IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: SHA1 weaknesses...



On Thu, Mar 31, 2005 at 03:09:18PM +1200, Peter Gutmann wrote:
> Joseph Galbraith <galb-list%vandyke.com@localhost> writes:
> 
> >In light of recent SHA1 weaknesses, which, if I understand correctly, 
> >may not really effect SSH, but are still worrisome, should we be 
> >looking at introducing a document for using SHA256?
> >
> It doesn't affect its use in either PRFs or HMAC, so SSH is unaffected
> (I've been working on an article for IEEE S&P for this, but it'll 
> probably be awhile before it appears).  There's no need to rush out and 
> change anything because of this, better to wait until we know whether 
> SHA-2 or Whirlpool is the way to go.

Wouldn't lack of collision resistance in SHA1 leave a
vulnerability with using fingerprints of host public keys
for verification?  (mentioned in the -architecture draft).

Of course this isn't a mandatory part of the spec, though
it's common in various implementations.

Matt




Home | Main Index | Thread Index | Old Index