Date: Thu, 4 Oct 2001 02:44:26 -0700 From: Kris Kennaway <kris@obsecurity.org> To: Peter Pentchev <roam@ringlet.net> Cc: Zvezdan Petkovic <zvezdan@CS.WM.EDU>, security@FreeBSD.ORG, markus@openbsd.org Subject: Re: default cipher types in openssh Message-ID: <20011004024425.A47260@xor.obsecurity.org> In-Reply-To: <20011004104839.A1959@ringworld.oblivion.bg>; from roam@ringlet.net on Thu, Oct 04, 2001 at 10:48:39AM %2B0300 References: <20011004011840.74747.qmail@web13904.mail.yahoo.com> <20011003221421.A28053@dali.cs.wm.edu> <20011004104839.A1959@ringworld.oblivion.bg>
next in thread | previous in thread | raw e-mail | index | archive | help
--UlVJffcvxoiEqYs2 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Thu, Oct 04, 2001 at 10:48:39AM +0300, Peter Pentchev wrote: > On Wed, Oct 03, 2001 at 10:14:21PM -0400, Zvezdan Petkovic wrote: > > According to the above we just need to update the stable branch to > > 2.9.9, or at least the port (which seems to be on the way). > > Other people probably know what would be better solution. >=20 > -STABLE is at 2.9.0 as of September 28th. It seems to use AES128 now, to= o. Hmm, I didn't even know it could do that :) Someone needs to update the usage message for ssh: -c cipher Select encryption algorithm: ``3des'', ``blowfish'' Kris --UlVJffcvxoiEqYs2 Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (FreeBSD) Comment: For info see http://www.gnupg.org iD8DBQE7vC95Wry0BWjoQKURApveAJwIW2KDcD+INEqXEw2aIkMtH6nb1wCdH/YV ov2uwMSMvl03GK4d70Z45xI= =wnk+ -----END PGP SIGNATURE----- --UlVJffcvxoiEqYs2-- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20011004024425.A47260>