Hi, can you confirm what type of key this is (RSA or EC)? Can it be parsed OK using any PEM decoder tool? How was it generated?
Our code simply tries to parse the key file as PEM format, the main limitation is that the key file can’t be password protected. This uses the BouncyCastle OpenSssl implementation.
If you can generate keys on demand, could you supply an example key that doesn’t work? i.e. one that’s not actually private.
Key is generated by mail server, thats all i know.
Thanks for the tip about PEM decoder tool,
i’ll try to generate new private key, that matches this tool.
Thanks, so if I run this through openssl it seems to be valid but that the original is not-quite correct base64 encoding (or rather, BouncyCastle can’t/doesn’t want to parse it):
openssl rsa -in C:\temp\key.pem -check
Which then gives me an output which works with Certify:
This is Zimbra Collaboration server.
Thanks for help,
private key for mail server i’v regenerate whith mathched parameters and replace it in console of mail server.
I am going to necro this post because i ran into the same issue. None of the private keys i generate with openssl work. I would expect that a standard tool like openssl can be used for this.
Thanks, licensed users should contact support at certifytheweb.com when they have specified requirements to discuss.
As you can see from the age of this post custom private keys are not frequently used with the app (currently) but we should definitely should extend that support.
I don’t know what your app does, but when i manually request a certificate with certbot with my key and password, i get back a working pfx. So your app must somehow change the pfx returned by let’s encrypt.
Hope that helps. If you need any more information feel free to ask.
The default PFX algorithms retain compatibility with older versions of Windows. These conflict with the defaults for openssl 3.0+. You can opt into modern PFX algorithms using Settings > General Settings > Enable Modern PFX Algs
The default PFX has a blank password, you can set this under Certificate > Advanced > Signing & Security, scroll down to password.
In both cases you then need to request your certificate again to rebuild the pfx.
Regarding the openssl error, this is a feature of openssl 3.0+ where they changed the default algorithms understood by pkcs12 and it differs from the default expected on Windows (where the app is typically used).
E.g. to work with an example pfx using default settings: openssl pkcs12 -in example.pfx -legacy -passout pass: -passin pass:
Note that if your version of Windows Server is an in-place upgrade from an older version you may find PFX using Modern Algs do not function on that server. That’s why we don’t use it as the default.
Let’s Encrypt themselves return a PEM encoded cert (not a PFX), which we convert into a PFX as that’s what’s commonly used on Windows.
I’m intrigued as to why you need to specify a custom private key at all? Is there some sort of legacy hardware that doesn’t let you provide your own private key?