Enabling and Disabling CPv4 Cipher Suites
Cipher suites for Cloning Protocol version 4 (CPv4) are used for cloning to-and-from partitions, if the individual suites are enabled for a partition, and the use of CPv4 is not prevented by CPv1 being active (see Allow CPv1).
NOTE Use of CPv4 requires that the HSM time be set before any cloning operation is attempted that invokes the protocol.
It is recommended to have the host synchronized to a secure ntp or nts server, before synchronizing the HSM time to host time.
Use hsm time commands.
By default, eight CPv4 cipher suites are available and active, and the system negotiates the best/most secure suite for the current cloning operation, based on which suites are available to both the source and target partitions. If you have reason to do so, you can disable some cipher suites, which reduces negotiation time among those that remain enabled. You can also enable desired cloning cipher suites that have been disabled.
To show the current status of enabled and disabled cipher suites
1.Run partition ciphershow command.
lunacm:>partition ciphershow
Cipher ID Cipher Suite Enabled
__________________________________________________________________________________
0 CPv3 RSA-4096-PKCS-SHA2-384 AES-256-GCM Yes
1 CPv4 ECDSA-P521-SHA2-512 ECDH-P521-SHA2-512 AES-256-GCM No
2 CPv4 ECDSA-P521-SHA2-512 ECDH-P521-SHA2-512 No
AES-256-CTR-HMAC-SHA2-512
3 CPv4 ECDSA-BP512-SHA2-512 ECDH-BP512-SHA2-512 No
AES-256-GCM
4 CPv4 ECDSA-BP512-SHA2-512 ECDH-BP512-SHA2-512 No
AES-256-CTR-HMAC-SHA2-512
5 CPv4 ECDSA-P521-SHA3-512 ECDH-P521-SHA3-512 AES-256-GCM No
6 CPv4 ECDSA-P521-SHA3-512 ECDH-P521-SHA3-512 No
AES-256-CTR-HMAC-SHA3-512
7 CPv4 ECDSA-BP512-SHA3-512 ECDH-BP512-SHA3-512 No
AES-256-GCM
8 CPv4 ECDSA-BP512-SHA3-512 ECDH-BP512-SHA3-512 No
AES-256-CTR-HMAC-SHA3-512
9 CPv4 ECDSA-P521-SHA2-512 ECDH-P521-ML-KEM1024-SHA2-512 Yes
AES-256-GCM
10 CPv4 ECDSA-P521-SHA2-512 ECDH-P521-ML-KEM1024-SHA2-512 Yes
AES-256-CTR-HMAC-SHA2-512
11 CPv4 ECDSA-BP512-SHA2-512 Yes
ECDH-BP512-ML-KEM1024-SHA2-512 AES-256-GCM
12 CPv4 ECDSA-BP512-SHA2-512 Yes
ECDH-BP512-ML-KEM1024-SHA2-512
AES-256-CTR-HMAC-SHA2-512
13 CPv4 ECDSA-P521-SHA3-512 ECDH-P521-ML-KEM1024-SHA3-512 Yes
AES-256-GCM
14 CPv4 ECDSA-P521-SHA3-512 ECDH-P521-ML-KEM1024-SHA3-512 Yes
AES-256-CTR-HMAC-SHA3-512
15 CPv4 ECDSA-BP512-SHA3-512 Yes
ECDH-BP512-ML-KEM1024-SHA3-512 AES-256-GCM
16 CPv4 ECDSA-BP512-SHA3-512 Yes
ECDH-BP512-ML-KEM1024-SHA3-512
AES-256-CTR-HMAC-SHA3-512
The output shown for your partition might vary from the example above. If the output from the command shows only 8 ciphers, you have an older firmware version - update your HSM firmware and client for support of the additional ciphers.
To enable a cipher suite
1.Run the partition cipherenable command with the ID of the cloning cipher suite you want to enable.
lunacm:>partition cipherenable -id 1 CPv4 ECDSA-P521-SHA-512 ECDH-P521-SHA512 AES-256-GCM is now enabled Command Result : No Error
2.Run partition ciphershow command to verify the result.
lunacm:>partition ciphershow
Cipher ID Cipher Suite Enabled
__________________________________________________________________________________
0 CPv3 RSA-4096-PKCS-SHA2-384 AES-256-GCM Yes
1 CPv4 ECDSA-P521-SHA2-512 ECDH-P521-SHA2-512 AES-256-GCM Yes
2 CPv4 ECDSA-P521-SHA2-512 ECDH-P521-SHA2-512 No
AES-256-CTR-HMAC-SHA2-512
3 CPv4 ECDSA-BP512-SHA2-512 ECDH-BP512-SHA2-512 No
AES-256-GCM
4 CPv4 ECDSA-BP512-SHA2-512 ECDH-BP512-SHA2-512 No
AES-256-CTR-HMAC-SHA2-512
5 CPv4 ECDSA-P521-SHA3-512 ECDH-P521-SHA3-512 AES-256-GCM No
6 CPv4 ECDSA-P521-SHA3-512 ECDH-P521-SHA3-512 No
AES-256-CTR-HMAC-SHA3-512
7 CPv4 ECDSA-BP512-SHA3-512 ECDH-BP512-SHA3-512 No
AES-256-GCM
8 CPv4 ECDSA-BP512-SHA3-512 ECDH-BP512-SHA3-512 No
AES-256-CTR-HMAC-SHA3-512
9 CPv4 ECDSA-P521-SHA2-512 ECDH-P521-ML-KEM1024-SHA2-512 Yes
AES-256-GCM
10 CPv4 ECDSA-P521-SHA2-512 ECDH-P521-ML-KEM1024-SHA2-512 Yes
AES-256-CTR-HMAC-SHA2-512
11 CPv4 ECDSA-BP512-SHA2-512 Yes
ECDH-BP512-ML-KEM1024-SHA2-512 AES-256-GCM
12 CPv4 ECDSA-BP512-SHA2-512 Yes
ECDH-BP512-ML-KEM1024-SHA2-512
AES-256-CTR-HMAC-SHA2-512
13 CPv4 ECDSA-P521-SHA3-512 ECDH-P521-ML-KEM1024-SHA3-512 Yes
AES-256-GCM
14 CPv4 ECDSA-P521-SHA3-512 ECDH-P521-ML-KEM1024-SHA3-512 Yes
AES-256-CTR-HMAC-SHA3-512
15 CPv4 ECDSA-BP512-SHA3-512 Yes
ECDH-BP512-ML-KEM1024-SHA3-512 AES-256-GCM
16 CPv4 ECDSA-BP512-SHA3-512 Yes
ECDH-BP512-ML-KEM1024-SHA3-512
AES-256-CTR-HMAC-SHA3-512
To disable a cipher suite
1.Run the partition cipherdisable command with the ID of the cloning cipher suite you want to disable.
lunacm:>partition cipherdisable -id 0 CPv3 RSA-4096-PKCS-SHA-384 AES-256-GCM is now disabled Command Result : No Error
2.Run the partition ciphershow command to verify the result.
lunacm:>partition ciphershow
Cipher ID Cipher Suite Enabled
__________________________________________________________________________________
0 CPv3 RSA-4096-PKCS-SHA2-384 AES-256-GCM No
1 CPv4 ECDSA-P521-SHA2-512 ECDH-P521-SHA2-512 AES-256-GCM Yes
2 CPv4 ECDSA-P521-SHA2-512 ECDH-P521-SHA2-512 No
AES-256-CTR-HMAC-SHA2-512
3 CPv4 ECDSA-BP512-SHA2-512 ECDH-BP512-SHA2-512 No
AES-256-GCM
4 CPv4 ECDSA-BP512-SHA2-512 ECDH-BP512-SHA2-512 No
AES-256-CTR-HMAC-SHA2-512
5 CPv4 ECDSA-P521-SHA3-512 ECDH-P521-SHA3-512 AES-256-GCM No
6 CPv4 ECDSA-P521-SHA3-512 ECDH-P521-SHA3-512 No
AES-256-CTR-HMAC-SHA3-512
7 CPv4 ECDSA-BP512-SHA3-512 ECDH-BP512-SHA3-512 No
AES-256-GCM
8 CPv4 ECDSA-BP512-SHA3-512 ECDH-BP512-SHA3-512 No
AES-256-CTR-HMAC-SHA3-512
9 CPv4 ECDSA-P521-SHA2-512 ECDH-P521-ML-KEM1024-SHA2-512 Yes
AES-256-GCM
10 CPv4 ECDSA-P521-SHA2-512 ECDH-P521-ML-KEM1024-SHA2-512 Yes
AES-256-CTR-HMAC-SHA2-512
11 CPv4 ECDSA-BP512-SHA2-512 Yes
ECDH-BP512-ML-KEM1024-SHA2-512 AES-256-GCM
12 CPv4 ECDSA-BP512-SHA2-512 Yes
ECDH-BP512-ML-KEM1024-SHA2-512
AES-256-CTR-HMAC-SHA2-512
13 CPv4 ECDSA-P521-SHA3-512 ECDH-P521-ML-KEM1024-SHA3-512 Yes
AES-256-GCM
14 CPv4 ECDSA-P521-SHA3-512 ECDH-P521-ML-KEM1024-SHA3-512 Yes
AES-256-CTR-HMAC-SHA3-512
15 CPv4 ECDSA-BP512-SHA3-512 Yes
ECDH-BP512-ML-KEM1024-SHA3-512 AES-256-GCM
16 CPv4 ECDSA-BP512-SHA3-512 Yes
ECDH-BP512-ML-KEM1024-SHA3-512
AES-256-CTR-HMAC-SHA3-512