From owner-freebsd-security@FreeBSD.ORG Sun Jun 24 21:18:22 2012 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52]) by hub.freebsd.org (Postfix) with ESMTP id AD6B01065673 for ; Sun, 24 Jun 2012 21:18:22 +0000 (UTC) (envelope-from des@des.no) Received: from smtp.des.no (smtp.des.no [194.63.250.102]) by mx1.freebsd.org (Postfix) with ESMTP id 6C5778FC23 for ; Sun, 24 Jun 2012 21:18:22 +0000 (UTC) Received: from ds4.des.no (smtp.des.no [194.63.250.102]) by smtp.des.no (Postfix) with ESMTP id 4D2FA684B; Sun, 24 Jun 2012 21:18:21 +0000 (UTC) Received: by ds4.des.no (Postfix, from userid 1001) id 14B118A9D; Sun, 24 Jun 2012 23:18:21 +0200 (CEST) From: =?utf-8?Q?Dag-Erling_Sm=C3=B8rgrav?= To: Robert Simmons References: Date: Sun, 24 Jun 2012 23:18:20 +0200 In-Reply-To: (Robert Simmons's message of "Sun, 24 Jun 2012 14:34:45 -0400") Message-ID: <86zk7sxvc3.fsf@ds4.des.no> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/23.3 (berkeley-unix) MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Cc: freebsd-security@freebsd.org Subject: Re: Hardware potential to duplicate existing host keys... RSA DSA ECDSA was Add rc.conf variables... X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 24 Jun 2012 21:18:22 -0000 Robert Simmons writes: > In light of advanced in processors and GPUs, what is the potential for > duplication of RSA, DSA, and ECDSA keys at the current default key > lengths (2048, 1024, and 256 respectively)? You do know that these keys are used only for authentication, and not for encryption, right? DES --=20 Dag-Erling Sm=C3=B8rgrav - des@des.no