@Neal: That's a valid critique of debian's SSL implementation not
related to DSA vs RSA.

DSA is faster for signing and RSA is faster for verification.  
  http://neubia.com/archives/000191.html
  ftp://ftp.rfc-editor.org/in-notes/rfc2536.txt
  http://home.pacbell.net/tpanero/crypto/dsa.html

RSA is weaker than a DSA key of the same length, so to get the same
effect, one must use a longer key.  I'm not sure that the neubia link
above takes that into account.  So if the default stays as RSA, it might
be an idea to increase the default RSA key length.

These are signature algorithms anyway and only used at the beginning
anyway.  After the client and server authenticate, the rest is done with
ciphers like Blowfish or IDEA.  So for SSH it's not a problem to use DSA
at all, new connections are not made that often.

-- 
ssh-keygen should default to dsa not rsa
https://bugs.launchpad.net/bugs/237391
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openssh in ubuntu.

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs

Reply via email to