OT: Microsoft Security Advisory: Update for minimum certificate key length

2012-09-08 Thread Jeffrey Walton
This is somewhat off topic, and I apologize for the noise. I imagine
it could interop problems on occasion.

http://support.microsoft.com/kb/2661254

...
The strength of public-key-based cryptographic algorithms is
determined by the time that it takes to derive the private key by
using brute-force methods. The algorithm is considered to be strong
enough when the time that it takes to derive private key is
prohibitive enough by using the computing power at disposal. The
threat landscape continues to evolve. Therefore, Microsoft is further
hardening the criteria for the RSA algorithm with key lengths that are
less than 1024 bits long.

After the update is applied, only certificate chains that are built by
using the CertGetCertificateChain function are affected. The CryptoAPI
builds a certificate trust chain and validates that chain by using
time validity, certificate revocation, and certificate policies (such
as intended purposes). The update implements an additional check to
make sure that no certificate in the chain has an RSA key length of
less than 1024 bits.
...
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


There is RSAPrivateKey_dup, why no counterpart for DSA/DH cert

2012-09-08 Thread Bruce (Riji) Cai
Hi,

My questions actually are two:

 1.  dup, which should stand for duplicate, in what case we should use such API.
 2.  RSA is only one kind of cert alg, so I expect counterpart for other alg 
certificate such as DH/DSA, but I can't find them in openssl 1.0.1c

Thanks