Solved

sha1 migration

Posted on 2014-09-09
2
210 Views
Last Modified: 2014-09-23
I read an article on the weakness of SHA1 and it needs to be migrated to SHA2 and I have a few questions:
- How do I check if my webpage is using SHA1?
- When we talk about SHA1, it is at the server and not the client or browser level. Correct?
- If I don't know if I have SHA1 then the webserver has implemented it. Correct?
- In that case, I have to contact them to request for a migration to SH2. Correct?
- People talked about upgrading to SH2, but why big companies don't do it, for ex. google or godaddy. I checked it at the following site www.shaaaaaaaaaaaaa.com. Should I move away from godaddy?

Thx
0
Comment
Question by:leblanc
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
2 Comments
 
LVL 14

Accepted Solution

by:
sentner earned 500 total points
ID: 40312473
Godaddy has a support article about this very issue, which is probably your best reference if that's your provider.

https://support.godaddy.com/help/article/4818/information-about-requiring-the-sha-2-hash-function
0
 
LVL 14

Assisted Solution

by:sentner
sentner earned 500 total points
ID: 40312479
And don't forget to go to the instruction page linked in that support article.  Here's the link:

https://support.godaddy.com/help/article/4976/re-keying-your-ssl-certificate?locale=en
0

Featured Post

How to Defend Against the WCry Ransomware Attack

On May 12, 2017, an extremely virulent ransomware variant named WCry 2.0 began to infect organizations. Within several hours, over 75,000 victims were reported in 90+ countries. Learn more from our research team about this threat & how to protect your organization!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Ransomware is a malware that is again in the list of security  concerns. Not only for companies, but also for Government security and  even at personal use. IT departments should be aware and have the right  knowledge to how to fight it.
Many old projects have bad code, but the budget doesn't exist to rewrite the codebase. You can update this code to be safer by introducing contemporary input validation, sanitation, and safer database queries.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

710 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question