-
Notifications
You must be signed in to change notification settings - Fork 92
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
sscep should support EC keys by using CMS instead of PKCS#7 #183
Comments
Same issue here, when trying to enroll on a FortiOS device (which may use SSCEP). According to the bug report above. could the OpenSSL 'cms' app be a drop-in replacement for 'pkcs7', allowing ECDSA certificate support?
|
It should be (or is) fairly easy to change pkcs7 to openssl cms in the code. I already did most of it, so that I got it working for my use case. There is still some operation that I did not change yet (that I don't need). If I would have done all of it, I would issue a pull request. Unfortunately, I don't have time to complete it all right now. @Borgquite, I could add my fork to github, and maybe that would be sufficient for you as well. |
Here's a fork that works with EC and RSA certs in my own testing for the operations I needed: https://github.com/bjanders/sscep-cms/tree/cms The Get Next CA operation will not work, and will make sscep crash. Fixing this should, however, be fairly trivial. |
@bjanders Love your work! It's great to know that it's possible. As mentioned - I need a downstream project (FortiOS) to pick this up which I guess would be tricky without full support - if you did get a chance at a later date, to finish it off & do a pull, I wouldn't be the only one to benefit :) |
I tried to enroll EC keys from NDES, but get the error:
I suspect it would work if sscep used OpenSSL CMS routines instead of PKCS#7.
I initially thought it was a bug in OpenSSL, so I filed a bug openssl/openssl#24685. But according to the explanation I received:
If I understand it correctly, then it might be possible that using CMS instead of PKCS#7 could work for both RSA and EC keys.
The text was updated successfully, but these errors were encountered: