{"id":571,"date":"2013-09-20T15:01:06","date_gmt":"2013-09-20T20:01:06","guid":{"rendered":"http:\/\/www.poweradmin.com\/blog\/?p=571"},"modified":"2015-04-27T08:36:37","modified_gmt":"2015-04-27T13:36:37","slug":"sha-1-and-windows-2003","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/sha-1-and-windows-2003\/","title":{"rendered":"SHA-1 Hashing Algorithm &#038; Windows 2003"},"content":{"rendered":"<p>\n\t<a href=\"\/blog\/wp-content\/uploads\/2013\/09\/nist-logo.jpg\" rel=\"\" style=\"\" target=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" alt=\"National Institute of Standards and Technology\" class=\"alignleft size-medium wp-image-575\" height=\"133\" src=\"\/blog\/wp-content\/uploads\/2013\/09\/nist-logo-300x133.jpg\" style=\"margin-left: 0px; margin-right: 15px;\" title=\"\" width=\"300\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/09\/nist-logo-300x133.jpg 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/09\/nist-logo.jpg 336w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><\/a>In 2012, the U.S.\u00a0National Institute of Standards and Technology (NIST) indicated that the SHA-1 hashing algorithm <a href=\"http:\/\/csrc.nist.gov\/groups\/ST\/hash\/policy.html\" target=\"_blank\" rel=\"nofollow\">should no longer be used by federal agencies<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>. \u00a0Our products use <a href=\"\/help\/sslhints\/\">self-signed SSL certificates<\/a> by default (you can replace that with your own certificate), and SHA-1 is used as the signature algorithm. \u00a0\n<\/p>\n<p>\n\t<span style=\"line-height: 1.6em;\">We started researching moving to SHA-2 (SHA-256, SHA-512, etc). \u00a0In our research we discovered that Windows Server 2003 doesn't recognize SHA-2 algorithms without a\u00a0special update, which unfortunately is not pushed out through Windows Update. \u00a0This is very unfortunate as Windows Server 2003 is a stable operating system and still in heavy use.<\/span>\n<\/p>\n<p>\n\tYou can read more about it in a <a href=\"http:\/\/blogs.technet.com\/b\/pki\/archive\/2010\/09\/30\/sha2-and-windows.aspx\" target=\"_blank\" rel=\"nofollow\">Microsoft blog post<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>, including information on getting the update which will enable SHA-2 support.\n<\/p>\n<p>\n\tIf you'd like to use SHA-2 in your self-signed certificates that are created by our products, contact us and we can show you how to do it (pretty easy to do \u2014 you\u00a0just have to be sure no Windows Server 2003 or Windows XP machines will need to connect).\n<\/p>\n<p>\n\t\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In 2012, the U.S.\u00a0National Institute of Standards and Technology (NIST) indicated that the SHA-1 hashing algorithm should no longer be used by federal agencies. \u00a0Our products use self-signed SSL certificates by default (you can replace that with your own certificate), and SHA-1 is used as the signature algorithm. \u00a0 We started researching moving to SHA-2 [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":575,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,6,9,8],"tags":[],"class_list":["post-571","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-tech","category-technical","category-windows"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/571","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=571"}],"version-history":[{"count":5,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/571\/revisions"}],"predecessor-version":[{"id":3580,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/571\/revisions\/3580"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/575"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=571"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=571"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=571"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}