Results 1 to 5 of 5

Thread: how do i uninstall SHA1?

  1. #1
    Join Date
    Jan 2010
    Location
    Wheeling WV USA
    Beans
    1,591
    Distro
    Xubuntu 18.04 Bionic Beaver

    how do i uninstall SHA1?

    i what to eliminate SHA1 from my system. but dpkg -l finds no such package.
    You can't have my Windows 95 until you pry it from my cold dead 1 GB IDE hard drive.

  2. #2
    Join Date
    May 2013
    Location
    Galiza
    Beans
    437
    Distro
    Ubuntu

    Re: how do i uninstall SHA1?

    There is no such package.

    What exactly are you trying to do?

  3. #3
    Join Date
    Dec 2014
    Beans
    1,363

    Re: how do i uninstall SHA1?

    SHA1 is not a separate piece of software, it's a hashing algorithm built into multiple pieces of software (take a look at 'apt search sha1'; there's at least three libraries (librhash0, libmhash2, libgcrypt20) that each implement SHA1 and a lot of other hashes). Since these usually offer several hash-functions, the right way to handle the vulnerability of SHA1 is to configure your software to use a different hashing algorithm and to never ever fall back to SHA1.

    Holger

  4. #4
    Join Date
    Jan 2010
    Location
    Wheeling WV USA
    Beans
    1,591
    Distro
    Xubuntu 18.04 Bionic Beaver

    Re: how do i uninstall SHA1?

    i want to have any software still using SHA1 to fail, if it is trying to use shared implementations. that is to discover any overlooked uses of SHA1.
    You can't have my Windows 95 until you pry it from my cold dead 1 GB IDE hard drive.

  5. #5
    Join Date
    Aug 2011
    Location
    51.8° N 5.8° E
    Beans
    4,922
    Distro
    Xubuntu 19.10 Eoan Ermine

    Re: how do i uninstall SHA1?

    You could get the source code of the hashing library, remove the SHA-1 code, compile and install. But that doesn't seem like a good idea to me. SHA-1 may no longer be considered cryptographically secure (and hasn't been for years), but it's widely used in applications where that doesn't matter: git, backup tools, file indexing tools, checking for accidental file corruption. Even MD5 is still widely used for such purposes. And you'd have to make sure you get the security upgrades for the other hashing functions in the same library manually.

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •