Closed ycombinator closed 2 years ago
Pinging @elastic/integrations-services (Team:Services)
Some notes from @urso:
Unfortunately the go crypto libraries do not support encrypted pkcs#8: golang/go#8860
PKCS#8 itself is just a container format. There is a lib trying to implement decryption (https://github.com/youmark/pkcs8), but not all ciphers might be supported as it is based on dependencies for PKCS#5.
We need to test with certificates and actually figure out which ciphers are supported + documentation.
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.
Backlog grooming: Closing it until further needs.
Pinging @elastic/elastic-agent-data-plane (Team:Elastic-Agent-Data-Plane)
Describe the enhancement:
Currently, the
tlscommon.ReadPEMFile
function is able to read encrypted PKCS#8 private keys created using a non-FIPS-compliantopenssl
. Such keys look like this:However, if the private key is encrypted using a FIPS-compliant
openssl
, thetlscommon.ReadPEMFile
function is unable to parse it. Such keys look like this:Describe a specific use case for the enhancement or feature:
To allow FIPS-compliant
openssl
created PKCS#8 private keys to be used with Beats.