On 12/19/2012 11:58 PM, John Hinton wrote:
On 12/19/2012 6:40 PM, Reindl Harald wrote:
[root@buildserver:~]$ cat /buildserver/ssl-cert/openssl.conf.template
[ req ]
prompt = yes
default_bits = 1024
I have heard some reports that browsers such as Chrome and MSIE balk
at 1024 bit certs and that one should use 2048. I wonder if this is
now a good idea when generating mailserver certs as well? Try to be
more future proof? Or am I confused and thinking 512 and 1024? Either
way, this is a good decision to think about so your users won't have
to grab a new cert if you need to change it. The uninformed can get
spooked by these things. I personally believe signed certs for
mailservers should be free
Check out the NSA/NIST keysize recommendations:
http://www.nsa.gov/business/programs/elliptic_curve.shtml
1024 is for a 80 bit symmetric strength. This has be 'deprecated' for
112 bit minimum which requires an rsa:2048 or ecdsa:224. To get full
aes 128 strength you need rsa:3072 or ecdsa:256. This is the case for
ecdsa.