On Thu, May 19, 2011 at 5:44 AM, Tim Watts <t...@dionic.net> wrote:
> Hi folks,
>
> I'm setting up a new CA/SSL infrastructure for work - the CA is self signed
> and all SSL certs (mostly server certs rather than client certs) will be
> signed off against this CA.
>
> I've just made the effort to try to actually understand SSL a bit better
> rather than monkey churning brokens certs out - so I'd really value a quick
> eyeball of my config and some text dumps of sample certs if anyone has a mo.
>
> Revocation crl would be published in this example at:
>
> http://www.example.com/ssl/CA-example.com.crl
>
> I do apologise - it's a long post. I'm just not totally sure if I have the
> correct attributes and extensions - and whether it meets the requirements of
> a v3 SSL cert (I think it does). Is 4096 bit key and sha1 a good choice?
>
> And is the revocation bit done correctly (assuming I actually maintain a CRL
> from openssl ca -gencrl at the url above?
>
>
> [SNIP]

> I'm setting up a new CA/SSL infrastructure for work
> ...
> and whether it meets the requirements of a v3 SSL cert
> (I think it does). Is 4096 bit key and sha1 a good choice?
SHA-1 is not a good choice here. You are exceeding 128 bits of
security with the 4096 key, but only offering ~50 bits of security for
authentication (SHA has an ideal level of 80 bits, but it has been
reduced). You would probably want to use SHA-256. As an attacker,
would you try to factor the modulus (which should take over 2^128
work, or swap in a key and sign it as the CA (at a cost of 2^50)?

Jeff
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to