In the field of cybersecurity, hash algorithms play a crucial role in ensuring data integrity and confidentiality. Among various hash functions available today, one of the most widely used algorithms is the Secure Hash Algorithm 1 (SHA-1).
The primary vulnerability of SHA-1 is its collision resistance, which means that it is possible to find two different messages that produce the same hash value. Therefore, it is recommended that SHA-1 be disabled on Security Analytics.
cp /etc/ssh/sshd_config /etc/ssh/sshd_config.bakMACs hmac-sha2-256,hmac-sha2-512#HostKey /etc/ssh/ssh_host_rsa_keyHostKey /etc/ssh/ssh_host_ecdsa_keyHostKey /etc/ssh/ssh_host_ed25519_keysystemctl restart sshdsha1