR site. (Remember that you should not use the Encryption Key
Manager to encrypt the copies of these files as you would not be able to decrypt
it without a functioning key manager). If your DR site uses different tape drives
from your primary site, the configuration file and tape drive table must contain
the correct information for the DR site.
Tape Library
C
a14m0255
Considerations for Sharing Encrypted Tapes Offsite
Note: It is important to verify the validity of any certificate received from a
business partner by checking the chain of trust of such a certificate back to
the Certificate Authority (CA) that ultimately signed it. If you trust the CA,
then you can trust that certificate. Alternately, the validity of a certificate can
be verified if it was securely guarded in transit. Failure to verify a
certificate’s validity in one of these ways may open the door to a
“Man-in-the-Middle” attack.
|
|
Sharing LTO 4 and LTO 5 Tape
In order to share encrypted data on an LTO 4 or LTO 5 tape, a copy of the
symmetric key used to encrypt the data on the tape must be made available to the
other organization to enable them to read the tape. In order for the symmetric key
to be shared, the other organization must share their public key with you. This
public key will be used to wrap the symmetric key when it is exported from the
Encryption Key Manager keystore using keytool (see “Exporting Data Keys Using
Chapter 2. Planning Your Encryption Key Manager Environment2-9
Keytool -exportseckey ” on page 3-12). When the other organization imports the
symmetric key into their Encryption Key Manager keystore, it will be unwrapped
using their corresponding private key (see “Importing Data Keys Using Keytool
-importseckey ” on page 3-12). This ensures that the symmetric key is safe in
transit since only the holder of the private key is able to unwrap the symmetric
key. With the symmetric key that was used to encrypt the data in their Encryption
Key Manager keystore, the other organization will then be able to read the data on
the tape.
Federal Information Processing Standard 140-2 Considerations
Federal Information Processing Standard 140-2 has become important now that the
Federal government requires all its cryptographic providers to be FIPS 140
certified. This standard has also been adopted in a growing private sector
community. The certification of cryptographic capabilities by a third party in
accordance with government standards is felt to have increased value in this
security-conscious world.
The Encryption Key Manager does not provide cryptographic capabilities itself and
therefore does not require, nor is it allowed to obtain, FIPS 140-2 certification.
However, the Encryption Key Manager takes advantage of the cryptographic
capabilities of the IBM JVM in the IBM Java Cryptographic Extension component
and allows the selection and use of the IBMJCEFIPS cryptographic provider, which
has a FIPS 140-2 level 1 certification. By setting the fips configuration parameter to
on in the Configuration Properties file, you make the Encryption Key Manager use
the IBMJCEFIPS provider for all cryptographic functions.
See the documentation from specific hardware and software cryptographic
providers for information on whether their products are FIPS 140-2 certified.
2-10Dell Encryption Key Mgr User's Guide
Loading...
+ 92 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.