Solved

sha1 migration

Posted on 2014-09-09
2
206 Views
Last Modified: 2014-09-23
I read an article on the weakness of SHA1 and it needs to be migrated to SHA2 and I have a few questions:
- How do I check if my webpage is using SHA1?
- When we talk about SHA1, it is at the server and not the client or browser level. Correct?
- If I don't know if I have SHA1 then the webserver has implemented it. Correct?
- In that case, I have to contact them to request for a migration to SH2. Correct?
- People talked about upgrading to SH2, but why big companies don't do it, for ex. google or godaddy. I checked it at the following site www.shaaaaaaaaaaaaa.com. Should I move away from godaddy?

Thx
0
Comment
Question by:leblanc
  • 2
2 Comments
 
LVL 14

Accepted Solution

by:
sentner earned 500 total points
ID: 40312473
Godaddy has a support article about this very issue, which is probably your best reference if that's your provider.

https://support.godaddy.com/help/article/4818/information-about-requiring-the-sha-2-hash-function
0
 
LVL 14

Assisted Solution

by:sentner
sentner earned 500 total points
ID: 40312479
And don't forget to go to the instruction page linked in that support article.  Here's the link:

https://support.godaddy.com/help/article/4976/re-keying-your-ssl-certificate?locale=en
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The next five years are sure to bring developments that are just astonishing, and we will continue to try to find the balance between connectivity and security. Here are five major technological developments from the last five years and some predict…
Many old projects have bad code, but the budget doesn't exist to rewrite the codebase. You can update this code to be safer by introducing contemporary input validation, sanitation, and safer database queries.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

820 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question