TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Google.com is still SHA-1 but they green-light their domains

35 pointsby pmccarrenabout 10 years ago

4 comments

geofftabout 10 years ago
The certificate is expiring in less than three months. Chrome has always been clear that they don&#x27;t care about SHA-1 certs that are expiring within 2015. They just want to make sure that when you renew those certs, you renew as SHA-256.<p><a href="http:&#x2F;&#x2F;googleonlinesecurity.blogspot.com&#x2F;2014&#x2F;09&#x2F;gradually-sunsetting-sha-1.html" rel="nofollow">http:&#x2F;&#x2F;googleonlinesecurity.blogspot.com&#x2F;2014&#x2F;09&#x2F;gradually-s...</a><p>&quot;Sites with end-entity certificates that expire between 1 January 2016 and 31 December 2016 (inclusive), and which include a SHA-1-based signature as part of the certificate chain, will be treated as &#x27;secure, but with minor errors&#x27; [i.e., the lock-with-yellow-triangle you also get for mixed content].<p>&quot;Sites with end-entity certificates that expire on or after 1 January 2017, and which include a SHA-1-based signature as part of the certificate chain, will be treated as &#x27;affirmatively insecure&#x27;. Subresources from such domain will be treated as &#x27;active mixed content&#x27;.&quot;
评论 #9412587 未加载
thesimonabout 10 years ago
Their certs expire before the deadline (only valid for 3 months) so they show up as green.<p>They seem to get new certs every three months.
评论 #9412650 未加载
评论 #9412554 未加载
dgomez1092about 10 years ago
I noticed that they use a 3 tier system. But even SHA-1 encryption, I wanted to talk about how it compares to the use of RC4 on AES. I am still learning about the effectual uses of encryption but it would seem to me that being able to use modulo as you swap indeces throughout the hash would enable more coerce authentication if not for the sole reason that it would be difficult to find out the derivative of both of the numbers that gave modulo. VS AES whose algorithm uses a reverse mapping of the hash in order to equate the distance from left to right between the indeces.It is said that RC$ is less secure as a method because of it is more prone to WEP attacks due to its inability to factorialize an instance of teh hash suring the scheduling phase, while it only allows for a 64 bit size whereas AES is more sutiable for 256 bit. It&#x27;s adavtnage lies in large network systems but would be suitable for API distributions. In effect its PRG would be effective in taking a modulo variable being parsed as K[] progresses through the list in a function that combines it along wth the inverse natural e in to create an limit as protection from FMS attacks even at a byte level. Thanks for letting me comment and learn.
alanfranzoniabout 10 years ago
Beyond the expiry fact, I think google does pinning for their certs. If you pin your certs you don&#x27;t really care a lot whether the ca is compromised, and here it&#x27;s just the ca that&#x27;s got sha1 signing, not the actual cert which is sha2.
评论 #9412569 未加载