-
Notifications
You must be signed in to change notification settings - Fork 757
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Download of pkcs12 / pfx not recognized by Windows with MVC rewrite #7703
Comments
|
same as #7251 ? |
|
No, not the same, i have a similar issue: Steps to reproduce:
Tried a workaround:
Also, example output from OpenSSL -info for three different generated p12 files: openssl -info: e:\Progs\Security\openssl-3\x64\bin>openssl pkcs12 -info -in bundle_v1.1.p12 MAC: sha1, Iteration 2048 e:\Progs\Security\openssl-3\x64\bin>openssl pkcs12 -info -in bundle_v3.p12 MAC: sha256, Iteration 2048 cert.p12 on OpenSSL 1.1.1w: |
|
I don't see anything weird in our code, but there seems to be something off here, we're using the standard functions offered by php to create these.
|
|
Ok, this was quite unexpected. the endpoint offers the right data, but then the browser seems to return something "random" . b3aa910 should prevent this from happening. |
|
That was quick! =) Confirmed working: e:\Progs\Security\openssl-3\x64\bin>openssl pkcs12 -info -in cert_new.p12 e:\Progs\Security\openssl-3\x64\bin>openssl pkcs12 -info -in cert_new_d.p12 MAC: sha256, Iteration 2048 Also, Keystore Explorer accepts the base64 decoded cert. Thank you! |
|
@Weltherrscher thanks for confirming, will likely be released in the next minor |
…lob. closes #7703 It looks like out atob() resulted in sending broken data back to the client, the easiest way to prevent this is to keep our endpoint b64 encoded data as is and let the client handle it. Accoring to https://developer.mozilla.org/en-US/docs/Web/HTTP/Basics_of_HTTP/Data_URLs, we should be able to suffix ;base64 in these cases. While here, also make sure the result status is as expected. (cherry picked from commit b3aa910)
…lob. closes #7703 It looks like out atob() resulted in sending broken data back to the client, the easiest way to prevent this is to keep our endpoint b64 encoded data as is and let the client handle it. Accoring to https://developer.mozilla.org/en-US/docs/Web/HTTP/Basics_of_HTTP/Data_URLs, we should be able to suffix ;base64 in these cases. While here, also make sure the result status is as expected.
|
Is this fix included in the OPNsense 24.7.3_1? |
|
It was fixed in 24.7.1 already. |
|
The reason I'm asking is because I'm having issues importing the downloaded .p12 from the WebUI on the MacOS client. |
|
Some of this incompatibility is because of OpenSSL 1.1 vs. 3.0 defaults. Can't do much more in community scope than mention this. |
|
Yup. This thread explains it. |
Important notices
Before you add a new report, we ask you kindly to acknowledge the following:
Describe the bug
Hi, I have a Firewall here with 24.7_9 and when I download a certificate as pfx with a password and double click in Windows, I get an error like enclosed (before even typing a password):
Seems it's marked as wrong type somewhere
To Reproduce
see above
Expected behavior
A clear and concise description of what you expected to happen.
Describe alternatives you considered
A clear and concise description of any alternative solutions or workaround you considered.
Screenshots
Se above
Relevant log files
If applicable, information from log files supporting your claim.
Additional context
Add any other context about the problem here.
Environment
Software version used and hardware type if relevant, e.g.:
Versions
OPNsense 24.7_9-amd64
FreeBSD 14.1-RELEASE-p2
OpenSSL 3.0.14
The text was updated successfully, but these errors were encountered: