Differences
This shows you the differences between the selected revisions of the page.
| 2007-04-11 | 2008-02-18 | ||
| 4.0 hidden for ftp (martin) | reexchange (martin) | ||
| Line 29: | Line 29: | ||
| If the first algorithm WinSCP finds is below the //warn below here// line, you will see a warning box when you make the connection, similar to that for [[ui_login_ssh#encryption_options|cipher selection]]. | If the first algorithm WinSCP finds is below the //warn below here// line, you will see a warning box when you make the connection, similar to that for [[ui_login_ssh#encryption_options|cipher selection]]. | ||
| - | ===== Options Controlling Key Re-exchange ===== | + | ===== [[reexchange]] Options Controlling Key Re-exchange ===== |
| If the session key negotiated at connection startup is used too much or for too long, it may become feasible to mount attacks against the SSH connection. Therefore, the SSH-2 protocol specifies that a new key exchange should take place every so often; this can be initiated by either the client or the server. | If the session key negotiated at connection startup is used too much or for too long, it may become feasible to mount attacks against the SSH connection. Therefore, the SSH-2 protocol specifies that a new key exchange should take place every so often; this can be initiated by either the client or the server. | ||