Am 19.10.2016 um 17:30 schrieb Leonard den Ottolander <leonard@xxxxxxxxxxxxxxxxx>: > Hello Clint, > > On Wed, 2016-10-19 at 11:28 +1300, Clint Dilks wrote: >> The following weak client-to-server encryption algorithms are supported by >> the remote service: >> rijndael-cbc@xxxxxxxxxxxxxx >> arcfour256 >> arcfour128 >> aes256-cbc >> 3des-cbc >> aes192-cbc >> blowfish-cbc >> cast128-cbc >> arcfour >> aes128-cbc > > Where did you get the idea that AES (~ Rijndael) is a weak cipher? > > RC4 (arcfour) is indeed considered insecure and Blowfish uses a block > size that is too small for comfort. CAST-128 might still be quite usable > and even though triple DES only provides about 80 bits of security it is > still not considered broken. Isn't there a collision attack for DES? -- LF _______________________________________________ CentOS mailing list CentOS@xxxxxxxxxx https://lists.centos.org/mailman/listinfo/centos