Luna HSM Firmware 7.7.1-20
This updated version of Luna HSM Firmware 7.7.1 was released in March 2023. It includes an important fix for an Out of Memory error affecting
If you are using
>Download Luna HSM Firmware 7.7.1-20
Refer to NIST certificate #4090 for FIPS 140-2 Level 3 certification:
https://csrc.nist.gov/projects/cryptographic-module-validation-program/Certificate/4090
NOTE This firmware version also requires Luna HSM Bootloader 1.1.5 Patch.
Valid Update Paths
You can update the Luna HSM firmware to version 7.7.1-20 from the following previous versions:
>7.0.1, 7.0.2, 7.0.3, 7.1.0, 7.2.0, 7.3.0, 7.3.3, 7.4.0, 7.4.1,
NOTE You must have Luna Appliance Software 7.7.1 installed to apply the secure package.
Update Procedure
Use the following procedure to install Luna HSM Firmware 7.7.1-20:
1.Transfer the secure package update file to the Luna Network HSM 7 using pscp or scp.
pscp <path>/<filename>.spkg admin@<appliance_host/IP>:
2.Stop all client applications to the Luna Network HSM 7 appliance.
3.Using a serial or SSH connection, log in to the appliance as admin (see Logging In to LunaSH).
4.Log in as HSM SO (see Logging In as HSM Security Officer).
lunash:> hsm login
5.[Optional Step] Verify that the secure package file is present on the Luna Network HSM 7.
lunash:> package listfile
6. [Optional Step] Verify the package file, specifying the authorization code you received from Thales.
lunash:> package verify <filename>.spkg -authcode <code_string>
7.Install the update on the Luna Network HSM 7.
lunash:> package update <filename>.spkg -authcode <code_string>
The latest firmware update package is now stored in reserve on the appliance, waiting to be installed.
8.[Optional] Check that the desired firmware version is ready to install. The minor version (-20) is not displayed in the output.
lunash:> hsm firmware show
Upgrade Firmware: 7.7.1
9.Update the firmware to the version currently stored on the appliance.
lunash:> hsm firmware upgrade
To Confirm That the Update Has Been Applied
The output of LunaSH command hsm show is unchanged after the update is applied. To determine if the Luna HSM firmware 7.7.1-20 [KB0027005] is installed successfully, check the supportInfo.txt
as follows:
1.Generate and download the supportInfo.txt
file from the HSM.
lunash:>hsm supportInfo
2.Use 'scp' from a client to get the file named supportInfo.txt
3.Search the supportInfo.txt
for “FW Rev 7.7.1”
If the Firmware 7.7.1-20 update was successfully applied, a firmware log entry displays
LOG(INFO): FW Rev 7.7.1-20
If the update was not successfully applied on an HSM, the supportInfo.txt
shows a lower version like: FW Rev 7.7.1-19
Advisory Notes
This section highlights important issues you should be aware of before deploying HSM firmware 7.7.1-20.
Firmware Cannot Be Rolled Back to Unpatched Version of Luna HSM Firmware 7.7.1
The rollback command does not distinguish versions at the build level (the number after the dash in 7.7.1-19 or 7.7.1-20 ). Therefore, after you have updated with the 7.7.1-20 patch, the system sees the rollback candidate as 7.7.1 and does not attempt rollback if you request it.
Rollback will become possible again after the next firmware update that you install.
To determine whether the patch has been installed on an HSM, See the previous section To Confirm That the Update Has Been Applied.
RSA Keygen Mechanism Remapping on Luna 7.7.1 or Newer Partitions Requires Minimum Luna HSM Client 10.4.0
Luna HSM Firmware 7.7.1 or newer partitions that have been individually set to FIPS mode using the new partition policy 43 require Luna HSM Client 10.4.0 or newer to automatically remap older RSA mechanisms as described in RSA Mechanism Remap for FIPS Compliance.
Special Considerations for Luna HSM Firmware 7.7.0 and Newer
Luna HSM Firmware 7.7.0 introduces new capabilities, features, and other significant changes that affect the operation of the HSM. Due to some of these changes, you must be aware of some special considerations before updating to Luna HSM Firmware 7.7.0 or newer. For more information, refer to Special Considerations for Luna HSM Firmware 7.7.0 and Newer before proceeding with the update.
3DES Usage Counter
For Luna HSM Firmware 7.7.0 and newer, triple-DES keys have a usage counter that limits each key instance to encrypting a maximum of 2^16 8-byte blocks of data when the HSM is in FIPS mode (HSM policy 12: Allow non-FIPS algorithms is set to 0). When the counter runs out for a key instance, that key instance can no longer be used for encryption or wrapping or deriving or signing, but can still be used for decrypting and unwrapping and verifying pre-existing objects.
The CKA_BYTES_REMAINING attribute is available when HSM policy 12: Allow non-FIPS algorithms is set to 0, but cannot be viewed if that policy is set to 1.
The attribute is preserved during backup/restore using a Luna Backup HSM 7; restoring puts the counter back to whatever value it had before backup.
The attribute is not preserved through backup/restore using a Luna Backup HSM G5; restoring sets the counter to like-new state (no usage).
FIPS Changes in Luna HSM Firmware 7.7.0 and Newer
New restrictions have been added to some mechanisms when the HSM is in FIPS mode (HSM policy 12: Allow non-FIPS algorithms set to OFF), to comply with FIPS SP800-131a Rev2, published in March 2019.
Mechanisms not permitted to wrap objects in FIPS mode
The following mechanisms are not permitted to wrap objects in FIPS mode (unwrap operations are permitted):
Mechanisms not permitted to sign data in FIPS mode
The following mechanisms are not permitted to sign data in FIPS mode (verify operations are permitted):
NOTE This page lists FIPS-related changes made since the last FIPS-validated firmware release. For a comprehensive list of changes across all released versions of the Luna HSM firmware, see Changes to FIPS Mode Mechanisms and Operations by Firmware Version. Refer to this section if you are updating from a firmware version that is older than the last FIPS-validated version.