Mozilla’s Security Engineering Team has announced that they are proactively phasing out the SHA-1 based signature algorithms for digital certificates, stemming from a concern that it too, like the MD5 hash algorithm, could be susceptible to collision attacks.

Here’s an excerpt from the official announcement:

SHA-1 is nearly twenty years old, and is beginning to show its age. In the last few years, collision attacks undermining some properties of SHA-1 have been getting close to being practical. Collision attacks against the older MD5 hash algorithm have been used to obtain fraudulent certificates, so the improving feasibility of collision attacks against SHA-1 is concerning. In order to avoid the need for a rapid transition should a critical attack against SHA-1 be discovered, we are proactively phasing out SHA-1.

We encourage Certification Authorities (CAs) and Web site administrators to upgrade their certificates to use signature algorithms with hash functions that are stronger than SHA-1, such as SHA-256, SHA-384, or SHA-512.

You may read the complete announcement here.

Related Post:  How to monitor the official Elasticsearch image on Docker

Share:

Share on facebook
Facebook
Share on twitter
Twitter
Share on pinterest
Pinterest
Share on linkedin
LinkedIn

Hola! Did you notice that LinuxBSDos.com no longer runs network ads?  Yep, no more ads from the usual suspects that track you across the Internet.  But since  I still need to pay to keep the site running, feel free to make a small donation by PayPal.

Subscribe for updates. Trust me, no spam!

Mailchimp Signup Form

Sponsored links

1. Attend Algorithm Conference, a top AI and ML event for 2020.
2. Reasons to use control panel for your server.
3. DHgate Computers Electronics, Cell Phones & more.

6 Responses

  1. Steps-
    Open the Windows Start menu or Start screen and search for certmgr.msc.
    Click Trusted Root Certification Authorities and open Certificates.
    Scroll down or use find to get to the Superfish, Inc. certificate.
    Right-click it and select Delete.

  2. Open the Windows Start menu or Start screen and search for certmgr.msc. …Click Trusted Root Certification Authorities and open Certificates.Scroll down or use find to get to the Superfish, Inc. certificate.
    Right-click it and select Delete.

  3. I have a Lenova laptop. I bought it specifically to install Linux. I totally wiped Windoes when I got it and installed Ubuntu. That was several years ago so I don’t think I had that software on my computer but I don’t have to worry about it now.

  4. It’s time we users demand the right to buy bare bones hardware and use it as we like! Enough with all this vPro Secure Boot Computrace nonsense! And now this! We should demand unlocked platforms and no more backdoors!

Leave a Reply

Your email address will not be published. Required fields are marked *

Get the latest

On social media
Via my newsletter
Mailchimp Signup Form

Partner links

1. Attend Algorithm Conference, a top AI and ML event for 2021.
2. Reasons to use control panel for your server.
3. DHgate Computers Electronics, Cell Phones & more.
Hacking, pentesting distributions

Linux Distributions for Hacking

Experts use these Linux distributions for hacking, digital forensics, and pentesting.

Categories
Archives

The authors of these books are confirmed to speak during

Algorithm Conference

T-minus AI

Author was the first chairperson of AI for the U.S. Air Force.

The case for killer robots

Author is the Director of the Center for Natural and Artificial Intelligence.

Why greatness cannot be planned

Author works on AI safety as a Senior Research Scientist at Uber AI Labs.

Anastasia Marchenkova

An invitation from Anastasia Marchenkova

Hya, after stints as a quantum researcher at Georgia Tech Quantum Optics & Quantum Telecom Lab, and the University of Maryland Joint Quantum Institute, I’m now working on superconducting qubit quantum processors at Bleximo. I’ll be speaking during Algorithm Conference in Austin, Texas, July 16 – 18, 2020. Meet me there and let’s chat about progress and hype in quantum computing.