On Fri, 2021-10-15 at 10:33 -0500, Michael Catanzaro wrote:
> On Fri, Oct 15 2021 at 10:10:38 AM +0200, Björn Persson
> wrote:
> > My question is: Is it true that this usage of SHA-1 makes the TLS
> > session weak, so that it's correct to forbid it in the crypto policy?
>
> Hm, I think Fedora's
Michael Catanzaro wrote:
> SHA-1 is blocked in certificate signatures because those can be
> attacked offline. Signatures in the TLS handshake are entirely
> different. I'm hardly an expert, but I think the attacker only has a
> few seconds to generate a hash collision before the user gives up a
On Fri, Oct 15 2021 at 10:10:38 AM +0200, Björn Persson
wrote:
My question is: Is it true that this usage of SHA-1 makes the TLS
session weak, so that it's correct to forbid it in the crypto policy?
Hm, I think Fedora's crypto policy should not be stricter than upstream
Firefox. This should p
Hello, I have a question for someone with deep knowledge about
cryptology. The question regards Fedora's crypto policies and a certain
usage of SHA-1 in TLS.
I encountered a web server that Seamonkey and Firefox refuse to talk
to. Both give me the error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGO