Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Microsoft Windows IT Technology

Microsoft To Remove All SHA-1 Windows Downloads Next Week (zdnet.com) 46

Microsoft announced this week plans to remove all Windows-related file downloads from the Microsoft Download Center that are cryptographically signed with the Secure Hash Algorithm 1 (SHA-1). From a report: The files will be removed next Monday, on August 3, the company said on Tuesday. The OS maker cited the security of the SHA-1 algorithm for the move. "SHA-1 is a legacy cryptographic hash that many in the security community believe is no longer secure. Using the SHA-1 hashing algorithm in digital certificates could allow an attacker to spoof content, perform phishing attacks, or perform man-in-the-middle attacks," it said. Most software companies have recently begun abandoning the SHA-1 algorithm after a team of academics broke the SHA-1 hashing function at a theoretical level in February 2016.
This discussion has been archived. No new comments can be posted.

Microsoft To Remove All SHA-1 Windows Downloads Next Week

Comments Filter:
  • Great cover story (Score:5, Insightful)

    by Valkyre ( 101907 ) on Thursday July 30, 2020 @01:22PM (#60348511) Journal

    "However, the OS maker didn't specify if the Windows-related files that are being removed from its downloads center on Monday will be replaced with new download links signed with SHA-2, leaving many too wonder if they'll ever be able to download some of Microsoft's old tools."

    So much this. Easy excuse to get rid of anything that could be helpful or supportive of your older products and force more people against their will to your new not-ness.

    • Eh. Everything Microsoft ever posted is cached in many separate places. None of that stuff is likely to become practically inaccessible in the foreseeable future - too many people have copies.

      That said, this creates an opportunity for bad actors to make available "cached" and SHA-1 signed images that have been intentionally corrupted. If MSFT really cares about security, they'll make an effort to repost the stuff with a more secure hash.

      If they don't do so, that indicates either (1) MSFT doesn't really
      • If MSFT really cares about security, they'll make an effort to repost the stuff with a more secure hash.

        Why would they bother doing that? There's no point re-signing everything they're taking down with SHA-2 and republishing it. Most of the old service packs, hot fixes and tools professionals might be concerned about here are basically for pre-SHA-2 operating systems and software. Microsoft doesn't support Windows 7, Windows Server 2008 R2, SQL Server 2008 R2 or anything that predates them but, right or wrong, there are still a lot of places out there using such things.

        • So now we will have a new batch of compromised computers because people were duped into downloading malware.

          Have fun with the new botnets. I'm sure grandma with her 2002 e-machines computer she refuses to part with will be happy to be part of all this.

      • I tried downloading an old copy of Windows Live Mail 2009 so I could migrate an Outlook Express 6 account to Live Mail 2012. Not only did MS delete every trace of 2009, but almost all download sites have removed their copies, too, probably due to copyright concerns. I was able to nab a copy from a pirate site.

        People seem to forget that even free software is subject to copyright, and a LOT of old stuff is being taken offline even if "everyone has copies". Unlike what we used to believe 20 years ago, the I

    • "However, the OS maker didn't specify if the Windows-related files that are being removed from its downloads center on Monday will be replaced with new download links signed with SHA-2, leaving many too wonder if they'll ever be able to download some of Microsoft's old tools."

      So much this. Easy excuse to get rid of anything that could be helpful or supportive of your older products and force more people against their will to your new not-ness.

      We're talking about Microsoft here. You know, the product pimps with a couple billion customers.

      To say there's another copy out there, is putting it mildly.

    • Replacing with new links won't help older versions of Windows that can't read the new signatures.

    • by tlhIngan ( 30335 )

      "However, the OS maker didn't specify if the Windows-related files that are being removed from its downloads center on Monday will be replaced with new download links signed with SHA-2, leaving many too wonder if they'll ever be able to download some of Microsoft's old tools."

      So much this. Easy excuse to get rid of anything that could be helpful or supportive of your older products and force more people against their will to your new not-ness.

      I'm pretty sure the answer is No.

      Why?

      Think about it - the product

      • by skids ( 119237 )

        As those OSes are probably ancient

        Not being an MS user I have to ask, how recently did MS actually start using something other than SHA-1 to sign? I wouldn't assume they did so in "ancient" times given the general industry lethargy on such matters.

        It's generally not a good idea to remove content and break links. As one of the other posters rightly pointed out it just allows less trustworthy 3rd parties to step in offering to supply the old material.

        Methinks MS just got sick of maintaining these downloads and was more than willing to use th

        • Microsoft started using SHA-2 to sign things in 2025.
          They started using SHA3-256 signatures in 2045.
          They plan to transition to SHA3-512 at the turn of the century in 3000.

  • "Experts believe" but have never really shown it to be the case. Various unrelated, limited scenario "attacks" in special and non-standard cases. How about show that it's actually compromised? OK, you don't have to, you can say you "believe" and that's good enough, but don't expect me to take your excuse seriously. Microsoft doesn't give a crap about my security.
    • Why do you insist on waiting for a publicly demonstrated exploit before taking any action? (Especially considering that we're talking about a high-profile software distribution site.)

      You don't think that it's possible that some actors in this world might develop and exploit security vulnerabilities without making them public first?

      • Why do you insist on waiting for a publicly demonstrated exploit before taking any action? (Especially considering that we're talking about a high-profile software distribution site.)

        You don't think that it's possible that some actors in this world might develop and exploit security vulnerabilities without making them public first?

        Context.

        If you're deploying a VPN with SHA-1, or doing file encryption with SHA-1 in 2020....yeah, that's asking for trouble and reflecting laziness as SHA-256 has been around for quite some time now.

        If Microsoft has an ISO file of Windows98SE still running around their download center, then the attack involves someone replacing that ISO with one that has malware in it, but still has Microsoft's SHA-1 signature and passes validation, and uploading it to Microsoft's CDNs, with the payoff of.....infecting peo

As you will see, I told them, in no uncertain terms, to see Figure one. -- Dave "First Strike" Pare

Working...