-
Notifications
You must be signed in to change notification settings - Fork 39
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CSR, Certificate validation error #124
Comments
We meanwhile figured that the issue is not really with with the digest but regarding the curve being used for EC keys. The tpm2 provider is being used successfully for producing a ECDSA self-signature of the CSR, with 384 bits, Actually there is no need to use the provider for signature validation as this just requires the public key, Unfortunately, tpm2 documentation on the possible query values is non-existing/incomplete: |
Does it make sense after all that the provider offers support for verifying signatures? |
I also think that the provider should not offer signature verification. In case someone runs into the same situation. With support from @DDvO we have found out the following workaround: # Command is executed to generate a request with support of tpm device. The command
# is stopped abruptly when the dummy file is consulted. At this point, the request (req.der) has already
# been created.
touch dummyfile
openssl cmp -provider tpm2 -provider default \
-cmd ir \
-config "" \
-server 192.168.251.40:80 \
-path /api/cmp \
-unprotected_requests \
-unprotected_errors \
-srvcert IssuingCA2018.cacert.pem \
-subject $csr_subject \
-certout $received_cert \
-extracertsout $received_extracert \
-newkey handle:$handle \
-verbosity 8 \
-reqout req.der \
-rspin dummyfile
# Command is executed to send the previously generated request (req.der) without support of a tpm device.
openssl cmp \
-cmd ir \
-config "" \
-server 192.168.251.40:80 \
-path /api/cmp \
-unprotected_requests \
-unprotected_errors \
-srvcert IssuingCA2018.cacert.pem \
-subject $csr_subject \
-certout $received_cert \
-extracertsout $received_extracert \
-newkey pubkey.pem \
-verbosity 8 \
-reqin req.der \
-popo -1 \
-disable_confirm |
Hello together
I am stuck with OpenSSL at one point. We send a CSR from a TPM to the PKI and the PKI sends back a certificate. Unfortunately, the certificate verification fails.
The PKI has existed for some time and must continue to be used. The PKI signs the certificates with a SHA512. The TPM, for its part, can use algorithms up to sha384 ( TPM Infineon 9673 ).
The problem is that openssl uses the TPM (which does not support this algorithm) to validate the certificate.
In my opinion, OpenSSL could do this without the TPM.
I have now tried a few things with the propquery. For example:
But I always failed.
The procedure is as follows:
The CMP IR displays the following response:
Does anyone have any ideas what we could change or what we are doing wrong?
The text was updated successfully, but these errors were encountered: