Re: Updating SSL keys on fedoraproject.org 2011-03-10

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 2011-03-11, Chris Adams <cmadams@xxxxxxxxxx> wrote:
> Once upon a time, Ralf Ertzinger <fedora@xxxxxxxxxxxxxx> said:
>> this document is about a quite special case (regarding lawfully binding
>> digital signatures) and not about SSL in general.
>
> I took a short look at software support for other SSL hashes:
>
> - OpenSSL: openssl only offers md5, sha1, md2, mdc2, md4 for generating
>   a signing request or signing a cert
>
Not true:

$ openssl req -newkey rsa:2048 -sha256 -new -utf8 -out test.req
[...]
$ openssl req -noout -text <test.req 
Certificate Request:
[...]
    Signature Algorithm: sha256WithRSAEncryption

The openssl FOO usage output is out-dated. You need to reuse options
from other subcommands (e.g. openssl dgst -h).

> - NSS: certutil doesn't seem to offer the option to set the digest (I
>   didn't see one in -H output and there's no man/info page)
>
NSS is under-documented. E.g. I could not figure out how to select
a hardware cryptoengine.

> - GnuTLS: certtool supports up to SHA512 for signing, although it only
>   used SHA-1 for a signing request (it appeared to ignore the --hash
>   option when generating a request)
>
Yes, there is a bug with selecting hash algorithm.

-- Petr

-- 
devel mailing list
devel@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/devel


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]
  Powered by Linux