Re: RSA key configuration limitations

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

 



On 14.06.22 22:25, Dmitry Belyavskiy wrote:
On Mon, Jun 13, 2022 at 10:32 AM Jochen Bern <Jochen.Bern@xxxxxxxxx> wrote:
I realize that with the *current* selection of algorithms available in
OpenSSH, fine-grained control of minimum key size almost(!) is an
RSA-only topic, but nonetheless I wonder whether newly-defined config
syntax thereto should be aimed at extensibility to other cryptalgorithms
...

It's not a problem to implement similar parameters for DH, EC and DSA, but
does it really make sense?

Does that imply that it will still not make sense for the Next Evolution Encryption/Decryption Algorithm of Novel Keylengths Erratic (NEE/DANKE)?

Regards,
--
Jochen Bern
Systemingenieur

Binect GmbH

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@xxxxxxxxxxx
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux