Red Hat Security Blog: January 2017 archives

  • Deprecation of Insecure Algorithms and Protocols in RHEL 6.9

    Cryptographic protocols and algorithms have a limited lifetime—much like everything else in technology. Algorithms that provide cryptographic hashes and encryption as well as cryptographic protocols have a lifetime after which they are considered either too risky to use or plain insecure. In this post, we will describe the changes planned for the 6.9 release of Red Hat Enterprise Linux 6, which is already on Production Phase 2. Balancing Legacy Use Cases and Modern Threats For the RHEL...
    Posted 2017-01-03T14:30:00+00:00 - 0