Luna HSM Client 10.9.0
Luna HSM Client 10.9.0 was released in July 2025. It includes bug fixes and security updates.
>Download Luna HSM Client 10.9.0 for Windows
>Download Luna HSM Client 10.9.0 for Linux
NOTE This version of Luna HSM Client is compatible with Luna HSMs with firmware 6.2.1 and newer. Features that do not have client version dependencies will function without issue.
New Features and Enhancements
Luna HSM Client 10.9.0 includes the following new features and enhancements:
ML-KEM and ML-DSA Mechanisms for Post Quantum Cryptography
This release includes support for post-quantum algorithms ML-KEM (Module-Lattice-based Key-Encapsulation Mechanism) and ML-DSA (Module-Lattice based Digital Signature Algorithm). Refer to:
>New PKCS extension descriptions:
•ML-KEM Programming Guide
•ML-DSA Programming Guide for Luna HSM
>New cryptographic mechanisms:
•CKM_ML_KEM_KEY_PAIR_GEN
•CKM_ML_KEM
•CKM_ML_DSA_KEY_PAIR_GEN
•CKM_ML_DSA
•CKM_EXTMU_ML_DSA
•CKM_HASH_ML_DSA
•CKM_HASH_ML_DSA_SHA3_224
•CKM_HASH_ML_DSA_SHA3_256
•CKM_HASH_ML_DSA_SHA3_384
•CKM_HASH_ML_DSA_SHA3_512
•CKM_HASH_ML_DSA_SHA224
•CKM_HASH_ML_DSA_SHA256
•CKM_HASH_ML_DSA_SHA384
•CKM_HASH_ML_DSA_SHA512
•CKM_HASH_ML_DSA_SHAKE128
•CKM_HASH_ML_DSA_SHAKE256
This feature also requires Luna HSM Firmware 7.9.0 or newer.
ML-KEM Cloning Ciphers
The following post-quantum cipher suites are now included for cloning between application partitions:
>ECDH-P521-ML-KEM1024-SHA2-512
>ECDH-BP512-ML-KEM1024-SHA2-512
>ECDH-P521-ML-KEM1024-SHA3-512
>ECDH-BP512-ML-KEM1024-SHA3-512
Refer to Enabling and Disabling CPv4 Cipher Suites for instructions on customizing cipher suites.
This feature also requires Luna HSM Firmware 7.9.0 or newer.
Supported Operating Systems
You can install Luna HSM Client 10.9.0 on the following operating systems:
Operating System | Version |
---|---|
Windows | 10, 11 |
Windows Server Standard | 2025 |
2022 | |
2019 | |
2016 | |
Windows Server Core | 2022 |
2019 | |
2016 | |
Red Hat Enterprise Linux (RHEL) | 10 |
9.0, 9.1, 9.2, 9.3, 9.5** | |
8.8, 8.9** | |
Red Hat Universal Base Image (UBI) | 8.8, 8.9, 9.0, 9.1, 9.2, 9.3 |
Ubuntu * |
24.04.1 |
22.04 | |
20.04 |
* The Linux installer for Luna HSM Client software is compiled as .rpm packages. To install on a Debian-based distribution, such as Ubuntu, alien is used to convert the packages. We used build-essential:
apt-get install build-essential alien
If you are using a Docker container or another such microservice to install the Luna Minimal Client on Ubuntu, and your initial client installation was on another supported Linux distribution as listed above, you do not require alien. Refer to the product documentation for instructions. You might need to account for your particular system and any pre-existing dependencies for your other applications.
** RHEL and CentOS 8.0-9.0 with their original kernels.
Secure Boot Support
Luna HSM Client can be used on all supported OS platforms in the table above, with Secure Boot enabled. If you are using Luna HSM Client to access partitions on a Luna Network HSM 7 only, no drivers are required. On Windows, the drivers for all other Luna HSM variants and components (Luna PCIe HSM 7, Luna USB HSM 7, Luna Backup HSM 7, Luna Backup HSM G5, Luna PED) are signed by Thales for use with Windows Secure Boot. In both these cases, you can proceed with the standard Luna HSM Client Software Installation procedure.
On Linux, these drivers are compiled for the host OS during Luna HSM Client installation. If Secure Boot is enabled on the host system, these drivers must be signed as directed by the host OS provider:
>Secure Boot on Red Hat Enterprise Linux
ESXi Passthrough
Luna PCIe HSM 7, Luna USB HSM 7, Luna Backup HSM 7, and Luna Backup HSM G5 can be used in passthrough mode, connected to an ESXi host.
CAUTION! You must set the ESXi power policy to High Performance to ensure that adequate power is supplied to the USB-connected devices.
The following combinations of ESXi version and virtual machine operating system are supported:
ESXi Version | Supported VM OS's | |||
---|---|---|---|---|
ESXi 8.0 |
|
|||
ESXi 7.0 |
Windows 11, 2016, 2022, 2025 | |||
RHEL 8.7, 8.8, 9.1, 9.5 | ||||
Ubuntu 14.04, 18.04, 22.04, 24.04.1 | ||||
ESXi 6.7 |
RHEL 8.7, 8.8, 9.0, 9.1, 9.2 Ubuntu 21.04, 22.04 Windows 2016, 2022 |
|||
ESXi 6.5 | Windows Server Core 2019 | |||
Windows Server Core 2016 |
Supported Cryptographic APIs
Applications can perform cryptographic operations using the following APIs:
>PKCS#11 2.20
>OpenSSL
>Microsoft CAPI
>Microsoft CNG
>Supported Java versions:
•Open JDK 7 up to Open JDK 21
•Oracle Java 7 up to JDK 21
•IBM Java 7, 8 and 11
Advisory Notes
This section highlights important issues you should be aware of before deploying Luna HSM Client 10.9.0.
Installation Directory Changes
Using Luna HSM Client 10.9.0 or newer, header files have been moved away from the Samples directory to a more appropriate SDK directory when the SDK option is selected during client installation to enforce a clear separation in the Luna HSM Client installation.[
Windows:
C:/Program Files/SafeNet/LunaClient/ sdk/ include/ <header files that provide specifications of Thales and non APIs, esp. for using the PKCS#11 interface> external/ <third party headers> RSA/ lib/ samples/ (moved within sdk; and removed "p11samples" subdirectory for consistency) <include directory moved> <lib directory moved> src/ <rename source to src> move header files from here to include/ makefiles/ ecc_examples/ README.txt fmsdk/ (moved from samples/) include/ lib/ samples/ ...
Linux/AIX:
/usr/safenet/lunaclient/ sdk/ include/ <header files that provide specifications of Thales and non APIs, esp. for using the PKCS#11 interface> external/ <third party headers> RSA/ samples/ (moved within sdk) <include directory moved> src/ <rename source to src> move header files from here to include/ makefiles/ ecc_examples/ README.txt ... /usr/safenet/lunafmsdk/ (unchanged) include/ lib/ samples/
Backup/USB/PCIe Drivers Not Installed on Windows 10 or Windows Server 2022 Unless Device is Connected
Due to changes in Windows 10 and Server 2022, device drivers are not installed unless the USB or PCIe device is connected to the client workstation. If you plan to use a Luna Backup HSM 7, Luna Backup HSM G5, Luna USB HSM 7, or Luna PCIe HSM 7 with these operating systems, use one of the following workarounds:
>Connect the Luna device to the workstation (or install the Luna PCIe HSM 7 card) before installing the Luna HSM Client software
>After installing the Luna HSM Client software:
a.Connect the Luna device(s) to the workstation (or install the Luna PCIe HSM 7 card)
b.Run LunaHSMClient.exe.
c.Select the devices you want to install drivers for.
d.Click Modify.
CentOS 8.4 Missing Dependency
Due to a missing dependency on CentOS 8.4 [specifically the symlink (libnsl.so.1) to libnsl was removed], when installing Luna HSM Client 10.5.0 or newer, you must install an additional rpm package first:
Run yum install libnsl before invoking the install.sh script.
CSP/KSP Registrations Can Fail if Windows Update Missing
CSP or KSP registration includes a step that verifies the DLLs are signed by our certificate that chains back to the DigiCert root of trust G4 (in compliance with industry security standards).
This step can fail if your Windows operating system does not have the required certificate. If you have been keeping your Windows OS updated, you should already have that certificate.
If your Luna HSM Client host is connected to the internet, use the following commands to update the certificate manually:
certutil -urlcache -f http://cacerts.digicert.com/DigiCertTrustedRootG4.crt
certutil -addstore -f root DigiCertTrustedRootG4.crt
To manually update a non-connected host
1. Download the DigiCert Trusted Root G4 (http://cacerts.digicert.com/DigiCertTrustedRootG4.crt) to a separate internet-connected computer.
2.Transport the certificate, using your approved means, to the Luna HSM Client host into a <downloaded cert path> location of your choice
3.Add the certificate to the certificate store using the command:
certutil -addstore -f root <downloaded cert path>
Luna HSM Client No Longer Supports Luna PCIe HSM 6 on any platform
Luna HSM Client 10.5.0 and newer cannot be used with a Luna PCIe HSM 6 that might be present in the host. If you need to use a version 6.x HSM card with your application, install Luna HSM Client 10.3.0 or older for Windows, or Luna HSM Client 10.4.1 or older for Linux.
CKR_MECHANISM_INVALID Messages in Mixed Luna Cloud HSM Implementations
When using a Luna Cloud HSM service with Luna HSM Client, you might encounter errors like "CKR_MECHANISM_INVALID" or "Error NCryptFinalizeKey" during some operations in Hybrid HA and FIPS mode (3DES Issue). This can occur if firmware versions differ between a Luna HSM partition and a Luna Cloud HSM service in an HA group when you invoke a mechanism that is supported on one but not the other. Similarly, if one member is in FIPS mode, while the other is not, a mechanism might be requested that is allowed for one member, but not the other. For example, the ms2luna tool can fail when 3DES operations are invoked.