Philip Martin <phi...@codematters.co.uk> writes: > A client using openssl 1.0 will connect to a server serving the > RSASSA-PSS cert. Clients using openssl 1.1 fail to verify cert. The > underlying openssl 1.1 error appears to be > > $ openssl s_client -connect localhost:8887 -CAfile apache2/ssl/ca-cert.pem > ... > Verify return code: 68 (CA signature digest algorithm too weak) > > This suggests that RSASSA-PSS is obsolete, but as I mentioned earlier in > the thread there are recent changes to the openssl project > adding/extending RSASSA-PSS support as part of TLS 1.3:
I built openssl trunk (1.1.1-dev) and it is able to verify the cert: $ LD_LIBRARY_PATH=/usr/local/openssl/lib /usr/local/openssl/bin/openssl s_client -connect localhost:8887 -CAfile=apache2/ssl/ca-cert.pem ... Verify return code: 0 (ok) This is exactly the same server and cert that cause openssl 1.1 to fail. -- Philip