[Pkg-openssl-devel] Bug#487152: Propose default_bits increase to 2048

Steven Chamberlain steven at pyro.eu.org
Fri Dec 10 05:23:10 UTC 2010


Tags: patch

Hi,

I propose that maybe now is a good time to increase default_bits in 
/etc/ssl/openssl.cnf from 1024 to 2048.

As of this month, apparently "neither Comodo nor RapidSSL will be 
issuing certificates that are less than 2048 bit key lengths", and this 
reflects a trend among certification authorities, also including Thawte 
from September 2010, and Entrust and GoDaddy as far back as around 
December 2009.

Microsoft will supposedly expect end entity certificates (and the 
signing CA certificate) *issued* from 2011 to be a minimum of 2048-bit 
length, perhaps meaning that their Windows SSL implementations (and 
applications that make use of it, such as Internet Explorer) will 
possibly reject such certificates otherwise:

* http://www.entrust.net/knowledge-base/technote.cfm?tn=7710

NIST recommendations are cited for this change.  They advised that 
2048-bit keys be used in place of 1024-bit asymmetric keys after 2010:

* http://www.keylength.com/en/4/

Some users may have their reservations about the performance impact of 
using larger key lengths, but I think it's safe to assume 2048-bit keys 
are now set to become prevalent for HTTPS and in all places where SSL 
certificates are issued from the major CAs.

I think changing this setting in Debian would not only be a convenience 
to Debian users generating CSRs with 'openssl req -new', without having 
to manually specify a longer key length, but it is also consistent with 
Debian's 'secure by default' approach.

My attached patch updates /etc/ssl/openssl.cnf as well as the relevant 
examples in the man page req(5).  The description of the 'default_bits' 
configuration setting in that document (quoted below) is still accurate, 
in that if unspecified in the configuration file then only a 512-bit key 
would be generated.

> =item B<default_bits>
>
> This specifies the default key size in bits. If not specified then
> 512 is used. It is used if the B<-new> option is used. It can be
> overridden by using the B<-newkey> option.

I have tested my patch to confirm that the default_bits setting is 
modified correctly during a package upgrade, and that it does indeed 
result in 2048-bit instead of 1024-bit keys being generated along with 
the CSR.

The CSR for a 2048-bit key can still be signed by a pre-existing 
1024-bit CA certificate, so I don't think this change should cause 
issues with backward-compatibility.

Many thanks,
Regards,
-- 
Steven Chamberlain
steven at pyro.eu.org
-------------- next part --------------
A non-text attachment was scrubbed...
Name: openssl-default-bits-2048.patch
Type: text/x-patch
Size: 1780 bytes
Desc: not available
URL: <http://lists.alioth.debian.org/pipermail/pkg-openssl-devel/attachments/20101210/a69174e2/attachment.bin>


More information about the Pkg-openssl-devel mailing list