As others have written, I think the use of SHA-1 within an enterprise as a data integrity check is fine, so long as it meets a client's own security standards. To go further, I think our (IBM's) use of SHA-1 for the same purpose for software downloads is likewise just fine. (One must now connect to IBM's download servers for z/OS products and PTFs using SSL, and physical delivery uses R/O DVDs.)

All that said, some clients are starting to ask us to use a stronger hashing algorithm. Most of them understand and agree that SHA-1 is just fine for a data integrity check. But, their security departments believe that disallowing SHA-1 is a simple overall rule that covers the security-related uses of SHA-1 even if it imposes changes on the non-security-related uses of SHA-1. It's difficult to argue with simplification logic, I must admit.

We will probably have to use something stronger for software delivery, eventually. We will probably need to continue to support SHA-1 for compatibility's sake when we do.

CM Poncelet wrote:
FWIW SHA1 hashing is *not* secure: you should use SHA2.  No idea whether
there is a z/OS utility to do that: I use PGP. HTH.
Chris Poncelet (retired sysprog)

On 20/11/2018 13:36, Sankaranarayanan, Vignesh wrote:
Hello again List!

Is there any utility for z/OS that lets us create SHA1 or MD5 or some such 
hash/fingerprint of a dataset or USS file.
The use case is to compare these hashes at source (z/OS) and destination 
(linux) after transferring some sizable datasets.
<snip>



--
John Eells
IBM Poughkeepsie
[email protected]

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to