Closed prince-chrismc closed 4 years ago
Wikipedia says:
Since 2005, SHA-1 has not been considered secure against well-funded opponents; as of 2010 many organizations have recommended its replacement. NIST formally deprecated use of SHA-1 in 2011 and disallowed its use for digital signatures in 2013. As of 2020, chosen-prefix attacks against SHA-1 are now practical. As such, it is recommended to remove SHA-1 from products as soon as possible and instead use SHA-256 or SHA-3. Replacing SHA-1 is urgent where it is used for signatures.
All major web browser vendors ceased acceptance of SHA-1 SSL certificates in 2017.
I think we need some language about using sha256 or higher.
Another item that came up from the Virtual Workshop compare the OpenXPKI and Cisco EST servers.
sha1
andsha256
sha256
I believe the limitation on the OpenXPKI is because of the security consideration when using low sha with ecdsa.
Here https://www.keycdn.com/support/sha1-vs-sha256