Looked it up on my Nitrokey. However I have no test key right now that I can factory-reset.
The following commands will reconfigure your token so it may loose keys that are already stored on the token.
You can use 4096 Bit keys on the token but AFAIK you need to run
gpg --card-edit
admin
key-attr
(1) RSA
4096
- Enter Admin PIN of your Nitrokey.
That should setup the key so that it expects 4096bit keys.
However, the openssl
command should have printed out some details about your certificate.
And it shows again an error that a invalid password has been used.
The password here is not a PIN of your Nitrokey but some Transport Key from your Certification Authority. So this should be fixed first before downloading the certificate.
From the CAcert wiki:
- Start the command prompt or open the “Run…” dialog of explorer
- Type “mmc” to start the Management console
- Click File->Add/Remove Snap-In
- Click “Add” and select “Certificates” and once more “Add”
- Select “My user account” and “Finish”
- Close all those open Dialogs with “Close” or “OK”
- Open Console Root->Certificates - Current User → Personal → Certificates
- There all your certificates should be listed.
- Select one by right clicking it and choose “All Tasks->Export…”
- If asked tell the computer that you want to include the private key
- When asked about the export format:
- check to include all certificates in the certificate path
- DO NOT check “Improved security…”
- If you like you may delete the key after export
- Then you have to enter a password (twice, as usual) to protect the private key file and choose a filename. The result is a PKCS12 file, fit for import in every program that supports a minimum standard.
This describes the manual export from your Windows certificate store. You enter your own password here to protect the certificate
I am not sure whether CAcert still creates 2048bit certificates and whether you are still allowed to choose 2048bit certs. This would also make it easier to download the certificate to your Nitrokey.