Last year's certificates again "too weak".... ARGHH!!!
Posted: Tue May 02, 2023 4:55 pm
Last year I setup a new server with the at that time actual easyrsa software to generate new certificates that would satisfy the security requirements.
It has generated CA, SERVER and CLIENT certificates with RSA 2048-bit modulus and SHA256 as hash.
And now, that is again considered "too weak"!!!
I think this is going way too far. It is not upon software authors to decide security policies for the users of their software.
Everyone has different requirements, and when you are not some secret service then these parameters are secure enough, IMHO.
As it is really difficult to smoothly migrate to a new CA cert, I would need to AGAIN (for the second time in a year) need to setup a new server and re-issue and re-distribute all certificates (well over 100).
I hope that the maintainers can convert that fatal "OpenSSL: error:0A00018E:SSL routines::ca md too weak" error into a warning (by enabling tls-cert-profile insecure when that error is encountered) to give us more time to migrate.
It has generated CA, SERVER and CLIENT certificates with RSA 2048-bit modulus and SHA256 as hash.
And now, that is again considered "too weak"!!!
I think this is going way too far. It is not upon software authors to decide security policies for the users of their software.
Everyone has different requirements, and when you are not some secret service then these parameters are secure enough, IMHO.
As it is really difficult to smoothly migrate to a new CA cert, I would need to AGAIN (for the second time in a year) need to setup a new server and re-issue and re-distribute all certificates (well over 100).
I hope that the maintainers can convert that fatal "OpenSSL: error:0A00018E:SSL routines::ca md too weak" error into a warning (by enabling tls-cert-profile insecure when that error is encountered) to give us more time to migrate.