[EMAIL PROTECTED] (Oden Eriksson) writes:
> Hi,
>
> Could we please apply this to the openssh-server package?
>
> --- /etc/rc.d/init.d/sshd Thu Mar 7 17:41:00 2002
> +++ /etc/rc.d/init.d/sshd.oden Thu Apr 25 13:51:58 2002
> @@ -73,7 +73,7 @@
> do_rsa_keygen() {
> if ! test -f $RSA_KEY ; then
> gprintf "Generating SSH2 RSA host key: "
> - if $KEYGEN -q -t rsa -f $RSA_KEY -C '' -N '' >&/dev/null; then
> + if $KEYGEN -q -b 2048 -t rsa -f $RSA_KEY -C '' -N ''
> >&/dev/null; then
> my_success "RSA key generation"
> echo
> else
> @@ -86,7 +86,7 @@
> do_dsa_keygen() {
> if ! test -f $DSA_KEY ; then
> gprintf "Generating SSH2 DSA host key: "
> - if $KEYGEN -q -t dsa -f $DSA_KEY -C '' -N '' >&/dev/null; then
> + if $KEYGEN -q -b 2048 -t dsa -f $DSA_KEY -C '' -N ''
> >&/dev/null; then
> my_success "DSA key generation"
> echo
Hi there,
according to the man page, key sizes longer than 1024 "no longer improve
security but make things slower. The default is 1024 bits."
is it really worth it tyo use 2048, I wonder ?
cheers,
--
Florin http://www.mandrakesoft.com