Integrating an HSM
While Corda Enterprise supports a variety of HSMs for storing legal identity and confidential identity keys, you can also integrate other HSMs with Corda Enterprise using Corda Enterprise APIs. Once HSM integration has been written, HSMs can be tested against Corda Enterprise using the HSM Technical Compatibility Kit (TCK), a test suite available here.
To help write integration for your HSM, there is an example HSM implementation available as part of the com.r3.corda:corda-enterprise-utils:4.10
resources. We’ll go over this example HSM here to explain what the components are, and how they work.
In the example HSM there are five key files:
- A configuration file, called
AWSCloudConfiguration.java
. - A configuration parser, called
AWSCloudConfigurationParser.java
. - A factory class called
AWSCloudCryptoServiceProvider.java
. - A file specifying the java class that implements the
CryptoServiceProvider
interface, calledresources/META-INF/services/com.r3.corda.utils.CryptoServiceProvider
. - The HSM integration, called
AWSCloudCryptoService.java
.
We’ll go through each of these files and use them as a basis for explaining how to integrate an HSM with Corda Enterprise.
The HSM configuration file
In the example HSM implementation the HSM configuration file AWSCloudConfiguration.java
contains the following code:
package com.r3.corda.hsm.sample.aws;
import com.r3.corda.utils.cryptoservice.CryptoServiceCredentials;
import net.corda.nodeapi.internal.config.CustomConfigParser;
@CustomConfigParser(parser = AWSCloudConfigurationParser.class)
public class AWSCloudConfiguration implements CryptoServiceCredentials<AWSCloudConfiguration> {
private String username;
private String password;
private String partition;
public AWSCloudConfiguration(
String username,
String password,
String partition) {
this.username = username;
this.password = password;
this.partition = partition;
}
public boolean samePartition(AWSCloudConfiguration other) {
// Public keys are shared between multiple HSM users, so we have to use different aliases within the same HSM instance.
return partition.equals(other.partition);
}
public String getUsername() {
return username;
}
public String getPassword() {
return password;
}
public String getPartition() {
return partition;
}
}
The HSM configuration contains the basic configuration information required by the HSM, and implements CryptoServiceCredentials
. When implementing CryptoServiceCredentials
the only argument should be the configuration class itself.
Ensure that the configuration options required by the HSM correspond to the configuration options in this file.
The samePartition
section is required by Corda Enterprise tools to manage multiple public keys being used to access shared HSMs.
The configuration parser
The configuration parser file AWSCloudConfigurationParser.java
implements the ConfigParser
interface, and contains the following code:
package com.r3.corda.hsm.sample.aws;
import com.typesafe.config.Config;
import net.corda.nodeapi.internal.config.ConfigParser;
import org.jetbrains.annotations.NotNull;
public class AWSCloudConfigurationParser implements ConfigParser<AWSCloudConfiguration> {
@Override
public AWSCloudConfiguration parse(@NotNull Config config) {
return new AWSCloudConfiguration(
config.getString("username"),
config.getString("password"),
config.getString("partition")
);
}
}
The configuration parser will be unique to the HSM implementation, and is used to deserialise HSM configuration to a Java class.
The factory class
The factory class AWSCloudCryptoServiceProvider
implements the CryptoServiceProvider
interface, and contains the following code:
package com.r3.corda.hsm.sample.aws;
import com.r3.corda.utils.cryptoservice.CryptoServiceProvider;
import net.corda.nodeapi.internal.cryptoservice.CryptoService;
import net.corda.nodeapi.internal.cryptoservice.CryptoServiceException;
import org.jetbrains.annotations.NotNull;
import javax.security.auth.x500.X500Principal;
public class AWSCloudCryptoServiceProvider implements CryptoServiceProvider<AWSCloudConfiguration> {
private Class configurationType = AWSCloudConfiguration.class;
@NotNull
@Override
public String getName() {
return AWSCloudCryptoService.NAME;
}
@NotNull
@Override
public Class getConfigurationType() {
return configurationType;
}
public CryptoService createCryptoService(X500Principal x500Principal, AWSCloudConfiguration configuration) throws CryptoServiceException {
return AWSCloudCryptoService.fromConfiguration(x500Principal, configuration);
}
}
Corda Enterprise uses a service loader class to discover implementations of CryptoServiceProvider
.
