[Gajim-devel] Re : Re : PKCS12 with password

Saleem Edah-Tally nmset at yahoo.com
Mon Jul 25 20:16:25 CEST 2011


>>> import OpenSSL.crypto
>>>OpenSSL.crypto.load_pkcs12(open('/home/user/xmpp_lab_set_pwd.p12').read())         
>>>  
>>>
Traceback (most recent call 
last):                                                                           
 
  File "<stdin>", line 1, in 
<module>                                                                         

OpenSSL.crypto.Error: [('PKCS12 routines', 'PKCS12_parse', 'mac verify 
failure')]                             

>>> OpenSSL.crypto.load_pkcs12(open('/home/user/xmpp_lab_set_pwd.p12').read(), 
>>>'REAL_PWD')                       
>>>
<PKCS12 object at 0x7f33978ffb90> 

Well it's really because the PKCS12 container is encrypted. If I remove the 
password from the same p12 file, I can authenticate successfully.

I don't know at all if it's a huge task but it would complete the effectiveness 
of the whole security approach.

Much emphasis has been laid out with MITM attacks in diverse fields of 
electronic cummunication. It's a real threat, but it's more likely that userA 
steals userB unencrypted credentials in a desktop session that is supposed to be 
used by many users and do whatever evil afterwards, pretending to be userB. 
userA will most probably lack required skills to sniff the network, intercept 
userB's communications, decrypt, alter and re-encrypt the content which he then 
forwards to userC.

(I am well aware that super hackers, national security agencies can do 
unthinkable piracy acts for whatever reason, but that's not the point here).

Have a nice day !





----- Message d'origine ----
De : Yann Leboulanger <asterix at lagaule.org>
À : Saleem Edah-Tally <nmset at yahoo.com>
Cc : gajim-devel at gajim.org
Envoyé le : Lun 25 juillet 2011, 17h 06min 35s
Objet : Re: Re : [Gajim-devel] PKCS12 with password


More information about the Gajim-devel mailing list