EasyManuals Logo
Home>Entrust>Security System>nShield

Entrust nShield User Manual

Entrust nShield
90 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #76 background imageLoading...
Page #76 background image
same client’s IP address/ESN, but the new KNETI hash, and then re-establish the secure
channel to the Connect(s)/RFS.
11.3.10. Compromised Key or Secret: nToken KNETI
Compromise Type
A brute force attack on KNETI encrypted blob held in KNETI file in the KMData folder.
Impact
KNETI is compromised and must not be used
Recovery Action
For every Connect that the affected client has communicated with, use the Front Panel
to remove the client’s configuration data.
For any RFS that the affected client has communicated with, update the RFS’s
configuration filer to remove the client’s configuration data.
Manually delete the kneti file identified as kneti-nToken ESN.
On Windows, it is stored in C:\ProgramData\nCipher\Key Management Data\hardserver.d\.
On Linux, it is stored in /opt/nfast/kmdata/hardserver.d/.
Reset the nToken.
Isolate client and investigate unauthorized access to KMData file and integrity of client.
Once resolved re-configure the Connects/RFS that this client communicated with using
same client’s IP address/ESN, but the new KNETI hash, and then re-establish the secure
channel to the Connect(s)/RFS.
11.3.11. Compromised Key or Secret: Imported application keys
Application keys can also be imported into the HSM. Any secret/private application key
imported in plaintext should be treated as potentially compromised if:
The confidentiality and integrity of an imported secret/private key cannot be verified
The provenance of the key is unknown (it has not come from a trusted party).
11.4. Deleting a Security World
You can re-initialise an HSM to use a new Security World if, for example, you believe that
your existing Security World has been compromised. This must be done for all HSMs that
hosted the old Security World, however:
nShield® Security Manual 76 of 90

Table of Contents

Other manuals for Entrust nShield

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Entrust nShield and is the answer not in the manual?

Entrust nShield Specifications

General IconGeneral
BrandEntrust
ModelnShield
CategorySecurity System
LanguageEnglish

Related product manuals