From owner-freebsd-security Sat Dec 9 23:36: 7 2000 From owner-freebsd-security@FreeBSD.ORG Sat Dec 9 23:36:05 2000 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from citi.umich.edu (citi.umich.edu [141.211.92.141]) by hub.freebsd.org (Postfix) with ESMTP id 6AE9137B400; Sat, 9 Dec 2000 23:36:01 -0800 (PST) Received: from citi.umich.edu (ssh-mapper.citi.umich.edu [141.211.92.147]) by citi.umich.edu (Postfix) with ESMTP id C536E207C1; Sun, 10 Dec 2000 02:35:50 -0500 (EST) Subject: Re: Re[2]: OpenSSH 2.3.0 pre-upgrade From: Niels Provos In-Reply-To: Boris, Sat, 25 Nov 2000 11:05:04 PST To: Boris Cc: Kris Kennaway , "Brian F. Feldman" , security@FreeBSD.ORG Date: Sun, 10 Dec 2000 02:35:50 -0500 Sender: provos@citi.umich.edu Message-Id: <20001210073550.C536E207C1@citi.umich.edu> Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org In message <7885578635.20001125110504@x-itec.de>, Boris writes: >How to recreate these numbers? I do not like static factors for >encryption, they are always a security risc But you like the one single static group that is being used in the basic DH key exchange? That does not make much sense. The primes were generated with a program written by Phil Karn and Bill Simpson. You can find the programs used to generate them at http://www.citi.umich.edu/u/provos/tmp/prime.tar.gz Niels. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message