-
Notifications
You must be signed in to change notification settings - Fork 37
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
salt length check failed #114
Comments
This happens in It would be good if you could show a bit more context around that error, like what exactly did you call, and with what parameters? |
Based on OpenVPN logs posted by OP to OpenVPN/openvpn#505 this appears to be caused by TPM at the client side using max salt length for RSAPSS (222 in this particular case) while OpenSSL at server side expects the salt length to match that of digest (32 here) for TLS 1.3. See also #75 which looks related. |
@levitte , thanks for the follow up.
I followed the commands below:
I followed OpenVPN/openvpn#505 (comment) and got following error from server side:
|
The TPM2.0 specification (Part 1, Section B.7) says: For both restricted and unrestricted signing keys, the random salt length will be the largest size allowed by the key size and message digest size. I am not sure the TPM2.0 can do shorter salt lengths. |
TPM2 specs on RSAPSS salt length have changed over time. Latest version says (quoting from Rev. 01.83, 25 Jan 2024, part 1, section B7, p. 264)
Indeed on my Lenovo laptop (STM chip, spec revision 1.38), it signs with salt length = digest length. So it seems to depend on what is implemented in the firmware. Unfortunately not user selectable, it seems. |
Hi,
According to OpenVPN/openvpn#505, I can't use OpenVPN with tpm2-openssl and I get the following error:
@gotthardp , @levitte and and others, can you help me?
The text was updated successfully, but these errors were encountered: