-
Notifications
You must be signed in to change notification settings - Fork 21
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Key generation: pass-a
and -o
argument?
#68
Comments
ED25519 keys are only compatible with the new key format, so What value do you propose for On Sat, Sep 24, 2016 at 8:18 AM, Timothy Guan-tin Chien <
|
@floatingatoll I am not proposing any other values for |
In general, unless there is a really tangible security gain, I'd tend to keep the slightly more compatible option until more tools are aware of the new format (which is to not specify -o for non-ed25519 keys). Just my opinion, of course.
On my i7 Skylake 6560-U (basically, the fastest U laptop CPU from january 2016), to decrypt it takes (half-scientific method ;-): 16 rounds:
64 rounds:
100 rounds:
128 rounds:
Basically, anything above 64 starts to annoy me significantly on this laptop (its less inconvenient if you've the key in the agent at all times, but then using more rounds starts to bring less benefits. On a faster machine. I've a quick-and-dirty tool that is probably outdated that tries to estimate how long passphrase X takes to break with resources Z, using known-amount-of-computing-power from the NSA and others, then extrapolating that for safety (https://github.com/gdestuynder/pwgen/) Due to this, unless your passphrase is really weak, such as "blah" (in which case 100 rounds won't cut it), I would question the need for more than 16 rounds if it's inconveniencing the user. I wonder what the author of https://blog.g3rt.nl/upgrade-your-ssh-keys.html would say about this. |
To clarify: When you say "check the passphrase", does the annoying delay
On Mon, Sep 26, 2016 at 3:43 PM, Guillaume Destuynder <
|
This is every time the key is decrypted, so when you add it to the agent the first time - it then depends on your agent settings. If the agent times out after 60s for it means every time after 60s. If it never expires, then it's only once. The agent stores the plaintext private key in memory while unlocked. |
The vast majority of users do not run an agent timeout, based on my limited
On Tue, Sep 27, 2016 at 10:47 AM, Guillaume Destuynder <
|
I couldn't help but notice the suggestion here ask for
ssh-keygen -o -a 100 -t ed25519
. We are using-t ed25519
but I wonder if-a
and-o
is really necessary.The text was updated successfully, but these errors were encountered: