You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This ties in with issue #8, but this information should not just be displayed when clicking on a protocol; rather, it should also be visible in the global comparision page. Say, by allowing users to only show secure protocols.
The text was updated successfully, but these errors were encountered:
There is a common misbelief that md5 and sha1 based hmac algorithms are not secure. However the collision resistance of the hash function is not required to make the hmac construction secure. Proof: https://link.springer.com/chapter/10.1007/11818175_36
Nevertheless, consensus in the secsh community is clear: any methods involving md5 and sha1 are considered as insecure / weak, which is what this issue is about.
This ties in with issue #8, but this information should not just be displayed when clicking on a protocol; rather, it should also be visible in the global comparision page. Say, by allowing users to only show secure protocols.
The text was updated successfully, but these errors were encountered: