Consider that I generate a new undisclosed private key using openssl:
openssl genrsa -out personal.key 2048
I then generate the multiple CSR requests (called csr1.csr
and csr2.csr
):
openssl req -new -sha256 -key personal.key -out csr1.csr
openssl req -new -sha256 -key personal.key -out csr2.csr
(Both CSRs are generated with the same set of fields.)
The .csr
files are given to different parties, and csr1.csr
is compromised by a third party.
As I understand that CSR contains only the public key, so I'd like to ask how secure and trusted are csr2.csr
and personal.key
now (in terms of remaining in use, and keeping them for future use)?
Should csr2.csr
and/or personal.key
be discarded if csr1.csr
is compromised? If so, why is that?