On Wed, Oct 30, 2013 at 06:13:51PM +0000, Paul Suhler wrote: > Note that SHA-1 is being deprecated by NIST for generating new > signatures. You may want to consider a SHA-2 algorithm (e.g., > SHA-224 or SHA-256). In principle it's still okay to *validate* > legacy signatures, e.g., SHA-1.
Actually, SHA-2 SHOULD NOT (yet) be used for signing certificates. Many TLSv1 clients don't support SHA-2 and servers must present SHA-1 certificates except when TLSv1.2 clients indicate SHA-2 support. Fielding multiple certificates with different signature algorithms is too complex. -- Viktor. ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager majord...@openssl.org