<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd">
<html lang="en">
<head>
<meta content="text/html; charset=US-ASCII" http-equiv="Content-Type">
<title>
GitLab
</title>
<style>img {
max-width: 100%; height: auto;
}
</style>
</head>
<body>
<div class="content">
<p class="details" style="font-style: italic; color: #666;">
<a href="https://gitlab.com/dwmw2">David Woodhouse</a> created an issue: <a href="https://gitlab.com/gnutls/gnutls/-/issues/1234">#1234</a>
</p>
<div></div>
<p dir="auto">I'm finally getting round to implementing TPM tests for OpenConnect.</p>
<p dir="auto">OpenConnect has a set of {EC,RSA,DSA} keys in its test suite, runs ocserv and attempts to use certificate authentication.</p>
<p dir="auto">If I import the EC key into a TPMv2 and then attempt to use it, I cannot use client certificate auth with TLSv1.3; I just get a silent failure to present a certificate, followed by authentication failure.</p>
<pre class="code highlight js-syntax-highlight language-plaintext" lang="plaintext" v-pre="true"><code><span id="LC1" class="line" lang="plaintext">HSK[0x1120930]: CERTIFICATE REQUEST (13) was received. Length 70[70], frag offset 0, frag length: 70, sequence: 0</span>
<span id="LC2" class="line" lang="plaintext">HSK[0x1120930]: parsing certificate request</span>
<span id="LC3" class="line" lang="plaintext">EXT[0x1120930]: rcvd signature algo (4.1) RSA-SHA256</span>
<span id="LC4" class="line" lang="plaintext">EXT[0x1120930]: rcvd signature algo (8.9) RSA-PSS-SHA256</span>
<span id="LC5" class="line" lang="plaintext">EXT[0x1120930]: rcvd signature algo (8.4) RSA-PSS-RSAE-SHA256</span>
<span id="LC6" class="line" lang="plaintext">EXT[0x1120930]: rcvd signature algo (4.3) ECDSA-SECP256R1-SHA256</span>
<span id="LC7" class="line" lang="plaintext">EXT[0x1120930]: rcvd signature algo (8.7) EdDSA-Ed25519</span>
<span id="LC8" class="line" lang="plaintext">EXT[0x1120930]: rcvd signature algo (5.1) RSA-SHA384</span>
<span id="LC9" class="line" lang="plaintext">EXT[0x1120930]: rcvd signature algo (8.10) RSA-PSS-SHA384</span>
<span id="LC10" class="line" lang="plaintext">EXT[0x1120930]: rcvd signature algo (8.5) RSA-PSS-RSAE-SHA384</span>
<span id="LC11" class="line" lang="plaintext">EXT[0x1120930]: rcvd signature algo (5.3) ECDSA-SECP384R1-SHA384</span>
<span id="LC12" class="line" lang="plaintext">EXT[0x1120930]: rcvd signature algo (8.8) EdDSA-Ed448</span>
<span id="LC13" class="line" lang="plaintext">EXT[0x1120930]: rcvd signature algo (6.1) RSA-SHA512</span>
<span id="LC14" class="line" lang="plaintext">EXT[0x1120930]: rcvd signature algo (8.11) RSA-PSS-SHA512</span>
<span id="LC15" class="line" lang="plaintext">EXT[0x1120930]: rcvd signature algo (8.6) RSA-PSS-RSAE-SHA512</span>
<span id="LC16" class="line" lang="plaintext">EXT[0x1120930]: rcvd signature algo (6.3) ECDSA-SECP521R1-SHA512</span>
<span id="LC17" class="line" lang="plaintext">EXT[0x1120930]: rcvd signature algo (2.1) RSA-SHA1</span>
<span id="LC18" class="line" lang="plaintext">EXT[0x1120930]: rcvd signature algo (2.3) ECDSA-SHA1</span>
<span id="LC19" class="line" lang="plaintext">EXT[0x1120930]: rcvd signature algo (2.2) (null)</span>
<span id="LC20" class="line" lang="plaintext">checking cert compat with RSA-SHA256</span>
<span id="LC21" class="line" lang="plaintext">cannot use privkey of EC/ECDSA with RSA-SHA256</span>
<span id="LC22" class="line" lang="plaintext">checking cert compat with RSA-PSS-SHA256</span>
<span id="LC23" class="line" lang="plaintext">cannot use privkey of EC/ECDSA with RSA-PSS-SHA256</span>
<span id="LC24" class="line" lang="plaintext">checking cert compat with RSA-PSS-RSAE-SHA256</span>
<span id="LC25" class="line" lang="plaintext">cannot use privkey of EC/ECDSA with RSA-PSS-RSAE-SHA256</span>
