This is connected to the Trustworthy Multipurpose Remote IDs ([email protected])

Right now I am working on what a eddsa pki would be that would back up the proposed HHITs and various repositories.  For this I want to generate some testing HHITs.

These HHITs will be used in x.509 certs as in rfc 8002, but also as subjectName in the signing cert.  This causes some challenges as to how to present an IPv6 value in subjectName (this is a separate question from this missive).

I will use openssl from my draft-moskowitz-eddsa-pki and HHIT format from draft-moskowitz-hierarchical-hip (sec 4).

Note about current HHIT draft and sec 4.  When I did this, I was using ecdsa.  The revised version of this draft (soon to be published) uses eddsa and I am a bit unsure as to what hash I will recommend.  But for this stage, use ed25519/sha256.


I make the ed25519 keypair with:

   openssl genpkey -aes256 -algorithm ed25519 -outform pem -out entity.key.pem

Note the keypair is encrypted; it contains the private key.  This can be viewed with:

   openssl pkey -inform pem -in entity.key.pem -text -noout

The public key can be extracted in DER format with:

   openssl pkey -in entity.key.pem -out entity.pub.der -outform DER -pubout

For the HHIT:

HIT SUITE ID = 4
RAA = 10
HDA = 20

It would be great to have this as a python or perl script.  That way I may learn something along the way.

Inputs are:

key file name
key password
HIT Suite ID
RRA
HDA

Output should be:

the HHIT in 128bit binary to some file
the HHIT in ipv6 : display format

Thanks on any help.

Bob


_______________________________________________
Hipsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/hipsec

Reply via email to