1
0
mirror of https://git.tartarus.org/simon/putty.git synced 2025-07-02 03:52:49 -05:00

Put DH group1-sha1 KEX below 'warn' by default.

Also try to upgrade the settings of people who haven't changed the
defaults; but anyone who has, or anyone who's used the pre-release
snapshots with elliptic-curve support, will have to review their
settings manually.
This commit is contained in:
Jacob Nevins
2016-03-27 17:24:44 +01:00
parent 697ea87808
commit 34add87ad2
2 changed files with 61 additions and 22 deletions

View File

@ -2394,15 +2394,16 @@ PuTTY currently supports the following key exchange methods:
2048-bit group.
\b \q{Group 1}: Diffie-Hellman key exchange with a well-known
1024-bit group. This is less secure \#{FIXME better words} than
group 14, but may be faster with slow client or server machines,
and may be the only method supported by older server software.
1024-bit group. We no longer recommend using this method, and it's
not used by default in new installations; however, it may be the
only method supported by very old server software.
\b \q{\ii{Group exchange}}: with this method, instead of using a fixed
group, PuTTY requests that the server suggest a group to use for key
exchange; the server can avoid groups known to be weak, and possibly
invent new ones over time, without any changes required to PuTTY's
configuration. We recommend use of this method, if possible.
configuration. We recommend use of this method instead of the
well-known groups, if possible.
\b \q{\i{RSA key exchange}}: this requires much less computational
effort on the part of the client, and somewhat less on the part of