{"id":177,"date":"2014-11-06T05:46:51","date_gmt":"2014-11-06T13:46:51","guid":{"rendered":"https:\/\/www.ssls.com\/blog\/?p=177"},"modified":"2023-09-27T15:18:25","modified_gmt":"2023-09-27T22:18:25","slug":"sunsetting-sha-1-moving-sha-2","status":"publish","type":"post","link":"https:\/\/www.ssls.com\/blog\/sunsetting-sha-1-moving-sha-2\/","title":{"rendered":"Sunsetting SHA-1 and Moving to&nbsp;SHA-2"},"content":{"rendered":"<pre>One of the most important parts of SSL certificates\u2019 security is the signature algorithm. The SHA-1 cryptographic algorithm, created nearly 20 years ago, is one of the most commonly used hash function for websites that are protected with SSL.<\/pre>\n<p>SHA-1 is getting weaker every day and is frequently exposed to collision attacks in which hackers may obtain fraudulent certificates. However, SHA-1 is still widely used for many websites that are <a href=\"https:\/\/www.ssls.com\/blog\/us-and-more-governments-push-for-backdoor-encryption-access\/\">protected<\/a> with SSL.<\/p>\n<p><!--more--><\/p>\n<p>Google and Microsoft encourage Certification Authorities and website administrators to upgrade their <a href=\"https:\/\/www.ssls.com\/blog\/what-is-a-digital-certificate\/\">SSL certificates<\/a> to use signature algorithms with hash functions that are stronger than 160-bit SHA-1 \u2013 such as SHA-2, which can produce up to 512-bit hash value and is supported almost everywhere.<\/p>\n<p>According to a recent <a href=\"http:\/\/googleonlinesecurity.blogspot.com\/2014\/09\/gradually-sunsetting-sha-1.html\">Google announcement<\/a>, beginning November, users who visit websites that use SHA-1-based SSLs expiring any time in 2017 in updated Chrome 40 will see a warning that Google has recently announced that they\u2019re sunsetting SHA-1. Initially, the warnings will be limited to a \u201c<a href=\"https:\/\/www.ssls.com\/blog\/us-and-more-governments-push-for-backdoor-encryption-access\/\">Secure<\/a>, but minor errors\u201d icon, in the form of a lock with a yellow triangle. In later Chrome versions, this will become a red crossed-out lock.<\/p>\n<p>According to <a href=\"http:\/\/www.w3schools.com\/browsers\/browsers_stats.asp\">web browser statistics<\/a> collected from W3Schools&#8217; log-files, Google Chrome is the most-used web browser. In September 2014, Google Chrome usage was at 60%, Mozilla Firefox 24%, and\u00a0Microsoft Internet Explorer 10%.<a href=\"https:\/\/www.ssls.com\/blog\/wp-content\/uploads\/2014\/11\/chart_05.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-195\" src=\"https:\/\/www.ssls.com\/blog\/wp-content\/uploads\/2014\/11\/chart_05.jpg\" alt=\"chart_05\" width=\"699\" height=\"483\" srcset=\"https:\/\/www.ssls.com\/blog\/wp-content\/uploads\/2014\/11\/chart_05.jpg 699w, https:\/\/www.ssls.com\/blog\/wp-content\/uploads\/2014\/11\/chart_05-300x207.jpg 300w\" sizes=\"auto, (max-width: 699px) 100vw, 699px\" \/><\/a>Here is a <a href=\"http:\/\/www.symantec.com\/connect\/blogs\/google-s-sha-1-deprecation-plan-chrome\">matrix<\/a> showing important dates of changes in Chrome.<img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-186\" src=\"https:\/\/www.ssls.com\/blog\/wp-content\/uploads\/2014\/11\/chrome_versions_dates.jpg\" alt=\"chrome-versions-dates\" width=\"680\" height=\"300\" srcset=\"https:\/\/www.ssls.com\/blog\/wp-content\/uploads\/2014\/11\/chrome_versions_dates.jpg 680w, https:\/\/www.ssls.com\/blog\/wp-content\/uploads\/2014\/11\/chrome_versions_dates-300x132.jpg 300w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><\/p>\n<p><a href=\"https:\/\/blog.mozilla.org\/security\/2014\/09\/23\/phasing-out-certificates-with-sha-1-based-signature-algorithms\/\"><br \/>\nMozilla\u2019s CA Certificate Maintenance Policy<\/a> also agrees that SHA-1 certificates should not be issued after January 1, 2016 or trusted after January 1, 2017.<\/p>\n<h2>What You Should Do:<\/h2>\n<ul>\n<li>You may use this quick\u00a0<a href=\"https:\/\/shaaaaaaaaaaaaa.com\/\">checker<\/a>\u00a0or this detailed\u00a0<a href=\"https:\/\/www.ssllabs.com\/ssltest\/index.html\">SSL Server Test<\/a>\u00a0to check if your SSL certificate is using SHA-1 signature algorithm.<\/li>\n<li>Determine whether your server supports SHA-2.\u00a0If your server supports SHA-2 and your SHA-1-signed SSL expires before January 1, 2016, reissue your certificate.<\/li>\n<li>If you need more information, please contact your CA or certificate shop. If you have a certificate with SSLs.com &#8211; you can <a href=\"https:\/\/www.ssls.com\/knowledgebase-article.html?article_id=9416&amp;category_id=57\">reach out to us\u00a0here<\/a>.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>One of the most important parts of SSL certificates\u2019 security is the signature algorithm. The SHA-1 cryptographic algorithm, created nearly 20 years ago, is one of the most commonly used hash function for websites that are protected with SSL. SHA-1 is getting weaker every day and is frequently exposed to collision attacks in which hackers [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[24],"class_list":["post-177","post","type-post","status-publish","format-standard","hentry","category-news","tag-security"],"_links":{"self":[{"href":"https:\/\/www.ssls.com\/blog\/wp-json\/wp\/v2\/posts\/177","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ssls.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ssls.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ssls.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ssls.com\/blog\/wp-json\/wp\/v2\/comments?post=177"}],"version-history":[{"count":18,"href":"https:\/\/www.ssls.com\/blog\/wp-json\/wp\/v2\/posts\/177\/revisions"}],"predecessor-version":[{"id":2731,"href":"https:\/\/www.ssls.com\/blog\/wp-json\/wp\/v2\/posts\/177\/revisions\/2731"}],"wp:attachment":[{"href":"https:\/\/www.ssls.com\/blog\/wp-json\/wp\/v2\/media?parent=177"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ssls.com\/blog\/wp-json\/wp\/v2\/categories?post=177"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ssls.com\/blog\/wp-json\/wp\/v2\/tags?post=177"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}