Sponsored Content
Full Discussion: RSA 1024
Top Forums UNIX for Dummies Questions & Answers RSA 1024 Post 302396257 by abubacker on Thursday 18th of February 2010 04:52:13 AM
Old 02-18-2010
Use this command
Code:
ssh-keygen -t rsa

In which -t defined the type of the algorithm.
 

8 More Discussions You Might Find Interesting

1. Cybersecurity

Allowing access to ports < 1024 w/o root

I need to set up an application to run in a script which will be running as a web server but is a database. I need to allow users to use the web server but the app must be run as root in order for the ports to be accessible. This is not a very secure environment would like to know how this could... (2 Replies)
Discussion started by: rpollard
2 Replies

2. UNIX Benchmarks

1024 Mb RAM / 648MHz Sparc Processor

============================================================== BYTE UNIX Benchmarks (Version 3.11) System -- SunOS as-1 5.8 Generic_108528-24 sun4u sparc SUNW,UltraAX-i2 Start Benchmark Run: Tue Jan 27 15:07:18 NZDT 2004 3 interactive users. Dhrystone 2 without register variables ... (0 Replies)
Discussion started by: mattd
0 Replies

3. Cybersecurity

Rsa

This "quiz" was pretty easy (at least for me) and the prize is a trip to RSA. http://www.messagelabs-quiz.com/Quiz/Index.asp By the way, did anyone go to this last year? (0 Replies)
Discussion started by: defender77
0 Replies

4. AIX

dev/rmt 0.1 block size is 0; variable; must be 1024 fixed.

Hi. After the shutdown for SWIFT Alliance Server, tape backup process will be done. Unfortunately, I encountered this error message when I performed the database tape backup. The error was "/dev/rmt 0.1 block size is 0; variable; must be 1024 fixed. Consider reconfiguration through 'chdev'... (2 Replies)
Discussion started by: MariaLuisa
2 Replies

5. UNIX for Advanced & Expert Users

Are ports above 1024 closed by default ?

Hi guys, Just needed to know if all the ports above 1024 are closed by default. I know that below 1024 the ports are reserved for the kernel and ports above 1024 are reserved for user applications. But by default, if I do not have a rule in my firewall to block ports above 1024, Will my... (4 Replies)
Discussion started by: firefox211
4 Replies

6. Red Hat

ssh_host_rsa_key 1024 bit?

Hi All, How do I know if ssh_host_rsa_key is 1024 bit? cat /etc/ssh/ssh_host_rsa_key | wc -m 887 It's only 887. Is that it? Or not? Thank you for any comment you may add. (2 Replies)
Discussion started by: itik
2 Replies

7. Shell Programming and Scripting

1024 field issue : awk

Hi i have a txt file in which i do a awk operation with ":" as field separator A B C D ABC::2386.13:2386.13:3248234281995::+DPY:INT:3:N::::2:200.00:0.00:2010-05-12:CA: ::2:N::N:PH:00010031:0001+DPY:BAL:3:N::::3:1601.01:0.00:2010-05-12:XT::2:N:MR ... (1 Reply)
Discussion started by: mad_man12
1 Replies

8. UNIX Desktop Questions & Answers

Cant Set 1024*768 resolution in fedora 11

This is my very first post to the forum ,so if i my mess up here please let me know. Now coming to the problem i am using fedora 11 with a nividia 8600GT graphic card on my desktop, but when i try to change the resolution i am able to select between two resolutions i.e. 800*600 and 640*480. I... (3 Replies)
Discussion started by: rohit_shetty
3 Replies
MODULI(5)						      BSD File Formats Manual							 MODULI(5)

NAME
moduli -- Diffie Hellman moduli DESCRIPTION
The /etc/ssh/moduli file contains prime numbers and generators for use by sshd(8) in the Diffie-Hellman Group Exchange key exchange method. New moduli may be generated with ssh-keygen(1) using a two-step process. An initial candidate generation pass, using ssh-keygen -G, calcu- lates numbers that are likely to be useful. A second primality testing pass, using ssh-keygen -T provides a high degree of assurance that the numbers are prime and are safe for use in Diffie Hellman operations by sshd(8). This moduli format is used as the output from each pass. The file consists of newline-separated records, one per modulus, containing seven space separated fields. These fields are as follows: timestamp The time that the modulus was last processed as YYYYMMDDHHMMSS. type Decimal number specifying the internal structure of the prime modulus. Supported types are: 0 Unknown, not tested 2 "Safe" prime; (p-1)/2 is also prime. 4 Sophie Germain; (p+1)*2 is also prime. Moduli candidates initially produced by ssh-keygen(1) are Sophie Germain primes (type 4). Futher primality testing with ssh-keygen(1) produces safe prime moduli (type 2) that are ready for use in sshd(8). Other types are not used by OpenSSH. tests Decimal number indicating the type of primality tests that the number has been subjected to represented as a bitmask of the following values: 0x00 Not tested 0x01 Composite number - not prime. 0x02 Sieve of Eratosthenes 0x04 Probabalistic Miller-Rabin primality tests. The ssh-keygen(1) moduli candidate generation uses the Sieve of Eratosthenes (flag 0x02). Subsequent ssh-keygen(1) pri- mality tests are Miller-Rabin tests (flag 0x04). trials Decimal number indicating of primaility trials that have been performed on the modulus. size Decimal number indicating the size of the prime in bits. generator The recommended generator for use with this modulus (hexadecimal). modulus The modulus itself in hexadecimal. When performing Diffie Hellman Group Exchange, sshd(8) first estimates the size of the modulus required to produce enough Diffie Hellman out- put to sufficiently key the selected symmetric cipher. sshd(8) then randomly selects a modulus from /etc/ssh/moduli that best meets the size requirement. SEE ALSO
ssh-keygen(1), sshd(8), Diffie-Hellman Group Exchange for the Secure Shell (SSH) Transport Layer Protocol, RFC 4419, 2006. BSD
June 26, 2008 BSD
All times are GMT -4. The time now is 04:45 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy