Configuring encryption with the Thales Vormetric DSM key server
This topic describes the regular setup for encryption with Thales Vormetric Data Security Manager (DSM) as the key management server and using self-signed certificates on the KMIP port of the DSM server.
Setting up an encryption environment with DSM as the key server requires IBM Storage Scale Advanced Edition 4.2.1 or later and a supported version of DSM. For more information see the subtopic "Required software: Remote Key Management (RKM) server" in the help topic Preparation for encryption.
Requirements:- The node must have direct network access to the system where the key server is installed.
- The security-sensitive files that are created during the configuration process must have the
following characteristics:
- They must be regular files that are owned by the root user.
- They must be in the root group.
- They must be readable and writable only by the user (mode '0600'). The following examples apply
to the regular setup and the DSM setup:
-rw-------. 1 root root 2446 Mar 20 12:15 /var/mmfs/etc/RKM.conf drw-------. 2 root root 4096 Mar 20 13:47 /var/mmfs/etc/RKMcerts -rw-------. 1 root root 3988 Mar 20 13:47 /var/mmfs/etc/RKMcerts/keystore_name.p12
- The RKM.conf file. For more information about this file, see The RKM.conf file and the RKM stanza.
- The files in the client keystore directory, which include the keystore file, the public and private key files for the client, and possibly other files. For more information about these files, see The client keystore directory and its files.
CAUTION:- Take appropriate precautions to ensure that the security-sensitive files are not lost or corrupted. IBM Storage Scale does not manage or replicate the files.
- Ensure that the passphrase for the client certificate file is not leaked through other means, such as the shell history.
- Client keystore files must be record-locked when the GPFS daemon starts. If the keystore files are stored on an NFS mount, the encryption initialization process can hang. The cause is a bug that affects the way NFS handles record locking. If you encounter this problem, upgrade your version of NFS or store your keystore file on a local file system. If an upgrade is not possible and no local file system is available, use a RAM drive to store the keystore files.
Part 1: Creating credentials for the key client
- Some of the commands in the following instructions require you to specify values for the following two parameters:For both parameters, follow these guidelines:
- --fips
- Specifies whether the key client complies with the requirements of FIPS 140.
- --nist
- Specifies whether security transport for the key client complies with the NIST SP800-131A recommendations.
- If the key client complies, set the parameter to on; otherwise, set the parameter to off.
- Specify the same setting for each parameter as the setting in the IBM
Storage Scale cluster. To display these settings, issue the
following two commands:
mmlsconfig nistCompliance mmlsconfig FIPS140mode
Follow the procedure shown. If you are using certificates for the client that are signed by a certificate authority (CA), skip Step 1 and go to Step 2.
- Client credentials
- The certificate chain of the DSM key server as trusted certificates
Part 2: Configuring the DSM key server
In DSM, a host is a system to which DSM provides security services. In these instructions, the host is the IBM Storage Scale node that you are configuring for encryption. A DSM domain is an administrative group of one or more hosts. In these instructions, the domain contains the single IBM Storage Scale node. For more complex configurations, see the DSM product documentation.