diff options
author | Damien Miller <djm@cvs.openbsd.org> | 2021-08-29 23:53:11 +0000 |
---|---|---|
committer | Damien Miller <djm@cvs.openbsd.org> | 2021-08-29 23:53:11 +0000 |
commit | 42a75000ce07163a21a3e5b706e3b8045543329c (patch) | |
tree | 1e6726dae809a08e78d4ceb3207e82275a6613d5 /usr.bin/unifdef | |
parent | f7c02fcb2e27e5deac9b056562601ba4b5797d9a (diff) |
After years of forewarning, disable the RSA/SHA-1 signature algorithm
by default. It is feasible to create colliding SHA1 hashes, so we
need to deprecate its use.
RSA/SHA-256/512 remains available and will be transparently selected
instead of RSA/SHA1 for most SSH servers released in the last five+
years. There is no need to regenerate RSA keys.
The use of RSA/SHA1 can be re-enabled by adding "ssh-rsa" to the
PubkeyAcceptedAlgorithms directives on the client and server.
ok dtucker deraadt
Diffstat (limited to 'usr.bin/unifdef')
0 files changed, 0 insertions, 0 deletions