Hi Carlos,

> "Cisco IOS SHA-2 Support for PKI" (that is SHA-256, SHA-384, SHA-512)
> was introduced mainly in IOS 12.4(15)T in almost all platforms.

It's right, Cisco can handle certificates with >= SHA-256, of course,
since 12.4(15)T.

BUT: we've tracked down that OCSP daemon answer which is signed, may not
be signed with a hash-size > SHA-1, even with IOS 12.4(15)T or IOS 15.
When the OCSP answer is signed with SHA-256 from the OCSP daemon,
the cisco router simply responds with:
   "E_DIGEST_ALG_NOT_SUPPORTED : message digest algorithms not supported"

But the main topic on the mailing list is: how can the OCSP-2 workaround
this by making it possible to send an OCSP answer with SHA-1 again, like
OCSP-1 did it by default. I've just workarounded it meanwhile by patching
the source code and removing the SHA256 case as a possible OCSP answer.

Greetings
    -Achim

------------------------------------------------------------------------------
EditLive Enterprise is the world's most technically advanced content
authoring tool. Experience the power of Track Changes, Inline Image
Editing and ensure content is compliant with Accessibility Checking.
http://p.sf.net/sfu/ephox-dev2dev
_______________________________________________
Openca-Users mailing list
Openca-Users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openca-users

Reply via email to