Hardware Security Modules (HSMs) are trusted machines that perform sensitive operations in critical ecosystems. They are usually required by law in financial and government digital services. The most important feature of an HSM is its ability to store sensitive credentials and cryptographic keys inside a tamper-resistant hardware, so that every operation is done internally through a suitable API, and such sensitive data are never exposed outside the device. HSMs are now conveniently provided in the cloud, meaning that the physical machines are remotely hosted by some provider and customers can access them through a standard API. The property of keeping sensitive data inside the device is even more important in this setting as a vulnerable application might expose the full API to an attacker. Unfortunately, in the last 20+ years a multitude of practical API-level attacks have been found and proved feasible in real devices. The latest version of PKCS#11, the most popular standard API for HSMs, does not address these issues leaving all the flaws possible. In this paper, we propose the first secure HSM configuration that does not require any restriction or modification of the PKCS#11 API and is suitable to cloud HSM solutions, where compliance to the standard API is of paramount importance. The configuration relies on a careful separation of roles among the different HSM users so that known API flaws are not exploitable by any attacker taking control of the application. We prove the correctness of the configuration by providing a formal model in the state-of-the-art Tamarin prover and we show how to implement the configuration in a real cloud HSM solution.
翻译:硬软件安全模块(HSMS)是信任的机器,在关键生态系统中执行敏感操作,通常是金融和政府数字服务的法律要求。HSM的最重要特征是它能够将敏感证书和加密钥匙储存在防破坏硬件中,因此每个操作都通过适当的API内部进行,而这种敏感数据从未在设备外曝光。HSM现在在云中提供方便,这意味着物理机器由某些提供者远程托管,客户可以通过标准API访问这些机器。在这个环境中,将敏感数据保存在设备内部的特性更为重要,因为一个脆弱的应用程序可能会将全API暴露给攻击者。不幸的是,在过去20年以上,发现大量实用的API级别袭击,并在实际设备中证明可行。 PKCS#11的最新版本是HSM最受欢迎的标准API,但并不能解决这些问题,因此所有缺陷都有可能。在本文件中,我们提议第一个不需要限制或修改PKSS#11 API的配置的可靠特性配置配置,因为一个不易变现的HSPI的系统配置解决方案是如何在高频级的配置中执行。