Consider that I generate a new undisclosed private key using openssl:
openssl genrsa -out personal.key 2048
I then generate the multiple CSR requests (called csr1.csr and csr2.csr):
openssl req -new -sha256 -key personal.key -out csr1.csr
openssl req -new -sha256 -key personal.key -out csr2.csr
(Both CSRs are generated with the same set of fields.)
The .csr files are given to different parties, and csr1.csr is compromised by a third party.
As I understand that CSR contains only the public key, so I'd like to ask how secure and trusted are csr2.csr and personal.key now (in terms of remaining in use, and keeping them for future use)?
Should csr2.csr and/or personal.key be discarded if csr1.csr is compromised? If so, why is that?