Because SHA-1 is not longer secure (since 2013!), when someone receives a digitally signed email in TB 115 that uses the old SHA-1 algo, we report the signature as "bad". <-- Some folks e.g. Italian government departments (and apparently: MS Office 2019 Outlook using Exchange Online still produces SHA-1-SMIME-Signatures today) are still using SHA-1 and are complaining in bug 1854592:" Thunderbird version 115 treats an S/MIME signature as invalid (e.g. from a PEC certificate) if the signature used SHA-1" --> Comment 15: "NIST formally deprecated use of SHA-1 in 2011 and disallowed its use for digital signatures in 2013, and declared that it should be phased out by 2030.[14] As of 2020, chosen-prefix attacks against SHA-1 are practical."
potential unimplemented workaround would be to create a pref: e.g. smime_signatures_accept_insecure_sha1, by default set to false, and users could set it to true.
Note there are various scenarios in which SHA1 is used, and several have already been addressed. So, if you wanted a general article on the topc of "SHA1 deprecation", it would be a lot of work, because you'd have to be complete
To simplify I suggest that the document is specific to this use: Using SHA-1 in S/MIME digital signatures.
Then the article could just briefly mention that there are other contexts which also need to be looked at separately, and many contexts have already deprecated the use of SHA-1
For example, we had a "same same but different" scenario with OpenPGP. We have successfully deprecated SHA1 for the "message signature" in OpenPGP messages.
However, an OpenPGP key is like a complex container with lots of data in it. And the elements in that container are also signed. And we currently still allow SHA1 for those signatures, because of compatibility, and because the other major implementation (gnupg) refuses to deprecate it in that context, and because it can be argued, because the "data that is being signed" cannot be arbitrarily chosen in that context, it's less of a worry. So better not go that deep into the topic.
See (from the 115 Support wiki page)
"NIST formally deprecated use of SHA-1 in 2011 and disallowed its use for digital signatures in 2013, and declared that it should be phased out by 2030.[14] As of 2020, chosen-prefix attacks against SHA-1 are practical."
smime_signatures_accept_insecure_sha1
, by default set to false, and users could set it to true.