X-Git-Url: https://asedeno.scripts.mit.edu/gitweb/?a=blobdiff_plain;f=doc%2Fpubkey.but;h=f9f894f7980bc78e7ee581b7a1c68d354127688a;hb=HEAD;hp=35988812cc309d8ea09b20a0bac0ae75defd4575;hpb=91653a10c6e6b9d57688e1d7dd7403625ea670a0;p=PuTTY.git diff --git a/doc/pubkey.but b/doc/pubkey.but index 35988812..f9f894f7 100644 --- a/doc/pubkey.but +++ b/doc/pubkey.but @@ -131,22 +131,6 @@ key will be completely useless. The SSH-2 protocol supports more than one key type. The types supported by PuTTY are RSA, DSA, ECDSA, and Ed25519. -The PuTTY developers \e{strongly} recommend you use RSA. -\#{FIXME: ECDSA, Ed25519!} -\I{security risk}\i{DSA} has an intrinsic weakness which makes it very -easy to create a signature which contains enough information to give -away the \e{private} key! -This would allow an attacker to pretend to be you for any number of -future sessions. PuTTY's implementation has taken very careful -precautions to avoid this weakness, but we cannot be 100% certain we -have managed it, and if you have the choice we strongly recommend -using RSA keys instead. - -If you really need to connect to an SSH server which only supports -DSA, then you probably have no choice but to use DSA. If you do use -DSA, we recommend you do not use the same key to authenticate with -more than one server. - \S{puttygen-strength} Selecting the size (strength) of the key \cfg{winhelp-topic}{puttygen.bits}