-
Notifications
You must be signed in to change notification settings - Fork 574
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Move from SHA1 to SHA256 #953
Comments
- new variable "digestalg" which defaults to "sha1", but allows "sha256" for those who want to sign using this - Addresses #953
Wouldn't this potentially make it possible to use the bitcoin ASICs to spam bitmessage? |
@g1itch I doubt it. |
@g1itch Bitmessage uses double SHA512 for PoW, so no. The SHA1 -> SHA256 migration is only for sender authentication. |
Has there been any progress on this issue? |
If the ASIC's are implemented by using FPGAs, which might be the case to allow the same hardware, server park, to be reconfigured and reused for mining other cryptocoins after the Bitcoin "mine" has become "depleted enough", then the switch from one hash algorithm to another is not that big of an impediment for the server park owners. |
@kewde You can specify that you want to send SHA256-hashed messages by specifying
in the bitmessagemain section of keys.dat. The other steps outlined will progress as new releases are made. |
This probably should be expedited, it's been waiting for too long. I've been running with |
Recently the team at Google have found the first SHA1 collision,
the ECDSA signatures use SHA1 and most of the code for a switch to SHA256 is in the comments already.
https://security.googleblog.com/2017/02/announcing-first-sha1-collision.html
The text was updated successfully, but these errors were encountered: