-
Notifications
You must be signed in to change notification settings - Fork 90
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow ownca provider to not copy all, or overwrite specific data from the CSR #320
Comments
From the initial issue: "[This] might still be a useful feature if you expect to handle CSRs coming from users with all kinds of garbage inside. I'm unsure if there's a way to kinda re-package a CSR (e.g. you get a weird one: create one with proper settings using Ansible instead, plop in the public key of the weird one and just don't sign it, then create a certificate from it ignoring the missing/invalid signature) that might be a bit more feasible than adding nearly all CSR fields to This is not how I personally use It seems like CSRs have to be signed, so a potential way forward would be to extend |
I'm a bit scared of this; I'm afraid that if cryptography allows to do this right now, it will eventually stop allowing that and then we're screwed (resp. have to invest a lot of work to re-create it somehow else :) ). |
Another idea: allow to white-list extensions that are copied over (by default: all), and allow to specify Base64 encoded content of extensions to be added. Then we could have another module which can generate encoded extensions. (You can of course also use |
https://cryptography.io/en/latest/x509/reference/#cryptography.x509.CertificateSigningRequest.is_signature_valid exists and is in use e.g. in
The likelyhood that they remove the ability to parse otherwise well-formed CSRs with invalid signatures is rather low in my opinion. I'm not sure if it is even possible to create a certificate directly from a CSR in community.crypto/plugins/module_utils/crypto/module_backends/certificate_ownca.py Line 117 in 94634a3
|
I'm not talking about reading well-formed CSRs with invalid signatures, but creating such CSRs. After all you proposed to create a module which allows to create such CSRs :)
It is not. The standard way is copying over what's needed, as we do right now. A CSR is mainly a signed container for public key + extensions + some additional data. |
SUMMARY
This was suggested as part of #76.
ISSUE TYPE
COMPONENT NAME
x509_certificate, ownca provider
The text was updated successfully, but these errors were encountered: