-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support for Code Signing Certificates to x509.verification #12464
Comments
With #11165 merged, it is possible to set custom extension policies. A code signing cert is a form of client verification (you're not checking that a cert is valid for a particular name, you're looking which names its valid for). |
Okay that seems interesting and I can imagine that this could work. But the documentation currently leaves me puzzled about how to use it.
If I understand this correctly this is in the current development version but not in a released version? Is there a beta version available on pypi? If not is there some sort of release cycle where I can check when this will be in a release? However, thanks for your work on this library, it makes my life so much easier. And I can currently see many new features being worked on which are helpful in making cryptography the only library required for any cryptographic topics. |
That's correct, this is in |
Unfortunately I need this feature at a work project, but I can not use unreleased packages in our productive code base. Depending on when it will be released I would have to implement a some work around until it ships, or I can just wait for the release to happen. There is no possibility to have a work around that ignores the KU and EKU with the code in version 44 or? The check on the extension of the ee can then by done manually. If I manage to understand the things which I mentioned above, I may be able to contribute documentation. But I have to understand it first. |
For examples on how the ExtensionPolicy API can be used, you can reference the tests, for example this one:
There are two main differences between a ClientVerifier and a ServerVerifier:
Why some properties are on
|
Oh yeah, and regarding having the extension policies or the store as properties on
That second point brings me to a renaming idea, which might actually make sense, but it's a breaking change unfortunately - instead of renaming DISCLAIMER: I sound pretty confident about some of these things here, but I'm not a core contributor here, so take what I say with a small grain of salt 😄 I just happened to work on this feature. |
And @loewexy, I think this would indeed benefit from a guide-style documentation entry, so if you will be able to take some of the stuff I laid out here and convert it to that format, that would be a great contribution! |
This issue has been waiting for a reporter response for 3 days. It will be auto-closed if no activity occurs in the next 5 days. |
Thanks for your answers. This will help me hopefully. However I will only work on this once the feature is released. |
This issue has been waiting for a reporter response for 3 days. It will be auto-closed if no activity occurs in the next 5 days. |
I want to use cryptography to validate a certificate chain of a signing certificate. But the x509.verification can only support server and client certificates.
Did I miss anything, or is there a work around to get that working. For a first step it would be okay for me to just validate the certificate chain to a root. The check if the leaf certificate has the correct KU and EKU can be done manually, but Path validation is tedious and error prone to implement myself.
The text was updated successfully, but these errors were encountered: