You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Currently, the signature digest algorithm for CSRs is hardcoded to SHA-256. This introduces challenges for clients that support ECDSA-P384 or -P521 where the digest algorithms are SHA-384/512 respectively, since most signing libraries will automatically select the digest based on the signature algorithm.
In Fulcio v2, we should remove this hardcoded digest algorithm and select the digest based on the signature algorithm. This would be a breaking change to do this now in Fulcio v1, since clients may already handle this for non-SHA256 signature algorithms.
Description
Currently, the signature digest algorithm for CSRs is hardcoded to SHA-256. This introduces challenges for clients that support ECDSA-P384 or -P521 where the digest algorithms are SHA-384/512 respectively, since most signing libraries will automatically select the digest based on the signature algorithm.
In Fulcio v2, we should remove this hardcoded digest algorithm and select the digest based on the signature algorithm. This would be a breaking change to do this now in Fulcio v1, since clients may already handle this for non-SHA256 signature algorithms.
Discussion in #1938 (comment)
The text was updated successfully, but these errors were encountered: