08-01-2018 11:40 AM - edited 08-01-2018 11:41 AM
Good afternoon!
I am working to secure my 5108 blade chassis CIMC access with CA signed SSL certificates but I'm hitting a snag. The CSRs generated by the UCSM GUI use the legacy SHA1 hashing algorithm and I can't see any way to change to SHA256/512.
It looks like the "Key Rings" in the UCSM GUI only allow for key-length customization but do not allow for hashing algorithm customization.
Is it possible to generate CSRs with SHA256 on the UCSM?
Thanks!
Solved! Go to Solution.
08-01-2018 06:16 PM
Greetings
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCuz64587/?reffering_site=dumpcr
I just checked a test CSR on 3.23c, and it had a sha256 hashing algorithm.
Looks like 3.2(3a) or higher changed the default to sha256.
Thanks,
Kirk...
08-01-2018 06:16 PM
Greetings
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCuz64587/?reffering_site=dumpcr
I just checked a test CSR on 3.23c, and it had a sha256 hashing algorithm.
Looks like 3.2(3a) or higher changed the default to sha256.
Thanks,
Kirk...
08-09-2018 10:14 AM
Thanks, Kirk!
I upgraded to 3.23c and the CSRs are now generated with a SHA256 hash.
Interesting that this is not configurable but I'm all set now!
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide