Hp Secure Key Manager User Manual Page 81

  • Download
  • Add to my manuals
  • Print
  • Page
    / 327
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 80
2. Change the le extension on the log le to .eml. The le will now be recognized by Windows
as an E-mail le.
3. Double-click on the le. Outlook Express will open and display a help screen with a security header
that reads: “Digitally signed - signing digital ID is not trusted.
4. Click Continue. A security warning will appear.
5. Click View Digital ID. The Signing Digital ID Properties dialog will appear.
6. Click the Details tab and scroll down to the Thumbprint eld.
7. Download the Log Signing Certicate used to sign the log le from the SKM.
8. Double-click on the Log Signing Certicate. The Certicate dialog will appear.
9. Select the Details tab.
10. Scroll down to the Thumbprint eld.
11 . Compare the thumbprints of the Signing Digital ID Properties dialog and the Log Signing Certicate
dialog. If the text strings are identical, the integrity of the log le is secure.
Verifying a secure log using OpenSSL
Prior to verifying a secure log, you must have installed OpenSSL on the machine that will verify the log
le. You can use the procedure in both Windows and UNIX/Linux environments. If OpenSSL has not
been installed on your Windows machine, you can nd a Windows distribution here:
http://w
ww.slproweb.com/products/Win32OpenSSL.html
To verify a secure log:
1. Log in to the Management Console as an administrator.
2. Navigate to the Log Conguration page (Device > Log Conguration) and click the Log Levels
&Signin
gtab.
3. Click View Log Signing Cert.
4. Click Download Log Signing Cert and save the Log Signer certicate to your local machine.
5. Navigate to the Audit Log page (Device>Logs&Statistics>LogViewer><select the log page> )
and click Download Entire Log.Savethelogleinthesamedirectoryasthelogsignercert.(You
cansaveboththelogle and the certicate anywhere you like; for the sake of simplicity, these
procedures assume that the two lesareinthesamedirectory.)
6. From
the command prompt, enter the following command:
openssl smime -verify -in <signed log file> -nointern -certfile <log
cert file> -text -noverify.
Afte
r issuing the command, the text from the log le is displayed. If the text of the log le has not
been
modied, the system displays “Verication successful” below the log text, as shown here:
2006
-07-06 09:15:02 [admin]: Logged in from 192.168.1.170 via web
200
6-07-06 11:17:30 [admin]: Logged in from 192.168.1.170 via web
2006-07-06 11:24:26 [admin]: Downloaded Cert logsigner
2006-07-06 12:30:17 [admin]: User admin login has expired.
Verication successful
You c
an test this process by modifying the text in the log le and running the command again. When
you
issue the command, the system again displays the text of the log le, but this time, it displays
“Ve
rication failure after the text of the log le.
Secure Key Manager
81
Page view 80
1 2 ... 76 77 78 79 80 81 82 83 84 85 86 ... 326 327

Comments to this Manuals

No comments