Back to bug 1309781

Who When What Removed Added
Nikos Mavrogiannopoulos 2016-02-18 16:45:35 UTC Component openssl nss
Assignee tmraz nss-nspr-maint
Wade Mealing 2016-02-19 01:51:52 UTC Blocks 1309930
Nikos Mavrogiannopoulos 2016-02-19 08:24:44 UTC Blocks 1309930
Kai Engert (:kaie) (inactive account) 2016-02-24 13:43:28 UTC CC kengert
Kai Engert (:kaie) (inactive account) 2016-02-24 13:43:44 UTC Status NEW CLOSED
Resolution --- WORKSFORME
Last Closed 2016-02-24 08:43:44 UTC
Kai Engert (:kaie) (inactive account) 2016-02-24 13:47:10 UTC Status CLOSED NEW
Resolution WORKSFORME ---
Assignee nss-nspr-maint kengert
Keywords Reopened
Kai Engert (:kaie) (inactive account) 2016-04-25 18:28:21 UTC Flags needinfo?(qe-baseos-security)
Hubert Kario 2016-05-05 09:22:03 UTC CC hkario
QA Contact qe-baseos-security hkario
Flags needinfo?(qe-baseos-security) needinfo+
Hubert Kario 2016-05-05 09:23:19 UTC Flags needinfo+
Hubert Kario 2016-06-29 12:53:30 UTC QA Contact hkario qe-baseos-security
Stanislav Zidek 2016-10-10 16:49:23 UTC CC szidek
Doc Type Bug Fix Release Note
Miroslav Grepl 2016-10-19 20:48:41 UTC Blocks 1377248
Miroslav Grepl 2016-11-28 09:47:46 UTC CC mgrepl
Blocks 1377248
Kai Engert (:kaie) (inactive account) 2017-03-07 14:30:43 UTC Link ID Mozilla Foundation 1345106
Kai Engert (:kaie) (inactive account) 2017-03-08 20:06:29 UTC Link ID Mozilla Foundation 1345528
Kai Engert (:kaie) (inactive account) 2017-03-09 15:40:24 UTC Assignee kengert dueno
Kai Engert (:kaie) (inactive account) 2017-03-09 15:41:15 UTC Flags needinfo?(szidek)
Stanislav Zidek 2017-03-10 13:51:28 UTC Flags needinfo?(szidek)
Kai Engert (:kaie) (inactive account) 2017-03-15 16:40:06 UTC CC dueno
Link ID Mozilla Foundation 1345528
Flags needinfo?(dueno)
Daiki Ueno 2017-03-16 09:45:33 UTC Status NEW POST
Flags needinfo?(dueno)
Daiki Ueno 2017-03-28 15:19:07 UTC Status POST MODIFIED
Fixed In Version nss-3.28.3-5.el7
Hubert Kario 2017-04-06 16:33:06 UTC Flags needinfo?(dueno)
errata-xmlrpc 2017-04-07 08:01:25 UTC Status MODIFIED ON_QA
Daiki Ueno 2017-04-07 08:04:11 UTC Flags needinfo?(dueno)
Lenka Špačková 2017-04-11 14:49:58 UTC Docs Contact mjahoda
Hubert Kario 2017-04-20 16:02:58 UTC Blocks 1444136
Hubert Kario 2017-04-20 17:19:30 UTC QA Contact qe-baseos-security hkario
Kai Engert (:kaie) (inactive account) 2017-04-26 16:30:23 UTC CC rrelyea
Doc Text The NSS library default has been changed to use a stronger hash algorithm when creating digital signatures. The new default is SHA256 and is used with RSA keys, with EC keys, and with DSA keys if q >= 32.

The new default also affects the NSS tools certutil, crlutil and cmsutil.
Flags needinfo?(rrelyea)
Kai Engert (:kaie) (inactive account) 2017-04-27 07:26:07 UTC Doc Text The NSS library default has been changed to use a stronger hash algorithm when creating digital signatures. The new default is SHA256 and is used with RSA keys, with EC keys, and with DSA keys if q >= 32.

The new default also affects the NSS tools certutil, crlutil and cmsutil.
The NSS library default has been changed to use a stronger hash algorithm when creating digital signatures. The new default is SHA256 and is used with RSA keys, with EC keys, and with >= 2048 bit DSA keys.

The new default also affects the NSS tools certutil, crlutil and cmsutil.
errata-xmlrpc 2017-04-27 16:24:33 UTC Status ON_QA VERIFIED
Mirek Jahoda 2017-05-11 16:38:25 UTC Doc Type Release Note Enhancement
Mirek Jahoda 2017-06-23 17:16:08 UTC Doc Text The NSS library default has been changed to use a stronger hash algorithm when creating digital signatures. The new default is SHA256 and is used with RSA keys, with EC keys, and with >= 2048 bit DSA keys.

The new default also affects the NSS tools certutil, crlutil and cmsutil.
_nss_ and _nss-util_ now use SHA-256 by default

With this update, default configurations of the NSS library have been changed to use a stronger hash algorithm when creating digital signatures. With RSA, EC, and 2048-bit (or longer) DSA keys, the SHA-256 algorithm is now used.

Note that also the NSS utilities, such as *certutil*, *crlutil*, and *cmsutil*, now use SHA-256 in default configurations.
Mirek Jahoda 2017-07-03 12:09:25 UTC Doc Text _nss_ and _nss-util_ now use SHA-256 by default

With this update, default configurations of the NSS library have been changed to use a stronger hash algorithm when creating digital signatures. With RSA, EC, and 2048-bit (or longer) DSA keys, the SHA-256 algorithm is now used.

Note that also the NSS utilities, such as *certutil*, *crlutil*, and *cmsutil*, now use SHA-256 in default configurations.
_nss_ and _nss-util_ now use SHA-256 by default

With this update, the default configuration of the NSS library has been changed to use a stronger hash algorithm when creating digital signatures. With RSA, EC, and 2048-bit (or longer) DSA keys, the SHA-256 algorithm is now used.

Note that also the NSS utilities, such as *certutil*, *crlutil*, and *cmsutil*, now use SHA-256 in their default configurations.
errata-xmlrpc 2017-08-01 16:47:42 UTC Status VERIFIED CLOSED
Resolution --- ERRATA
Last Closed 2016-02-24 08:43:44 UTC 2017-08-01 12:47:42 UTC
Nikos Mavrogiannopoulos 2019-01-04 09:57:21 UTC Flags needinfo?(rrelyea)

Back to bug 1309781