Crypto - what algorithms to use?
Hal Murray
hmurray at megapathdsl.net
Fri Apr 1 06:17:42 UTC 2016
fallenpegasus at gmail.com said:
> We should live with MD5/SHA1 in shared key protocol, for now, for reasons of
> compatibility, but document that we know it's not the current best practice.
I think we can add support for new algorithms and leave the old stuff. Maybe
add a nasty message at startup time.
> Who maintains the leap-file?
A few years ago, there were versions from NIST and USNO. There is now a
version from IERS (the source of the raw data) and a mirror at IETF. I think
the payloads are all the same. The differences are in the comments.
--
These are my opinions. I hate spam.
More information about the devel
mailing list