Hardware potential to duplicate existing host keys... RSA DSA ECDSA was Add rc.conf variables...

Robert Simmons rsimmons0 at gmail.com
Sun Jun 24 21:23:48 UTC 2012


On Sun, Jun 24, 2012 at 5:18 PM, Dag-Erling Smørgrav <des at des.no> wrote:
> Robert Simmons <rsimmons0 at gmail.com> writes:
>> In light of advanced in processors and GPUs, what is the potential for
>> duplication of RSA, DSA, and ECDSA keys at the current default key
>> lengths (2048, 1024, and 256 respectively)?
>
> You do know that these keys are used only for authentication, and not
> for encryption, right?

Yes, the encryption key length is determined by which symmetric cipher
is negotiated between the client and server based on what is available
from the Ciphers line in sshd_config and ssh_config.


More information about the freebsd-security mailing list