Crypto - what algorithms to use?

Hal Murray hmurray at megapathdsl.net
Fri Apr 1 06:17:42 UTC 2016


fallenpegasus at gmail.com said:
> We should live with MD5/SHA1 in shared key protocol, for now, for reasons of
> compatibility, but document that we know it's not the current best practice.

I think we can add support for new algorithms and leave the old stuff.  Maybe 
add a nasty message at startup time.

> Who maintains the leap-file?

A few years ago, there were versions from NIST and USNO.  There is now a 
version from IERS (the source of the raw data) and a mirror at IETF.  I think 
the payloads are all the same.  The differences are in the comments.




-- 
These are my opinions.  I hate spam.





More information about the devel mailing list