- 
    
Bug
 - 
    Resolution: Done
 - 
    
Minor
 - 
    None
 - 
    CentOS Stream 10
 
- 
        No
 - 
        Low
 - 
        1
 
- 
        rhel-security-crypto
 
- 
        0
 - 
        False
 - 
        False
 - 
        
 - 
        No
 - 
        Crypto25August
 
- 
        None
 - 
        None
 
- 
        Unspecified Release Note Type - Unknown
 - 
        Unspecified
 - 
        Unspecified
 - 
        Unspecified
 
- 
        None
 
The following was tested against gnutls-3.8.10-1.el10.x86_64 (the CentOS Stream 10 build)
# # certtool --generate-privkey --key-type=mldsa65 > cakey.pem Generating an ML-DSA-65 private key... # cat > ca.info cn = Name of your organization ca cert_signing_key # certtool --generate-self-signed --load-privkey cakey.pem \ --template ca.info --outfile cacert.pem Generating a self signed certificate... X.509 Certificate Information: Version: 3 Serial Number (hex): 5959832524ad6a36692163bbd568f293e02a8183 Validity: Not Before: Tue Aug 05 08:19:52 UTC 2025 Not After: Wed Aug 05 08:19:52 UTC 2026 Subject: CN=Name of your organization Subject Public Key Algorithm: ML-DSA-65 Algorithm Security Level: Future (15616 bits) Extensions: Basic Constraints (critical): Certificate Authority (CA): TRUE Key Usage (critical): Certificate signing. Subject Key Identifier (not critical): b5c6522df90bee6cd7c4c583dbe1a5f8961d90a2 Other Information: Public Key ID: sha1:b5c6522df90bee6cd7c4c583dbe1a5f8961d90a2 sha256:714c9a6c9192fc97cf711a66e9256f72be00e905f4c2766b0120e060e968a577 Public Key PIN: pin-sha256:cUyabJGS/JfPcRpm6SVvcr4A6QX0wnZrASDgYOlopXc= Signing certificate...
Now query info about the cert and observe the warning against the ML-DSA signature
# certtool -i --infile cacert.pem X.509 Certificate Information: Version: 3 Serial Number (hex): 5959832524ad6a36692163bbd568f293e02a8183 Issuer: CN=Name of your organization Validity: Not Before: Tue Aug 05 08:19:52 UTC 2025 Not After: Wed Aug 05 08:19:52 UTC 2026 Subject: CN=Name of your organization Subject Public Key Algorithm: ML-DSA-65 Algorithm Security Level: Future (15616 bits) Extensions: Basic Constraints (critical): Certificate Authority (CA): TRUE Key Usage (critical): Certificate signing. Subject Key Identifier (not critical): b5c6522df90bee6cd7c4c583dbe1a5f8961d90a2 Signature Algorithm: ML-DSA-65 warning: signed using a broken signature algorithm that can be forged. Signature: 5c:39:36:24:47:92:e1:87:ce:01:5e:71:50:0b:c8:ef ...snip....
That warning should not be issued and will alarm users into thinking they made a mistake in using PQC
- relates to
 - 
                    
RHEL-101123 Enable support for ML-DSA in GnuTLS
-         
 - Release Pending
 
 -