You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I'm not sure if this can be solved with the current approach. What about cases where protocols demand the usage of SHA-1 for non-cryptographic reasons, for example WebSockets:
The WebSocket handshake described in this document doesn't depend on
any security properties of SHA-1, such as collision resistance or
resistance to the second pre-image attack (as described in
[[RFC4270](https://www.rfc-editor.org/rfc/rfc4270)]).
Does that then mean we have to roll a custom SHA-1 code that won't get caught by this patch?
The text was updated successfully, but these errors were encountered:
@Radisovik This probably means you're using a (non-RHEL) OpenSSL that forbids use of the low-level APIs in FIPS mode. This should be resolved whenever golang-fips/openssl#27 gets merged into mainline, as that PR switches to using the (high-level) EVP APIs for hashing.
I'm not sure if this can be solved with the current approach. What about cases where protocols demand the usage of SHA-1 for non-cryptographic reasons, for example WebSockets:
https://www.rfc-editor.org/rfc/rfc6455#section-10.8
Does that then mean we have to roll a custom SHA-1 code that won't get caught by this patch?
The text was updated successfully, but these errors were encountered: