diff options
author | Michael Tänzer <neo@nhng.de> | 2013-11-06 16:07:34 +0100 |
---|---|---|
committer | Michael Tänzer <neo@nhng.de> | 2013-11-06 16:07:34 +0100 |
commit | b65dcec9da0414797ecd43af71a755df99c324c5 (patch) | |
tree | 275744eb581202e4c7d9b5d7d05bb0a5dd8c91fa /scripts | |
parent | 234b43aca01ba78b9aff492591f84187ca12a664 (diff) | |
parent | 661dee916f4be9c6d6847376ca8c31c21be37db1 (diff) | |
download | cacert-devel-b65dcec9da0414797ecd43af71a755df99c324c5.tar.gz cacert-devel-b65dcec9da0414797ecd43af71a755df99c324c5.tar.xz cacert-devel-b65dcec9da0414797ecd43af71a755df99c324c5.zip |
Merge remote-tracking branch 'origin/bug-1213' into release
Diffstat (limited to 'scripts')
-rw-r--r-- | scripts/mail-weak-keys.php | 12 |
1 files changed, 6 insertions, 6 deletions
diff --git a/scripts/mail-weak-keys.php b/scripts/mail-weak-keys.php index 95c0e4f..c85aec8 100644 --- a/scripts/mail-weak-keys.php +++ b/scripts/mail-weak-keys.php @@ -18,7 +18,7 @@ You received this email because a certificate issued to you is vulnerable: Server Certificate, Serial $cert_serial, expiring $cert_expire, CN $cert_CN To rectify the problem CAcert will revoke all vulnerable certificates (including yours) on $action_date. -CAcert will no longer accept vulnerable certificate requests for signing. In future all Certficate +CAcert will no longer accept vulnerable certificate requests for signing. In future all Certificate Signing Requests must be backed by private keys with a key length at least 2048 bits and no other known vulnerabilities. You should submit a new Certificate Signing Request of acceptable strength as soon as possible @@ -51,13 +51,13 @@ Client Certificate, Serial $cert_serial, expiring $cert_expire, CN $cert_CN To rectify the problem CAcert will revoke all vulnerable certificates (including yours) on $action_date. CAcert will no longer accept vulnerable certificate requests for signing. In future all -client certficates must be backed by private keys with a key length at least 1024 bits +client certificates must be backed by private keys with a key length at least 1024 bits and no other known vulnerabilities. This means that you should replace your current certificate with a new one of acceptable strength. If you use Firefox or Chrome, select 'Keysize: High Grade' before 'Create Certificate Request'. If you use Internet Explorer, select 'Microsoft Strong Cryptographic Provider'. If you select an -option that generates a weak key (eg 'Microsoft Base Cryptographic Provider v1.0') your certficate +option that generates a weak key (eg 'Microsoft Base Cryptographic Provider v1.0') your certificate request will be rejected. Kind regards @@ -83,7 +83,7 @@ You received this email because a certificate issued to you is vulnerable: Organisation Server Certificate, Serial $cert_serial, expiring $cert_expire, CN $cert_CN To rectify the problem CAcert will revoke all vulnerable certificates (including yours) on $action_date. -CAcert will no longer accept vulnerable certificate requests for signing. In future all Certficate +CAcert will no longer accept vulnerable certificate requests for signing. In future all Certificate Signing Requests must be backed by private keys with a key length at least 2048 bits and no other known vulnerabilities. You should submit a new Certificate Signing Request of acceptable strength as soon as possible @@ -116,13 +116,13 @@ Organisation Client Certificate, Serial $cert_serial, expiring $cert_expire, CN To rectify the problem CAcert will revoke all vulnerable certificates (including yours) on $action_date. CAcert will no longer accept vulnerable certificate requests for signing. In future all -client certficates must be backed by private keys with a key length at least 1024 bits +client certificates must be backed by private keys with a key length at least 1024 bits and no other known vulnerabilities. This means that you should replace your current certificate with a new one of acceptable strength. If you use Firefox or Chrome, select 'Keysize: High Grade' before 'Create Certificate Request'. If you use Internet Explorer, select 'Microsoft Strong Cryptographic Provider'. If you select an -option that generates a weak key (eg 'Microsoft Base Cryptographic Provider v1.0') your certficate +option that generates a weak key (eg 'Microsoft Base Cryptographic Provider v1.0') your certificate request will be rejected. Kind regards |