<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic HTTPS SSL Certificate Signed using Weak Hashing Algorithm in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/https-ssl-certificate-signed-using-weak-hashing-algorithm/m-p/1760809#M495261</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Ramkumar,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The report is complaining that the Certificate Authority who signed the ID certificate presented by the ASA used a weak hashing algorithm. First, you need to determine who signed the certificate. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the certificate is self-signed by the ASA, you can generate a new certificate and use SHA1 as the hashing algorithm. To do this, the ASA needs to be running a software version that is at least 8.2(4) (8.3 and 8.4 software also support SHA1).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the certificate is signed by an external CA, you need to contact them and ask them to sign a new certificate for you using SHA instead of MD5.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The links you posted have more information on this as well. Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 22 Oct 2011 12:01:18 GMT</pubDate>
    <dc:creator>mirober2</dc:creator>
    <dc:date>2011-10-22T12:01:18Z</dc:date>
    <item>
      <title>HTTPS SSL Certificate Signed using Weak Hashing Algorithm</title>
      <link>https://community.cisco.com/t5/network-security/https-ssl-certificate-signed-using-weak-hashing-algorithm/m-p/1760808#M495257</link>
      <description>&lt;P&gt; I am support one client for,&amp;nbsp; whom falls under Security&amp;nbsp; scans mandatory for new implementation of ASA 5520 device .&amp;nbsp; The client uses Nessus Scan and&amp;nbsp; the test results are attached&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Nessus scanner hit on 1 Medium vulnerabilities, Could you pls review the statement and provide work around for the same.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nessus Scanner reports&lt;/P&gt;&lt;P&gt;-----------------------------------&lt;/P&gt;&lt;P id="medium"&gt;Medium Severity Vulnerability&lt;/P&gt;&lt;P&gt; Port : &lt;A name="9_28_223_21_443_tcp_35291" target="_blank"&gt;https (443/tcp)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Issue:&lt;/P&gt;&lt;DIV id="other"&gt;&lt;STRONG&gt;SSL Certificate Signed using Weak Hashing&amp;nbsp; Algorithm&lt;/STRONG&gt;&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Synopsis : &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The SSL certificate has been signed using&amp;nbsp; a weak hash algorithm.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Description : &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The remote service uses an&amp;nbsp; SSL certificate that has been signed using&lt;/P&gt;&lt;P&gt;a cryptographically weak hashing&amp;nbsp; algorithm - MD2, MD4, or MD5. These&lt;/P&gt;&lt;P&gt;signature algorithms are known to be&amp;nbsp; vulnerable to collision attacks. &lt;/P&gt;&lt;P&gt;In theory, a determined attacker may be&amp;nbsp; able to leverage this weakness&lt;/P&gt;&lt;P&gt;to generate another certificate with the same&amp;nbsp; digital signature, which&lt;/P&gt;&lt;P&gt;could allow him to masquerade as the affected&amp;nbsp; service.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See also : &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;A href="http://tools.ietf.org/html/rfc3279" target="_blank"&gt;http://tools.ietf.org/html/rfc3279&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;A href="http://www.phreedom.org/research/rogue-ca/" target="_blank"&gt;http://www.phreedom.org/research/rogue-ca/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;A href="http://www.microsoft.com/technet/security/advisory/961509.mspx" target="_blank"&gt;http://www.microsoft.com/technet/security/advisory/961509.mspx&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;A href="http://www.kb.cert.org/vuls/id/836068" target="_blank"&gt;http://www.kb.cert.org/vuls/id/836068&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Solution : &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Contact the Certificate Authority to have the certificate&amp;nbsp; reissued.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Plugin Output : &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the service's SSL certificate&amp;nbsp; :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Subject Name: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Common Name: xxxxxxxxxx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Issuer Name: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Common Name: xxxxxxxxxx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Serial Number: D8 2E 56 4E &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Version: 3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Signature Algorithm: MD5 With RSA&amp;nbsp; Encryption&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not Valid Before: Aug 25 11:15:36 2011 GMT&lt;/P&gt;&lt;P&gt;Not Valid After:&amp;nbsp; Aug 22 11:15:36 2021 GMT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Public Key Info: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Algorithm: RSA&amp;nbsp; Encryption&lt;/P&gt;&lt;P&gt;Public Key: 00 AA AB 57 9C 74 FF E9 FB 68 E1 BF 69 90 8E D2 65 7F&amp;nbsp; DF 40 &lt;/P&gt;&lt;P&gt;D6 F6 29 E7 35 5E 16 FB 76 AA 03 3F 47 07 5A D0 6D 07 E0 EC &lt;/P&gt;&lt;P&gt;06 7E&amp;nbsp; D4 