The certificate on this page...
http://waywardgeek.net/CipherShed/...uses 1,024bit RSA + MD5. A variety of MD5 certificate forgeries have been demonstrated. See sections 4-5 in link below:
http://www.win.tue.nl/hashclash/rogue-ca/#sec4Regarding 1,024 bit RSA, one paper in 2010 extrapolated what extra resources an existing factoring method would need to break it. Their claim: "For a 1024-bit RSA modulus between half a million and a million [processor] core years should suffice. For each tightly coupled cluster participating in the matrix step a combined memory of 10 terabytes should be adequate." That's not easy enough for people to be throwing attacks at everyone using it. However, it shows it might be within reach of any private or public institution with a supercomputer.
So, I highly recommend swapping out MD5 for at least SHA-1, preferably SHA-2. This is across the board for anything PKI. Also, you might consider configuring browsers, etc to not trust MD5 certificates. Less important, but still wise, is increasing the RSA key to 2,048 bit. I'm less worried your RSA key will be broken than I am pushing for instilling a good habit that might also defeat any future, incremental advances in factoring.