Subject: Policy-Discussion
List archive
- From: Guillaume ROMAGNY <guillaume AT cacert.org>
- To: cacert-policy AT lists.cacert.org
- Cc: Faramir <faramir.cl AT gmail.com>
- Subject: Re: Fwd: Mozilla Security Blog regarding compromise of 512-bit certs
- Date: Fri, 04 Nov 2011 02:32:16 +0100
- Authentication-results: lists.cacert.org; dkim=pass (1024-bit key) header.i= AT cacert.org; dkim-asp=none
- Openpgp: id=EB42B796
|
Hello Faramir, Le 04/11/2011 01:51, Faramir a écrit : El 03-11-2011 17:58, ianG escribió: +1 an email can be valuable for 1 minute to hours or days. But software signing is meant to be strong enough for months. So I guess you are right for codesigning. At the same time, it could lead to more complex implementation. So unless the software team wants to make its life difficult, I would propose to switch to 1024 bit RSA key for all as a minimum my 2 cents -- Cordialement, Best regards, Guillaume Vision without action is a daydream. Action without vision is a nightmare. -- Japanese Proverb |
Attachment:
smime.p7s
Description: Signature cryptographique S/MIME
- Fwd: Mozilla Security Blog regarding compromise of 512-bit certs, ianG, 11/03/2011
- Re: Fwd: Mozilla Security Blog regarding compromise of 512-bit certs, Faramir, 11/04/2011
- Re: Fwd: Mozilla Security Blog regarding compromise of 512-bit certs, Guillaume ROMAGNY, 11/04/2011
- Re: Fwd: Mozilla Security Blog regarding compromise of 512-bit certs, Faramir, 11/04/2011
Archive powered by MHonArc 2.6.16.