Home >

Administration Guide > Software Updates and Maintenance > Apply a Capability Upgrade or Update to Network HSM

Apply a Capability Upgrade or Update to Network HSM

SafeNet HSMs are shipped from the factory in specific configurations with specific sets of capabilities, to suit your requirements. It can happen that your requirements change over time. To future-proof your SafeNet HSM investment, you have the option to purchase Secure Capability Updates to enhance the performance or extend the capability of SafeNet systems already in your possession, as described in Advanced Configuration Upgrades. The Secure Capability Update accomplishes system upgrades while safeguarding the integrity of your sensitive key material and of the system software.

A Secure Capability Upgrade is delivered to you as a downloaded file set. The procedure to perform the update is very similar to the procedure for Appliance software updates or firmware updates.

Preparing to Upgrade

To ensure a trouble-free installation, you must prepare for the upgrade.

To prepare for the upgrade

1.Backup all SafeNet HSM Partitions to SafeNet Backup HSM or Tokens (if you have the backup option).

2.On the client computer, acquire the capability update software package.

a.Follow the FTP instructions that are supplied in e-mail from SafeNet Customer Support (support@safenet-inc.com).

b.Go to the temporary “appliance” directory  (that you created for ftp files).

c.Unzip the files (as directed in the ftp instructions).

3.Go to the location of the scp executable:

Linux/AIX cd /usr/safenet/lunaclient/bin
Solaris/HP-UX cd /opt/safenet/lunaclient/bin
Windows cd C:\Program Files\SafeNet\LunaClient

4.Copy the SafeNet appliance package file from the ftp directory to the SafeNet appliance, as follows:

Linux/UNIX

./scp /<path>/<spkg_patch_file.spkg>  admin@<LunaHostname>:

Windows pscp \<path>\<spkg_patch_file.spkg>  admin@<LunaHostname>:

Installing the Upgrade Package

Once the package has been transferred to the appliance, it is installed in two stages. First the package is unwrapped into its component files with the package command. Then the update is applied to the HSM with the hsm update command.

To install the upgrade package

1.Open an SSH session or console session to the SafeNet Network HSM appliance.

2.Log in to the appliance as "admin".

3.Verify that the package has arrived:

[myluna] lunash:>package listf       
7874 Dec 19 2011 16:46 caupdateK3908000139_100000.spkg
7874 Dec 19 2011 16:35 caupdateK3908000086_100000.spkg
Command Result : 0 (Success)
[myluna] lunash:>

        

4.Open the desired package:

[myluna] lunash:>package update caupdateK3908000139_100000.spkg -a XS9p7YbsW5WJp5PT 
Command succeeded: decrypt package
Command succeeded: verify package certificate
Command succeeded: verify package signature
Preparing packages for installation...
908-000139-001_100000-1.0.0-0
Running update script
Command Result : 0 (Success)
[myluna] lunash:>
 

5.Check that the desired package is ready to be applied :

[myluna] lunash:>hsm update show 
Capability Updates:
    908000139_100000
Command Result : 0 (Success)
[myluna] lunash:>
            

6.Apply the new capability:  

[myluna] lunash:>hsm update capability -capability 908000139_100000 
CAUTION: This command updates the HSM Capability.
    This process cannot be reversed.
    Any connected clients will have their
    connections closed.
    All clients should disconnect and the
    NTLS should be stopped before proceeding.
Type 'proceed' to continue, or 'quit' to quit now.
    > proceed
 
FwUpdate3 Application Version 2.2
SafeNet Firmware/Capability Update Utility for G5 and K6 modules
Enter slot number (0 for the first slot found) : 0
This is a NON-destructive capability update
Update Result : 0 (Success)
Command Result : 0 (Success)
[myluna] lunash:>
  

7.Check that the new capability is in place:

[myluna] lunash:>hsm displayLicenses     
HSM CAPABILITY LICENSES
License ID         Description
================   ======================================
621000002-000     K6 base configuration
621000021-001      Performance level 15
620127-000         Elliptic curve cryptography
620114-001         Key backup via cloning protocol
620124-000         Maximum 20 partitions
621000003-001      Enable government configuration
620109-000         PIN entry device (PED) enabled
621010089-001      Enable remote PED capability
621010358-001      Enable a split of the master tamper key to be stored externally
908000086-001      Enabled for 15.5 megabytes of object storage
908000139-001      Korean market cryptographic algorithms
Command Result : 0 (Success)
[myluna] lunash:>
  

8.Reboot the system to enable the new capability:  

[myluna] lunash:>sysconf appliance reboot -force  
Force option used. Proceed prompt bypassed.
'hsm supportInfo' successful.
Use 'scp' from a client machine to get file named:
supportInfo.txt

Broadcast message from root (pts/0) (Mon Dec 19 16:49:56 2011):
The system is going down for reboot NOW!
Reboot commencing
Command Result : 0 (Success)
[myluna] lunash:>