Secrets management
Automatic Unseal, Seal Wrap, a...

Configure the Futurex PKCS #11 Library with HashiCorp Vault

25min

The Vault HSM auto-unseal and Seal Wrap features require Vault Enterprise with the Governance and Policy Module.

To configure the PKCS #11 Library for use with HashiCorp Vault, perform the following tasks:

  1. Download Vault.
  2. Install Vault.
  3. Configure Systemd.
  4. Configure Vault settings.
  5. Start the Vault server.
  6. Enable and test the Seal Wrap feature.
  7. Enable and test the Entropy Augmentation feature.

1 | Download Vault

Download precompiled Vault binaries at https://releases.hashicorp.com/vault/. You can download Vault Enterprise binaries by following the instructions made available to HashiCorp Vault customers.

This integration requires the Enterprise HSM binary. You can use this for testing and find it at the following link: https://releases.hashicorp.com/vault/1.7.2+ent.hsm/

2 | Install Vault

1

Unzip the downloaded package and move the vault binary to /usr/local/bin/.

Shell

2

Set the owner of the Vault binary.

Shell

3

Check that vault is available on the system path.

Shell

4

Verify the Vault version.

Shell

5

Enable autocompletion flags, subcommands, and arguments (where supported).

Shell

6

Enable autocompletion.

Shell

7

Give Vault the ability to use the mlock syscall without running the process as root. The mlock syscall prevents the system from swapping memory to disk.

Shell

8

Create a unique, non-privileged system user to run Vault.

Shell


3 | Configure Systemd

Systemd uses documented sane defaults, so you need to set only non-default values in the configuration file.

1

Create a Vault service file at /etc/systemd/system/vault.service.

Shell

2

Add the following configuration to the Vault service file:

Text


4 | Configure Vault settings

This section shows you how to perform the following tasks:

  • Configure Vault
  • Configure Auto-unseal and Entropy Augementation.

Configure Vault

Vault uses documented sane defaults so you need to set only non-default values in the configuration file.

1

Create /etc/vault.d directory.

Shell

2

Create a Vault configuration file, vault.hcl.

Shell

3

Set the ownership of the /etc/vault.d directory.

Shell

4

Set the file permissions.

Shell


Configure HSM Auto-unseal and Entropy Augmentation

When you start a Vault server, it normally starts in a sealed state where you need a quorum of existing unseal keys to unseal it. By integrating Vault with an HSM, you can set the Vault server to be automatically unsealed by the trusted HSM key provider.

To integrate the Vault Enterprise server with an HSM cluster, the configuration file must define the PKCS11 seal stanza providing necessary connection information, as shown in the following example:

Example: vault.hcl

This guide sets the storage backend to the local file system, /tmp/vault, to make the verification step easy.

The example configuration defines the following in its seal stanza:

Parameter

Description



lib

Path to the PKCS #11 library on the machine where Vault Enterprise is installed.



slot

The slot number to use (this should be set to 0 because that is the default slot in the FXPKCS11 config file).



key_label

Defines the label of the key to use.



hmac_key_label

Defines the label of the key to use for HMACing.



generate_key

If no existing key with the label specified by key_label exists at Vault initialization time, Vault generates a key.



For this integration, the generate_key parameter needs to be set to true so that Vault automatically creates the encryption keys that it uses for the Seal Wrap functionality on the HSM. The values set for the key_label and hmac_key_label parameters correspond with the special key label defines that must be set in the <CONFIG> section of the fxpkcs11.cfg file

For the full list of configuration parameters, prefer to the Vault documentation here.

5 | Start the Vault Server

This section shows you haw to perform the following tasks:

  • Start Vault
  • Initialize Vault
  • Access the Vault UI

Start Vault

1

Log in with the vault user.

2

Set the PKCS #11 PIN for log in with the following command. For the value of VAULT_HSM_PIN, use the password of the identity created on the HSM and defined in the FXPKCS11 config file.

Shell


You can also set the PKCS #11 PIN can in the Vault configuration file (vault.hcl) with the pin parameter, but we don't recommend this in a production setting. Best practice is to specify the pin with the VAULT_HSM_PIN environment variable, as shown here. This prevents the password from being exposed if the config file is compromised or you store it in an unsecure location. If set through the environment variable, Vault obfuscates the environment variable after reading it. The one caveat is that you need to re-set the VAULT_HSM_PIN environment variable if you restart the Vault.

