There is definitely a great deal of interest in PKCS7 support. Previously we've had to wait while we worked on X509 but now that we have a reasonable implementation of that we can talk more about PKCS7. If you'd like to take a stab at an API proposal to start just file an issue with it and we can start discussing there!
-Paul (reaperhulk) > On Oct 14, 2015, at 8:46 PM, Micah Baker <hacim.re...@gmail.com> wrote: > > Hi Paul, > > I already have the ASN.1 dotted notation values and just need a way to sign > the PKCS7 EnvelopedData with those OIDs. I think you are correct in that what > I need here is a way to build and sign arbitrary PKCS7 structures since SCEP > does some nesting. The diagram on Page 14/15 of the IETF draft for SCEP is a > helpful way to visualize it: > https://tools.ietf.org/html/draft-gutmann-scep-01#page-15 > > Would this be something the community is interested in? > > Thanks, > > Micah > >> On Oct 5, 2015, at 7:32 AM, Paul Kehrer <paul.l.keh...@gmail.com> wrote: >> >> It has been a long time since I looked at SCEP, but it looks like it >> requires PKCS7 SignedData/EnvelopedData structures? Cryptography can't >> generate arbitrary ASN.1 so you'd need to generate it outside of >> cryptography (using something like pyasn1 or >> https://github.com/wbond/asn1crypto) and then sign it using cryptography >> (which may or may not be possible with the currently exposed primitives -- I >> didn't dig into how SCEP does the SignedData). >> >> I suspect what you need here is a PKCS7 implementation in cryptography, >> since that would hypothetically allow you to build/sign arbitrary PKCS7 >> structures, but maybe I'm misunderstanding the problem and it's simpler than >> that. >> >> -Paul >>> On October 4, 2015 at 7:03:53 PM, Micah Baker (hacim.re...@gmail.com) wrote: >>> >>> Hi Paul, >>> >>> SCEP requires a senderNonce and transactionID to be returned to the client >>> requesting the certificate. Those two values are included in the signed >>> message the client sends to the server, and then the server must take the >>> two values and include them in the response to the client or the client is >>> supposed to reject the response. This is not just adding an OID for a >>> capability, it’s also adding a value to the OID which must be included in >>> the signed response. Does x509.ObjectIdentifier allow something to the >>> effect of 1.2.3.4=some random bytes or text? >>> >>> Thanks, >>> >>> Micah >>> >>>> On Oct 4, 2015, at 4:59 PM, Paul Kehrer <paul.l.keh...@gmail.com> wrote: >>>> >>>> Micah, >>>> >>>> You can define any OID you want just by passing a string of the dotted >>>> value of the OID to the constructor of x509.ObjectIdentifier. You won't >>>> get the human readable name, but that's not a big deal. However, that >>>> class is really just a convenience and doesn't have any behavior so I'm >>>> not sure what benefit it would be to you when implementing SCEP. Could you >>>> elaborate a bit on what you're trying to do? >>>> >>>> >>>> -Paul (reaperhulk) >>>> >>>>> On October 4, 2015 at 6:33:57 PM, Micah Baker (hacim.re...@gmail.com) >>>>> wrote: >>>>> >>>>> I’m attempting to build a SCEP server using cryptography and don’t see a >>>>> way to add OIDs not already defined by the module. If it is not possible >>>>> to use other real OIDs, can we add the half-dozen SCEP OIDs to >>>>> cryptography? The OIDs can be found here: >>>>> https://tools.ietf.org/html/draft-gutmann-scep-01#page-17. If someone is >>>>> willing to give me some pointers I could try to write a patch for this, >>>>> assuming it’s just a table of supported OIDs somewhere. >>>>> _______________________________________________ >>>>> Cryptography-dev mailing list >>>>> Cryptography-dev@python.org >>>>> https://mail.python.org/mailman/listinfo/cryptography-dev >
_______________________________________________ Cryptography-dev mailing list Cryptography-dev@python.org https://mail.python.org/mailman/listinfo/cryptography-dev