SHA-1 Deprecation, on to SHA-2

December 9, 2013 by Bruce Morton     1 Comment

We have previously reviewed implementation of SHA-2, but with Bruce Schneier stating the need to migrate away from SHA-1 and the SHA-1 deprecation policy from Microsoft, the industry must start to make some progress in 2014.

Lock_smallWeb server administrators will have to make plans to move from SSL and code signing certificates signed with the SHA-1 hashing algorithm to certificates signed with SHA-2. This is the result of the new Microsoft Root Certificate Policy where Microsoft deprecates SHA-1 and imposes the following requirements:

  • Certification Authorities (CAs) must stop issuing new SHA-1 SSL and Code Signing end-entity certificates by January 1, 2016.
  • For SSL certificates, Windows will stop accepting SHA-1 end-entity certificates by January 1, 2017.
  • For code signing certificates, Windows will stop accepting SHA-1 code signing certificates without time stamps after January 1, 2016.

The good news is that Windows and Internet Explorer support SHA-2. In fact, new versions of Mac OSX, Firefox, Chrome, Opera, Java and Adobe Acrobat/Reader all support SHA-2.

The bad news? Some enterprises might be running an application that does not support SHA-2. If you are unaware, you need to do some investigation or testing to see if your system supports SHA-2 and consider your migration plan.

That said, it is not over. Microsoft plans to review the deadlines in July 2015 and consider whether SHA-1 is still resistant to pre-image attacks and whether a significant portion of the ecosystem is still not capable of switching to SHA-2.

In the short term you will likely see your CA take some action, such as:

  • Re-setting the default signing algorithm from SHA-1 to SHA-2
  • Providing warnings on existing SHA-1 signed certificates that expire after 2016
  • Imposing date restrictions, so you will not have a SHA-1 certificate that is not supported by Windows in 2017
  • Providing advice to time-stamp during code signing

If you perform some testing and find that your application does not support SHA-2, then it would be advisable to inform your CA or Microsoft.

About

Bruce Morton has worked in the public key infrastructure and digital certificate industry for more than 15 years and has focused on SSL and other publicly trusted certificates since 2005. He has been an active member of the CA/Browser Forum that released guidelines for extended validation (EV) certificates and Baseline Requirements for SSL certificates. Bruce oversees the governance and compliance of Entrust’s publicly trusted PKI.

One thought on “SHA-1 Deprecation, on to SHA-2

  1. Pingback: Do You Need SHA-2 Signed Root Certificates? | Entrust, Inc.

Add to the Conversation