Date: Thu, 29 Aug 2002 18:30:06 +0300 From: Alexandr Kovalenko <never@nevermind.kiev.ua> To: "Perry E. Metzger" <perry@piermont.com> Cc: mipam@ibb.net, Matthias Buelow <mkb@mukappabeta.de>, Stefan Kr?ger <skrueger@europe.com>, freebsd-security@FreeBSD.ORG, tech-security@netbsd.org, misc@openbsd.org Subject: Re: 1024 bit key considered insecure (sshd) Message-ID: <20020829153006.GB26145@nevermind.kiev.ua> In-Reply-To: <87k7mamc2s.fsf@snark.piermont.com> References: <20020828200748.90964.qmail@mail.com> <3D6D3953.6090005@mukappabeta.de> <20020828224330.GE249@localhost> <87k7mamc2s.fsf@snark.piermont.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Hello, Perry E. Metzger! On Thu, Aug 29, 2002 at 02:08:27AM -0400, you wrote: > > > >and maybe we should update our rc scripts, > > > >so that ssh-keygen generates at least 1280 Bit keys > > > I think this is highly overrated and only of theoretical > > > value for most *BSD users. > > I dont think its too much overrated and theoretical. > I do. If someone with millions of dollars to spend on custom designed > hardware wants to break into your computer, I assure you that > increasing the size of your ssh keys will not stop them. Nor, for that > matter, would the slow and tedious process of cracking your ssh keys > be nearly as efficient as the more pragmatic alternatives. Much more simplier is to get physical access with those millions of dollars. -- NEVE-RIPE Ukrainian FreeBSD User Group http://uafug.org.ua/ To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020829153006.GB26145>