<span id="LC26" class="line" lang="plaintext">checking cert compat with ECDSA-SECP256R1-SHA256</span>
<span id="LC27" class="line" lang="plaintext">checking cert compat with EdDSA-Ed25519</span>
<span id="LC28" class="line" lang="plaintext">cannot use privkey of EC/ECDSA with EdDSA-Ed25519</span>
<span id="LC29" class="line" lang="plaintext">checking cert compat with RSA-SHA384</span>
<span id="LC30" class="line" lang="plaintext">cannot use privkey of EC/ECDSA with RSA-SHA384</span>
<span id="LC31" class="line" lang="plaintext">checking cert compat with RSA-PSS-SHA384</span>
<span id="LC32" class="line" lang="plaintext">cannot use privkey of EC/ECDSA with RSA-PSS-SHA384</span>
<span id="LC33" class="line" lang="plaintext">checking cert compat with RSA-PSS-RSAE-SHA384</span>
<span id="LC34" class="line" lang="plaintext">cannot use privkey of EC/ECDSA with RSA-PSS-RSAE-SHA384</span>
<span id="LC35" class="line" lang="plaintext">checking cert compat with ECDSA-SECP384R1-SHA384</span>
<span id="LC36" class="line" lang="plaintext">checking cert compat with EdDSA-Ed448</span>
<span id="LC37" class="line" lang="plaintext">cannot use privkey of EC/ECDSA with EdDSA-Ed448</span>
<span id="LC38" class="line" lang="plaintext">checking cert compat with RSA-SHA512</span>
<span id="LC39" class="line" lang="plaintext">cannot use privkey of EC/ECDSA with RSA-SHA512</span>
<span id="LC40" class="line" lang="plaintext">checking cert compat with RSA-PSS-SHA512</span>
<span id="LC41" class="line" lang="plaintext">cannot use privkey of EC/ECDSA with RSA-PSS-SHA512</span>
<span id="LC42" class="line" lang="plaintext">checking cert compat with RSA-PSS-RSAE-SHA512</span>
<span id="LC43" class="line" lang="plaintext">cannot use privkey of EC/ECDSA with RSA-PSS-RSAE-SHA512</span>
<span id="LC44" class="line" lang="plaintext">checking cert compat with ECDSA-SECP521R1-SHA512</span>
<span id="LC45" class="line" lang="plaintext">checking cert compat with RSA-SHA1</span>
<span id="LC46" class="line" lang="plaintext">cannot use privkey of EC/ECDSA with RSA-SHA1</span>
<span id="LC47" class="line" lang="plaintext">checking cert compat with ECDSA-SHA1</span>
<span id="LC48" class="line" lang="plaintext">The hash size used in signature (20) is less than the expected (32)</span>
<span id="LC49" class="line" lang="plaintext">ASSERT: signature.c[_gnutls_session_sign_algo_enabled]:433</span>
<span id="LC50" class="line" lang="plaintext">Signature algorithm ECDSA-SHA1 is not enabled</span>
<span id="LC51" class="line" lang="plaintext">HSK[0x1120930]: rejecting client auth because of no suitable signature algorithm</span>
<span id="LC52" class="line" lang="plaintext">ASSERT: tls13/certificate_request.c[_gnutls13_recv_certificate_request_int]:203</span>
<span id="LC53" class="line" lang="plaintext">ASSERT: buffers.c[get_last_packet]:1168</span>
<span id="LC54" class="line" lang="plaintext">READ: Got 5 bytes from 0x5</span>
<span id="LC55" class="line" lang="plaintext">READ: read 5 bytes from 0x5</span>
<span id="LC56" class="line" lang="plaintext"></span></code></pre>
</div>
<div class="footer" style="margin-top: 10px;">
<p style="font-size: small; color: #666;">
—
<br>
Reply to this email directly or <a href="https://gitlab.com/gnutls/gnutls/-/issues/1234">view it on GitLab</a>.
<br>
You're receiving this email because of your account on gitlab.com.
If you'd like to receive fewer emails, you can
<a href="https://gitlab.com/-/sent_notifications/5d69a35f95a2f1315fc5785116ea2efd/unsubscribe">unsubscribe</a>
from this thread or
adjust your notification settings.
<script type="application/ld+json">{"@context":"http://schema.org","@type":"EmailMessage","action":{"@type":"ViewAction","name":"View Issue","url":"https://gitlab.com/gnutls/gnutls/-/issues/1234"}}</script>
</p>
</div>
</body>
</html>