version 1.332, 2013/04/19 01:06:50 |
version 1.333, 2013/06/27 14:05:37 |
|
|
using one of the DSA, ECDSA or RSA algorithms. |
using one of the DSA, ECDSA or RSA algorithms. |
Protocol 1 is restricted to using only RSA keys, |
Protocol 1 is restricted to using only RSA keys, |
but protocol 2 may use any. |
but protocol 2 may use any. |
The |
The HISTORY section of |
.Sx HISTORY |
|
section of |
|
.Xr ssl 8 |
.Xr ssl 8 |
contains a brief discussion of the DSA and RSA algorithms. |
contains a brief discussion of the DSA and RSA algorithms. |
.Pp |
.Pp |
|
|
signed certificates are used. |
signed certificates are used. |
This has the advantage that a single trusted certification authority |
This has the advantage that a single trusted certification authority |
can be used in place of many public/private keys. |
can be used in place of many public/private keys. |
See the |
See the CERTIFICATES section of |
.Sx CERTIFICATES |
|
section of |
|
.Xr ssh-keygen 1 |
.Xr ssh-keygen 1 |
for more information. |
for more information. |
.Pp |
.Pp |