3

Now, start the Vault server with the following command.

Shell


If this command is successful, you should see output similar to the following example:

Shell

4

Open a new terminal window and leave the terminal running where you started the Vault server.

Initialize Vault

1

In the new terminal, first, set the VAULT_ADDR environment variable.

Shell

2

Check the Vault status.

Shell


The output should be similar to the following:

Shell

3

Initialize Vault.

Shell


The output should be similar to the following:

Shell

4

Set the VAULT_TOKEN environment variable value to the generated Root Token value displayed in the terminal output. To interact with Vault, you must provide a valid token. Setting this environment variable enables interaction with Vault through the CLI.

Shell


Access the Vault UI

1

Go to http://localhost:8200 in a web browser.

2

Copy and paste the Initial Root Token from the output of the Vault initialization command into the Token field, and select [ Sign In ].

If the log in succeeds, you see the Vault UI homepage.

6 | Enable and test the Seal Wrap feature

To enable and test the Seal Wrap feature, perform the tasks in this section.

Enable Seal Wrap

To enable Seal Wrap, choose the appropriate method and perform the instructions:

Use CLI command
Use the Web UI
1

To compare seal wrapped data against unwrapped data, enable key/value v1 secrets engine at two different paths: kv-unwrapped and kv-seal-wrapped.

Enable k/v v1 without seal wrap at kv-unwrapped.

Shell


Enable k/v v1 with seal wrap. To do so, use the -seal-wrap flag when you enable the KV workflow.

Shell


To enable seal wrap, pass the -seal-wrap flag when you enable a secrets engine.

2

List the enabled secrets engines with details.

Shell


Notice that the Seal Wrap parameter value is true for kv-unwrapped/.

Test the Seal Wrap feature

To test the Seal Wrap feature, perform the following tasks:

  • Test the feature
  • View the encrypted sectets

Test the feature

To test the Seal Wrap feature, choose the appropriate method and follow the instructions:

Use CLI command
Use the Web UI
1

Write a secret at kv-unwrapped/unwrapped for testing.

Shell

2

Read the path to verify.

Shell

3

Write the same secret at kv-seal-wrapped/wrapped for testing.

Shell

4

Read the path to verify.

Shell


Using a valid token, you can write and read secrets the same way regardless of the seal wrap.

View the encrypted secrets

To view the encrypted secrets, choose the appropriate method and follow the instructions:

The following examples assume the Vault server is configured to use the local file system (/tmp/vault) as its storgage backend:

Text

Use CLI command
Use the Web UI
1

SSH into the machine where the Vault server is running, and check the stored values in the /tmp/vault directory.

Shell

2

In the /tmp/vault/logical directory, there are two sub-directories. One maps to kv-unwrapped/ and another maps to kv-seal-wrapped/ although you cannot tell by the folder names.

View the secret at rest. One of the directories maps to kv-unwrapped/unwrapped.

Example:

Shell

3

View its content. The password value is encrypted.

Shell

4

Another directory maps to kv-seal-wrapped/wrapped.

Shell

5

View its content. The password value is encrypted.

Shell


Secrets are encrypted regardless; however, the seal-wrapped value is significantly longer despite the fact that both values are the same, my-long-password.

7 | Enable and test the Entropy Augmentation feature

To leverage the external entropy source, set the external_entropy_access parameter to true when you enable a secrets engine or auth method.

This step shows how to enable external entropy source on a transit secrets engine.

You must enable the Entropy Augmentation feature through the CLI. At this time, we do not support enabling Entropy Augmentation through the Web UI.

1

Execute the following command to enable the transit secrets engine with external entropy source by using the -external-entropy-access flag.

Shell

2

List the enabled secrets engine with -detailed flag.

Shell


Notice that the External Entropy Access is set to true for transit/.

3

You can start using the transit secrets engine to encrypt your sensitive data which leverages the HSM as its external entropy source. Regardless, the user experience remains the same as before.

Example:

1. Create a new encryption key named, orders.

Shell


2. Send a base64-encoded string to be encrypted by Vault.

Shell


3. Now, test to verify that you can decrypt:

Shell


4. Decode to get the original data:

Shell


When the external entropy access is enabled, the connectivity to the HSM is required. If the HSM becomes unreachable for any reason, the transit secrets engine fails to generate new keys or rotate the existing keys.

Shell