2016-07-30 15:20:44 +00:00
# rsa-compat.js
2018-07-10 19:55:08 +00:00
!["Lifetime Downloads" ](https://img.shields.io/npm/dt/rsa-compat.svg "Lifetime Download Count can't be shown" )
!["Monthly Downloads" ](https://img.shields.io/npm/dm/rsa-compat.svg "Monthly Download Count can't be shown" )
!["Weekly Downloads" ](https://img.shields.io/npm/dw/rsa-compat.svg "Weekly Download Count can't be shown" )
2016-07-30 19:59:48 +00:00
2018-06-29 09:36:36 +00:00
| Sponsored by [ppl ](https://ppl.family ).
2018-03-21 03:33:26 +00:00
JavaScript RSA utils that work on Windows, Mac, and Linux with or without C compiler
2016-07-30 19:59:48 +00:00
In order to provide a module that "just works" everywhere, we mix and match methods
from `node.js` core, `ursa` , `forge` , and others.
2016-08-01 09:44:46 +00:00
This is useful for **certbot** and **letsencrypt** .
2016-07-30 19:59:48 +00:00
(in the future we'd like to provide the same API to the browser)
2016-08-17 06:22:07 +00:00
Install
=======
2018-06-29 08:39:10 +00:00
node.js
```bash
2016-08-17 06:22:07 +00:00
npm install --save rsa-compat
2018-06-29 08:39:10 +00:00
```
2018-07-13 10:33:17 +00:00
For **more efficient** RSA key generation:
< small > (I dropped `ursa` as an "optional dependency" because the non-fatal error messages on unsupported platforms and node versions were confusing people, but I still recommend installing it)</ small >
```bash
npm install --save ursa
```
2018-06-29 08:39:10 +00:00
**Node < v6** support:
```bash
npm install --save buffer-v6-polyfill
```
### CLI
```bash
2016-08-17 06:22:07 +00:00
npm install --global rsa-compat
```
Usage
=====
CLI
---
You can generate keypairs on Windows, Mac, and Linux using rsa-keygen-js:
```bash
# generates a new keypair in the current directory
rsa-keypiar-js
```
2016-07-30 19:59:48 +00:00
Examples
--------
Generate an RSA Keypair:
```javascript
2016-07-31 05:23:10 +00:00
var RSA = require('rsa-compat').RSA;
2016-07-30 19:59:48 +00:00
2018-07-13 10:09:57 +00:00
var options = { bitlen: 2048, exp: 65537, public: true, pem: true, internal: true };
2016-07-30 19:59:48 +00:00
2018-07-13 10:09:57 +00:00
RSA.generateKeypair(options, function (err, keypair) {
2016-07-30 19:59:48 +00:00
console.log(keypair);
});
```
2016-07-31 05:23:10 +00:00
Here's what the object might look like:
2016-07-30 19:59:48 +00:00
`console.log(keypair)` :
```javascript
2016-07-31 03:47:52 +00:00
{ publicKeyPem: '-----BEGIN RSA PUBLIC KEY-----\n/*base64 pem-encoded string*/'
, privateKeyPem: '-----BEGIN RSA PRIVATE KEY-----\n/*base64 pem-encoded string*/'
2016-07-30 19:59:48 +00:00
, privateKeyJwk: {
kty: "RSA"
, n: '/*base64 modulus n = pq*/'
2016-07-30 20:04:57 +00:00
, e: '/*base64 exponent (usually 65537)*/'
2016-07-30 19:59:48 +00:00
, d: '/*base64 private exponent (d = e^− 1 (mod ϕ(n))/'
, p: '/*base64 first prime*/'
2016-07-31 05:23:10 +00:00
, q: '/*base64 second prime*/'
, dp: '/*base64 first exponent for Chinese remainder theorem (dP = d (mod p− 1))*/'
, dq: '/*base64 Second exponent, used for CRT (dQ = d (mod q− 1))/'
, qi: '/*base64 Coefficient, used for CRT (qinv = q^− 1 (mod p))*/'
2016-07-30 19:59:48 +00:00
}
, publicKeyJwk: {
kty: "RSA"
2016-07-31 05:23:10 +00:00
, n: '/*base64 modulus n = pq*/'
, e: '/*base64 exponent (usually 65537)*/'
2016-07-30 19:59:48 +00:00
}
2016-07-31 03:47:52 +00:00
2016-07-31 05:23:10 +00:00
, _ursa: '/*undefined or intermediate ursa object*/'
, _ursaPublic: '/*undefined or intermediate ursa object*/'
, _forge: '/*undefined or intermediate forge object*/'
, _forgePublic: '/*undefined or intermediate forge object*/'
2016-07-30 19:59:48 +00:00
}
```
2016-07-31 05:23:10 +00:00
NOTE: this object is JSON safe as _ursa and _forge will be ignored
See http://crypto.stackexchange.com/questions/6593/what-data-is-saved-in-rsa-private-key to learn a little more about the meaning of the specific fields in the JWK.
2016-07-30 19:59:48 +00:00
2018-07-13 10:09:57 +00:00
Security and Compatibility
------
**TL;DR**: Use the default values 2048 and 65537 unless you have a really, really good reason to do otherwise.
Various platforms *require* these values.
Most security experts agree that 4096-bit is no more "secure" than 2048-bit -
a fundamental vulnerability in the RSA algorithm which causes 2048 to be broken
will most likely also cause 4096 to be broken
(i.e. if someone can prove mathematically prove P=NP or a way to predict prime numbers).
Also, many platforms
only support 2048 bit keys due to the insecurity of 1024-bit keys (which are not 1/2 secure
but rather 1/(2^1028) less secure) and the excess computational
cost of 4096-bit keys (it's not a 2x increase, it's more like a 2^2048 increase).
