-
Story
-
Resolution: Done
-
Normal
-
None
-
None
-
2
-
False
-
-
False
-
-
-
DFG Security: UC Sprint 102, DFG Security: UC Sprint 103, DFG Security: UC Sprint 104
-
3
The default backend configuration for Thales Luna Network HSM uses a key-wrapping mechanism that is no longer supported in newer versions of the HSM firmware. This was reported upstream in a Launchpad bug: https://bugs.launchpad.net/barbican/+bug/2036506
Barbican PKCS#11 code needs to be modified so that we can configure a different key wrapping mechanism - the current one is hard-coded. Preferably we should use a NIST approved mechanism. I.e. CKM_WRAPKEY_AES_KWP - https://thalesdocs.com/gphsm/ptk/5.9.1/docs/Content/PTK-C_Program/PTK-C_Mechs/CKM_WRAPKEY_AES_KWP.htm
- is cloned by
-
OSPRH-11019 Create component CI job to test Luna + Barbican
-
- Closed
-