9front - general discussion about 9front
 help / color / mirror / Atom feed
* [9front] obsolete cryptographic algorithms
@ 2022-06-04  7:13 sml
  2022-06-04 14:47 ` ori
  0 siblings, 1 reply; 18+ messages in thread
From: sml @ 2022-06-04  7:13 UTC (permalink / raw)
  To: 9front

Hello everyone, 

I am currently trying to understand the implementation of factotum and I noticed that /sys/src/libsec contains some obsolete cryptographic algorithms like sha-1, md4, md5, dsa and des. 

In section 7.4.3.2 of the fqa the manual change from p9sk1 to dp9ik is described and since then, as far as I understand, it is also the new standard where des has been replaced by aes. 

In the list I keep reading about different cleanups, which I greatly appreciate and I'm wondering whether the deprecated crypto algorithms and protocols can be cleaned out as well, or if there is a specific reason to hold on to them. I think if you use very weak crypto, you can do without it directly.

Many thanks in advance for your responses!

Best regards, 
sml

^ permalink raw reply	[flat|nested] 18+ messages in thread

end of thread, other threads:[~2022-10-02 22:33 UTC | newest]

Thread overview: 18+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-06-04  7:13 [9front] obsolete cryptographic algorithms sml
2022-06-04 14:47 ` ori
2022-06-04 15:26   ` mkf9
2022-06-04 15:32     ` ori
2022-06-04 15:36       ` ori
2022-06-04 16:07         ` Stanley Lieber
2022-06-04 16:12           ` ori
2022-09-27 20:10   ` Michael Forney
2022-09-27 20:11     ` hiro
2022-09-27 20:31       ` Michael Forney
2022-09-27 21:40         ` hiro
2022-09-27 22:26     ` ori
2022-09-28  6:41       ` hiro
2022-09-29  5:01         ` ori
2022-09-29  6:17           ` unobe
2022-09-29  6:30             ` unobe
2022-09-29  8:53           ` hiro
2022-10-02 18:23     ` [9front] " magma698hfsp273p9f

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).