Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 1 Apr 2002 13:48:16 -0500 (EST)
From:      Garrett Wollman <wollman@lcs.mit.edu>
To:        Dag-Erling Smorgrav <des@ofug.org>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: It's time for those 2048-, 3072-, and 4096-bit keys?
Message-ID:  <200204011848.g31ImGv55875@khavrinen.lcs.mit.edu>
In-Reply-To: <xzp8z89sgr1.fsf@flood.ping.uio.no>
References:  <5.0.2.1.1.20020326024955.02392830@popserver.sfu.ca> <20020326034234.Q10197-100000@patrocles.silby.com> <20020326185714.F22539@mail.webmonster.de> <xzp8z89sgr1.fsf@flood.ping.uio.no>

next in thread | previous in thread | raw e-mail | index | archive | help
<<On 31 Mar 2002 01:49:54 +0100, Dag-Erling Smorgrav <des@ofug.org> said:

> Some systems (like the SparcStation 5 that serves DNS, DHCP and NTP
> requests from my home network) are too slow for the algorithms used by
> ssh2.

It's perfectly acceptable on our IPX.  The session takes a few seconds
to start, and the keys took a long time to generate, but once
authenticated there does not seem to be much difference to me.  (In
fact, `cat /etc/termcap' takes consistently twice as long using v1 as
v2.)

-GAWollman


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200204011848.g31ImGv55875>