Re: verify RSA 2048
- From: Jose <joseche@xxxxxxxxx>
- Date: Fri, 22 Dec 2006 13:51:26 -0600
The mechanism to encrypt the information will be negotiated as stated by
3.3 Policy Issues
The protocol allows _full_negotiation_of_encryption_, integrity, key
exchange, compression, and public key algorithms and formats.
Encryption, integrity, public key, and compression algorithms can be
different for each direction.
Options may be:
AES-*, twofish, blowfish, 3des, rc4
Use "ssh -vvv" if you want to see what you actually use for each connection.
On 12/21/06, Jeff Sadowski <jeff.sadowski@xxxxxxxxx> wrote:
This goes along with my question on decrypting ssh
From what I gather ssh does not use RSA to encrypt. It uses RSA to Authenticate.
And uses a faster method to form a secure channel.
I'm kind of curious as to what others have to say I could be mislead.
I would like to know if there is a way to increase the amount of
encryption that ssh uses
and by your question I think you would also be interested.
On 12/21/06, Dustin Seeger <dustin.seeger@xxxxxxxxx> wrote:
> I am using OpenSSH version 4.3p2. I was wondering how I could verify
> that the data going from one computer to another over the internet is
> using RSA 2048. I set both of the keys on each machine to that bit
> strength. Is there a tool out there that I can you that could verify
> that the information is being sent at 2048 or is even being encrypted?
El bosque sería muy triste si sólo cantaran los pájaros que mejor lo hacen.
- Prev by Date: Re: verify RSA 2048
- Next by Date: Re: verify RSA 2048
- Previous by thread: Re: verify RSA 2048
- Next by thread: Re: verify RSA 2048