|author||Dag-Erling Smørgrav <des@FreeBSD.org>||2017-03-02 00:27:21 +0000|
|committer||Dag-Erling Smørgrav <des@FreeBSD.org>||2017-03-02 00:27:21 +0000|
Update to reflect that SHA-1 has now been broken.
Submitted by: ak MFC after: 1 week
Notes: svn path=/head/; revision=314528
Diffstat (limited to 'sbin/md5/md5.1')
1 files changed, 12 insertions, 14 deletions
diff --git a/sbin/md5/md5.1 b/sbin/md5/md5.1
index f877c1e1ace1..acc2cdc2680e 100644
@@ -1,5 +1,5 @@
-.Dd January 7, 2017
+.Dd March 2, 2017
.Dt MD5 1
@@ -84,21 +84,17 @@ in a secure manner before being encrypted with a private
key under a public-key cryptosystem such as
.Tn RSA .
-has been completely broken as far as finding collisions is
-concerned, and should not be relied upon to produce unique outputs.
-This also means that
-should not be used as part of a cryptographic signature scheme.
-At the current time (2014-05-17) there is no publicly known method to
-MD5, i.e., to find an input given a hash value.
-currently (2014-05-17) has no known collisions, but an attack has been
-found which is faster than a brute-force search, placing the security of
+algorithms have been proven to be vulnerable to practical collision
+attacks and should not be relied upon to produce unique outputs, nor
+should they be used as part of a cryptographic signature scheme.
+As of 2016-03-02, there is no publicly known method to
+either algorithm, i.e. to find an input that produces a specific
is a version of
@@ -111,6 +107,8 @@ The hashes are not interchangeable.
It is recommended that all new applications use
instead of one of the other hash functions.
The following options may be used in any combination and must