http - Generating SHA-2 certificate with ikeyman -


trying move sha-1 ssl sha-2 ssl since sha-1 certificates expiring of jan 2016. using ikeyman version 8.0.344 generate new sha-2 cert. couple of questions have

  1. i generating kdb, , under create new key , cert request have selected:

    key size: 2048,

    sig. algorithm: sha2withrsa

    are these 2 values correct selections?

2.after created cert. request, viewed generated , seeing

fingerprint (sha1 digest):

num:num:num...

signature algorithm: sha256withrsa

does matter if fingerprint sha1?

thanks

theoretically, certificate can forged. but, still researching don't know if there known 'fix' or non-issue ssl security.

this question , ensuing discussion may shed light - is sha-1 secure password storage?


Comments

Popular posts from this blog

Java 3D LWJGL collision -

spring - SubProtocolWebSocketHandler - No handlers -

methods - python can't use function in submodule -