Package: tinyca Version: 0.7.5-3 Severity: normal When asked to sign an X.509 certificate request made via md5WithRSAEncryption, tinyca insists on creating the resulting certificate using the same signature algorithm.
This is a mistake. tinyca should issue new certificates using a strong digest algorithm, regardless of the digest used in the certificate request. --dkg -- System Information: Debian Release: wheezy/sid APT prefers testing APT policy: (500, 'testing'), (200, 'unstable'), (1, 'experimental') Architecture: i386 (i686) Kernel: Linux 3.2.0-3-686-pae (SMP w/1 CPU core) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages tinyca depends on: ii libgtk2-perl 2:1.244-1 ii liblocale-gettext-perl 1.05-7+b1 ii openssl 1.0.1c-4 Versions of packages tinyca recommends: ii zip 3.0-6 tinyca suggests no packages. -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org