-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Read pkcs#8 private keys encrypted using FIPS-compliant openssl #4
Comments
Pinging @elastic/integrations-services (Team:Services) |
Some notes from @urso:
|
tlscommon
function to read encrypted pkcs#8 private keys encrypted using FIPS-compliant openssl
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
Backlog grooming: Closing it until further needs. |
Pinging @elastic/elastic-agent-data-plane (Team:Elastic-Agent-Data-Plane) |
@ycombinator, we may want to re-open this as part of elastic-agent fips work, however it should probably be moved to our fork: https://github.com/elastic/pkcs8/ cc @cmacknz |
After a conversation with @cmacknz, this issue should be reopened but we do not expect it to be in scope for our current efforts. |
Describe the enhancement:
Currently, the
tlscommon.ReadPEMFile
function is able to read encrypted PKCS#8 private keys created using a non-FIPS-compliantopenssl
. Such keys look like this:However, if the private key is encrypted using a FIPS-compliant
openssl
, thetlscommon.ReadPEMFile
function is unable to parse it. Such keys look like this:Describe a specific use case for the enhancement or feature:
To allow FIPS-compliant
openssl
created PKCS#8 private keys to be used with Beats.The text was updated successfully, but these errors were encountered: