Hi,

Just a update. I tested it with cryptography==2.1.dev1 and now it is working. 
So it is exactly this issue, as you guessed it.

Thank you very much.

Regards,
Julian

> Am 01.10.2017 um 15:54 schrieb Julian Meyer <jul...@meyer-privat.com>:
> 
> Hi Alex,
> <asn1parse_cert_not_working.txt>
> <asn1parse_cert_working.txt>
> Thanks for the fast answer. It seems that you have the right guess. I’ve 
> attached the Outputs of the openssl command. In comparing the Files I can see 
> one created with python are UTF8STRING and the one with my other application 
> are PRINTABLESTRING.
> 
> I try to make a new test with the current git version of cryptography.
> 
> Thanks,
> Julian
> 
>> Am 01.10.2017 um 15:45 schrieb Alex Gaynor <alex.gay...@gmail.com 
>> <mailto:alex.gay...@gmail.com>>:
>> 
>> Can you point your certificate at `openssl asn1parse` and compare the string 
>> types used in the signature?
>> 
>> My guess it that the cryptography generated cert will have UTF8String, and 
>> the cert generated by your other software will have PrintableString or some 
>> other string time.
>> 
>> If yes, good news! This will be fixed in the next cryptography release -- 
>> you can verify this by testing with the version of cryptography in git.
>> 
>> Alex
>> 
>> On Sun, Oct 1, 2017 at 9:43 AM, Julian Meyer <jul...@meyer-privat.com 
>> <mailto:jul...@meyer-privat.com>> wrote:
>> Hi,
>> 
>> I woud like to sign a certificate with my internal intermediate (CA) 
>> certificate. First I thought the issue was caused by the 
>> AuthorityKeyIdentifier Extension without the authority_cert_issuer and 
>> authority_cert_serial_number parameters.
>> 
>> But as Paul wrote back and I made a few tests, this isn’t the issue.
>> 
>> Until now, I used a Desktop application called XCA to manage my testing 
>> certificates. I like to automate this, witch my python program. But the 
>> Webbrowser don’t accept the created certificates. In Crome I get 
>> ERR_CERT_AUTHORITY_INVALID as an error message, but if I check this 
>> certificate with openssl, or by importing it in XCA, all themes alright. 
>> Yes, the Root Certificate is in the Truststore and the Webserver is 
>> delivering the Intermediate and server certificate.
>> 
>> I can't locate the issue why the browser can not validate the trust chain if 
>> the certificate is signed by the cryptography library.
>> 
>> My Software is Open Source and this is the part, where the certificate is 
>> signed:
>> https://github.com/meyju/cert-master/blob/92104e07bc8d909d763f3559783e9e3698785dbc/cert_master/certificate.py#L239
>>  
>> <https://github.com/meyju/cert-master/blob/92104e07bc8d909d763f3559783e9e3698785dbc/cert_master/certificate.py#L239>
>> 
>> Is the order of the extensions in the certificate imported? This is the only 
>> difference I can see right now.
>> 
>> Any suggestions or tipps?
>> 
>> Should I send my testing certificates?
>> 
>> Kind regards,
>> Julian
>> _______________________________________________
>> Cryptography-dev mailing list
>> Cryptography-dev@python.org <mailto:Cryptography-dev@python.org>
>> https://mail.python.org/mailman/listinfo/cryptography-dev 
>> <https://mail.python.org/mailman/listinfo/cryptography-dev>
>> 
>> 
>> 
>> -- 
>> "I disapprove of what you say, but I will defend to the death your right to 
>> say it." -- Evelyn Beatrice Hall (summarizing Voltaire)
>> "The people's good is the highest law." -- Cicero
>> GPG Key fingerprint: D1B3 ADC0 E023 8CA6
>> 
>> _______________________________________________
>> Cryptography-dev mailing list
>> Cryptography-dev@python.org <mailto:Cryptography-dev@python.org>
>> https://mail.python.org/mailman/listinfo/cryptography-dev
> 

_______________________________________________
Cryptography-dev mailing list
Cryptography-dev@python.org
https://mail.python.org/mailman/listinfo/cryptography-dev

Reply via email to