Yubico YubiHSM 2
Ovviamente, è naturale mettere la sicurezza più stretta sui server che memorizzano i segreti custoditi per tutte le autenticazioni degli utenti. Se questi server sono compromessi significa che la sicurezza di tutte le chiavi di crittografia e password residenti su tale server è compromessa – in altre parole, un disastro.
Yubico ha originariamente sviluppato YubiHSM, (un “Hardware Security Module”), per elaborare la codifica, la decodifica e la conservazione dei segreti sui propri server. Oggi, lo YubiHSM2 è l’offerta di Yubico per una facile, conveniente e sicura protezione dei segreti di autenticazione legati alla Yubico OTP memorizzati sul server di autenticazione o di chiavi. Il dispositivo protegge i dati a riposo contro gli attacchi di intrusione condotti a distanza e le minacce interne.
La versione attuale di YubiHSM2 comprende un elemento sicuro e un cambio dal formato originale più grande, verso un design più piccolo (nano) con imbracatura in plastica pressofusa.
Microsoft Active Directory Certificate Services
YubiHSM 2 fornisce una chiave hardware per proteggere le chiavi digitali utilizzate in un’implementazione PKI basata su Microsoft. La distribuzione di YubiHSM 2 ai servizi Microsoft Active Directory Certificate non solo protegge le chiavi root della CA ma protegge anche tutti i servizi di firma e verifica mediante la chiave radice.
Abilita operazioni crittografiche Hardware-Based
YubiHSM 2 può essere utilizzato come toolkit crittografico completo per un’ampia gamma di applicazioni commerciali e open source. Il caso d’uso più comune è la generazione e la verifica della firma digitale basata su hardware.
Migliora la protezione delle chiavi crittografiche
YubiHSM 2 è una soluzione affidabile per la generazione, l’archiviazione e la gestione sicura di chiavi digitali, comprese le funzionalità essenziali per generare, scrivere, firmare, decodificare, hash e wrap keys.
L’ hardware security module più piccolo al mondo
Semplice installazione in una porta USB-A
- Secure key storage and operations
- Extensive cryptographic capabilities: RSA, ECC, ECDSA (ed25519), SHA-2, AES
- Secure session between HSM and application
- Role-based access controls for key management and key usage
- 16 concurrent connections
- Optionally network sharable
- Remote management
- Unique “Nano” form factor, low-power usage
- M of N wrap key Backup and Restore
- Interfaces via YubiHSM KSP, PKCS#11, and native libraries
- Tamper evident Audit Logging
Secure key storage and operations
Create, import, and store keys, then perform all crypto operations in the HSM hardware to prevent theft of keys while at rest or in use. This protects against both logical attacks against the server, such as zero-day exploits or malware, and physical theft of a server or its hard drive.
Extensive cryptographic capabilities
YubiHSM 2 supports hashing, key wrapping, asymmetric signing and decryption operations including advanced signing using ed25519. Attestation is also supported for asymmetric key pairs generated on-device.
Secure session between HSM and application
The integrity and privacy of commands and data in transit between the HSM and applications are protected using a mutually authenticated, integrity and confidentiality protected tunnel.
Role-based access controls for key management and key usage
All cryptographic keys and other objects in the HSM belong to one or more security domains. Access rights are assigned for each authentication key at creation time which allow a specific set of cryptographic or management operations to be performed per security domain. Admins assign rights to authentication keys based on its use case, such as a event monitoring app that needs the ability to read all audit logs in the HSM, or a Registration Authority that needs to issue (sign) end user digital certificates, or a domain security admin who needs to create and delete crypto keys.
16 concurrent connections
Multiple applications can establish sessions with a YubiHSM to perform cryptographic operations. Sessions can be automatically terminated after inactivity or be long-lived to improve performance by eliminating session creation time.
To increase the flexibility of deployments, the YubiHSM 2 can be made available for use over the network by applications on other servers. This can be especially advantageous on a physical server that is hosting multiple virtual machines.
Easily manage multiple deployed YubiHSMs remotely for the entire enterprise – eliminate on-call staff complexity and travel expense.
Unique “Nano” form factor, low-power usage
The Yubico “Nano” form factor allows the HSM to be inserted completely inside a USB-A port so it’s completely concealed – no external parts that protrude out of the server back or front chassis. It uses minimal power, max of 30mA, for cost-savings on your power budget.
M of N wrap key Backup and Restore
Backing up and deploying cryptographic keys on multiple HSMs is a critical component of an enterprise security architecture, but it’s a risk to allow a single individual to have that ability. The YubiHSM supports setting M of N rules on the wrap key used to export keys for backup or transport, so that multiple administrators are required to import and decrypt a key to make it usable on additional HSMs. For example in an enterprise, the Active Directory root CA private key might be key wrapped for 7 administrators (M=7) and at least 4 of them (N=4) are required to import and unwrap (decrypt) the key in the new HSM.
Interfaces via YubiHSM KSP, PKCS#11, and native libraries
Crypto enabled applications can leverage the YubiHSM via Yubico’s Key Storage Provider (KSP) for Microsoft’s CNG or industry-standard PKCS#11. Native libraries are also available on Windows, Linux and macOS to enable more direct interaction with the device’s capabilities.
Tamper evident Audit Logging
The YubiHSM internally stores a log of all management and crypto operation events that occur in the device and that log can be exported for monitoring and reporting. Each event (row) in the log is hash chained with the previous row and signed so that it’s possible to determine if any events are modified or deleted.
Advanced, Affordable Hardware Security
Whether you are getting started securing servers, or replacing pre-existing Hardware Security Module (HSM) solutions, YubiHSM 2 offers robust capabilities and benefits at a price that is now within easy reach for enterprises.
The YubiHSM 2 evolved from the award-winning YubiKey, trusted by 9 of the top 10 internet companies, and 2 of the top 3 financial, retail, healthcare and research institutions globally. Manufactured in USA and Sweden with high security and quality.
Supporto Sistemi Operativi
Windows Server 2012
Windows Server 2016
10.13 High Sierra
Cryptographic interfaces (APIs)
Microsoft CNG (KSP)
PKCS#11 (Windows, Linux, macOS)
Native YubiHSM Core Libraries (C, python)
Hashing (used with HMAC and asymmetric signatures)
SHA-1, SHA-256, SHA-384, SHA-512
2048, 3072, and 4096 bit keys
Signing using PKCS#1v1.5 and PSS
Decryption using PKCS#1v1.5 and OAEP
Elliptic Curve Cryptography (ECC)
Curves: secp224r1, secp256r1, secp256k1, secp384r1, secp521r, bp256r1, bp384r1, bp512r1, curve25519
Signing: ECDSA (all except curve25519), EdDSA (curve25519 only)
Decryption: ECDH (all except curve25519)
Import and export using NIST AES-CCM Wrap at 128, 196, and 256 bits
On-chip True Random Number Generator (TRNG) used to seed NIST SP 800-90 AES 256 CTR_DRBG
Asymmetric key pairs generated on-device may be attested using a factory certified attestation key and certificate, or using your own key and certificate imported into the HSM
Performance varies depending on usage. The accompanying Software Development Kit includes performance tools that can be used for additional measurements. Example metrics from an otherwise unoccupied YubiHSM 2:
- RSA-2048-PKCS1-SHA256: ~139ms avg
- RSA-3072-PKCS1-SHA384: ~504ms avg
- RSA-4096-PKCS1-SHA512: ~852ms avg
- ECDSA-P256-SHA256: ~73ms avg
- ECDSA-P384-SHA384: ~120ms avg
- ECDSA-P521-SHA512: ~210ms avg
- EdDSA-25519-32Bytes: ~105ms avg
- EdDSA-25519-64Bytes: ~121ms avg
- EdDSA-25519-128Bytes: ~137ms avg
- EdDSA-25519-256Bytes: ~168ms avg
- EdDSA-25519-512Bytes: ~229ms avg
- EdDSA-25519-1024Bytes: ~353ms avg
- AES-(128|192|256)-CCM-Wrap: ~10ms avg
- HMAC-SHA-(1|256): ~4ms avg
- HMAC-SHA-(384|512): ~243ms avg
- All data stored as objects. 256 object slots, 128KB (base 10) max total
- Stores up to 127 rsa2048, 93 rsa3072, 68 rsa4096 or 255 of any elliptic curve type, assuming only one authentication key is present
- Object types: Authentication keys (used to establish sessions); asymmetric private keys; opaque binary data objects, e.g. x509 certs; wrap keys; HMAC keys
- Mutual authentication and secure channel between applications and HSM
- M of N unwrap key restore via YubiHSM Setup Tool
Software Development Kit
A Software Development Kit for YubiHSM 2 is available for download on Yubico.com and includes:
- YubiHSM Core Library (libyubihsm) for C, Python
- YubiHSM Shell (Configuration CLI)
- PKCS#11 Module
- YubiKey Key Storage Provider (KSP) for use with Microsoft
- YubiHSM Connector
- YubiHSM Setup Tool
- Documentation and code examples
- Form factor: ‘nano’ designed for confined spaces such as internal USB ports in servers
- Dimensions: 12mm x 13mm x 3.1mm
- Weight: 1 gram
- Current requirements 20mA avg, 30mA max
- USB-A plug connector
Safety and environmental compliance
- Universal Serial Bus (USB) 1.x Full Speed (12Mbit/s) Peripheral with bulk interface.