How to secure client certificate info in python source code - python

We have a service that requires a client certificate to be presented with the request or the call will be rejected. For our .NET components, we have the certificate installed in the local Windows cert store. At runtime we can get the certificate by thumbprint and include that with our request.
For our python component, I am able to get the certificate from the store, but only the public data. I can't seem to access the private key. To get around this I have a pem file with the certificate data that python uses. We are cleaning all secrets out of our source repository, so I need to remove this file.
Does anyone have a suggesiton on how I can access the private key for the certificate without checking it in with my code? Things I am exploring are:
Get the private key with the certificate from the windows cert store
Continue to use the pem file, but encrypt it somehow
Something else?
Thanks,
~john

Related

In Python ssl.create_default_context won't retrieve new certificate from the Local Computer Cert Store

I am trying to retrieve certificate data using Python 3.11.0 on Windows using the ssl.create_default_context command.
While it does retrieve some certificates, it doesn't retrieve all of them. For example, I added a new Go-Daddy ssl certificate to the Certificate Snap-In of the MMC, specifically to the "Trusted Root Certificate Authority" section, since I saw the ssl.create_default_context command pulls existing certificates from there.
After adding said certificate and running the following lines of code:
certs = ssl.create_default_context().get_ca_certs(binary_form=True)
pem_certs = [ssl.DER_cert_to_PEM_cert(der) for der in certs]
I'm getting a list of certificates, but it doesn't include the new certificate I manually added.
I tried to read the command configuration but didn't find any flag that could help me retrieve any extra certificates with this command.
Any help would be greatly appreciated, thanks!

Requesting a website with python that has a ssh certificate enabled

I have an issue, i want to access an http server
with ssh certificate using python requests library
however without any usage of private keys and inside server data
(only publicly known, f.e. public RSA key and simmilar stuff)
How can I do that?

Can exe file Install pfx file in Windows Certificate Store With Python

I use Self Code sign Certificate and sign exe file using Windows SDK signtool.exe through PowerShell.
Exe file successfully signed. But for other systems This Sign Doesn't work. Because other system Doesn't have my
Code Sign Certificate in form of pfx file.
So what I do For that:
I have two options : Through the help of python script which includes an exe file. that performs a pfx file install in Windows certificate Store at time of exe file run as administrator and i get Publisher Name.
But how this thing is possible !!
Or Suggest Other ways to do this.
Simply I ask Self Sign Code Certificate run in all system.
Thank you.
Certificates are validated through trust certificate chain. The trust chain of the leading code signing providers are already present as a part of OS. Thus they don't require to distribute their certificates.
If at all, you want to use your own certificate (irrespective of which OS will trust it), you may create your own private CA (google for it) and then use your private CA certificate to sign your code signing certificate. You may distribute certificate of your private CA (certificate don't have private keys... contains only public keys...).
It's not good idea to distribute your pfx since it also contains private key and anybody can use the certificate which is again stealing your identity...
BTW, Certifying Authorities issuing code signing certificates, has some cost verifying your identity and that is the reason they are charging the amount (for some countries it becomes large amount though...!!)
I have found another way to do it. I created the setup of the executable file using Inno Setup Creator and after installation on the system it stopped displaying blue screen that this is an unrecognized program.

Python - SSL Client/Server Certificate

I want to create a Client/Server architecture following the python documentation.
This works well with my self-signed certificates in one pem file. (ca_root root_key ca_intermediate intermediate_key)
So my next plan is to create client certificates which can be revoked by the server if the client isn't trustworthy anymore.
So the way to go is that i create a certificate, signed with the intermediate key, and hand it out to the client.
But i still get
ssl.SSLError: [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:590)
Do i need to export the whole certificate chain to the client? This seems odd to me.
Thanks!
Most likely you're entire chain isn't in your .pem file. Just copy the text from the certificates in the right order into a single .pem file and attempt that. If that doesn't work you may be getting this error because of your server configuration. More information is need thought to provide a better answer.

Verify SSL/X.509 certificate is signed by another certificate

Question
How can I verify that an X.509 certificate is signed by another certificate using PyOpenSSL or Twisted? I want a client to verify that the received server certificate is the one that signed its client certificate.
I've looked through the PyOpenSSL documentation and can't seem to find anything on how to verify a certificate separately from the establishing the SSL connection.
I found a reference to OpenSSL.crypto:X509.verify() in twisted.internet._sslverify:PublicKey.verifyCertificate() , but the twisted method is commented out (in Twisted 13.0) and the X509 method does not exist (in PyOpenSSL 0.13).
pyOpenSSL has no support for verifying a certificate describes a bug for not being able to manually verify a certificate chain, but I'm not entirely sure if that's what I'm trying to do.
Use Case
Certificates:
Generated self-signed CA certificate with openssl.
Generated server certificate signed by CA certificate.
Generated client certificate signed by server certificate.
Setup:
The server is using Twisted's CertificateOptions with its server cert. The CA certs are the CA and server certs to setup a chain where the server cert verifies the received client cert, and the CA cert verifies the server cert (all built-in functionality).
The client is also using CertificateOptions for the client cert. The CA certs only contains the CA cert.
This all works fine (both sides verify each other) but I want to perform an additional step:
In the client set_verify() callback, verify that the client cert is signed by the server cert.
You should be able to do it with something like written here:
http://www.yothenberg.com/validate-x509-certificate-in-python/
which is basically:
load your certificates in PyOpenSSL with load_certificate()
create a X509Store() object
use add_cert() to add your intermediate certificate in the store
create a X509StoreContext() object, initializing it with both your store object and your end certificate
call verify_certificate() on your store context object
In practice, I was unable to make that part, and I think it is for the reasons explained here: https://mail.python.org/pipermail/cryptography-dev/2016-August/000676.html
In short, even in 2016, there still does not seem to be a correct wait to check certificates in PyOpenSSL, which is very sad. Note that the consensus seem to be that if you operate inside a TLS connection, the things are better checked by the connection routine instead of offline through check_certificate()

Categories