Solved: Chrome v18, self signed certs and “signed using a weak signature algorithm”

Posted by David Christiansen on Geeks with Blogs See other posts from Geeks with Blogs or by David Christiansen
Published on Mon, 02 Apr 2012 13:21:05 GMT Indexed on 2012/04/02 17:30 UTC
Read the original article Hit count: 282

Filed under:

So chrome has just updated itself automatically and you are now running v18 – great. Or is it…

If like me, you are someone that are running sites using a self-signed SSL Certificate (i.e. when running a site on a developer machine) you may come across the following lovely message;

WAT? Try explaining what a weak signature algorithm means to a non-tech!

Fear not, this is likely as a result of you following instructions you found on the apache openssl site which results in a self signed cert using the MD5 signature hashing algorithm.

The simple fix is to generate a new certificate specifying to use the SHA1 signature hashing algorithm, like so;

openssl req -new -x509 -sha1 -nodes -out server.crt -keyout server.key

Simples!

© Geeks with Blogs or respective owner

Solved: Chrome v18, self signed certs and “signed using a weak signature algorithm”

Posted by David Christiansen on Geeks with Blogs See other posts from Geeks with Blogs or by David Christiansen
Published on Mon, 02 Apr 2012 13:46:09 GMT Indexed on 2012/04/02 17:30 UTC
Read the original article Hit count: 282

Filed under:

So chrome has just updated itself automatically and you are now running v18 – great. Or is it…

If like me, you are someone that are running sites using a self-signed SSL Certificate (i.e. when running a site on a developer machine) you may come across the following lovely message;

WAT? Try explaining what a weak signature algorithm means to a non-tech!

Fear not, this is likely as a result of you following instructions you found on the apache openssl site which results in a self signed cert using the MD5 signature hashing algorithm.

Using OpenSSL

The simple fix is to generate a new certificate specifying to use the SHA512 signature hashing algorithm, like so;

openssl req -new -x509 -sha512 -nodes -out server.crt -keyout server.key

Simples!

Now, you should be able to confirm the signature algorithm used is sha512 by looking at the details tab of certificate

Confirming the signature algorithm

Notes

  • If you change your certificate, be sure to reapply any private key permissions you require – such as allowing access to the application pool user.

© Geeks with Blogs or respective owner