From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) by finch.gentoo.org (Postfix) with ESMTP id F3D531384B4 for ; Tue, 10 Nov 2015 19:26:02 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id BC03B21C08F; Tue, 10 Nov 2015 19:25:54 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 8CA6921C08B for ; Tue, 10 Nov 2015 19:25:53 +0000 (UTC) Received: from [192.168.1.100] (c-98-218-46-55.hsd1.md.comcast.net [98.218.46.55]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: mjo) by smtp.gentoo.org (Postfix) with ESMTPSA id 6831F34097F for ; Tue, 10 Nov 2015 19:25:51 +0000 (UTC) Subject: Re: [gentoo-user] OpenSSH upgrade warning To: gentoo-user@lists.gentoo.org References: <56414A8C.1080701@gentoo.org> <56420397.8010504@gentoo.org> <56420DB1.80302@gmail.com> <56421438.4080202@gentoo.org> <564236F0.9020503@gmail.com> <56423DAD.5030200@gentoo.org> <564242CF.2050602@gentoo.org> <56424426.2030708@gmail.com> From: Michael Orlitzky Message-ID: <564244BC.1080208@gentoo.org> Date: Tue, 10 Nov 2015 14:25:48 -0500 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.3.0 Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-user@lists.gentoo.org Reply-to: gentoo-user@lists.gentoo.org MIME-Version: 1.0 In-Reply-To: <56424426.2030708@gmail.com> Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-Archives-Salt: dade7426-03b7-4e17-8cb0-80919a5fd929 X-Archives-Hash: 8cc56cbcc770e2a7041de7376bf7857f On 11/10/2015 02:23 PM, Stanislav Nikolov wrote: >> > Are you sure you know how such keys work? An extremely 15 character > password (Upper case, lower case, numbers, 8 more symbols) gives you > ~4747561509943000000000000000 combinations. Just a simple 2048 bit > key on the other hand (~180 of which are "secure") > 1532495540865888858358347027150309183618739122183602176. Thats ALOT > moar. You don't have to generate the key from a password! > I don't have to brute-force the key. The key is encrypted with a password. How long is that password?