Bug #1851
closed
ECC-Cert breaks the webconfigurator
Added by Michal Fresel over 13 years ago.
Updated over 10 years ago.
Description
Uploading a certificate which is using Elliptic curve cryptography (ECC) - afterwards webconfigurator stops responding.
related to Bug #1190?
- Status changed from New to Feedback
Applied in changeset commit:f65b6851ea3d473128e48419450f0edb5d8830d9.
from /var/log/lighttpd.error.log
2011-xx-xx xx:xx:xx: (connections.c.299) SSL: 1 error:1408A0C1:SSL routines:SSL3_GET_CLIENT_HELLO:no shared cipher
no connection possible
will provide a sample for selftest
I think lighty need it enable in config and presently we do not enable sslv3.
gen
openssl ecparam -name secp521r1 -genkey -out key.pem
req
openssl req -new -key key.pem -out req.pem
sign
openssl req -x509 -in req.pem -key key.pem -out selfigned.pem
uploading key + selfsigned breaks GUI
maybe we want to "block" uploading the following curves until working
openssl ecparam -list_curves
"quick+dirty-fix"
openssl x509 -noout -text -in selfigned.pem | grep 'Signature Algorithm:'
… the proper way should be by OID but for now i'm going to bed ;)
maybe testing using the php-function "openssl_pkey_get_details" and checking for return-level could sanitize uploading unsupported certificates?
<?php
$keyFile = openssl_pkey_get_public(file_get_contents('./myfile.pem'));
$keyData = openssl_pkey_get_details($keyFile);
print $keyData['bits'] ;
print $keyData['key'] ;
print $keyData['type'] ;
?>
types are
0: RSA
1: DSA
2: DH
3: EC
-1: unknown
permitting use of valid and "supported" certificates and rejecting others as "unsupported" or "unknown" might help until implemented.
- Status changed from Feedback to Closed
Also available in: Atom
PDF