Certificate Authority using ed25519 key on Gnuk?
Terminada
gnupg.org at terminada.io
Fri Oct 4 10:33:11 CEST 2024
On 4/10/24 10:20, NIIBE Yutaka wrote:
> Terminada wrote:
>
>> It appears that gpgsm supports creating a self signed CA but maybe only
>> for RSA keys?
>
> I don't know for X.509 CA use cases. Could you please ask gnupg-devel?
Yes, it seems that the failure relates to unimplemented functionality in
gpg-agent / gpgsm, rather than Gnuk.
I'll sign up to gnupg-devel and ask.
>
> For X.509 Ed25519 support, it would not be tested well or it's buggy,
> and the UI is not that good. Although I don't know if it's related, for
> X.509 EdDSA certificates, I can find this commit:
>
> https://dev.gnupg.org/rG6dc3846d78192e393be73c16c72750734a9174d1
>
That link gave me hope so I installed the lastest development version of
gnupg and all dependencies and re-tried using the same parameter file
demonstrated in the commit that you linked (but with my keygrip).
Unfortunately gpgsm wouldn't work and I got a message saying "Signing
failed: Not implemented".
It seems strange to me that more people don't want to use ed25519 keys
protected by a smartcard as the basis for their self-signed CA. The
ed25519 keys have become much more commonly used and they seem better
suited for use on devices with limited resources like a smartcard.
Do you know if there is a way I can work around the gpgsm inadequacy?
Is there some way that I can do part of the self signed CA creation with
openssl and then sign using gpg-agent talking to Gnuk? For example, I
believe it might be possible to use the ssh key equivalent of the gpg
private key in openssl to create the self signed CA. However, I will
still need to sign user CSRs after the private key is residing on my
Gnuk token, which doesn't seem possible?
More information about the Gnuk-users
mailing list