The class takes the configuration information and creates an instance of the CryptoService
- in this case AWSCloudCryptoService
- including an X500 identifier and the configuration information defined in AWSCloudConfiguration.java
.
Java class specification file
This file is required when integrating an HSM. It must have the following filepath: src/main/resources/META-INF/services/com.r3.corda.utils.cryptoservice.CryptoServiceProvider
.
The file must contain the fully qualified name of the Java class that implements the CryptoServiceProvider
interface. In this example implementation, the content of the file is:
com.r3.corda.hsm.sample.aws.AWSCloudCryptoServiceProvider
The HSM integration
The HSM integration will differ depending on the mechanics of any given HSM, but in this example we’ve used a Java helper class JCACryptoService
to reduce the complexity. This class was created to facilitate the integration of further HSM vendors that provide a JCA provider.
When writing HSM integration, there are two groups of keys to consider: “alias” keys used for Artemis, node legal identity, and TLS, and “non-alias” keys, used for confidential identities.
Alias keys are stored in the HSM, and are never removed. Each HSM implementation should only have a very small number of alias keys.
Non-alias keys are generated using the HSM and extracted from HSMs in a wrapped format. Depending on the implementation there may be many confidential identity keys. Confidential identity keys are not stored in the HSM. The key used to wrap confidential identity keys is stored in the HSM and is not extracted.
All asymmetric keypairs (TLS, Artemis, and node legal identity) should use elliptic-curve keys, and all wrapping keys should use at least AES 256-bit keys.
public class AWSCloudCryptoService extends JCACryptoService implements CryptoServiceAdmin {
public static String NAME = "AWS_CLOUD_SAMPLE";
private static Logger logger = LoggerFactory.getLogger(AWSCloudCryptoService.class);
private LoginManager loginManager = LoginManager.getInstance();
private AWSCloudConfiguration config;
AWSCloudCryptoService(KeyStore keyStore, Provider provider, X500Principal x500Principal, AWSCloudConfiguration config) {
super(keyStore, provider, x500Principal);
this.config = config;
}
The above code block also includes the HSM configuration, and defines the HSM class, including keyStore
, Provider
, X500Principal
, and config
arguments. For full details, see the JCACryptoService definition.
The HSM integration must include code for authenticating with the HSM, creating keypairs, retrieving public keys, signing, creating wrapping keys, wrapping private keys, and error handling.
The full HSM integration example is as follows:
package com.r3.corda.hsm.sample.aws;
import com.cavium.cfm2.CFM2Exception;
import com.cavium.cfm2.LoginManager;
import com.cavium.cfm2.Util;
import com.cavium.key.CaviumKey;
import com.cavium.key.parameter.CaviumAESKeyGenParameterSpec;
import com.cavium.key.parameter.CaviumECGenParameterSpec;
import com.cavium.key.parameter.CaviumRSAKeyGenParameterSpec;
import com.r3.corda.utils.cryptoservice.AuthenticatedBlock;
import com.r3.corda.utils.cryptoservice.CryptoServiceAdmin;
import com.r3.corda.utils.cryptoservice.JCACryptoService;
import net.corda.core.crypto.Crypto;
import net.corda.core.crypto.SignatureScheme;
import net.corda.core.crypto.internal.Instances;
import net.corda.nodeapi.internal.cryptoservice.CryptoService;
import net.corda.nodeapi.internal.cryptoservice.CryptoServiceException;
import net.corda.nodeapi.internal.cryptoservice.WrappedPrivateKey;
import net.corda.nodeapi.internal.cryptoservice.WrappingMode;
import org.jetbrains.annotations.NotNull;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import java.security.*;
import java.security.spec.AlgorithmParameterSpec;
import java.security.spec.RSAKeyGenParameterSpec;
import java.util.UUID;
import javax.crypto.Cipher;
import javax.crypto.KeyGenerator;
import javax.crypto.SecretKey;
import javax.security.auth.x500.X500Principal;
public class AWSCloudCryptoService extends JCACryptoService implements CryptoServiceAdmin {
public static String NAME = "AWS_CLOUD_SAMPLE";
private static Logger logger = LoggerFactory.getLogger(AWSCloudCryptoService.class);
private LoginManager loginManager = LoginManager.getInstance();
private AWSCloudConfiguration config;
AWSCloudCryptoService(KeyStore keyStore, Provider provider, X500Principal x500Principal, AWSCloudConfiguration config) {
super(keyStore, provider, x500Principal);
this.config = config;
}
public boolean isLoggedIn() {
try {
return loginManager.isLoggedIn();
} catch (Exception e) {
logger.warn("Exception in isLoggedIn(): " + e.getMessage());
return false;
}
}
@Override
public void logIn() throws CryptoServiceException {
try {
loginManager.login(config.getPartition(), config.getUsername(), config.getPassword());
} catch (CFM2Exception e) {
if (CFM2Exception.isClientDisconnectError(e)) {
// Throw recoverable exception on socket disconnect
throw new CryptoServiceException(e.getMessage(), e, true);
}
throw new CryptoServiceException(e.getMessage(), e, false);
} catch (Exception e) {
throw new CryptoServiceException(e.getMessage(), e, false);
}
}
@Override
public <T> T withAuthentication(@NotNull AuthenticatedBlock<? extends T> block) throws CryptoServiceException {
try {
return super.withAuthentication(block);
} catch (CryptoServiceException e) {
throw e;
} catch (IllegalArgumentException e) {
throw e;
} catch (IllegalStateException e) {
throw e;
} catch (Exception e) {
throw new CryptoServiceException(e.getMessage(), e, false);
}
}
public SignatureScheme defaultIdentitySignatureScheme() {
return Crypto.ECDSA_SECP256R1_SHA256;
}
public SignatureScheme defaultTLSSignatureScheme() {
return Crypto.ECDSA_SECP256R1_SHA256;
}
@Override
public PublicKey generateKeyPair(String alias, SignatureScheme scheme) throws CryptoServiceException {
return withAuthentication(() -> {
String publicAlias = toPublic(alias);
String privateAlias = toPrivate(alias);
logger.trace("CryptoService(action=generate_key_pair_start;alias='" + alias + "';scheme='" + scheme + "'");
// Multiples keys can be stored under the same alias, so we need to check existing keys first
Key publicKey;
try {
publicKey = getKeyStore().getKey(publicAlias, null);
} catch (Exception e) {
throw new CryptoServiceException("Exception getting public key from key store for alias '" + alias + "'", e, false);
}
if (publicKey != null) {
throw new CryptoServiceException("Public key already exists in key store for alias '" + publicAlias + "'", null, false);
}
Key privateKey;
try {
privateKey = getKeyStore().getKey(privateAlias, null);
} catch (Exception e) {
throw new CryptoServiceException("Exception getting private key from key store for alias '" + alias + "'", e, false);
}
if (privateKey != null) {
throw new CryptoServiceException("Private key already exists in key store for alias '" + publicAlias + "'", null, false);
}
KeyPairGenerator keyPairGenerator = keyPairGeneratorFromScheme(scheme, publicAlias, privateAlias, false, true);
KeyPair keyPair = keyPairGenerator.generateKeyPair();
try {
getKeyStore().setKeyEntry(privateAlias, keyPair.getPrivate(), null, selfSign(scheme, keyPair));
} catch (Exception e) {
throw new CryptoServiceException("Exception setting private key in key store", e, false);
}
logger.trace("CryptoService(action=generate_key_pair_end;alias='" + alias + "';scheme='" + scheme + "'");
return Crypto.toSupportedPublicKey(keyPair.getPublic());
});
}
public boolean containsKey(String alias) {
return super.containsKey(toPublic(alias)) || super.containsKey(alias);
}
public PublicKey getPublicKey(String alias) throws CryptoServiceException {
return withAuthentication(() -> {
logger.trace("CryptoService(action=key_get_start;alias='" + alias + "')");
Key key;
try {
key = getKeyStore().getKey(toPublic(alias), null);
} catch (Exception e) {
logger.error("Exception getting key from key store: " + e.getMessage());
throw new CryptoServiceException("Exception getting key from key store", e, false);
}
if (key == null) {
return null;
}
if (!(key instanceof PublicKey)) {
throw new CryptoServiceException("Key with alias '" + alias + "': Key store returned object is of type " +
key.getClass().getSimpleName() + ", but should be of type PublicKey", null, false);
}
PublicKey publicKey = (PublicKey)key;
PublicKey supportedKey = Crypto.toSupportedPublicKey(publicKey);
logger.trace("CryptoService(action=key_get_end;alias='" + alias + "')");
return supportedKey;
});
}
public byte[] sign(String alias, byte[] data, String signAlgorithm) throws CryptoServiceException {
return super.sign(toPrivate(alias), data, signAlgorithm);
}
public void delete(String alias) throws CryptoServiceException {
withAuthentication(() -> {
try {
Key k1 = getKeyStore().getKey(toPublic(alias), null);
if (k1 != null) {
Util.deleteKey((CaviumKey) k1);
}
Key k2 = getKeyStore().getKey(toPrivate(alias), null);
if (k2 != null) {
Util.deleteKey((CaviumKey) k2);
}
Key k3 = getKeyStore().getKey(alias, null);
if (k3 != null) {
Util.deleteKey((CaviumKey) k3);
}
} catch (Exception e) {
throw new CryptoServiceException("Error deleting alias '" + alias + "' from CryptoService.", e, true);
}
return 0; // Return type needed in withAuthentication
});
}
@Override
public synchronized void createWrappingKey(String alias, boolean failIfExists) throws CryptoServiceException {
withAuthentication(() -> {
try {
boolean exists = false;
try {
if (getKeyStore().getKey(alias,null) != null) {
exists = true;
}
} catch (UnrecoverableKeyException e) {
}
if (exists) {
if (failIfExists) {
throw new IllegalArgumentException("There is an existing key with the alias: " + alias);
} else {
return 0;
}
}
} catch (IllegalArgumentException e) {
throw e;
} catch (Exception e) {
throw new CryptoServiceException("Exception checking if keystore contains alias: '" + alias + "'", e, false);
}
try {
KeyGenerator keyGenerator = KeyGenerator.getInstance("AES", getProvider());
keyGenerator.init(new CaviumAESKeyGenParameterSpec(wrappingKeySize(), alias, false, true));
SecretKey wrappingKey = keyGenerator.generateKey();
getKeyStore().setKeyEntry(alias, wrappingKey, null, null);
} catch (Exception e) {
throw new CryptoServiceException("Exception wrapping key for alias: '" + alias + "'", e, false);
}
return 0; // Return type needed in withAuthentication
});
}
@Override
public kotlin.Pair<PublicKey, WrappedPrivateKey> generateWrappedKeyPair(String masterKeyAlias, SignatureScheme childKeyScheme) throws CryptoServiceException {
return withAuthentication(() -> {
Key key;
try {
key = getKeyStore().getKey(masterKeyAlias,null);
if (key == null) {
throw new IllegalStateException("No master key under the alias: '" + masterKeyAlias + "'");
}
if (!(key instanceof SecretKey)) {
throw new CryptoServiceException("Master key under the alias: '" + masterKeyAlias + "': Object is of type " +
key.getClass().getSimpleName() + ", but should be of type SecretKey", null, false);
}
} catch (Exception e) {
throw new IllegalStateException("There is no master key under the alias: " + masterKeyAlias);
}
SecretKey wrappingKey = (SecretKey)key;
Cipher cipher;
try {
// AES Key Wrap (RFC 3394) with PKCS#5 padding
cipher = Cipher.getInstance("AESWrap/ECB/PKCS5Padding", getProvider());
cipher.init(Cipher.WRAP_MODE, wrappingKey);
} catch (Exception e) {
throw new CryptoServiceException("Unable to init cipher", e, false);
}
KeyPairGenerator keyPairGenerator;
String alias = UUID.randomUUID().toString();
try {
keyPairGenerator = keyPairGeneratorFromScheme(childKeyScheme, toPublic(alias), toPrivate(alias), true, false);
} catch (Exception e) {
throw new CryptoServiceException("Unable to get keypair generator from scheme", e, false);
}
byte[] privateKeyMaterial;
KeyPair keyPair;
try {
keyPair = keyPairGenerator.generateKeyPair();
privateKeyMaterial = cipher.wrap(keyPair.getPrivate());
} catch (Exception e) {
throw new CryptoServiceException("Unable to wrap key", e, false);
}
try {
Util.deleteKey((CaviumKey)keyPair.getPublic());
Util.deleteKey((CaviumKey)keyPair.getPrivate());
} catch (Exception e) {
throw new CryptoServiceException("Unable to delete key", e, false);
}
PublicKey publicKey = Crypto.toSupportedPublicKey(keyPair.getPublic());
return new kotlin.Pair<>(publicKey, new WrappedPrivateKey(privateKeyMaterial, childKeyScheme, null));
});
}
@Override
public byte[] sign(String masterKeyAlias, WrappedPrivateKey wrappedPrivateKey, byte[] payloadToSign) throws CryptoServiceException {
return withAuthentication(() -> {
try {
Key wrappingKey = getKeyStore().getKey(masterKeyAlias, null);
if (wrappingKey == null || !(wrappingKey instanceof SecretKey)) {
throw new IllegalStateException("There is no master key under the alias: " + masterKeyAlias);
}
Cipher cipher = Cipher.getInstance("AESWrap/ECB/PKCS5Padding", getProvider());
cipher.init(Cipher.UNWRAP_MODE, wrappingKey);
String algorithm = keyAlgorithmFromScheme(wrappedPrivateKey.getSignatureScheme());
Key priKey = cipher.unwrap(wrappedPrivateKey.getKeyMaterial(), algorithm, Cipher.PRIVATE_KEY);
if (!(priKey instanceof PrivateKey)) {
throw new CryptoServiceException("Key is not an instance of PrivateKey.", null, false);
}
PrivateKey privateKey = (PrivateKey) priKey;
Signature signature = Instances.INSTANCE.getSignatureInstance(wrappedPrivateKey.getSignatureScheme().getSignatureName(), getProvider());
signature.initSign(privateKey);
signature.update(payloadToSign);
byte[] signedData = signature.sign();
Util.deleteKey((CaviumKey) privateKey);
return signedData;
} catch (CryptoServiceException e) {
throw e;
} catch (IllegalStateException e) {
throw e;
} catch (Exception e) {
throw new CryptoServiceException("Cannot sign with alias: " + masterKeyAlias, e, false);
}
});
}
public WrappingMode getWrappingMode() {
return WrappingMode.WRAPPED;
}
private String toPublic(String val) {
return val + ":public";
}
private String toPrivate(String val) {
return val + ":private";
}
