-
-
Notifications
You must be signed in to change notification settings - Fork 2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Remove MD5 & SHA1 from certificate validation #1186
Comments
We cannot just suddenly remove something without very strong reason.
Volunteer is needed. |
Yes this would be good. Although I would argue to drop MD5 support earlier than SHA-1. (maybe MD5: 0.5 years, SHA1: 1.5y) |
Can I put some messages when developers choose 'MD5' or 'SHA-1' to the functions? |
@Taekyoon I don't follow. |
I've added a warning.warn call and have updated the docs to show that the older hashes are insecure and deprecated on this branch on my fork. What is your preferred method of testing this behavior? (I am not super familiar with PyTest.) |
These tests: https://github.com/KeepSafe/aiohttp/blob/master/tests/test_client_functional.py#L256-L308 should raise warning on deprecated fingerprints. |
Fixed by #1341 |
Please remove SHA-1 and MD5 as options for verifying certificates. MD5 is known to be broken for decades and SHA-1 is considered insecure and being depreciated.
Just do not offer these insecure options anymore, so that developers cannot use them. Get security by default!
The text was updated successfully, but these errors were encountered: