Displaying 9 results from an estimated 9 matches for "ede3".
Did you mean:
ede
2020 Apr 04
3
how to pick cipher for AES-NI enabled AMD GX-412TC SOC tincd at 100% CPU
...-128-ecb camellia-192-cbc
camellia-192-ecb camellia-256-cbc camellia-256-ecb cast
cast-cbc cast5-cbc cast5-cfb cast5-ecb
cast5-ofb des des-cbc des-cfb
des-ecb des-ede des-ede-cbc des-ede-cfb
des-ede-ofb des-ede3 des-ede3-cbc des-ede3-cfb
des-ede3-ofb des-ofb des3 desx
rc2 rc2-40-cbc rc2-64-cbc rc2-cbc
rc2-cfb rc2-ecb rc2-ofb rc4
rc4-40 seed seed-cbc seed-cfb
seed-ecb...
2020 Apr 04
0
how to pick cipher for AES-NI enabled AMD GX-412TC SOC tincd at 100% CPU
...c
> camellia-192-ecb camellia-256-cbc camellia-256-ecb cast
> cast-cbc cast5-cbc cast5-cfb cast5-ecb
> cast5-ofb des des-cbc des-cfb
> des-ecb des-ede des-ede-cbc des-ede-cfb
> des-ede-ofb des-ede3 des-ede3-cbc des-ede3-cfb
> des-ede3-ofb des-ofb des3 desx
> rc2 rc2-40-cbc rc2-64-cbc rc2-cbc
> rc2-cfb rc2-ecb rc2-ofb rc4
> rc4-40 seed seed-cbc seed-c...
2009 Jan 20
1
OpenSSH private key encryption: time for AES?
...bit keypairs to 4096
bits, it really doesn't matter that much, because they're still
only encrypted with 3DES, which provides an effective 112 bits of
symmetric encryption strength:
$ head -4 ~/.ssh/id_rsa
-----BEGIN RSA PRIVATE KEY-----
Proc-Type: 4,ENCRYPTED
DEK-Info: DES-EDE3-CBC,XXXXXXXXXXXXXXXX
$
According to NIST[1][2], a minimum of 112-bit symmetric / 2048-bit
asymmetric keystrength is recommended for protection up until about
2030. For protection beyond 2030, or for the paranoid, larger keysizes
are recommended. Other recommendations (e.g., those of ECRYPT...
2008 Jun 18
2
SSH connection hang after upgrade
...hangs and sits at:
...
debug2: service_accept: ssh-userauth
debug1: SSH2_MSG_SERVICE_ACCEPT received
I don't know why the error 'Not a RSA1 key file' comes up, as my
private key (id_rsa) remains unchanged and begins:
-----BEGIN RSA PRIVATE KEY-----
Proc-Type: 4,ENCRYPTED
DEK-Info: DES-EDE3-CBC,...
Other points of interest:
'ssh-keygen -B' correctly identifies my private key and returns what
appears to be a valid bubble-babble digest, beginning with '1024 ...'
'ssh-keygen -l' correctly identifies my private key and returns what
appears to be a valid finger...
2004 Jun 30
10
[Bug 887] Problem connecting OpenSSH Client to a F-Secure SSH Server
http://bugzilla.mindrot.org/show_bug.cgi?id=887
Summary: Problem connecting OpenSSH Client to a F-Secure SSH
Server
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: other
Status: NEW
Severity: major
Priority: P2
Component: sftp
AssignedTo: openssh-bugs at
2004 Feb 09
0
miss-parsing id_rsa file
...(0x0)
andreas at lukas:~$ ls -al .ssh/id_rsa*
-rw------- 1 andreas andreas 951 Aug 2 2003 .ssh/id_rsa
-rw-r--r-- 1 andreas andreas 223 Aug 2 2003 .ssh/id_rsa.pub
andreas at lukas:~$ head -n3 .ssh/id_rsa
-----BEGIN RSA PRIVATE KEY-----
Proc-Type: 4,ENCRYPTED
DEK-Info: DES-EDE3-CBC,483908A29B0FB1E5
first i believed in a subtily broken binary but i got the same
error when deinstalling, purging and reinstalling a newly
downloaded package.
i have not found a similar error with google.
please advice.
2001 Sep 27
4
ssh2 key passphrase problems in 2.9.9 on Linux
I've just compiled and installed openssh-2.9.9p2 (compiled against
openssl-0.9.6b using gcc-3.0.0) on a Slackware 7-based Linux machine
(kernel 2.4.6ac2). The previously installed version was 2.9p2, compiled
against openssl-0.9.6a, also with gcc-3.0.0, but with a different build of
gcc-3.0.0.
Everything seems to work fine except for one problem: passphrase matching
for ssh2 keys
2007 Jul 09
12
[Bug 1337] New: SCP performance twice as slow as RCP
http://bugzilla.mindrot.org/show_bug.cgi?id=1337
Summary: SCP performance twice as slow as RCP
Product: Portable OpenSSH
Version: 3.8.1p1
Platform: Other
OS/Version: AIX
Status: NEW
Severity: enhancement
Priority: P3
Component: scp
AssignedTo: bitbucket at mindrot.org
ReportedBy:
2009 Jan 22
8
[Bug 1550] New: Move from 3DES to AES-256 for private key encryption
...bit keypairs to 4096
bits, it really doesn't matter that much, because they're still
only encrypted with 3DES, which provides an effective 112 bits of
symmetric encryption strength:
$ head -4 ~/.ssh/id_rsa
-----BEGIN RSA PRIVATE KEY-----
Proc-Type: 4,ENCRYPTED
DEK-Info: DES-EDE3-CBC,XXXXXXXXXXXXXXXX
$
According to NIST[1][2], a minimum of 112-bit symmetric / 2048-bit
asymmetric keystrength is recommended for protection up until about
2030. For protection beyond 2030, or for the paranoid, larger keysizes
are recommended. Other recommendations (e.g., those of ECRYPT...