-
-
Notifications
You must be signed in to change notification settings - Fork 15.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
TLS with EdDSA private keys not supported with OpenSSL #10916
Comments
Will have a look... thanks! |
Also not supported at the moment in Conscrypt: google/conscrypt#829 |
Related to http://openjdk.java.net/jeps/339 |
It almost exactly a year since this issue was opened, and I too am having this issue. My environment: Is there any update on this? Everything is fine when I am using RSA keys, and also EcDSA keys on P-256,P-384 and P-521 NIST curves. I even tested RSA with both TLS 1.2 and TLS 1.3 protocols, and the EcDSA with 1.3 alone. But the moment I try it with Ed25519 or Ed448 keys, stuff hits the fan. @SanjayVas were you able to solve it, or try any workaround? @normanmaurer any pointers on how to proceed would help. I also check the OpenJDK link you mentioned, and created my key pair as mentioned in that link, but that does not solve the issue either. |
I was not. My project is currently stuck using ECDSA with a NIST curve. |
This issue is also blocking us as well. Is there any timeline or thought going into this issue? |
I am also facing this issue. Is anyone planning to look into it? |
Despite the fact that OpenSSL supports EdDSA with the ed25519 and ed448 algorithms as of 1.1.1 (and BoringSSL for even longer), Netty fails when using these algorithms.
From the stack trace below, it appears that Netty doesn't try the
EdDSA
Java private key type for theECDHE_ECDSA
auth method. EdDSA is supported with that auth method in TLS 1.3 and with an extension to TLS 1.2.Note that the
EdDSA
key type is only available in Java 15+ or by using a JCE provider such as BouncyCastle.See the related issue filed for grpc-java: grpc/grpc-java#7774
Expected behavior
Server TLS succeeds when using a certificate with the ED25519 or ED448 signature algorithm (Java private key type
EdDSA
).Actual behavior
Server TLS fails with the following stack trace:
Steps to reproduce
openssl s_client
command, specifying the CA certificate.openssl s_client
command, specifying the CA certificate.Minimal yet complete reproducer code (or URL to code)
https://github.com/SanjayVas/netty-tls-example
Netty version
netty-all:4.1.56.Final (Maven)
netty-tcnative-boringssl-static:2.0.35.Final (Maven)
JVM version (e.g.
java -version
)OS version
x86_64 GNU/Linux (Debian Testing "Bullseye")
The text was updated successfully, but these errors were encountered: