Displaying 8 results from an estimated 8 matches for "irtf".
Did you mean:
intf
2019 Feb 13
3
Support for Argon2 for password hashing
Is there any information on adding support for Argon2?
I have been working on my new mailserver and this came up in moving from
the default MD5 hash to more 'modern' hashes like SHA256 and SHA512.?
Then I was pointed to the work behind Argon2, and I see that it is
moving through the IRTF cfrg workgroup:
draft-irtf-cfrg-argon2-04.txt
It is a 'purpose built' hash for passwords, with recommendations that
new implementations use it.? Of course can't use it if crypt does not
support it....
thanks
2019 Feb 13
0
Support for Argon2 for password hashing
...tion on adding support for Argon2?
>
> I have been working on my new mailserver and this came up in moving from
> the default MD5 hash to more 'modern' hashes like SHA256 and SHA512.
> Then I was pointed to the work behind Argon2, and I see that it is
> moving through the IRTF cfrg workgroup:
>
> draft-irtf-cfrg-argon2-04.txt
>
> It is a 'purpose built' hash for passwords, with recommendations that
> new implementations use it.? Of course can't use it if crypt does not
> support it....
>
> thanks
>
> _______________________...
2004 Nov 02
0
A general Mathematicasl pointer if you could? Thank you.
Greetings.
A friend of mine and I are thinking about implementing the SIQ Protocol,
describe as RFC here:
http://www.milter.info/milter-siq/draft-irtf-asrg-iar-howe-siq-00.txt
as an Apache Module. This would implement the HTTP "connector?? described
in the RFC. While we do not think that this is too complicated, we are
concerned about the whole process that is attached to building the
necessary data.
I would like to know your opinion on SI...
2019 Feb 12
4
Using SHA256/512 for SQL based password
On 2/12/19 6:03 PM, Matthias Fechner via dovecot wrote:
> Am 12.02.2019 um 17:05 schrieb Robert Moskowitz via dovecot:
>> I have trying to find how to set the dovecot-sql.conf for using
>> SHA256/512.? I am going to start clean with the stronger format, not
>> migrate from the old MD5.? It seems all I need is:
> you maybe would like to have a look to the hashing algo
2015 Jul 24
2
DH_GRP_MIN is currently 1024, should it be bumped to 2048?
Greetings,
Given the weakness with Diffie-Hellman modp groups less than 2048, is it
time to bump the suggested 1024 bit minimum value from the RFC 4419 to a
more current 2048 value for OpenSSH 7.0?
If so, should this be just a compile-time change, or should there be a
new client and server runtime option?
Thanks,
-- Mark
2018 Apr 03
0
Announce: OpenSSH 7.7 released
...SSH implementations.
Changes since OpenSSH 7.6
=========================
This is primarily a bugfix release.
New Features
------------
* All: Add experimental support for PQC XMSS keys (Extended Hash-
Based Signatures) based on the algorithm described in
https://tools.ietf.org/html/draft-irtf-cfrg-xmss-hash-based-signatures-12
The XMSS signature code is experimental and not compiled in by
default.
* sshd(8): Add a "rdomain" criteria for the sshd_config Match keyword
to allow conditional configuration that depends on which routing
domain a connection was received...
2018 Mar 22
16
Call for testing: OpenSSH 7.7
...SSH implementations.
Changes since OpenSSH 7.6
=========================
This is primarily a bugfix release.
New Features
------------
* All: Add experimental support for PQC XMSS keys (Extended Hash-
Based Signatures) based on the algorithm described in
https://tools.ietf.org/html/draft-irtf-cfrg-xmss-hash-based-signatures-12
The XMSS signature code is experimental and not compiled in by
default.
* sshd(8): Add a "rdomain" criteria for the sshd_config Match keyword
to allow conditional configuration that depends on which routing
domain a connection was received...
2018 Apr 03
2
Announce: OpenSSH 7.7 released
...SSH implementations.
Changes since OpenSSH 7.6
=========================
This is primarily a bugfix release.
New Features
------------
* All: Add experimental support for PQC XMSS keys (Extended Hash-
Based Signatures) based on the algorithm described in
https://tools.ietf.org/html/draft-irtf-cfrg-xmss-hash-based-signatures-12
The XMSS signature code is experimental and not compiled in by
default.
* sshd(8): Add a "rdomain" criteria for the sshd_config Match keyword
to allow conditional configuration that depends on which routing
domain a connection was received...