Charlie Lenahan wrote:
While I guess it is technically possible to sign a key which is bigger than the CA's key it is quite useless. Why should an attacker try to break your strong key if it is easier to break the CA's key and create a bogus certificate for his own key?George Adams wrote: [...]2) Related to that, should I be worried that I'm generating a public/private keypair for my Apache2/mod_ssl server that's only 1024-bits? Do I even have the OPTION of having a larger/stronger key, or am I going to hit some weird compatibility problems with modern-day browsers?I think all CA's will only sign a request with a key size smaller than it's own key size. Most CA's should be at least 2048 if not higher.
I have never heard of modern-day browsers having problems with key sizes of 2048. For example CACert (http://www.cacert.org/) uses an RSA key of 4096 bits for its CA key and 2048 bits for the server cert.
Hope it helps, Ted ;) -- PGP Public Key Information Download complete Key from http://www.convey.de/ted/tedkey_convey.asc Key fingerprint = 31B0 E029 BCF9 6605 DAC1 B2E1 0CC8 70F4 7AFB 8D26
smime.p7s
Description: S/MIME Cryptographic Signature