Mick wrote:
> I have looked around and have found confusing info regarding which is a 
> better 
> key cipher to use for ssh authentication.  Some say that RSA is widely 
> considered more secure than DSA.  Some say that it doesn't really matter, as 
> long as you use a large enough bits setting in creating your key.  RSA takes 
> longer to create but it takes less time to authenticate on the server and DSA 
> is the other way around.  Not sure what to believe and I'd rather not be 
> guessing which one is best

DSA keys are always 1024 bits, as this is mandated by the standard. RSA
keys can have variable length. From "man ssh-keygen":

  -b bits
    Specifies the number of bits in the key to create.  For RSA keys,
    the minimum size is 768 bits and the default is 2048 bits.  Gen-
    erally, 2048 bits is considered sufficient.  DSA keys must be
    exactly 1024 bits as specified by FIPS 186-2.

Another argument in favor of RSA is mentioned in the PuTTY FAQ:

  http://www.chiark.greenend.org.uk/~sgtatham/putty/faq.html#faq-dsa

Personally, I use RSA keys because I want to use a 2048 bit key length.

-- Remy


Remove underscore and suffix in reply address for a timely response.

-- 
gentoo-user@gentoo.org mailing list

Reply via email to