Support for netscape / html5 SPKAC client certificate request
Project description
This library supports the format of browser-generated SPKAC certificate requests.
The HTML keygen tag which previously was supported by most Mozilla-based browsers is now in the HTML-5 standard. The keygen tag is used in a HTML form element and displays a key generation widget to the user. When submitted, the browser locally generates a public key pair, locally stores the private key, and submits the public key to the web server in the SPKAC format.
When generating a form with a keygen element, the web server can include a challenge string in the form. This challenge string is returned in the SPKAC generated by the browser. It is signed together with the public key by the private key retained by the browser.
This package is intended for server-side support of SPKAC. It uses a submitted SPKAC and checks for correct challenge string and that the public key and challenge are properly signed by the browser. It supports a method for generating a certificate from the data in the SPKAC and additional data supplied by the web application.
The generated certificate can then typically be used for client authentication to a web application and is therefore called a client certificate. The web browser (or other client-side application) supplies the certificate in the SSL handshake and proves it is in the posession of the necessary private key.
When building certificates it is also a good idea to have a certificate revocation list (CRL). The package provides routines to generate a revocation list from scratch using a list of certificate serial numbers and revocation dates.
Installation
Install using the standard python setup.py mechanism, e.g.:
python setup.py install --prefix=/usr/local
You need pyasn1 and M2Crypto installed for this package to work.
Examples
For a usage example see the doctests in spkac.py and crl.py
Changes
Version 0.5: Major feature enhancements
Implement Certificate Revocation Lists (CRL)
Implementation of CRL (with MD5 hash, this probably needs to be fixed later on, don’t know yet if there is a format with a stronger hash)
factor pem_object
Fix timezone of default valid_from for generated certificate: We used a timezone correction on a timestamp which is already UTC.
Version 0.4: Bug fix
Fix incompatibility with newer versions of pyasn1.
BitString serialisation in pyasn1 changed method names, the old inofficial serialisation method with ‘_’ is now official without the ‘_’.
Version 0.3: Bug fix
Import of version.py failed if dependecies were missing. This prevented a pip install from succeeding in case of missing dependencies.
Guard import in __init__.py to not fail for missing dependencies
Version 0.2: Minor feature additions
Move example from end of spkac.py into a doctest. Change of API: set_email no longer supported. Now extensions can be given as unnamed arguments in the constructor. Named arguments are interpreted as subject parameters for the resulting certificate. All this is shown in the doctest.
Remove set_email
Change constructor: Allow extensions as args and subject parameters as keyword args
Add doctest
Fix setup.py to include install_requires to auto-install required packages
Easier import: from pyspkac import SPKAC works now.
Version 0.1: Initial Release
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
File details
Details for the file pyspkac-V-0.5.tar.gz
.
File metadata
- Download URL: pyspkac-V-0.5.tar.gz
- Upload date:
- Size: 9.4 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 022e5467cac3e0ba3921f342652062692234d9d950f13fc4271e4cae19558de6 |
|
MD5 | 83118afc1383337d3977e05bec8ec2f3 |
|
BLAKE2b-256 | 0bfd8dfd08230a1269420ce35c0028777b8936f8c63df45cbecae7f904cd801a |