Re: Legacy option for key length?

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

 



>
> I think zero.


That seems like a pretty untenable position.

Note that a less extreme stance than this (0!) still led OpenSSL to support
VMS, Netware and 16-bit Windows into 2014 and beyond. Creating a larger,
more complex codebase which contributed to security problems. Security
being the entire point, this was deemed by others (OpenBSD from whence
comes this very OpenSSH) to be counter-productive. OpenBSD then forked and
removed said support. So their philosophy on removing insecure baggage is
pretty clear and consistent.

It seems like you grant the point that the 768 bit keys are insecure and
you don't mind, in which case you likely already have an easily accesible
command line option to access these devices called telnet.
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@xxxxxxxxxxx
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev



[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux