Project

General

Profile

Actions

Feature #1192

closed

Certificate Manager - Ability to Encrypt Private Keys When Exporting

Added by Joe Kelly almost 11 years ago. Updated over 1 year ago.

Status:
Resolved
Priority:
Normal
Category:
Certificates
Target version:
Start date:
01/13/2011
Due date:
% Done:

100%

Estimated time:
Plus Target Version:
Release Notes:

Description

I'm currently running pfSense 2.0-BETA5 (i386) built on Tue Jan 11 15:17:51 EST 2011. I love the Certificate Manager and a nice feature to add would be the ability to optionally encrypt private keys when exporting them. When you click the export button, the system should prompt you with "Do you want to encrypt the exported private key?" If you answer "yes", the key should be encrypted, otherwise it should be unencrypted.

This command should encrypt the key (works for me, anyway): openssl rsa -in unencrypted.key -des3 -out encrypted.key

To reverse the encryption (not sure why you would want to do that...), use this: openssl rsa -in encrypted.key -out unencrypted.key

This feature would make it easier to ensure that unencrypted private keys aren't floating around all over the place.

Actions #1

Updated by Jim Pingle almost 2 years ago

  • Status changed from New to In Progress
  • Assignee set to Jim Pingle
  • Target version set to 2.5.0
Actions #2

Updated by Jim Pingle almost 2 years ago

  • Status changed from In Progress to Feedback
  • % Done changed from 0 to 100
Actions #3

Updated by Viktor Gurov almost 2 years ago

works ok, but it should hide exportpass field on non-edit (certificate import) page:
https://github.com/pfsense/pfsense/pull/4136

Actions #4

Updated by Jim Pingle almost 2 years ago

  • Status changed from Feedback to Pull Request Review
Actions #5

Updated by Renato Botelho almost 2 years ago

  • Status changed from Pull Request Review to Feedback

PR merged

Actions #6

Updated by Viktor Gurov almost 2 years ago

Renato Botelho wrote:

PR merged

The password must be between 3 and 1023 characters long, otherwise you will get an openssl error:

$ openssl rsa -in shortpass.key -out p.key
Enter pass phrase for shortpass.key:
140194656773248:error:28078065:UI routines:UI_set_result_ex:result too small:../crypto/ui/ui_lib.c:905:You must type in 4 to 1023 characters

PR to fix it:
https://github.com/pfsense/pfsense/pull/4147

Actions #7

Updated by Jim Pingle almost 2 years ago

  • Status changed from Feedback to Pull Request Review
Actions #8

Updated by Renato Botelho almost 2 years ago

  • Status changed from Pull Request Review to Feedback
  • Assignee changed from Jim Pingle to Renato Botelho

By default openssl export uses DES-EDE3-CBC for encryption

This is not necessary, but if we want to avoid using any outdated encryption standards (to comply Suite B, CNSA),
we should avoid the old algorithms throughout the all system.

https://github.com/pfsense/pfsense/pull/4157

Actions #9

Updated by Jim Pingle almost 2 years ago

  • Status changed from Feedback to Pull Request Review
Actions #10

Updated by Renato Botelho almost 2 years ago

  • Status changed from Pull Request Review to Feedback

PR has been merged. Thanks!

Actions #11

Updated by Viktor Gurov over 1 year ago

  • Status changed from Feedback to Resolved

Renato Botelho wrote:

PR has been merged. Thanks!

tested on 2.5.0.a.20200129.1414

export of encrypted private keys and PKCS#12 archives works OK

Actions

Also available in: Atom PDF