As to why 65537 is even optional as a prime exponent or why it matters... no idea,
but it does matter.
2016-07-30 19:59:48 +00:00
API
---
2018-07-13 10:09:57 +00:00
* `RSA.generateKeypair(options, cb)`
* (deprecated `RSA.generateKeypair(bitlen, exp, options, cb)` )
* `RSA.import(options)`
* (deprecated `RSA.import(keypair, options)` )
2016-07-31 03:47:52 +00:00
* `RSA.exportPrivatePem(keypair)`
* `RSA.exportPublicPem(keypair)`
* `RSA.exportPrivateJwk(keypair)`
* `RSA.exportPublicJwk(keypair)`
2018-03-21 03:33:26 +00:00
* `RSA.signJws(keypair, header, protect, payload)`
* (deprecated `RSA.signJws(keypair, payload, nonce)` )
2016-08-01 09:44:46 +00:00
* `RSA.generateCsrPem(keypair, names)`
* `RSA.generateCsrDerWeb64(keypair, names)`
2016-07-31 03:47:52 +00:00
`keypair` can be any object with any of these keys `publicKeyPem, privateKeyPem, publicKeyJwk, privateKeyJwk`
2016-07-30 19:59:48 +00:00
2018-07-13 10:09:57 +00:00
### RSA.generateKeypair(options, cb)
2016-07-30 19:59:48 +00:00
Create a private keypair and export it as PEM, JWK, and/or internal formats
```javascript
2018-07-13 10:09:57 +00:00
RSA.generateKeypair(null, function (keypair) { /*...*/ });
2016-07-30 19:59:48 +00:00
2018-07-13 10:09:57 +00:00
RSA.generateKeypair({
bitlen: 2048, exp: 65537, pem: false, public: false, internal: false
}, function (keypair) { /*...*/ });
2016-07-30 19:59:48 +00:00
```
`options` :
```javascript
{ public: false // export public keys
, pem: false // export pems
, jwk: true // export jwks
, internal: false // preserve internal intermediate formats (_ursa, _forge)
, thumbprint: false // JWK sha256 thumbprint
, fingerprint: false // NOT IMPLEMENTED (RSA key fingerprint)
}
```
2016-08-01 08:44:55 +00:00
2018-07-13 10:09:57 +00:00
### RSA.import(options)
2016-08-02 20:42:44 +00:00
Imports keypair as JWKs and internal values `_ursa` and `_forge` .
```javascript
2018-07-13 10:09:57 +00:00
var keypair = RSA.import({ type: 'RSA', privateKeyPem: '...' });
2016-08-02 20:42:44 +00:00
console.log(keypair);
```
```javascript
{ privateKeyPem: ..., privateKeyJwk: ..., _ursa: ..., _forge: ... }
```
2016-08-01 08:44:55 +00:00
### RSA.export*(keypair)
You put in an object like `{ privateKeyPem: '...' }` or `{ publicKeyJwk: {} }`
and you get back the keys in the format you requested.
Note:
* Private keys **can** be used to export both private and public keys
* Public keys can **NOT** be used to generate private keys
Example:
```javascript
var keypair = { privateKeyPem: '...' };
keypair.publicKeyJwk = RSA.exportPublicJwk(keypair);
console.log(keypair);
```
### RSA.signJws(keypair, payload, nonce)
2016-08-01 09:44:46 +00:00
Generates a signature in JWS format (necessary for **certbot** /**letsencrypt**).
2016-08-01 08:44:55 +00:00
```javascript
var message = "Hello, World!"
var nonce = crypto.randomBytes(16).toString('hex');
var jws = RSA.signJws(keypair, message, nonce);
console.log(jws);
```
The result looks like this:
```javascript
{ "header": {
"alg": "RS256",
"jwk": {
"kty": "RSA",
"n": "AMJubTfOtAarnJytLE8fhNsEI8wnpjRvBXGK/Kp0675J10ORzxyMLqzIZF3tcrUkKBrtdc79u4X0GocDUgukpfkY+2UPUS/GxehUYbYrJYWOLkoJWzxn7wfoo9X1JgvBMY6wHQnTKvnzZdkom2FMhGxkLaEUGDSfsNznTTZNBBg9",
"e": "AQAB"
}
},
"protected": "eyJub25jZSI6IjhlZjU2MjRmNWVjOWQzZWYifQ",
"payload": "JLzF1NBNCV3kfbJ5sFaFyX94fJuL2H-IzaoBN-ciiHk",
"signature": "Wb2al5SDyh5gjmkV79MK9m3sfNBBPjntSKor-34BBoGwr6n8qEnBmqB1Y4zbo-5rmvsoPmJsnRlP_hRiUY86zSAQyfbisTGrGBl0IQ7ditpkfYVm0rBWJ8WnYNqYNp8K3qcD7NW72tsy-XoWEjNlz4lWJeRdEG2Nt4CJgnREH4Y"
}
```
2016-08-01 09:44:46 +00:00
### RSA.generateCsr*(keypair, names)
You can generate the CSR in human-readable or binary / base64 formats:
`RSA.generateCsrPem(keypair, names)` :
```javascript
var pem = RSA.generateCsrPem(keypair, [ 'example.com', 'www.example.com' ]);
console.log(pem);
```
web-safe base64 for **certbot** /**letsencrypt**:
`RSA.generateCsrDerWeb64(keypair, names)` :
```javascript
var web64 = RSA.generateCsrDerWeb64(keypair, [ 'example.com', 'www.example.com' ]);
console.log(web64);
```
2018-06-29 08:39:10 +00:00
ChangeLog:
* v1.4.0
* remove ursa as dependency (just causes confusion), but note in docs
* drop node < v6 support