Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Note
titleDeprecated

Note that this page has been deprecated. The information it contains is no longer current.

In January 2010, InCommon Operations announced that all certificates in metadata must have at least 2048-bit keys by the end of December 2012. In anticipation of this deadline, InCommon Operations began a comprehensive communications campaign in June 2012. The goal of the campaign was to inform Site Administrators of the security risks associated with weak keys in metadata, and to educate them how to mitigate the risk, that is, how to migrate a certificate with a strong key into metadata. To make a long story short, the last remaining weak key was removed from InCommon metadata on March 28, 2013. This wiki page and its child page (Report on Weak Keys in Metadata) are the historical record of this effort.

...

Historical Summary of Weak Keys in Metadata

...


2012-08-17

2012-09-20

2012-10-10

2012-10-22

2012-11-12

2012-12-17

2012-12-27

2013-01-30

2013-03-28

IdPs:

26

19

15

15

15

11

11

7

0

SPs:

65

53

48

40

35

25

18

12

0

 

 

 




InCCollaborate:report

InCCollaborate:report

InCCollaborate:report

InCCollaborate:report

InCCollaborate:report

InCCollaborate:report

 


A Report on Weak Keys in Metadata records the history of weak keys in metadata.

...

In the InCommon Federation, the use of long-lived, self-signed X.509 certificates in metadata is strongly recommended. A self-signed certificate containing a 2048-bit key is easily created with the OpenSSL command-line tool. Before doing so, develop a strategy for securely handling the private key, since the security of your deployment (and that of your partners) depends on the security of the private key used to sign and/or decrypt messages.

Attachments