From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) by finch.gentoo.org (Postfix) with ESMTP id A83F11384B4 for ; Tue, 10 Nov 2015 19:38:54 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 98DB621C0AE; Tue, 10 Nov 2015 19:38:25 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 4EBC121C0A9 for ; Tue, 10 Nov 2015 19:38:19 +0000 (UTC) Received: from [192.168.1.100] (c-98-218-46-55.hsd1.md.comcast.net [98.218.46.55]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: mjo) by smtp.gentoo.org (Postfix) with ESMTPSA id 2202F34069C for ; Tue, 10 Nov 2015 19:38:18 +0000 (UTC) Subject: Re: [gentoo-user] OpenSSH upgrade warning To: gentoo-user@lists.gentoo.org References: <56414A8C.1080701@gentoo.org> <56420397.8010504@gentoo.org> <56420DB1.80302@gmail.com> <56421438.4080202@gentoo.org> <564236F0.9020503@gmail.com> <56423DAD.5030200@gentoo.org> <564242CF.2050602@gentoo.org> <56424426.2030708@gmail.com> <564244BC.1080208@gentoo.org> <56424645.4020104@gmail.com> From: Michael Orlitzky Message-ID: <564247A7.3000604@gentoo.org> Date: Tue, 10 Nov 2015 14:38:15 -0500 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.3.0 Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-user@lists.gentoo.org Reply-to: gentoo-user@lists.gentoo.org MIME-Version: 1.0 In-Reply-To: <56424645.4020104@gmail.com> Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-Archives-Salt: 67ac0fc2-77c3-46f1-99fc-cda62f7ac89e X-Archives-Hash: b11a6ec5c5d425bc280000f60c3deb4d On 11/10/2015 02:32 PM, Stanislav Nikolov wrote: > > > On 11/10/2015 09:25 PM, Michael Orlitzky wrote: >> On 11/10/2015 02:23 PM, Stanislav Nikolov wrote: >>> Are you sure you know how such keys work? An extremely 15 character >>> password (Upper case, lower case, numbers, 8 more symbols) gives you >>> ~4747561509943000000000000000 combinations. Just a simple 2048 bit >>> key on the other hand (~180 of which are "secure") >>> 1532495540865888858358347027150309183618739122183602176. Thats ALOT >>> moar. You don't have to generate the key from a password! >>> >> I don't have to brute-force the key. The key is encrypted with a >> password. How long is that password? >> >> >> > 1) The key is not encrypted. > 2) You don't need a password to generate a key. > 3) Don't go full retard, do your research before arguing. > I guess I'll just say that I'm fine with it taking trillions of years to hack my systems and give up. Yes, adding another key would make it take longer than trillions of years. So would increasing the password length.