mirror of
https://git.tartarus.org/simon/putty.git
synced 2025-04-20 12:38:06 -05:00
Update docs for Ed25519 and ChaCha20-Poly1305.
This commit is contained in:
parent
9f9d72ec58
commit
9dd9860cc8
@ -2548,6 +2548,8 @@ use that.
|
|||||||
|
|
||||||
PuTTY currently supports the following algorithms:
|
PuTTY currently supports the following algorithms:
|
||||||
|
|
||||||
|
\b \i{ChaCha20-Poly1305}, a combined cipher and \i{MAC} (SSH-2 only)
|
||||||
|
|
||||||
\b \i{AES} (Rijndael) - 256, 192, or 128-bit SDCTR or CBC (SSH-2 only)
|
\b \i{AES} (Rijndael) - 256, 192, or 128-bit SDCTR or CBC (SSH-2 only)
|
||||||
|
|
||||||
\b \i{Arcfour} (RC4) - 256 or 128-bit stream cipher (SSH-2 only)
|
\b \i{Arcfour} (RC4) - 256 or 128-bit stream cipher (SSH-2 only)
|
||||||
|
@ -53,8 +53,8 @@ OpenSSH and ssh.com's implementation.
|
|||||||
\dt \cw{\-t} \e{keytype}
|
\dt \cw{\-t} \e{keytype}
|
||||||
|
|
||||||
\dd Specify a type of key to generate. The acceptable values here are
|
\dd Specify a type of key to generate. The acceptable values here are
|
||||||
\c{rsa} and \c{dsa} (to generate SSH-2 keys), and \c{rsa1} (to
|
\c{rsa}, \c{dsa}, \c{ecdsa}, and \c{ed25519} (to generate SSH-2 keys),
|
||||||
generate SSH-1 keys).
|
and \c{rsa1} (to generate SSH-1 keys).
|
||||||
|
|
||||||
\dt \cw{\-b} \e{bits}
|
\dt \cw{\-b} \e{bits}
|
||||||
|
|
||||||
@ -117,9 +117,15 @@ algorithms are believed compatible with OpenSSH.
|
|||||||
|
|
||||||
\dt \cw{private-openssh}
|
\dt \cw{private-openssh}
|
||||||
|
|
||||||
\dd Save an SSH-2 private key in OpenSSH's format. This option is not
|
\dd Save an SSH-2 private key in OpenSSH's format, using the oldest
|
||||||
|
format available to maximise backward compatibility. This option is not
|
||||||
permitted for SSH-1 keys.
|
permitted for SSH-1 keys.
|
||||||
|
|
||||||
|
\dt \cw{private-openssh-new}
|
||||||
|
|
||||||
|
\dd As \c{private-openssh}, except that it forces the use of OpenSSH's
|
||||||
|
newer format even for RSA, DSA, and ECDSA keys.
|
||||||
|
|
||||||
\dt \cw{private-sshcom}
|
\dt \cw{private-sshcom}
|
||||||
|
|
||||||
\dd Save an SSH-2 private key in ssh.com's format. This option is not
|
\dd Save an SSH-2 private key in ssh.com's format. This option is not
|
||||||
|
@ -72,7 +72,8 @@ For each key, the list box will tell you:
|
|||||||
\b The type of the key. Currently, this can be \c{ssh1} (an RSA key
|
\b The type of the key. Currently, this can be \c{ssh1} (an RSA key
|
||||||
for use with the SSH-1 protocol), \c{ssh-rsa} (an RSA key for use
|
for use with the SSH-1 protocol), \c{ssh-rsa} (an RSA key for use
|
||||||
with the SSH-2 protocol), \c{ssh-dss} (a DSA key for use with
|
with the SSH-2 protocol), \c{ssh-dss} (a DSA key for use with
|
||||||
the SSH-2 protocol), or \c{ecdsa-sha2-*} (an ECDSA key for use with
|
the SSH-2 protocol), \c{ecdsa-sha2-*} (an ECDSA key for use with
|
||||||
|
the SSH-2 protocol), or \c{ssh-ed25519} (an Ed25519 key for use with
|
||||||
the SSH-2 protocol).
|
the SSH-2 protocol).
|
||||||
|
|
||||||
\b The size (in bits) of the key.
|
\b The size (in bits) of the key.
|
||||||
|
@ -66,7 +66,7 @@ The key types supported by PuTTY are described in \k{puttygen-keytype}.
|
|||||||
PuTTYgen is a key generator. It \I{generating keys}generates pairs of
|
PuTTYgen is a key generator. It \I{generating keys}generates pairs of
|
||||||
public and private keys to be used with PuTTY, PSCP, and Plink, as well
|
public and private keys to be used with PuTTY, PSCP, and Plink, as well
|
||||||
as the PuTTY authentication agent, Pageant (see \k{pageant}). PuTTYgen
|
as the PuTTY authentication agent, Pageant (see \k{pageant}). PuTTYgen
|
||||||
generates RSA, DSA, and ECDSA keys.
|
generates RSA, DSA, ECDSA, and Ed25519 keys.
|
||||||
|
|
||||||
When you run PuTTYgen you will see a window where you have two
|
When you run PuTTYgen you will see a window where you have two
|
||||||
choices: \q{Generate}, to generate a new public/private key pair, or
|
choices: \q{Generate}, to generate a new public/private key pair, or
|
||||||
@ -109,7 +109,7 @@ server to accept it.
