Date: Sat, 30 Mar 2002 19:51:18 -0500 From: Will Andrews <will@csociety.org> To: Dag-Erling Smorgrav <des@ofug.org> Cc: "Karsten W. Rohrbach" <karsten@rohrbach.de>, Mike Silbersack <silby@silby.com>, Colin Percival <colin.percival@wadham.ox.ac.uk>, freebsd-security@freebsd.org Subject: Re: It's time for those 2048-, 3072-, and 4096-bit keys? Message-ID: <20020331005118.GK63817@squall.waterspout.com> In-Reply-To: <xzp8z89sgr1.fsf@flood.ping.uio.no> References: <5.0.2.1.1.20020326024955.02392830@popserver.sfu.ca> <20020326034234.Q10197-100000@patrocles.silby.com> <20020326185714.F22539@mail.webmonster.de> <xzp8z89sgr1.fsf@flood.ping.uio.no>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sun, Mar 31, 2002 at 01:49:54AM +0100, Dag-Erling Smorgrav wrote: > Some systems (like the SparcStation 5 that serves DNS, DHCP and NTP > requests from my home network) are too slow for the algorithms used by > ssh2. If you're having problems with DSA, you should be able to use RSA, which is the same algorithm used with SSHv1 if I'm not mistaken. regards, -- wca To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020331005118.GK63817>