by shizcakes on 2/23/17, 1:04 PM with 23 comments
by merricksb on 2/23/17, 1:30 PM
by mshenfield on 2/23/17, 1:22 PM
http://stackoverflow.com/questions/9392365/how-would-git-han...
by singularity2001 on 2/23/17, 1:20 PM
Nine quintillion (9,223,372,036,854,775,808) SHA1 computations in total
6,500 years of CPU computation to complete the attack first phase
110 years of GPU computation to complete the second phase
So no need to panic or urgently switch, but time to slowly transitionby ktta on 2/23/17, 1:09 PM
by Charged_Buffalo on 2/23/17, 1:24 PM
Copy-pasting for posterity:
I've been informed by the git Gods that the chances of a
SHA1 collision is the same as the Earth being sucked up into
the black hole created by the CERN accelerator. If this is
indeed true, then there's no need for that extra memcmp.
by seycombi on 2/23/17, 1:19 PM
https://arstechnica.com/security/2017/02/at-deaths-door-for-...
by mckoss on 2/23/17, 1:28 PM
by rpdillon on 2/23/17, 5:11 PM
by djhworld on 2/23/17, 1:26 PM
by mtgx on 2/23/17, 1:23 PM
They got a lot of flak for trying to deprecate it "so early". It's nice to see them proving everyone wrong on this.
by necessity on 2/23/17, 1:22 PM
No need to wait. The option to reject SHA-1 certificates on Firefox is `security.pki.sha1_enforcement_level` with value `1`.
https://blog.mozilla.org/security/2016/01/06/man-in-the-midd...
Other configs worth doing:
`security.ssl.treat_unsafe_negotiation_as_broken` to `true` and `security.ssl.require_safe_negotiation` to `true` also. Refusing insecure algorithms (`security.ssl3.<alg>`) might also be smart.