Re: Legacy option for key length?

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

 



David Newall wrote:
> On 02/01/18 03:29, Michael Ströder wrote:
>> How high is the risk that this unmaintained device is added to
>> yet-another-bot-net in the Internet-of-shitty-devices or is used to
>> enter parts of your network.
> 
> I think that is what is called a straw-man argument.  If a device can be
> compromised in the way you suggest, then I am sure it will be replaced,
> but it will be replaced because it needs to be,

But how do *you* determine without doubts that it does *not* need to be
replaced?

(I do not claim that there's one good way to find out.)

Ciao, Michael.

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@xxxxxxxxxxx
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux