Difference between revisions of "Key length"
Jump to navigation
Jump to search
↑ https://support.apple.com/en-us/HT210176
Line 12: | Line 12: | ||
== Related == | == Related == | ||
− | * [[Openssh client]]: < | + | * [[Openssh client]]: <code>[[Openssh client: Invalid key length|Invalid key lenght]]</code> connecting to a [[Cisco]] device |
== See also == | == See also == |
Revision as of 10:12, 26 October 2021
OpenSSH 7.6 (October 2017)
- Refuse keys length <1024 bits in length and improve reporting for keys that do not meet this requirement.
macOS 10.15 requires that TLS server certificates and issuing CAs using RSA keys must use key sizes greater than or equal to 2048. [1]
- OpenSSH 4.2: September 1, 2005 https://www.openssh.com/txt/release-4.2
- Increase the default size of new RSA/DSA keys generated by
ssh-keygen
from 1024 to 2048 bits.
- Increase the default size of new RSA/DSA keys generated by
Related
- Openssh client:
Invalid key lenght
connecting to a Cisco device
See also
- Public key cryptography,
private key
,public key
,key length
,ssh-keygen
,ssh-keyscan
, Root certificate, KEX, Generate a key - OpenSSH (changelog):
/etc/ssh/sshd_config
|/etc/ssh/ssh_config
|~/.ssh/
|openSSL | sshd logs
|sftp
|scp
|authorized_keys
|ssh-keygen
|ssh-keyscan
|ssh-add
|ssh-agent
|ssh
|Ssh -O stop
|ssh-copy-id
|CheckHostIP
|UseKeychain
, OpenSSF, ~/.ssh/authorized_keys - Public-key cryptography: RSA, DSA, ECDSA, EdDSA (Ed25519), AES, RSA Conference, hash,
pkeyutl
, Signature, key length, Easyrsa, OAEP, Ron Rivest, Adi Shamir, Leonard Adleman
Advertising: