-
-
Notifications
You must be signed in to change notification settings - Fork 191
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[OpenSSL] LotW Certificate import fails #2068
Comments
Digged though my LotW certificates and also the most recent one (from 2022) uses |
Seems like tQSL also went for the legacy move: https://sourceforge.net/p/trustedqsl/tqsl/ci/2368dd6c64e8aa57c4a939b169c979c53cd97ead/ That means no other solution so far :( |
Darn. This means we could also get stuck with systems that upgrade OpenSSL to more recent versions :( |
The RC2 algorithms have been deprecated with release of OpenSSL 3. See: https://www.openssl.org/docs/man3.1/man7/migration_guide.html |
As long as ARRL/LotW built around deprecated algorithms not ... -.- |
Yeah sadly not much we can do about this one, balls in ARRLs court. |
Yeah apparently. |
I'm tagging this as not a bug but also not deleting it. |
Hi, if your have this line commented out with # in openssl.cnf #openssl_conf = openssl_init You must uncomment it openssl_conf = openssl_init |
I'm using Archlinux and it has already been uncommented. After some research, I solved it by adding some additional support for openssl. For anyone having the same issue: First you have to find where your openssl.cnf is.
Then open it with your editor. Uncomment Then if it still fails, add/modify the following:
|
I had to uncomment
|
UpdateThere is a release candidate 2.7 for tqsl application (not published yet). The release notes say:
Using this version and exporting the certificates we are successful with importing these into Cloudlog without tuning OpenSSL parameters. The exported certificate(s) are now based on AES-256 instead of RC-2 which was deprecated. The cert now contains:
No need to (re-)request new certificates. Just re-exporting them using tqsl-2.7 is required. We should close this issue once tqsl-2.7 is published officially. |
Yay |
tqsl 2.7 (and even 2.7.1) has been released. With this version certificates can be exported and imported into CL without issues. So I close here. |
At least HB9WDF reported that LotW cert upload fails with web server running PHP8.1 / OpenSSL 3. The application logs show an error like:
This seems to be a problem of recent OpenSSL versions and probably LotW using outdated security and hashing algorithms for their certificates. As of now it seems there is no workaround besides enabling the legacy options in SSL config /etc/ssl/openssl.cnf:
Taken from https://stackoverflow.com/a/73858615 resp. https://gist.github.com/rdh27785/97210d439a280063bd768006450c435d.
This enables legacy options in SSL. After doing the changes the web server / PHP application needs a restart. This ist definitely only a temporary solution because we should not touch these settings imho. Not sure if LotW uses more recent algos in newer certs?
According to https://www.openssl.org/docs/manmaster/man1/openssl-pkcs12.html we can extract data from a cert file with -info. So maybe there is someone out there who has a recent LotW certificate and could run
on his p12 file (extracted without password from tqsl application) and show the info about the algorithms in use? My cert is from 2021 and maybe ARRL uses more recent algorithms in newer certs?!
The (probably) relevant sections are:
The RC2_CBC algos are definitely deprecated and causing the issues here.
After all I think this is more related to the OpenSSL version than the PHP version but hey ...
P.S.: Please do not post private key data :)
The text was updated successfully, but these errors were encountered: