Date: Mon, 1 Apr 2002 13:48:16 -0500 (EST) From: Garrett Wollman <wollman@lcs.mit.edu> To: Dag-Erling Smorgrav <des@ofug.org> Cc: freebsd-security@FreeBSD.ORG Subject: Re: It's time for those 2048-, 3072-, and 4096-bit keys? Message-ID: <200204011848.g31ImGv55875@khavrinen.lcs.mit.edu> In-Reply-To: <xzp8z89sgr1.fsf@flood.ping.uio.no> References: <5.0.2.1.1.20020326024955.02392830@popserver.sfu.ca> <20020326034234.Q10197-100000@patrocles.silby.com> <20020326185714.F22539@mail.webmonster.de> <xzp8z89sgr1.fsf@flood.ping.uio.no>
next in thread | previous in thread | raw e-mail | index | archive | help
<<On 31 Mar 2002 01:49:54 +0100, Dag-Erling Smorgrav <des@ofug.org> said: > Some systems (like the SparcStation 5 that serves DNS, DHCP and NTP > requests from my home network) are too slow for the algorithms used by > ssh2. It's perfectly acceptable on our IPX. The session takes a few seconds to start, and the keys took a long time to generate, but once authenticated there does not seem to be much difference to me. (In fact, `cat /etc/termcap' takes consistently twice as long using v1 as v2.) -GAWollman To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200204011848.g31ImGv55875>