Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Deprecating SHA1 #11

Closed
kestewart opened this issue Aug 1, 2017 · 4 comments
Closed

Deprecating SHA1 #11

kestewart opened this issue Aug 1, 2017 · 4 comments
Milestone

Comments

@kestewart
Copy link
Contributor

This is likely a condition for projects going for CII badging so good thing to do, given public compromises noted. Other notes from earlier discussion on google doc

  • PVC to use something
  • Uday interested in putting this proposal, Brad, Yev +1
  • SPDX 3.0 - is going to be needed. General ok from all on call.
@kestewart kestewart added this to the 3.0 milestone Aug 1, 2017
@goneall
Copy link
Member

goneall commented Aug 1, 2017

Since we are using sha1 as a verification and not as a security authentication mechanism, it may not be considered a security issue. That being said, it would be good to strengthen the verification algorithm. This is somewhat analogous to the debate on using sha1 in git (see https://news.ycombinator.com/item?id=13719368 as a reference).

@ghost
Copy link

ghost commented Aug 1, 2017

@goneall you're right. SHA1 is never a security mechanism but a cryptographic algorithm for integrity-check. Idea is to avoid SHA-1 collision i.e. no two fields should have same hash from the algorithm used.

@wking
Copy link
Contributor

wking commented Aug 1, 2017 via email

@goneall
Copy link
Member

goneall commented Apr 4, 2024

This is now optional and the user can specify a stronger file hash.

I don't think this issue is applicable to SPDX 3.0.

Closing the issue.

@kestewart if you disagree, feel free to reopen

@goneall goneall closed this as completed Apr 4, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants