Difference between revisions of "SHA-1 (deprecated)"
Jump to navigation
Jump to search
Line 1: | Line 1: | ||
[[wikipedia:SHA-1]] | [[wikipedia:SHA-1]] | ||
+ | |||
+ | == Attacks == | ||
+ | [[Certificates]] are at special risk to the aforementioned [[SHA1 collision]] vulnerability as an attacker has effectively unlimited time in which to craft a collision that yields them a valid certificate, far more than the relatively brief [[LoginGraceTime]] window that they have to forge a host key signature. | ||
== See also == | == See also == |
Revision as of 05:37, 18 August 2021
Attacks
Certificates are at special risk to the aforementioned SHA1 collision vulnerability as an attacker has effectively unlimited time in which to craft a collision that yields them a valid certificate, far more than the relatively brief LoginGraceTime window that they have to forge a host key signature.
See also
Advertising: