Hi Kyle,

What tool is it you're using for DKIM?




DKIM uses openssl library to produce a public and private key. The private
key should be saved on a MTA server. The public key will used in the DNS TXT
record for DKIM.  They use the following openssl command below to produce
the public and private key:

  - Enter the following command to generate your private key:

  openssl genrsa -out rsa.private 1024

  - Enter the following command to generate your public key:

  openssl rsa -in rsa.private -out rsa.public -pubout -outform PEM

  The public key entry in DNS TXT record looks like the following:


mail._domainkey.example.com. IN TXT "k=rsa; t=y;
p=MEwwPQRJKoZIhvcNADAQCQADOwAwOAIxANPpYHdE2tevfEpvL1Tk2dDYv0pF28/f5MxU83x/0b
sn4R4p7waPaz1IbOGs/6bm5QIDAQAB"

The string after *p=* is the base64 encoding of your public key.

If the *rsa.public* file which was generated contains

-----BEGIN PUBLIC KEY-----
MEwwPQRJKoZIhvcNADAQCQADOwAwOAIxANPpYHdE2tevfEpvL1Tk2dDYv0pF28/f
5MxU83x/0bsn4R4p7waPaz1IbOGs/6bm5QIDAQAB
-----END PUBLIC KEY-----

You can find more info about DKIM setup using openssl pub and priv keys at:
http://www.elandsys.com/resources/sendmail/dkim.html





that tool expects, I can find a way to make it possible.
(Technically, if you're using OpenCA, you're using OpenLDAP to store
all of the issued certificates -- and those certificates contain the
keys necessary.)

I am sorry that I didn't understand that you're running this on the
server, disseminating information for verifiers.  This explains a lot.
:)

-Kyle H

On 5/4/07, Janet N <[EMAIL PROTECTED]> wrote:
>
> Hello,
>
> >
> > Why do you need to get the public key at the time the certificate is
> > issued?  You already have it.
>
> We are using DKIM (domain key signing), it uses not the x509 public key,
but
> the public key of the private key.  The idea is to extract the rsa
public
> key at the time the CA issue the cert and load this rsa public key to a
db.
> This program is run against the CA.
>
> > The CA can extract the public key from the certificate request.
>
> I see, so I can't extract the public key
> -----BEGIN PUBLIC KEY-----
> MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCg8yo6rDhsNiwUfVR37HgF4bWq
> oG13Nd9XLT+Z0VLzCkWJZOdzGNQnnm7ujoQ8gbxeDvIo9RG5I3eZteBwD91Nf6P/
> E9lvJQDL2Qnz4EXH/CVW9DeEfvY1UJN9kc6q6KkYEPWssvVvlDOp2slbEKZCJtaP
> vVuGCAqfaps8J0FjOQIDAQAB
> -----END PUBLIC KEY-----
>
> from the already issued certificate?
>
> > The certificate contains the public key.
> > But you already have the public key, since you sent the certificate
> > request in the first place, and you have the private key that the
> > public key was generated with.
>
>
> The user won't be the one extracting the public key but the program
running
> against the CA server.
>
> >
> > But, you could try:
> >
> > $ openssl x509 -inform PEM -in file.pem -x509toreq -out file.csr
> > $ openssl req -in file.csr -pubkey -noout
> >
> > (the '-noout' can be replaced with '-outform pem -out publickey.pem '
> > if you need it to go to a file.)
>
> hmm, I'm running openca so I'm not sure where the certificate request
are
> located at.  Where are they located at  in openssl?
>
> thanks,
> Janet
>
> > -Kyle H
> >
> ______________________________________________________________________
> > OpenSSL Project
> http://www.openssl.org
> > User Support Mailing List                    openssl-users@openssl.org
> > Automated List Manager
> [EMAIL PROTECTED]
> >
>
>


--

-Kyle H
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to