On 12/19/2012 11:58 PM, John Hinton wrote:
On 12/19/2012 6:40 PM, Reindl Harald wrote:
[root@buildserver:~]$ cat /buildserver/ssl-cert/openssl.conf.template
[ req ]
prompt                          = yes
default_bits                    = 1024

I have heard some reports that browsers such as Chrome and MSIE balk at 1024 bit certs and that one should use 2048. I wonder if this is now a good idea when generating mailserver certs as well? Try to be more future proof? Or am I confused and thinking 512 and 1024? Either way, this is a good decision to think about so your users won't have to grab a new cert if you need to change it. The uninformed can get spooked by these things. I personally believe signed certs for mailservers should be free

Check out the NSA/NIST keysize recommendations: http://www.nsa.gov/business/programs/elliptic_curve.shtml

1024 is for a 80 bit symmetric strength. This has be 'deprecated' for 112 bit minimum which requires an rsa:2048 or ecdsa:224. To get full aes 128 strength you need rsa:3072 or ecdsa:256. This is the case for ecdsa.


Reply via email to