Re: SSH Weak Ciphers

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



Am 19.10.2016 um 17:30 schrieb Leonard den Ottolander <leonard@xxxxxxxxxxxxxxxxx>:
> Hello Clint,
> 
> On Wed, 2016-10-19 at 11:28 +1300, Clint Dilks wrote:
>> The following weak client-to-server encryption algorithms are supported by
>> the remote service:
>> rijndael-cbc@xxxxxxxxxxxxxx
>> arcfour256
>> arcfour128
>> aes256-cbc
>> 3des-cbc
>> aes192-cbc
>> blowfish-cbc
>> cast128-cbc
>> arcfour
>> aes128-cbc
> 
> Where did you get the idea that AES (~ Rijndael) is a weak cipher?
> 
> RC4 (arcfour) is indeed considered insecure and Blowfish uses a block
> size that is too small for comfort. CAST-128 might still be quite usable
> and even though triple DES only provides about 80 bits of security it is
> still not considered broken.


Isn't there a collision attack for DES? 

--
LF


_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
https://lists.centos.org/mailman/listinfo/centos



[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux