>>> import OpenSSL.crypto
>>>OpenSSL.crypto.load_pkcs12(open('/home/user/xmpp_lab_set_pwd.p12').read())   
>>>      
>>>  
>>>
Traceback (most recent call 
last):                                                                          
 
 
  File "<stdin>", line 1, in 
<module>                                                                        
 

OpenSSL.crypto.Error: [('PKCS12 routines', 'PKCS12_parse', 'mac verify 
failure')]                             

>>> OpenSSL.crypto.load_pkcs12(open('/home/user/xmpp_lab_set_pwd.p12').read(), 
>>>'REAL_PWD')                       
>>>
<PKCS12 object at 0x7f33978ffb90> 

Well it's really because the PKCS12 container is encrypted. If I remove the 
password from the same p12 file, I can authenticate successfully.

I don't know at all if it's a huge task but it would complete the effectiveness 
of the whole security approach.

Much emphasis has been laid out with MITM attacks in diverse fields of 
electronic cummunication. It's a real threat, but it's more likely that userA 
steals userB unencrypted credentials in a desktop session that is supposed to 
be 
used by many users and do whatever evil afterwards, pretending to be userB. 
userA will most probably lack required skills to sniff the network, intercept 
userB's communications, decrypt, alter and re-encrypt the content which he then 
forwards to userC.

(I am well aware that super hackers, national security agencies can do 
unthinkable piracy acts for whatever reason, but that's not the point here).

Have a nice day !





----- Message d'origine ----
De : Yann Leboulanger <aste...@lagaule.org>
À : Saleem Edah-Tally <nm...@yahoo.com>
Cc : gajim-devel@gajim.org
Envoyé le : Lun 25 juillet 2011, 17h 06min 35s
Objet : Re: Re : [Gajim-devel] PKCS12 with password
_______________________________________________
Gajim-devel mailing list
Gajim-devel@gajim.org
http://lists.gajim.org/cgi-bin/listinfo/gajim-devel

Reply via email to