简体   繁体   English

没有签名功能的 x509 客户端证书

[英]x509 Client Certificate without signing capability

i'm currently experimenting with X509 Certificates.我目前正在试验 X509 证书。

As i tested, i just signed a Apple Configuration (.mobileconfig) with the same cert.正如我测试的那样,我刚刚使用相同的证书签署了 Apple 配置 (.mobileconfig)。 Which shows as perfectly valid (when Root CA is installed of course)这显示为完全有效(当然,当安装了 Root CA 时)

I signed the.mobileconfig with我签署了.mobileconfig

openssl smime -sign

Now is my question, is there a possibility to remove those signing capabilities from the client cert.现在是我的问题,是否有可能从客户端证书中删除这些签名功能。 Or is it there by default?还是默认存在?

I also tried fiddling around with KeyUsage and ExtendedKeyUsage but nothing seemed to have worked.我也尝试摆弄 KeyUsage 和 ExtendedKeyUsage 但似乎没有任何效果。

My Goal is to have a Client cert for a user to use with EAP-TLS for radius auth.我的目标是让用户使用 EAP-TLS 进行 radius 身份验证的客户端证书。 Without the possibility for the user to sign files.用户无法签署文件。

My Goal is to have a Client cert for a user to use with EAP-TLS for radius auth.我的目标是让用户使用 EAP-TLS 进行 radius 身份验证的客户端证书。 Without the possibility for the user to sign files.用户无法签署文件。

You can't really prevent anyone from using the private key associated with their X509 certificate from signing things.您无法真正阻止任何人使用与其 X509 证书关联的私钥来签署内容。 Unless you control every bit of software they can use with that private key, they can just use something that ignores the key usage extensions listed on the X509 certificate.除非您控制他们可以使用该私钥使用的所有软件,否则他们可以只使用忽略 X509 证书上列出的密钥使用扩展的东西。

What you can do is simply not respect any signature that can't be validated by an X509 certificate with the digitalSignature extension.可以做的就是不尊重任何无法由具有digitalSignature扩展名的 X509 证书验证的签名。

"Your X509 cert I'm supposed to use to validate your signature doesn't have the digitalSignature bit set. This signature is invalid." “我应该用来验证你的签名的你的 X509 证书没有设置digitalSignature位。这个签名无效。”

Hopefully any software product you're using requires the proper certificate properties to exist on the X509 certificate used to validate a signature.希望您使用的任何软件产品都需要正确的证书属性存在于用于验证签名的 X509 证书上。

Among many ways to see the properties of an X509 certificate:查看 X509 证书属性的多种方法之一:

openssl x509 -in /path/to/cert.pem -noout -text

For a combined cert/private key in PKCS#12 format:对于 PKCS#12 格式的组合证书/私钥:

openssl pcks12 -in /path/to/key.p12 -nokeys | openssl x509 -noout -text

(Note that I haven't tested these openssl... examples - they may not be fully correct...) (请注意,我还没有测试这些openssl...示例 - 它们可能不完全正确...)

声明:本站的技术帖子网页,遵循CC BY-SA 4.0协议,如果您需要转载,请注明本站网址或者原文地址。任何问题请咨询:yoyou2525@163.com.

 
粤ICP备18138465号  © 2020-2024 STACKOOM.COM