Mercurial > dropbear
view libtommath/logs/sub.log @ 994:5c5ade336926
Prefer stronger algorithms in algorithm negotiation.
Prefer diffie-hellman-group14-sha1 (2048 bit) over
diffie-hellman-group1-sha1 (1024 bit).
Due to meet-in-the-middle attacks the effective key length of
three key 3DES is 112 bits. AES is stronger and faster then 3DES.
Prefer to delay the start of compression until after authentication
has completed. This avoids exposing compression code to attacks
from unauthenticated users.
(github pull request #9)
author | Fedor Brunner <fedor.brunner@azet.sk> |
---|---|
date | Fri, 23 Jan 2015 23:00:25 +0800 |
parents | eed26cff980b |
children |
line wrap: on
line source
480 94 960 116 1440 140 1920 164 2400 205 2880 229 3360 253 3840 277 4320 299 4800 321 5280 345 5760 371 6240 395 6720 419 7200 441 7680 465