I suspect they won't know.  This information was only obtained after
they examined a certificate created in what they consider the "normal"
means: by using their CA that comes with a Windows application they
sell.  It's basically just a MS CA.  All of this was discovered when I
complained LOUDLY that I would not install a MS server to create
certificates.  I did not, and still do not, want to expand the MS
footprint at my shop, nor do I want any insecurities from doing so.  I
am working diligently to reduce the MS footprint.



On Mon, Sep 8, 2008 at 5:08 PM, Kyle Hamilton <[EMAIL PROTECTED]> wrote:
> Because your vendor doesn't follow the latest ipsec specification,
> which states that only keyUsage nonRepudiation,digitalSignature should
> be required, and no extendedKeyUsage should be required.  However,
> looking at http://www.oid-info.com/cgi-bin/display?tree=1.3.6.1.5.5.8.2
> says that 1.3.6.1.5.5.8.2 is the ipsec OID tree, not pkix.
>
> If you could get them to point you to what they're using as the
> Reference Which States They Must Require That OID, I would very much
> appreciate knowing.  (It's worth noting that Microsoft's ipsec
> implementation in Windows Server 2008 doesn't appear to require this.)
>
> -Kyle H
>
> On Mon, Sep 8, 2008 at 2:29 PM, Chris Zimmerman
> <[EMAIL PROTECTED]> wrote:
>> Here's what I had to add to the config to get it to work (as listed by
>> the vendor):
>>
>> [ new_oids ]
>> pkixeku=1.3.6.1.5.5.8.2
>> ikeIntermediate=${pkixeku}.2
>>
>> [ usr_cert ]
>> keyUsage = nonRepudiation, digitalSignature, keyEncipherment
>> extendedKeyUsage = serverAuth,clientAuth,ikeIntermediate
>>
>> Any thoughts on why this works?
>>
>>
>>
>> On Tue, Aug 26, 2008 at 2:50 PM, Chris Zimmerman
>> <[EMAIL PROTECTED]> wrote:
>>> Well, those attributes will work (minus the IKE one-it was not
>>> recognized) but the Watchguard does not assign it with a type of
>>> IPSec, so I've contacted Watchguard support to request the expected
>>> extended attributes for this.  I will post a reply as soon as I know.
>>>
>>> On Tue, Aug 26, 2008 at 1:41 PM, Kyle Hamilton <[EMAIL PROTECTED]> wrote:
>>>> This is a bug, per RFC 4549.  Please submit a report to your vendor.
>>>> (The semantics of the OIDs were never well-defined, and they have been
>>>> obsoleted -- according to RFC4549, having keyUsage=digitalSignature
>>>> and no EKU should work for IPsec.)
>>>>
>>>> In the [new_oids] section, add new lines:
>>>>
>>>> pkixeku=1.3.6.1.5.5.7.3
>>>> ipsecendsystem=${pkixeku}.5
>>>> ipsectunnel=${pkixeku}.6
>>>> ipsecuser=${pkixeku}.7
>>>>
>>>> and then in [usr_cert] change your extendedKeyUsage line to:
>>>>
>>>> extendedKeyUsage=serverAuth,clientAuth,ipsecIKE,ipsecendsystem,ipsectunnel,ipsecuser
>>>>
>>>> This /should/ do it, but since I don't do anything with IPsec I can't
>>>> test it.  My reference is
>>>> http://www.alvestrand.no/objectid/1.3.6.1.5.5.7.3.html
>>>>
>>>> -Kyle H
>>>>
>>>> On Tue, Aug 26, 2008 at 1:17 PM, Chris Zimmerman
>>>> <[EMAIL PROTECTED]> wrote:
>>>>> Thanks to all of you in your assistance.  With the recommended changes
>>>>> to the openssl.cnf file, I have successfully signed the CSR from the
>>>>> Watchguard box and imported it as a web cert (the Type that the
>>>>> Watchguard box sees).  However, in order to use it for VPN tunnels,
>>>>> the device needs it to be a type IPSec.  What is the extended key
>>>>> usage setting for that?
>>>>>
>>>>> On Tue, Aug 26, 2008 at 10:41 AM, Kyle Hamilton <[EMAIL PROTECTED]> wrote:
>>>>>> [usr_cert] is the appropriate section.
>>>>>>
>>>>>> This is above the [v3_req] section, at least in the vanilla 0.9.8h 
>>>>>> sources.
>>>>>>
>>>>>> -Kyle H
>>>>>>
>>>>>> On Tue, Aug 26, 2008 at 10:33 AM, Chris Zimmerman
>>>>>> <[EMAIL PROTECTED]> wrote:
>>>>>>> What is the appropriate section?
>>>>>>>
>>>>>>> Sorry if this is a basic question, but I am working on improving my 
>>>>>>> knowledge.
>>>>>>>
>>>>>>> On Tue, Aug 26, 2008 at 10:24 AM, Patrick Patterson
>>>>>>> <[EMAIL PROTECTED]> wrote:
>>>>>>>> Chris:
>>>>>>>>
>>>>>>>> On Tuesday 26 August 2008 12:58:22 Kyle Hamilton wrote:
>>>>>>>>> There is no ExtendedKeyUsage extension.
>>>>>>>>>
>>>>>>>>> To fix this, in your openssl.cnf file in section [usr_cert] there is a
>>>>>>>>> commented-out line that needs to be uncommented.
>>>>>>>>> # keyUsage = nonRepudiation, digitalSignature, keyEncipherment
>>>>>>>>>
>>>>>>>>> Then generate a new certificate.
>>>>>>>>>
>>>>>>>> Actually - that will only set the keyUsage extension (Which you will 
>>>>>>>> need) -
>>>>>>>> what you also want to set is to add a line to the appropriate section 
>>>>>>>> in the
>>>>>>>> openssl.cnf file that you are using to generate the certificate below 
>>>>>>>> that
>>>>>>>> that has:
>>>>>>>>
>>>>>>>> extendedKeyUsage = serverAuth,clientAuth
>>>>>>>>
>>>>>>>> And then regen the certificate.
>>>>>>>>
>>>>>>>> Have fun.
>>>>>>>>
>>>>>>>> Patrick.
>>>>>>>>
>>>>>>>>> -Kyle H
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> On Tue, Aug 26, 2008 at 9:20 AM, Chris Zimmerman
>>>>>>>>>
>>>>>>>>> <[EMAIL PROTECTED]> wrote:
>>>>>>>>> > Here's the cert for the Watchguard:
>>>>>>>>> >
>>>>>>>>> > Certificate:
>>>>>>>>> >    Data:
>>>>>>>>> >        Version: 3 (0x2)
>>>>>>>>> >        Serial Number: 15 (0xf)
>>>>>>>>> >        Signature Algorithm: sha1WithRSAEncryption
>>>>>>>>> >        Issuer: C=US, ST=TX, L=Somewhere, O=Company, OU=System,
>>>>>>>>> > CN=Company Root CA/[EMAIL PROTECTED]
>>>>>>>>> >        Validity
>>>>>>>>> >            Not Before: Aug 26 16:16:57 2008 GMT
>>>>>>>>> >            Not After : Aug 24 16:16:57 2018 GMT
>>>>>>>>> >        Subject: C=US, ST=TX, O=Company, OU=System, CN=WG
>>>>>>>>> >        Subject Public Key Info:
>>>>>>>>> >            Public Key Algorithm: rsaEncryption
>>>>>>>>> >            RSA Public Key: (1024 bit)
>>>>>>>>> >                Modulus (1024 bit):
>>>>>>>>> >                    00:c2:83:76:81:24:5c:48:09:71:66:bb:22:37:05:
>>>>>>>>> >                    f3:8b:0b:f6:df:24:a0:ec:d8:65:ac:d5:77:7f:e0:
>>>>>>>>> >                    91:f1:86:a4:00:23:17:c2:28:1f:81:e0:6d:e8:24:
>>>>>>>>> >                    e7:0a:bb:7e:a5:72:57:6d:65:cb:ec:7c:f1:d0:64:
>>>>>>>>> >                    63:9f:0d:0c:b3:4c:c6:e4:3f:7c:f9:1f:53:6b:c0:
>>>>>>>>> >                    47:3a:59:4d:87:37:e5:f6:4f:ef:75:20:5b:93:0b:
>>>>>>>>> >                    f9:8b:d7:4b:b7:4c:0c:e2:8c:2e:34:ad:23:3e:c6:
