-
Notifications
You must be signed in to change notification settings - Fork 91
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unknown certificate type #494
Comments
@Ggrison Thanks for the full report. Before reading all details, allow me to ask whether you checked https://github.com/open-quantum-safe/oqs-demos/tree/main/nginx (and ran the ready-made dockerimage)? This "demo" has been done to facilitate experimentation such as yours... |
@baentsch Hello Michael, I did not find any real VM implementing this also on internet and would like to do it and make it available to others. Stubborn ? *insert Heisenberg meme * "You're god damn right". Regards, Greg |
Big smile. I'm even more old school and don't like VM either, but only real hardware :-) So, good to know our setup works to begin with... Now I read your description in detail and agree, it all looks like things should work OK. Can I safely assume you also checked the (dil) cert (for correctness/no corruption) via the |
@baentsch Thank you for your answer.
Yup:
I did that in my debugging activities but not yet here as I wanted something clean to follow you rinstructions, so it's done now :
Running the openssl server with these hard setted env variable I've got same error (which is a good and a bad news at the same time) :
This is where I putted my limit, I did not wanted to do any debugging as my C skills died a long time ago, I can read some normal code but not advanced code like in these libraries.
Well yes, you can count on me. I wish to build a script to be run as a one-shot from a brand new ubuntu server install to do the setup of post-quantum hello world. I'm not there yet but I wish I can avoid some people to internally die like I am here. Thank you, Greg |
Sounds like a definitely doable thing (I suppose it should run an nginx server, then, basically mimicking the setup of test.openquantumsafe.org)? If you don't feel like banging your head alone, feel free to share your code/repo and I'll take a look/lend a hand. |
Thank you for your help. I will continue with my shovel, even buy a second one if need be. For your info, I have tried to generate RSA certificate and of course it's working like a charm with openssl s_server.
So I tempted my chance with some Falcon certificate but it gives me the same issue as with dilithium. Wanted to make sure that Dilithium wasn't victim of bug only affecting him. Debug verbose with openssl s_server are not as talkative as I wanted them to be...
Thank you for your help proposal, I can share with you my Virtual Machine through a big zip file (using VMWare Workstation Player) Regards, |
Before shipping around large VM images, can I ask you to set the OPENSSL_ROOT_DIR cmake var when building oqsprovider? All your problems are consistent with your setup using a libssl with a version below 3.2 (which cannot handle provider based sigs for TLS 13 ops, only for doing certs), I.e., the system libssl, and I didn't see that config in your build script... |
Step 1:
Step 2:
It's beautiful. I will now continue with nginx implementation. Thank you. THANK YOU. Do you want that we add something in the documentation between this error and this solution ? Regards, Greg |
Sure -- feel free to do a PR adding wording to the documentation in a place where you deem it missing/might help others/would have helped you most. Please add to your commit the tag "[skip ci]" to avoid wasting CI test cycles (if indeed it only is a documentation change). All that said, this option is visible in the "courtesy" build script... Maybe a more clear reference in the documentation to that script could be sensible, too (?).
Allow me to suggest again using our Dockerfile as a starting point (that also btw contains the reference to OPENSSL_ROOT_DIR): It encodes many hours of my time banging my head so other don't have to again :) |
Closing due to inactivity. Tagging @Ggrison as a gentle reminder to contribute documentation as per discussion above to avoid others hitting the same problem again. |
Dear community,
I desire to make as simple VMWare virtual Ubuntu server running locally an nginx webserver using dilithium certificate and kyber. My objective is simply to do my hello world using only quantum resistant algorythm. Nothing more nothing less. The fun of it.
The configuration I am using is the following:
You will find below the exact command line that I have typed to setup a brand new installed Ubuntu Server:
Liboqs:
All perfect, no issue at all.
OQS-Provider:
All test OK, no issue at all.
OpenSSL:
All test OK, install OK, version OK
Copying oqsprovider.so into the correct local openssl install:
Modifying the configuration file as explained in the documentation:
Checking OQS-provider is recognized and algo available:
From my perspective, everything is green and as expected.
Let's start generating some certifiate as in the USAGE.md:
Again, all perfect!
So, now let's make to simulate a server and a client connection as in the documentation USAGE.md:
Here is the drama that I am trying to debug since 3 days. I re-did these actions multiple time and looked a lot around internet.
Then I gave up and decided to re-start from scratch logging everything properly to give you all the necessary informations above.
I have tried some adjustment in environment variable, messing with openssl, try other configuration build, and so many other things... But nothing works when it comes to perform the client and server with the dilithium certificates.
I have also reviewed the different cases already closed but couldn't find a proper solution to apply to my problem.
Already thank you your assistance,
Greg
The text was updated successfully, but these errors were encountered: