Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 30 Mar 2002 19:51:18 -0500
From:      Will Andrews <will@csociety.org>
To:        Dag-Erling Smorgrav <des@ofug.org>
Cc:        "Karsten W. Rohrbach" <karsten@rohrbach.de>, Mike Silbersack <silby@silby.com>, Colin Percival <colin.percival@wadham.ox.ac.uk>, freebsd-security@freebsd.org
Subject:   Re: It's time for those 2048-, 3072-, and 4096-bit keys?
Message-ID:  <20020331005118.GK63817@squall.waterspout.com>
In-Reply-To: <xzp8z89sgr1.fsf@flood.ping.uio.no>
References:  <5.0.2.1.1.20020326024955.02392830@popserver.sfu.ca> <20020326034234.Q10197-100000@patrocles.silby.com> <20020326185714.F22539@mail.webmonster.de> <xzp8z89sgr1.fsf@flood.ping.uio.no>

next in thread | previous in thread | raw e-mail | index | archive | help
On Sun, Mar 31, 2002 at 01:49:54AM +0100, Dag-Erling Smorgrav wrote:
> Some systems (like the SparcStation 5 that serves DNS, DHCP and NTP
> requests from my home network) are too slow for the algorithms used by
> ssh2.

If you're having problems with DSA, you should be able to use
RSA, which is the same algorithm used with SSHv1 if I'm not
mistaken.

regards,
-- 
wca

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020331005118.GK63817>