The mechanism to encrypt the information will be negotiated as stated by
http://www.openssh.org/txt/draft-ietf-secsh-architecture-12.txt -------snip 3.3 Policy Issues The protocol allows _full_negotiation_of_encryption_, integrity, key exchange, compression, and public key algorithms and formats. Encryption, integrity, public key, and compression algorithms can be different for each direction. -------snip Options may be: Ciphers: AES-*, twofish, blowfish, 3des, rc4 MACs: MD5, SHA1 Use "ssh -vvv" if you want to see what you actually use for each connection. On 12/21/06, Jeff Sadowski <[EMAIL PROTECTED]> wrote:
This goes along with my question on decrypting ssh From what I gather ssh does not use RSA to encrypt. It uses RSA to Authenticate. And uses a faster method to form a secure channel. I'm kind of curious as to what others have to say I could be mislead. I would like to know if there is a way to increase the amount of encryption that ssh uses and by your question I think you would also be interested. On 12/21/06, Dustin Seeger <[EMAIL PROTECTED]> wrote: > I am using OpenSSH version 4.3p2. I was wondering how I could verify > that the data going from one computer to another over the internet is > using RSA 2048. I set both of the keys on each machine to that bit > strength. Is there a tool out there that I can you that could verify > that the information is being sent at 2048 or is even being encrypted? > > Thanks, > > -- > Dustin >
-- El bosque sería muy triste si sólo cantaran los pájaros que mejor lo hacen. Rabindranath Tagore
