UPDATE:

I now have reason to believe that they just removed MD5 from known signing 
algorithms, and that a SHA1 will work.  Anyone know anything about this?

Thanks,
bwc

> On May 25, 2015, at 3:06 PM, Brantley Coile <brantleyco...@me.com> wrote:
> 
> Turns out the CSR wasn’t acceptable because of the MD5 signature. It seems 
> the that they should be signed as RSA and not MD5.  MD5 is not deemed secure 
> enough.  The plan 9 code is signing everything with MD5. Who owns this code? 
> Has anyone fixed this yet?
> 
>> On May 24, 2015, at 11:10 AM, Skip Tavakkolian <9...@9netics.com> wrote:
>> 
>> going by my notes from the last time i used plan9 tools to generate a
>> CSR, the only differences i see are quoting the O attribute to handle
>> spaces in organization name and dropping the word "SIGNING" from
>> PEM header/footer.
>> 
>>> Thanks all.  It goes through sslshopper fine, but the CA still doesn’t like 
>>> it. I’ll call them tomorrow.  Thanks for all the help.
>>> 
>>> bwc
>>> 
>>>> On May 23, 2015, at 1:08 PM, lu...@proxima.alt.za wrote:
>>>> 
>>>>> I then pasted the contents of ‘csr’ into the page and get “This CSR
>>>>> has an invalid signature!”
>>>> 
>>>> It's worth playing with openssl to check the output from auth/rsa2csr.
>>>> The diagnostics are bound to be a bit less vague.  Trying your
>>>> instructions, the PEM encoded csr includes the seemingly unwanted word
>>>> "SIGNING" in the headers.  When I remove it (and a space) openssl req
>>>> reports a valid certificate request.
>>>> 
>>>> Lucio.
>>>> 
>>>> 
>> 
>> 
> 
> 


Reply via email to