How does the weakness of SHA-1 introduce attack vectors in SSH?
The security branch of my company worries that the use of older versions of OpenSSH (pre-7.4), where the only Key Exchange Algorithm available is SHA-1 is a major security issue. They suggest generating new public/private keypairs for all … Continue reading How does the weakness of SHA-1 introduce attack vectors in SSH?