|
|||||||
\cfg{winhelp-topic}{puttygen.keytype}
|
\cfg{winhelp-topic}{puttygen.keytype}
|
||||||
|
|
||||||
Before generating a key pair using PuTTYgen, you need to select
|
Before generating a key pair using PuTTYgen, you need to select
|
||||||
which type of key you need. PuTTYgen currently supports three types
|
which type of key you need. PuTTYgen currently supports these types
|
||||||
of key:
|
of key:
|
||||||
|
|
||||||
\b An \i{RSA} key for use with the SSH-1 protocol.
|
\b An \i{RSA} key for use with the SSH-1 protocol.
|
||||||
@ -121,14 +121,18 @@ of key:
|
|||||||
\b An \i{ECDSA} (\i{elliptic curve} DSA) key for use with the
|
\b An \i{ECDSA} (\i{elliptic curve} DSA) key for use with the
|
||||||
SSH-2 protocol.
|
SSH-2 protocol.
|
||||||
|
|
||||||
|
\b An \i{Ed25519} key (another elliptic curve algorithm) for use
|
||||||
|
with the SSH-2 protocol.
|
||||||
|
|
||||||
The SSH-1 protocol only supports RSA keys; if you will be connecting
|
The SSH-1 protocol only supports RSA keys; if you will be connecting
|
||||||
using the SSH-1 protocol, you must select the first key type or your
|
using the SSH-1 protocol, you must select the first key type or your
|
||||||
key will be completely useless.
|
key will be completely useless.
|
||||||
|
|
||||||
The SSH-2 protocol supports more than one key type. The types
|
The SSH-2 protocol supports more than one key type. The types
|
||||||
supported by PuTTY are RSA, DSA, and ECDSA.
|
supported by PuTTY are RSA, DSA, ECDSA, and Ed25519.
|
||||||
|
|
||||||
The PuTTY developers \e{strongly} recommend you use RSA. \#{FIXME: ECDSA!}
|
The PuTTY developers \e{strongly} recommend you use RSA.
|
||||||
|
\#{FIXME: ECDSA, Ed25519!}
|
||||||
\I{security risk}\i{DSA} has an intrinsic weakness which makes it very
|
\I{security risk}\i{DSA} has an intrinsic weakness which makes it very
|
||||||
easy to create a signature which contains enough information to give
|
easy to create a signature which contains enough information to give
|
||||||
away the \e{private} key!
|
away the \e{private} key!
|
||||||
@ -150,11 +154,15 @@ more than one server.
|
|||||||
The \q{Number of bits} input box allows you to choose the strength
|
The \q{Number of bits} input box allows you to choose the strength
|
||||||
of the key PuTTYgen will generate.
|
of the key PuTTYgen will generate.
|
||||||
|
|
||||||
For RSA, 2048 bits should currently be sufficient for most purposes.
|
\b For RSA, 2048 bits should currently be sufficient for most purposes.
|
||||||
\#{FIXME: DSA}
|
|
||||||
For ECDSA, only 256, 384, and 521 bits are supported. (ECDSA offers
|
\#{FIXME: advice for DSA?}
|
||||||
|
|
||||||
|
\b For ECDSA, only 256, 384, and 521 bits are supported. (ECDSA offers
|
||||||
equivalent security to RSA with smaller key sizes.)
|
equivalent security to RSA with smaller key sizes.)
|
||||||
|
|
||||||
|
\b For Ed25519, the only valid size is 256 bits.
|
||||||
|
|
||||||
\S{puttygen-generate} The \q{Generate} button
|
\S{puttygen-generate} The \q{Generate} button
|
||||||
|
|
||||||
\cfg{winhelp-topic}{puttygen.generate}
|
\cfg{winhelp-topic}{puttygen.generate}
|
||||||
@ -189,7 +197,8 @@ appear in the window to indicate this.
|
|||||||
|
|
||||||
The \q{Key fingerprint} box shows you a fingerprint value for the
|
The \q{Key fingerprint} box shows you a fingerprint value for the
|
||||||
generated key. This is derived cryptographically from the \e{public}
|
generated key. This is derived cryptographically from the \e{public}
|
||||||
key value, so it doesn't need to be kept secret.
|
key value, so it doesn't need to be kept secret; it is supposed to
|
||||||
|
be more manageable for human beings than the public key itself.
|
||||||
|
|
||||||
The fingerprint value is intended to be cryptographically secure, in
|
The fingerprint value is intended to be cryptographically secure, in
|
||||||
the sense that it is computationally infeasible for someone to
|
the sense that it is computationally infeasible for someone to
|
||||||
@ -374,6 +383,16 @@ saving it (see \k{puttygen-savepriv}) - you need to have typed your
|
|||||||
passphrase in beforehand, and you will be warned if you are about to
|
passphrase in beforehand, and you will be warned if you are about to
|
||||||
save a key without a passphrase.
|
save a key without a passphrase.
|
||||||
|
|
||||||
|
For OpenSSH there are two options. Modern OpenSSH actually has two
|
||||||
|
formats it uses for storing private keys. \q{Export OpenSSH key}
|
||||||
|
will automatically choose the oldest format supported for the key
|
||||||
|
type, for maximum backward compatibility with older versions of
|
||||||
|
OpenSSH; for newer key types like Ed25519, it will use the newer
|
||||||
|
format as that is the only legal option. If you have some specific
|
||||||
|
reason for wanting to use OpenSSH's newer format even for RSA, DSA,
|
||||||
|
or ECDSA keys, you can choose \q{Export OpenSSH key (force new file
|
||||||
|
format}.
|
||||||
|
|
||||||
Note that since only SSH-2 keys come in different formats, the export
|
Note that since only SSH-2 keys come in different formats, the export
|
||||||
options are not available if you have generated an SSH-1 key.
|
options are not available if you have generated an SSH-1 key.
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user