Uploaded image for project: 'Dogtag PKI'
  1. Dogtag PKI
  2. DOGTAG-4189

Implement ServerSide KeyGen Password Complexity Checks for pkcs12

    • Icon: Bug Bug
    • Resolution: Done
    • certsys-10.8
    • certsys-11.1
    • pki-core
    • None
    • Moderate
    • rhel-idm-cs
    • None
    • False
    • False
    • Hide

      None

      Show
      None
    • None
    • None
    • None
    • None
    • None
    • 0

      Description of problem:
      Currently, the Red Hat SSKG via the serverKeygenInputImpl and the pkcs12OutputImpl allow for any password to be used for the generated p12 files. Would like the ability to have a configurable option to force/enforce password complexity requirements for a user-provided password, or the ability to have a strong password generated and provided to the user upon submission to improve the security of the p12s with strong passwords.

      Version-Release number of selected component (if applicable):
      RHEL 8.x

      How reproducible:
      Very

      Steps to Reproduce:
      1. Configure SSKG - https://access.redhat.com/documentation/en-us/red_hat_certificate_system/9/html/planning_installation_and_deployment_guide/configuration_for_server-side_keygen
      2. Test with a password of 1234

      Actual results:
      Allows pkcs12 to be created with weakened password

      Expected results:
      Desire a check for password comlpexity

      Additional info:

              rh-ee-mfargett Marco Fargetta
              rhn-support-czinda Chris Zinda
              RH Bugzilla Integration RH Bugzilla Integration
              Votes:
              0 Vote for this issue
              Watchers:
              1 Start watching this issue

                Created:
                Updated:
                Resolved: