<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=16&amp;t=2154" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2016-01-08T22:21:24+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=16&amp;t=2154</id>
<entry>
<author><name><![CDATA[cruxic]]></name></author>
<updated>2016-01-08T22:21:24+01:00</updated>
<published>2016-01-08T22:21:24+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2154&amp;p=8134#p8134</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2154&amp;p=8134#p8134"/>
<title type="html"><![CDATA[SHA1 Security Vulnerability]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2154&amp;p=8134#p8134"><![CDATA[
I'm considering an application which would use the Yubikey's HMAC challenge-response mode.  However given SHA1's <a href="https://threatpost.com/sloth-attacks-up-ante-on-sha-1-md5-deprecation/115807/" class="postlink">questionable strength</a> I'm wondering if the new YubiKey 4 offers a stronger alternative (SHA2 family).  Does it?  Am I the only person to voice this concern?<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4128">cruxic</a> — Fri Jan 08, 2016 10:21 pm</p><hr />
]]></content>
</entry>
</feed>