On Wed, Oct 30, 2013 at 06:13:51PM +0000, Paul Suhler wrote:

> Note that SHA-1 is being deprecated by NIST for generating new
> signatures.  You may want to consider a SHA-2 algorithm (e.g.,
> SHA-224 or SHA-256).  In principle it's still okay to *validate*
> legacy signatures, e.g., SHA-1.

Actually, SHA-2 SHOULD NOT (yet) be used for signing certificates.

Many TLSv1 clients don't support SHA-2 and servers must present
SHA-1 certificates except when TLSv1.2 clients indicate SHA-2
support.  Fielding multiple certificates with different signature
algorithms is too complex.

-- 
        Viktor.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to