On 23/03/2012 13:25, Stephen Henson via RT wrote:
>> [[email protected] - Fri Mar 23 11:59:30 2012]:
>>
>> Hi,
>> after updating to openssl 1.0.1 (debian package), authentication
>> against a test server
>> with a 512 bit rsa key gives :
>>
>> openssl s_client -connect 127.0.0.1:12346 -key /home/dev/agent1-
>> key.pem -cert /home/dev/agent1-cert.pem
>> ...
>>     139860308645544:error:04075070:rsa routines:RSA_sign:digest too
>> big for rsa key:rsa_sign.c:127:
>>     139860308645544:error:14099006:SSL
>> routines:SSL3_SEND_CLIENT_VERIFY:EVP lib:s3_clnt.c:2974:
>> ...
>>
>> Downgrading to openssl 1.0.0h fixes the issue.
>> Please find attached the key/certificate.
>> (they have been made for testing purpose).
>>
>> I guess this is unexpected behavior, and i did not find any recent
>> similar report.
>>
> 
> The reason for this is that OpenSSL 1.0.1 support TLS v1.2 and the
> digest algorithm it uses by default is SHA512. A 512 bit RSA key is not
> large enough for SHA512 so you get that error.
> 
> If you disable TLS v1.2 with -no_tls1_2 or use a larger key this wont
> happen.
> 
> Use of 512 bit RSA keys is discouraged anyway for security reasons.

Thank you for your quick reply.

Could it be explicitely explained in 1.0.1 changelog ?
i think there is already the fact that TLS v1.2 is supported,
but not what it implies (digest is sha512).

Jérémy.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [email protected]
Automated List Manager                           [email protected]

Reply via email to