ed25519 self-signed root cert

classic Classic list List threaded Threaded
3 messages Options
Reply | Threaded
Open this post in threaded view
|

ed25519 self-signed root cert

Robert Moskowitz
genpkey worked without those options.  I am going to have to look at the
RFC again, as there are different types of ed25519 certs, but how will
that work out in openssl?  I will have to remember back to a
conversation at had at IETF 100...

Anyway error on the next step:

# openssl req -config $dir/openssl-root.cnf\
 >      -set_serial 0x$(openssl rand -hex $sn)\
 >      -keyform pem -outform pem\
 >      -key $dir/private/ca.key.pem -subj "$DN"\
 >      -new -x509 -days 7300 -extensions v3_ca\
 >      -out $dir/certs/ca.cert.pem
Enter pass phrase for /root/ca/private/ca.key.pem:
3064983568:error:1010F08A:elliptic curve routines:pkey_ecd_ctrl:invalid
digest type:crypto/ec/ecx_meth.c:801:

where dir=/root/ca



--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Reply | Threaded
Open this post in threaded view
|

Re: ed25519 self-signed root cert

Viktor Dukhovni


> On Jul 27, 2018, at 10:36 AM, Robert Moskowitz <[hidden email]> wrote:
>
> nyway error on the next step:
>
> # openssl req -config $dir/openssl-root.cnf\
> >      -set_serial 0x$(openssl rand -hex $sn)\
> >      -keyform pem -outform pem\
> >      -key $dir/private/ca.key.pem -subj "$DN"\
> >      -new -x509 -days 7300 -extensions v3_ca\
> >      -out $dir/certs/ca.cert.pem
> Enter pass phrase for /root/ca/private/ca.key.pem:
> 3064983568:error:1010F08A:elliptic curve routines:pkey_ecd_ctrl:invalid digest type:crypto/ec/ecx_meth.c:801:

Do you have a "default_md" in your configuration file?
Ed25519 and Ed448 sign the raw data, not a digest thereof.

It might be more use-friendly to figure out a way to ignore
the requested digest rather than throw an error...

--
--
        Viktor.

--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Reply | Threaded
Open this post in threaded view
|

Re: ed25519 self-signed root cert

Robert Moskowitz


On 07/27/2018 10:43 AM, Viktor Dukhovni wrote:

>
>> On Jul 27, 2018, at 10:36 AM, Robert Moskowitz <[hidden email]> wrote:
>>
>> nyway error on the next step:
>>
>> # openssl req -config $dir/openssl-root.cnf\
>>>       -set_serial 0x$(openssl rand -hex $sn)\
>>>       -keyform pem -outform pem\
>>>       -key $dir/private/ca.key.pem -subj "$DN"\
>>>       -new -x509 -days 7300 -extensions v3_ca\
>>>       -out $dir/certs/ca.cert.pem
>> Enter pass phrase for /root/ca/private/ca.key.pem:
>> 3064983568:error:1010F08A:elliptic curve routines:pkey_ecd_ctrl:invalid digest type:crypto/ec/ecx_meth.c:801:
> Do you have a "default_md" in your configuration file?
> Ed25519 and Ed448 sign the raw data, not a digest thereof.
>
> It might be more use-friendly to figure out a way to ignore
> the requested digest rather than throw an error...
>

Ouch.  That is bad.  Since ed25519 does not use md, it should not error
out on this at all.  Makes it especially challenging for a cnf file to
have multiple uses.  I commented out default_md and it worked.  Dumping
it shows:

# openssl x509 -inform pem -in $dir/certs/ca.cert.pem\
 >         -text -noout
Certificate:
     Data:
         Version: 3 (0x2)
         Serial Number:
             49:b3:1f:0f:cf:8a:9a:d9
         Signature Algorithm: ED25519
         Issuer: C = US, ST = MI, L = Oak Park, O = HTT Consulting, CN =
Root CA
         Validity
             Not Before: Jul 27 14:49:02 2018 GMT
             Not After : Jul 22 14:49:02 2038 GMT
         Subject: C = US, ST = MI, L = Oak Park, O = HTT Consulting, CN
= Root CA
         Subject Public Key Info:
             Public Key Algorithm: ED25519
                 ED25519 Public-Key:
                 pub:
                     ea:c7:3a:3c:80:49:ce:c9:a6:eb:a4:01:0a:11:df:
                     62:58:27:e0:af:77:5c:3e:fd:73:08:24:f8:e4:b1:
                     45:0c
         X509v3 extensions:
             X509v3 Subject Key Identifier:
D6:1B:BA:96:44:EF:F1:07:59:35:A7:F2:77:5F:82:24:21:53:9A:9F
             X509v3 Authority Key Identifier:
keyid:D6:1B:BA:96:44:EF:F1:07:59:35:A7:F2:77:5F:82:24:21:53:9A:9F

             X509v3 Basic Constraints: critical
                 CA:TRUE
             X509v3 Key Usage: critical
                 Certificate Sign, CRL Sign
             X509v3 Subject Alternative Name:
                 email:[hidden email]
     Signature Algorithm: ED25519
          93:f9:f9:c2:a6:e7:ca:8f:5c:82:4b:fa:7f:a8:0f:4c:e2:46:
          52:f3:99:d0:ad:f0:2c:2b:b4:f3:90:26:27:8f:36:2b:ed:cf:
          58:c5:f4:28:78:ec:59:53:13:ac:96:32:fa:07:ac:b6:d8:eb:
          78:2c:da:19:95:6e:ed:36:bb:09


So on to the next step.


--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users