In the field of cybersecurity, hash algorithms play a crucial role in ensuring data integrity and confidentiality. Among various hash functions available today, one of the most widely used algorithms is the Secure Hash Algorithm 1 (SHA-1).
The primary vulnerability of SHA-1 is its collision resistance, which means that it is possible to find two different messages that produce the same hash value. Therefore, it is recommended that SHA-1 be disabled on Security Analytics.
cp /etc/ssh/sshd_config /etc/ssh/sshd_config.bak
MACs hmac-sha2-256,hmac-sha2-512
#HostKey /etc/ssh/ssh_host_rsa_key
HostKey /etc/ssh/ssh_host_ecdsa_key
HostKey /etc/ssh/ssh_host_ed25519_key
systemctl restart sshd
sha1