Differences
This shows you the differences between the selected revisions of the page.
2007-04-11 | 2008-02-18 | ||
4.0 hidden for ftp (martin) | reexchange (martin) | ||
Line 29: | Line 29: | ||
If the first algorithm WinSCP finds is below the //warn below here// line, you will see a warning box when you make the connection, similar to that for [[ui_login_ssh#encryption_options|cipher selection]]. | If the first algorithm WinSCP finds is below the //warn below here// line, you will see a warning box when you make the connection, similar to that for [[ui_login_ssh#encryption_options|cipher selection]]. | ||
- | ===== Options Controlling Key Re-exchange ===== | + | ===== [[reexchange]] Options Controlling Key Re-exchange ===== |
If the session key negotiated at connection startup is used too much or for too long, it may become feasible to mount attacks against the SSH connection. Therefore, the SSH-2 protocol specifies that a new key exchange should take place every so often; this can be initiated by either the client or the server. | If the session key negotiated at connection startup is used too much or for too long, it may become feasible to mount attacks against the SSH connection. Therefore, the SSH-2 protocol specifies that a new key exchange should take place every so often; this can be initiated by either the client or the server. | ||