diff options
| author | Stefan Kangas | 2019-09-16 10:45:14 +0200 |
|---|---|---|
| committer | Stefan Kangas | 2019-09-20 20:47:47 +0200 |
| commit | 6d50010b34dbbcb90a7b4512f97e07fd8beceea5 (patch) | |
| tree | cc43618d3626c667c9658c4a69db8cf784563bac /doc | |
| parent | b8e9baac9ada62c2ea7437579df4be9d4f437fda (diff) | |
| download | emacs-6d50010b34dbbcb90a7b4512f97e07fd8beceea5.tar.gz emacs-6d50010b34dbbcb90a7b4512f97e07fd8beceea5.zip | |
Recommend against SHA-1 and MD5 for security
* doc/lispref/text.texi (Checksum/Hash):
* src/fns.c (Fmd5, Fsecure_hash):
* lisp/subr.el (sha1): Doc fix to recommend against SHA-1 and MD5 for
security-related applications, since they are not collision
resistant. (Bug#37420)
Diffstat (limited to 'doc')
| -rw-r--r-- | doc/lispref/text.texi | 12 |
1 files changed, 6 insertions, 6 deletions
diff --git a/doc/lispref/text.texi b/doc/lispref/text.texi index 7ce54f59c69..955ad6130ca 100644 --- a/doc/lispref/text.texi +++ b/doc/lispref/text.texi | |||
| @@ -4710,12 +4710,12 @@ that you have an unaltered copy of that data. | |||
| 4710 | SHA-1, SHA-2, SHA-224, SHA-256, SHA-384 and SHA-512. MD5 is the | 4710 | SHA-1, SHA-2, SHA-224, SHA-256, SHA-384 and SHA-512. MD5 is the |
| 4711 | oldest of these algorithms, and is commonly used in @dfn{message | 4711 | oldest of these algorithms, and is commonly used in @dfn{message |
| 4712 | digests} to check the integrity of messages transmitted over a | 4712 | digests} to check the integrity of messages transmitted over a |
| 4713 | network. MD5 is not collision resistant (i.e., it is possible to | 4713 | network. MD5 and SHA-1 are not collision resistant (i.e., it is |
| 4714 | deliberately design different pieces of data which have the same MD5 | 4714 | possible to deliberately design different pieces of data which have |
| 4715 | hash), so you should not used it for anything security-related. A | 4715 | the same MD5 or SHA-1 hash), so you should not use them for anything |
| 4716 | similar theoretical weakness also exists in SHA-1. Therefore, for | 4716 | security-related. For security-related applications you should use |
| 4717 | security-related applications you should use the other hash types, | 4717 | the other hash types, such as SHA-2 (e.g. @code{sha256} or |
| 4718 | such as SHA-2. | 4718 | @code{sha512}). |
| 4719 | 4719 | ||
| 4720 | @defun secure-hash-algorithms | 4720 | @defun secure-hash-algorithms |
| 4721 | This function returns a list of symbols representing algorithms that | 4721 | This function returns a list of symbols representing algorithms that |