Hello,

first and foremost, many thanks for the time and effort you guys (and
girls!) put in to 'keep the internet running' - and thank you for
encrypting my credit card data mostly every day (and other data every
single day)!

I am wondering why my version OpenSSL 1.0.1.i-1 (Arch Linux) is by default
still generating SHA-1 CSRs. So I have done the following:

$ openssl req -new -sha256 -key privkey.pem -out sha256.csr
$ openssl req -new -key privkey.pem -out normal.csr

and if I have a look inside those CSRs with

$ openssl req -in $CSRFILE -noout -text

I get either

    Signature Algorithm: sha1WithRSAEncryption

from normal.csr and

    Signature Algorithm: sha256WithRSAEncryption

from sha256.csr.


Shouldn't it be the default to generate SHA-2 sigs? I understand SHA-2
support is not given on absolutely all devices out there, but I guess to
push things forward with SHA-1 deprecation it would help to generate
SHA-2 sigs by default and on the other hand, instructing openssl
specifically if you want SHA-1 signed certs.


Regards

Thomas

-- 
www.preissler.co.uk | Twitter: @module0x90 | PGP-Key: 75889415
GPG Fingerprint:  CCBD 153A D257 CA7E A217  FDF7 5928 03D1 7588 9415

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       openssl-dev@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to