* Daniel Kahn Gillmor <d...@fifthhorseman.net> [2009-02-10 18:04:44]:

> RapidSSL has been willing to freely re-issue all of its older MD5
> certificates using SHA1 from what i've seen.  I suggest that you contact
> your system administrators and advise them that they are using a
> certificate that requires trust in a known-weak digest algorithm to
> verify.  Since it was issued by RapidSSL, you may wish to point them to
> their FAQ on the subject:
> 
> https://knowledge.rapidssl.com/support/ssl-certificate-support/index?page=content&id=AD125
> 
> We hope to ship lenny with MD5 fully deprecated in GnuTLS so that
> GnuTLS-reliant apps are not subject to forged intermediate certificate
> authorities or other attacks based on a weak digest algorithm.
> 
> Thanks for reporting this,
> 
>       --dkg
> 

Daniel,

Thank you very much for the helpful information.  I have passed this along
to Tuffmail along with a link to this bug report so hopefully they will
update their certs soon.  Sorry posting noise about what ultimately is
not a bug.  :-)

Regards,
Chess

-- 
Chess Griffin

Attachment: signature.asc
Description: Digital signature

Reply via email to