private KeyPairGenerator keyPairGeneratorFromScheme(SignatureScheme scheme, String publicAlias, String privateAlias,
boolean extractable, boolean persistent) throws CryptoServiceException {
String algorithm = keyAlgorithmFromScheme(scheme);
AlgorithmParameterSpec params;
if (scheme.getSchemeCodeName().equals(Crypto.ECDSA_SECP256R1_SHA256.getSchemeCodeName())) {
params = new CaviumECGenParameterSpec("secp256r1", publicAlias, privateAlias, extractable, persistent);
} else if (scheme.getSchemeCodeName().equals(Crypto.ECDSA_SECP256K1_SHA256.getSchemeCodeName())) {
params = new CaviumECGenParameterSpec("secp256k1", publicAlias, privateAlias, extractable, persistent);
} else if (scheme.getSchemeCodeName().equals(Crypto.RSA_SHA256.getSchemeCodeName())) {
if (scheme.getKeySize() == null) {
throw new CryptoServiceException("Key size must not be null for signature scheme RSA_SHA256", null, false);
}
params = new CaviumRSAKeyGenParameterSpec(scheme.getKeySize(), RSAKeyGenParameterSpec.F4, publicAlias, privateAlias, extractable, persistent);
} else {
throw new CryptoServiceException("No mapping for scheme ID '" + scheme.getSchemeNumberID() + "' [" + scheme.getSchemeCodeName() + "]", null, false);
}
KeyPairGenerator keyPairGenerator;
try {
keyPairGenerator = KeyPairGenerator.getInstance(algorithm, getProvider());
keyPairGenerator.initialize(params);
} catch (Exception e) {
throw new CryptoServiceException("Cannot initialize key pair generator", e, false);
}
return keyPairGenerator;
}
private String keyAlgorithmFromScheme(SignatureScheme scheme) throws CryptoServiceException {
if (scheme.getSchemeCodeName().equals(Crypto.ECDSA_SECP256R1_SHA256.getSchemeCodeName())) {
return "EC";
} else if (scheme.getSchemeCodeName().equals(Crypto.ECDSA_SECP256K1_SHA256.getSchemeCodeName())) {
return "EC";
} else if (scheme.getSchemeCodeName().equals(Crypto.RSA_SHA256.getSchemeCodeName())) {
return "RSA";
} else {
throw new CryptoServiceException("No algorithm for scheme ID '" + scheme.getSchemeNumberID() + "'", null, false);
}
}
static CryptoService fromConfiguration(X500Principal x500Principal, AWSCloudConfiguration config) throws CryptoServiceException {
// Registered provider is required for CaviumSignature
try {
Provider provider = new com.cavium.provider.CaviumProvider();
Security.addProvider(provider);
KeyStore keyStore = KeyStore.getInstance("CloudHSM", provider);
keyStore.load(null, null);
return new AWSCloudCryptoService(keyStore, provider, x500Principal, config);
} catch (Exception e) {
throw new CryptoServiceException("Exception creating Crypto service", e, false);
}
}
}
Was this page helpful?
Thanks for your feedback!
Chat with us
Chat with us on our #docs channel on slack. You can also join a lot of other slack channels there and have access to 1-on-1 communication with members of the R3 team and the online community.
Propose documentation improvements directly
Help us to improve the docs by contributing directly. It's simple - just fork this repository and raise a PR of your own - R3's Technical Writers will review it and apply the relevant suggestions.
We're sorry this page wasn't helpful. Let us know how we can make it better!
Chat with us
Chat with us on our #docs channel on slack. You can also join a lot of other slack channels there and have access to 1-on-1 communication with members of the R3 team and the online community.
Create an issue
Create a new GitHub issue in this repository - submit technical feedback, draw attention to a potential documentation bug, or share ideas for improvement and general feedback.
Propose documentation improvements directly
Help us to improve the docs by contributing directly. It's simple - just fork this repository and raise a PR of your own - R3's Technical Writers will review it and apply the relevant suggestions.