Skip to content
This repository has been archived by the owner on Apr 19, 2024. It is now read-only.

Commit

Permalink
obviously missed some more ecdsa commits; this is a disaster
Browse files Browse the repository at this point in the history
  • Loading branch information
FauxFaux committed Sep 20, 2015
1 parent 4c4a633 commit 6ef59d7
Show file tree
Hide file tree
Showing 4 changed files with 20 additions and 29 deletions.
22 changes: 10 additions & 12 deletions doc/config.but
Expand Up @@ -2382,27 +2382,25 @@ PuTTY supports a variety of SSH-2 key exchange methods, and allows you
to choose which one you prefer to use; configuration is similar to
cipher selection (see \k{config-ssh-encryption}).

PuTTY currently supports the following key exchange methods:
PuTTY currently supports the following varieties of \i{Diffie-Hellman key
exchange}:

\b \q{ECDH}: \i{elliptic curve} \i{Diffie-Hellman key exchange}.
\b \q{Group 14}: a well-known 2048-bit group.

\b \q{Group 14}: Diffie-Hellman key exchange with a well-known
2048-bit group.

\b \q{Group 1}: Diffie-Hellman key exchange with a well-known
1024-bit group. This is less secure \#{FIXME better words} than
group 14, but may be faster with slow client or server machines,
and may be the only method supported by older server software.
\b \q{Group 1}: a well-known 1024-bit group. This is less secure
\#{FIXME better words} than group 14, but may be faster with slow
client or server machines, and may be the only method supported by
older server software.

\b \q{\ii{Group exchange}}: with this method, instead of using a fixed
group, PuTTY requests that the server suggest a group to use for key
exchange; the server can avoid groups known to be weak, and possibly
invent new ones over time, without any changes required to PuTTY's
configuration. We recommend use of this method, if possible.

\b \q{\i{RSA key exchange}}: this requires much less computational
effort on the part of the client, and somewhat less on the part of
the server, than Diffie-Hellman key exchange.
In addition, PuTTY supports \i{RSA key exchange}, which requires much less
computational effort on the part of the client, and somewhat less on
the part of the server, than Diffie-Hellman key exchange.

If the first algorithm PuTTY finds is below the \q{warn below here}
line, you will see a warning box when you make the connection, similar
Expand Down
2 changes: 1 addition & 1 deletion doc/licence.but
Expand Up @@ -5,7 +5,7 @@ PuTTY is \i{copyright} 1997-2015 Simon Tatham.
Portions copyright Robert de Bath, Joris van Rantwijk, Delian
Delchev, Andreas Schultz, Jeroen Massar, Wez Furlong, Nicolas Barry,
Justin Bradford, Ben Harris, Malcolm Smith, Ahmad Khalifa, Markus
Kuhn, Colin Watson, Christopher Staite, and CORE SDI S.A.
Kuhn, Colin Watson, and CORE SDI S.A.

Permission is hereby granted, free of charge, to any person
obtaining a copy of this software and associated documentation files
Expand Down
3 changes: 1 addition & 2 deletions doc/pageant.but
Expand Up @@ -71,8 +71,7 @@ For each key, the list box will tell you:

\b The type of the key. Currently, this can be \c{ssh1} (an RSA key
for use with the SSH-1 protocol), \c{ssh-rsa} (an RSA key for use
with the SSH-2 protocol), \c{ssh-dss} (a DSA key for use with
the SSH-2 protocol), or \c{ecdsa-sha2-*} (an ECDSA key for use with
with the SSH-2 protocol), or \c{ssh-dss} (a DSA key for use with
the SSH-2 protocol).

\b The size (in bits) of the key.
Expand Down
22 changes: 8 additions & 14 deletions doc/pubkey.but
Expand Up @@ -55,9 +55,9 @@ disk. Many people feel this is a good compromise between security
and convenience. See \k{pageant} for further details.

There is more than one \i{public-key algorithm} available. The most
common are \i{RSA} and \i{ECDSA}, but others exist, notably \i{DSA}
(otherwise known as DSS), the USA's federal Digital Signature Standard.
The key types supported by PuTTY are described in \k{puttygen-keytype}.
common is \i{RSA}, but others exist, notably \i{DSA} (otherwise known as
DSS), the USA's federal Digital Signature Standard. The key types
supported by PuTTY are described in \k{puttygen-keytype}.

\H{pubkey-puttygen} Using \i{PuTTYgen}, the PuTTY key generator

Expand All @@ -66,7 +66,7 @@ The key types supported by PuTTY are described in \k{puttygen-keytype}.
PuTTYgen is a key generator. It \I{generating keys}generates pairs of
public and private keys to be used with PuTTY, PSCP, and Plink, as well
as the PuTTY authentication agent, Pageant (see \k{pageant}). PuTTYgen
generates RSA, DSA, and ECDSA keys.
generates RSA and DSA keys.

When you run PuTTYgen you will see a window where you have two
choices: \q{Generate}, to generate a new public/private key pair, or
Expand Down Expand Up @@ -118,17 +118,14 @@ of key:

\b A \i{DSA} key for use with the SSH-2 protocol.

\b An \i{ECDSA} (\i{elliptic curve} DSA) key for use with the
SSH-2 protocol.

The SSH-1 protocol only supports RSA keys; if you will be connecting
using the SSH-1 protocol, you must select the first key type or your
key will be completely useless.

The SSH-2 protocol supports more than one key type. The types
supported by PuTTY are RSA, DSA, and ECDSA.
The SSH-2 protocol supports more than one key type. The two types
supported by PuTTY are RSA and DSA.

The PuTTY developers \e{strongly} recommend you use RSA. \#{FIXME: ECDSA!}
The PuTTY developers \e{strongly} recommend you use RSA.
\I{security risk}\i{DSA} has an intrinsic weakness which makes it very
easy to create a signature which contains enough information to give
away the \e{private} key!
Expand All @@ -150,10 +147,7 @@ more than one server.
The \q{Number of bits} input box allows you to choose the strength
of the key PuTTYgen will generate.

For RSA, 2048 bits should currently be sufficient for most purposes.
\#{FIXME: DSA}
For ECDSA, only 256, 384, and 521 bits are supported. (ECDSA offers
equivalent security to RSA with smaller key sizes.)
Currently 1024 bits should be sufficient for most purposes.

\S{puttygen-generate} The \q{Generate} button

Expand Down

0 comments on commit 6ef59d7

Please sign in to comment.