summaryrefslogtreecommitdiff
path: root/usr.bin/unifdef
diff options
context:
space:
mode:
authorDamien Miller <djm@cvs.openbsd.org>2021-08-29 23:53:11 +0000
committerDamien Miller <djm@cvs.openbsd.org>2021-08-29 23:53:11 +0000
commit42a75000ce07163a21a3e5b706e3b8045543329c (patch)
tree1e6726dae809a08e78d4ceb3207e82275a6613d5 /usr.bin/unifdef
parentf7c02fcb2e27e5deac9b056562601ba4b5797d9a (diff)
After years of forewarning, disable the RSA/SHA-1 signature algorithm
by default. It is feasible to create colliding SHA1 hashes, so we need to deprecate its use. RSA/SHA-256/512 remains available and will be transparently selected instead of RSA/SHA1 for most SSH servers released in the last five+ years. There is no need to regenerate RSA keys. The use of RSA/SHA1 can be re-enabled by adding "ssh-rsa" to the PubkeyAcceptedAlgorithms directives on the client and server. ok dtucker deraadt
Diffstat (limited to 'usr.bin/unifdef')
0 files changed, 0 insertions, 0 deletions