Stop supporting SHA-1 for signing CSRs #144
Merged
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR solves issue #143 and also removes insecure MD2 and MD5 hashing algorithms.
Copying the issue description here to save readers' time.
Since SHA-1 is insecure (attacks), this issue is to propose to stop supporting clients using it to sign CSRs.
SHA-1 can be used to sign CSRs using micromdm/scep in the following cases:
scep/cmd/scepclient/csr.go
Line 46 in 1078401
scep/cryptoutil/x509util/x509util.go
Line 308 in 1078401