On 7/13/21 11:25 AM, Peter Krempa wrote:
> On Tue, Jul 13, 2021 at 08:57:30 +0200, Michal Privoznik wrote:
>> In not so distant past (v6.5.0~3) I've updated the private key we
>> use for virnettls* tests. Back then I was driven by Fedora 33
>> change which deprecated RSA-1024 which we used back the
On Tue, Jul 13, 2021 at 08:57:30 +0200, Michal Privoznik wrote:
> In not so distant past (v6.5.0~3) I've updated the private key we
> use for virnettls* tests. Back then I was driven by Fedora 33
> change which deprecated RSA-1024 which we used back then. I
> generated an EC-384 key which was fine
In not so distant past (v6.5.0~3) I've updated the private key we
use for virnettls* tests. Back then I was driven by Fedora 33
change which deprecated RSA-1024 which we used back then. I
generated an EC-384 key which was fine as it was considered
strong enough until RHEL-9 came along. RHEL-9 no lo
On 7/1/20 1:13 PM, Daniel P. Berrangé wrote:
On Wed, Jul 01, 2020 at 11:45:15AM +0200, Michal Privoznik wrote:
With the recent update of Fedora rawhide I've noticed
virnettlssessiontest and virnettlscontexttest failing with:
Our own certificate servercertreq-ctx.pem failed validation
agai
On Wed, Jul 01, 2020 at 11:45:15AM +0200, Michal Privoznik wrote:
> With the recent update of Fedora rawhide I've noticed
> virnettlssessiontest and virnettlscontexttest failing with:
>
> Our own certificate servercertreq-ctx.pem failed validation
> against cacertreq-ctx.pem: The certificate u
With the recent update of Fedora rawhide I've noticed
virnettlssessiontest and virnettlscontexttest failing with:
Our own certificate servercertreq-ctx.pem failed validation
against cacertreq-ctx.pem: The certificate uses an insecure
algorithm
This is result of Fedora changes to support str