Note that SHA-1 is being deprecated by NIST for generating new signatures.  You 
may want to consider a SHA-2 algorithm (e.g., SHA-224 or SHA-256).  In 
principle it's still okay to *validate* legacy signatures, e.g., SHA-1.

-----Original Message-----
From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of Walter H.
Sent: Wednesday, October 30, 2013 11:05
To: openssl-users@openssl.org
Subject: Re: Signature Algorithm that was disabled because that algorithm is 
not secure

Hello,

On 30.10.2013 18:17, Marcus Schmitt wrote:
> I have one problem after I created a root-CA, intermediate-CA and a server 
> certificate. After I configured my apache with the server cert, key and 
> intermediate cert and importing the root-CA to firefox 24 I received the 
> following error when I browse to the website:
>
> Could not verify this certificate because it was signed using a 
> signature algoritm that was disabled because that algorithm is not 
> secure
>
>
> I assume the reason for this error message is that I see "Certificate 
> Signatore Algorithm" is "PKCS #1 MD5 With RSA Encryption" for the 
> Intermediate Certificate and Server Certificate. For the root-CA I see "PKCS 
> #1 SHA With RSA Encryption".
>
> Unfortunately I was not able to find the reason for this issue, please find 
> the lines I use below:
>
The problem is not in one of these lines, it is in the config file openssl.cnf
> openssl genrsa -des3 -out private/cakey.pem 2048 -config ./openssl.cnf 
> openssl req -new -x509 -nodes -days 3650 -key private/cakey.pem -out 
> certs/cacert.pem -config openssl.cnf
>
> openssl genrsa -des3 -out private/cakey.pem 2048 -config ./openssl.cnf 
> openssl req -new -sha1 -key private/cakey.pem -out csr/ica.csr -config 
> ./openssl.cnf openssl ca -config ./openssl.cnf -days 1825 -md sha1 -in 
> ica.csr -out ica.crt -extensions v3_ca
>
> openssl genrsa -des3 -out server.key 2048 -config ./openssl.cnf 
> openssl req -new -sha1 -key private/server.key -out csr/server.csr 
> -config ./openssl.cnf openssl ca -config ./openssl.cnf -days 730 -md 
> sha1 -in server.csr -out server.crt
>
look if you find there something similiar to

default_md = md5

change this to

default_md = sha1

and generate your certificates the same way as above

Greetings,
Walter
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

----------------------------------------------------------------------
The information contained in this transmission may be confidential. Any 
disclosure, copying, or further distribution of confidential information is not 
permitted unless such privilege is explicitly granted in writing by Quantum. 
Quantum reserves the right to have electronic communications, including email 
and attachments, sent across its networks filtered through anti virus and spam 
software programs and retain such messages in order to comply with applicable 
data security and retention requirements. Quantum is not responsible for the 
proper and complete transmission of the substance of this communication or for 
any delay in its receipt.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to