9A 43 C6 B3 A6 93 B7 76 CC 58 31 25 36 98 04 30 E6 &lt;/P&gt;&lt;P&gt;77 56 D7 C3 EE EF 7A&amp;nbsp; 79 21 5E A0 78 9B F6 1B C5 E6 2A 10 B5 &lt;/P&gt;&lt;P&gt;CB 90 3D 6D 7C A0 8D B1 B8 76 61 7F&amp;nbsp; E2 D1 00 45 E2 A1 C7 9F &lt;/P&gt;&lt;P&gt;57 00 37 60 27 E1 56 2A 83 F5 0E 48 36 CC 61 85 59&amp;nbsp; 54 0C CB &lt;/P&gt;&lt;P&gt;78 82 FB 50 17 CB 7D CD 15 &lt;/P&gt;&lt;P&gt;Exponent: 01 00 01 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Signature: 00 24 51 24 25 47 62 30 73 95 37 C4 71 7E BD E4 95 68 76 35 &lt;/P&gt;&lt;P&gt;2E AF 2B 4A 23 EE 15 AF E9 09 93 3F 02 BB F8 45 00 A1 12 A9 &lt;/P&gt;&lt;P&gt;F7 5A 0C E8&amp;nbsp; 4D DB AE 92 70 E4 4C 24 10 58 6B A9 87 E1 F0 12 &lt;/P&gt;&lt;P&gt;AE 12 18 E8 AB DF B9 02 F7&amp;nbsp; DA BE 3C 45 02 C4 1E 81 44 C2 74 &lt;/P&gt;&lt;P&gt;25 A2 81 E7 D6 38 ED B9 66 4C 4A 17 AC E3&amp;nbsp; 05 1A 01 14 88 23 &lt;/P&gt;&lt;P&gt;E8 9F 3B 5C C5 B8 13 97 27 17 C3 02 5F 6E 7C DB 4C D3 65&amp;nbsp; B5 &lt;/P&gt;&lt;P&gt;C5 FC 94 62 59 04 E7 7E FB&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CVE : &lt;/P&gt;&lt;P&gt; &lt;A href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2761" target="_blank"&gt;CVE-2004-2761&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BID : &lt;/P&gt;&lt;P&gt; &lt;A href="http://www.securityfocus.com/bid/11849" target="_blank"&gt;BID 11849&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;A href="http://www.securityfocus.com/bid/33065" target="_blank"&gt;BID&amp;nbsp; 33065&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Other References : &lt;/P&gt;&lt;P&gt;OSVDB:45106&lt;/P&gt;&lt;P&gt;OSVDB:45108&lt;/P&gt;&lt;P&gt;OSVDB:45127&lt;/P&gt;&lt;P&gt;CWE:310&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nessus Plugin ID&amp;nbsp; : &lt;/P&gt;&lt;P&gt; &lt;A href="http://www.nessus.org/plugins/index.php?view=single&amp;amp;id=35291" target="_blank"&gt;35291&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;VulnDB ID: &lt;/P&gt;&lt;P&gt; &lt;A href="https://w3.secintel.ibm.com/vscan/refs/refs.php?vuln_id=69469" target="_blank"&gt;69469&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;and try with configure the ssl encryption method with " ssl encryption 3des-sha1 aes128-sha1 aes256-sha1 rc4-md5" but it throws the same issue.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is ASA log &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725010: Device supports the following 4 cipher(s).&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[1] : DES-CBC3-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[2] : AES128-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[3] : AES256-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[4] : RC4-MD5&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725008: SSL client production:xxxxxxxxx/2587 proposes the following 26 cipher(s).&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[1] : ADH-AES256-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[2] : DHE-RSA-AES256-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[3] : DHE-DSS-AES256-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[4] : AES256-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[5] : ADH-AES128-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[6] : DHE-RSA-AES128-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[7] : DHE-DSS-AES128-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[8] : AES128-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[9] : ADH-DES-CBC3-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[10] : ADH-DES-CBC-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[11] : EXP-ADH-DES-CBC-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[12] : ADH-RC4-MD5&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[13] : EXP-ADH-RC4-MD5&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[14] : EDH-RSA-DES-CBC3-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[15] : EDH-RSA-DES-CBC-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[16] : EXP-EDH-RSA-DES-CBC-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[17] : EDH-DSS-DES-CBC3-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[18] : EDH-DSS-DES-CBC-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[19] : EXP-EDH-DSS-DES-CBC-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[20] : DES-CBC3-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[21] : DES-CBC-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[22] : EXP-DES-CBC-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[23] : EXP-RC2-CBC-MD5&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[24] : RC4-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[25] : RC4-MD5&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[26] : EXP-RC4-MD5&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725012: Device chooses cipher : DES-CBC3-SHA for the SSL session with client production:xxxxxxxx/2586&lt;/P&gt;&lt;P&gt;6|Oct 19 2011 01:59:34|725002: Device completed SSL handshake with client production:xxxxxxxxx/2586&lt;/P&gt;&lt;P&gt;6|Oct 19 2011 01:59:34|725007: SSL session with client production:xxxxxxxx/2586 terminated.&lt;/P&gt;&lt;P&gt;6|Oct 19 2011 01:59:34|302014: Teardown TCP connection 3201 for production:xxxxxxx/2586 to identity:xxxxxx/443 duration 0:00:00 bytes 758 TCP Reset-I&lt;/P&gt;&lt;P&gt;6|Oct 19 2011 01:59:34|302013: Built inbound TCP connection 3202 for production:xxxxxxxxxxx/2587 (xxxxxxxxx/2587) to identity:xxxxxx/443 (xxxxxxx/443)&lt;/P&gt;&lt;P&gt;6|Oct 19 2011 01:59:34|725001: Starting SSL handshake with client production:xxxxxxxxxxx/2587 for TLSv1 session.&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725010: Device supports the following 4 cipher(s).&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[1] : DES-CBC3-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[2] : AES128-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[3] : AES256-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[4] : RC4-MD5&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725008: SSL client production:xxxxxxxxx/2587 proposes the following 26 cipher(s).&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[1] : ADH-AES256-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[2] : DHE-RSA-AES256-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[3] : DHE-DSS-AES256-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[4] : AES256-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[5] : ADH-AES128-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[6] : DHE-RSA-AES128-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[7] : DHE-DSS-AES128-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[8] : AES128-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[9] : ADH-DES-CBC3-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[10] : ADH-DES-CBC-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[11] : EXP-ADH-DES-CBC-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[12] : ADH-RC4-MD5&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[13] : EXP-ADH-RC4-MD5&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[14] : EDH-RSA-DES-CBC3-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[15] : EDH-RSA-DES-CBC-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[16] : EXP-EDH-RSA-DES-CBC-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[17] : EDH-DSS-DES-CBC3-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[18] : EDH-DSS-DES-CBC-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[19] : EXP-EDH-DSS-DES-CBC-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[20] : DES-CBC3-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[21] : DES-CBC-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[22] : EXP-DES-CBC-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[23] : EXP-RC2-CBC-MD5&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[24] : RC4-SHA&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[25] : RC4-MD5&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725011: Cipher[26] : EXP-RC4-MD5&lt;/P&gt;&lt;P&gt;7|Oct 19 2011 01:59:34|725012: Device chooses cipher : DES-CBC3-SHA for the SSL session with client production:xxxxxxxxxx/2587&lt;/P&gt;&lt;P&gt;6|Oct 19 2011 01:59:34|725002: Device completed SSL handshake with client production:xxxxxxxxx/2587&lt;/P&gt;&lt;P&gt;H&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:39:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/https-ssl-certificate-signed-using-weak-hashing-algorithm/m-p/1760808#M495257</guid>
      <dc:creator>ramkumar-n</dc:creator>
      <dc:date>2019-03-11T21:39:59Z</dc:date>
    </item>
    <item>
      <title>HTTPS SSL Certificate Signed using Weak Hashing Algorithm</title>
      <link>https://community.cisco.com/t5/network-security/https-ssl-certificate-signed-using-weak-hashing-algorithm/m-p/1760809#M495261</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Ramkumar,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The report is complaining that the Certificate Authority who signed the ID certificate presented by the ASA used a weak hashing algorithm. First, you need to determine who signed the certificate. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the certificate is self-signed by the ASA, you can generate a new certificate and use SHA1 as the hashing algorithm. To do this, the ASA needs to be running a software version that is at least 8.2(4) (8.3 and 8.4 software also support SHA1).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the certificate is signed by an external CA, you need to contact them and ask them to sign a new certificate for you using SHA instead of MD5.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The links you posted have more information on this as well. Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 22 Oct 2011 12:01:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/https-ssl-certificate-signed-using-weak-hashing-algorithm/m-p/1760809#M495261</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2011-10-22T12:01:18Z</dc:date>
    </item>
    <item>
      <title>HTTPS SSL Certificate Signed using Weak Hashing Algorithm</title>
      <link>https://community.cisco.com/t5/network-security/https-ssl-certificate-signed-using-weak-hashing-algorithm/m-p/1760810#M495264</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I am having this same issue with a PIX 8.0.4.&amp;nbsp; How do I know if the cert is self signed?&lt;/P&gt;&lt;P&gt;I did try to do a sh crypto ca cert.&amp;nbsp; Nothing came back.&amp;nbsp; Does that mean it is not self signed?&lt;/P&gt;&lt;P&gt;Because this firewall has been running before I started working on it.&lt;/P&gt;&lt;P&gt;Let me know thanks,&lt;/P&gt;&lt;P&gt;David &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Dec 2011 20:08:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/https-ssl-certificate-signed-using-weak-hashing-algorithm/m-p/1760810#M495264</guid>
      <dc:creator>david.contreras</dc:creator>
      <dc:date>2011-12-09T20:08:03Z</dc:date>
    </item>
  </channel>
</rss>

