Displaying 4 results from an estimated 4 matches for "rfc6668".
Did you mean:
rfc6647
2013 Sep 10
4
[Bug 1647] Implement FIPS 186-3 for DSA keys
...= 2048, N = 224
L = 2048, N = 256
L = 3072, N = 256
And it would seem that the L=2048,N=256 L=3072,N=256 selections are now
possible while remaining standards compliant.
It appears that OpenSSH has added support for SHA-256 and SHA-512 in
version 5.9p1 (2011-09).
[1] http://tools.ietf.org/html/rfc6668
[2] http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf
--
You are receiving this mail because:
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.
2013 Sep 10
4
[Bug 1647] Implement FIPS 186-3 for DSA keys
...= 2048, N = 224
L = 2048, N = 256
L = 3072, N = 256
And it would seem that the L=2048,N=256 L=3072,N=256 selections are now
possible while remaining standards compliant.
It appears that OpenSSH has added support for SHA-256 and SHA-512 in
version 5.9p1 (2011-09).
[1] http://tools.ietf.org/html/rfc6668
[2] http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf
--
You are receiving this mail because:
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.
2013 Sep 10
1
ssh-keygen -t dsa limited to 1024?
...sion 5.9p1 (2011-09).
I have updated bug 1647 with the additional information.
Are there any plans to add support for generating DSA 2048, 3072 keys?
[1] http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf
[2] https://bugzilla.mindrot.org/show_bug.cgi?id=1647
[3] http://tools.ietf.org/html/rfc6668
--Kyle
P.S. What, by the way, does OpenSSH do if you have an existing DSA
2048 or 3072 key? (OpenSSL will generate them just fine.)
2013 Sep 10
0
[Bug 1647] Implement FIPS 186-3 for DSA keys
...negotiations.
The OpenSSH community implemented aes128-gcm at openssh.com and
aes256-gcm at openssh.com with specified semantics during negotiation to
ensure that a non-toxic selection is made and otherwise uses the RFC
5647 wire protocol for the traffic.
>
> [1] http://tools.ietf.org/html/rfc6668
> [2] http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf
>
> --
> You are receiving this mail because:
> You are watching the assignee of the bug.
> You are watching someone on the CC list of the bug.
> _______________________________________________
> openssh-bugs...