>>>>>>>>> >                    89:1e:6f:3b:0d:52:25:69:d2:42:d3:de:cd:cd:e3:
>>>>>>>>> >                    ef:80:8a:e0:2d:1c:20:8f:6b
>>>>>>>>> >                Exponent: 65537 (0x10001)
>>>>>>>>> >        X509v3 extensions:
>>>>>>>>> >            X509v3 Basic Constraints:
>>>>>>>>> >                CA:FALSE
>>>>>>>>> >            Netscape Comment:
>>>>>>>>> >                OpenSSL Generated Certificate
>>>>>>>>> >            X509v3 Subject Key Identifier:
>>>>>>>>> >
>>>>>>>>> > 3E:BB:9E:11:45:7B:F7:5E:BD:1D:F9:CE:A1:A9:E1:D7:7C:71:A5:FF X509v3
>>>>>>>>> > Authority Key Identifier:
>>>>>>>>> >
>>>>>>>>> > keyid:DB:E2:B6:28:36:12:83:63:B2:FA:87:E1:64:FB:44:F7:58:A0:8A:E8
>>>>>>>>> >
>>>>>>>>> >    Signature Algorithm: sha1WithRSAEncryption
>>>>>>>>> >        7b:b7:d0:ca:42:96:24:6a:26:e1:a4:e1:45:91:d1:28:14:97:
>>>>>>>>> >        e2:ea:dc:d6:59:97:73:ef:1a:5a:54:a4:33:fe:c2:0c:74:ca:
>>>>>>>>> >        6b:e4:85:4c:a0:9d:49:7a:1a:b0:fd:48:5c:6a:bc:de:44:53:
>>>>>>>>> >        73:23:bc:0f:ab:b6:cb:49:5a:53:2c:5c:d5:24:23:3b:e6:da:
>>>>>>>>> >        16:22:d4:db:1c:82:ac:7a:37:01:0f:a5:4e:24:92:2b:bc:2e:
>>>>>>>>> >        33:01:4d:5e:c3:7f:91:0f:3d:1d:ea:b8:8d:ad:38:ed:ab:44:
>>>>>>>>> >        b7:2d:82:7b:c3:0d:2a:a2:21:8a:58:25:ac:c4:cb:f0:57:4e:
>>>>>>>>> >        ed:ec
>>>>>>>>> >
>>>>>>>>> > On Tue, Aug 26, 2008 at 9:14 AM, Kyle Hamilton <[EMAIL PROTECTED]> 
>>>>>>>>> > wrote:
>>>>>>>>> >> openssl x509 -in [filename] -noout -text -inform PEM
>>>>>>>>> >>
>>>>>>>>> >> -Kyle H
>>>>>>>>> >>
>>>>>>>>> >> On Tue, Aug 26, 2008 at 8:44 AM, Chris Zimmerman
>>>>>>>>> >>
>>>>>>>>> >> <[EMAIL PROTECTED]> wrote:
>>>>>>>>> >>> That command seems to have a syntax problem, showing: "unknown 
>>>>>>>>> >>> option
>>>>>>>>> >>> [cert.pem-inserted my cert here]"
>>>>>>>>> >>>
>>>>>>>>> >>> On Mon, Aug 25, 2008 at 10:55 PM, Tim Hudson <[EMAIL PROTECTED]> 
>>>>>>>>> >>> wrote:
>>>>>>>>> >>>> Chris Zimmerman wrote:
>>>>>>>>> >>>>> I am working to setup a Watchguard firewall with x509 certs for 
>>>>>>>>> >>>>> VPN
>>>>>>>>> >>>>> tunnels.  I have created my own CA on my laptop and I have 
>>>>>>>>> >>>>> created a
>>>>>>>>> >>>>> CSR on the Watchguard product.  I have then signed the CSR with 
>>>>>>>>> >>>>> my CA
>>>>>>>>> >>>>> certificate successfully which then imports into the Watchguard.
>>>>>>>>> >>>>> Here's the problem: Watchguard requires that the cert be typed 
>>>>>>>>> >>>>> as
>>>>>>>>> >>>>> "Web" or "IPSec" if it is to be used for VPN tunnels.  
>>>>>>>>> >>>>> Everytime I
>>>>>>>>> >>>>> import my signed cert it shows up as a CA Cert type.  I know 
>>>>>>>>> >>>>> this is
>>>>>>>>> >>>>> an interop question, but has any got an idea of what to try to 
>>>>>>>>> >>>>> get
>>>>>>>>> >>>>> this working?  I've been at this for days now with no success.
>>>>>>>>> >>>>
>>>>>>>>> >>>> Look a the various settings for basic constraints, key usage and
>>>>>>>>> >>>> extended key usage as controlled in openssl.cnf ... basically 
>>>>>>>>> >>>> you need
>>>>>>>>> >>>> to set them to match what Watchguard wants.
>>>>>>>>> >>>>
>>>>>>>>> >>>> Perhaps you have the v3_ca stuff set.
>>>>>>>>> >>>>
>>>>>>>>> >>>> The output of
>>>>>>>>> >>>>        openssl x509 -text -noout cert.pem
>>>>>>>>> >>>> will let me see what you have set in the way of those extensions.
>>>>>>>>> >>>>
>>>>>>>>> >>>> If you have a working certificate and a non-working one then 
>>>>>>>>> >>>> comparing
>>>>>>>>> >>>> the text output should help show what the requirements are.
>>>>>>>>> >>>>
>>>>>>>>> >>>> Tim.
>>>>>>>>> >>>
>>>>>>>>> >>> ______________________________________________________________________
>>>>>>>>> >>> OpenSSL Project                                 
>>>>>>>>> >>> http://www.openssl.org
>>>>>>>>> >>> User Support Mailing List                    
>>>>>>>>> >>> openssl-users@openssl.org
>>>>>>>>> >>> Automated List Manager                           [EMAIL PROTECTED]
>>>>>>>>> >>
>>>>>>>>> >> ______________________________________________________________________
>>>>>>>>> >> OpenSSL Project                                 
>>>>>>>>> >> http://www.openssl.org
>>>>>>>>> >> User Support Mailing List                    
>>>>>>>>> >> openssl-users@openssl.org
>>>>>>>>> >> Automated List Manager                           [EMAIL PROTECTED]
>>>>>>>>> >
>>>>>>>>> > ______________________________________________________________________
>>>>>>>>> > OpenSSL Project                                 
>>>>>>>>> > http://www.openssl.org
>>>>>>>>> > User Support Mailing List                    
>>>>>>>>> > openssl-users@openssl.org
>>>>>>>>> > Automated List Manager                           [EMAIL PROTECTED]
>>>>>>>>>
>>>>>>>>> ______________________________________________________________________
>>>>>>>>> OpenSSL Project                                 http://www.openssl.org
>>>>>>>>> User Support Mailing List                    openssl-users@openssl.org
>>>>>>>>> Automated List Manager                           [EMAIL PROTECTED]
>>>>>>>> ______________________________________________________________________
>>>>>>>> OpenSSL Project                                 http://www.openssl.org
>>>>>>>> User Support Mailing List                    openssl-users@openssl.org
>>>>>>>> Automated List Manager                           [EMAIL PROTECTED]
>>>>>>>>
>>>>>>> ______________________________________________________________________
>>>>>>> OpenSSL Project                                 http://www.openssl.org
>>>>>>> User Support Mailing List                    openssl-users@openssl.org
>>>>>>> Automated List Manager                           [EMAIL PROTECTED]
>>>>>>>
>>>>>> ______________________________________________________________________
>>>>>> OpenSSL Project                                 http://www.openssl.org
>>>>>> User Support Mailing List                    openssl-users@openssl.org
>>>>>> Automated List Manager                           [EMAIL PROTECTED]
>>>>>>
>>>>> ______________________________________________________________________
>>>>> OpenSSL Project                                 http://www.openssl.org
>>>>> User Support Mailing List                    openssl-users@openssl.org
>>>>> Automated List Manager                           [EMAIL PROTECTED]
>>>>>
>>>> ______________________________________________________________________
>>>> OpenSSL Project                                 http://www.openssl.org
>>>> User Support Mailing List                    openssl-users@openssl.org
>>>> Automated List Manager                           [EMAIL PROTECTED]
>>>>
>>>
>> ______________________________________________________________________
>> OpenSSL Project                                 http://www.openssl.org
>> User Support Mailing List                    openssl-users@openssl.org
>> Automated List Manager                           [EMAIL PROTECTED]
>>
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           [EMAIL PROTECTED]
>
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to