MD5 has been discredited (found insecure) a long time ago. Putting out
*new* signatures with SHA256 shouldn't be all that hard. And just like
some new sigs needing a recent version of ClamAV because of their
content, SHA-signed sigs could demand a new ClamAV version.

As far as a being a security issue, forged sigs could cause denial of
service via false positives. (And I imagine there could even be
actively malicious bytecode.)

P.S. Mozilla is even providing SHA512 sigs for Firefox (ESR, at least).


On Fri, 08 Sep 2017 04:27:42 -0700
Al Varnell <alvarn...@mac.com> wrote:

> I'm struggling to understand how that would improve the DB? It's not
> a security issue and it would seemingly involve a ton of work to run
> all those samples again just to get a larger number which would
> require additional time to download and space to store the DB as well
> as in RAM.
> 
> -Al-
> 
> On Fri, Sep 08, 2017 at 04:12 AM, Vijayakumar U wrote:
> > Dear Team,
> > 
> > Do we have any plans to maintain/update the signature DB with
> > sha256sum?
> > 
> > Is there any specific reason to maintain the signatures in md5sum
> > format?
> > 
> > Please clarify.
_______________________________________________
clamav-users mailing list
clamav-users@lists.clamav.net
http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to