Ranter
Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Comments
-
stop68675y@PrivateGER the new sk keys are not usable, due an missing depency and an missing buildoption.
-
fuckwit12185y@PrivateGER @metamourge I feel personally attacked and have to mention that I indeed use arch btw
-
stop68675y@metamourge why? The archrepos are usually stable enough for developing stuff. I usually get errors when another developer was to strict with versions (too new nodeversion is very often the culprit)
-
fuckwit12185y@metamourge no not really
@stop no clue why people think that arch is bad. Over my Linux years I have broken more debian/ubuntu Installation than arch.
Not to hard considering my broken arch installation count is at 0.
@Root ;) -
@kescherRant You can also use gets() in a C program. Does that mean that you should do so?
-
matt-jd10305yGood to know, then I'll prepare for a shift in a few years when it finally reaches debian
Related Rants
OpenSSH 8.2 is out. This release removes support for the ssh-rsa key algorithm. The better alternatives include:
1. RSA SHA-2 signature algorithms rsa-sha2-256/512. These algorithms have the advantage of using the same key type as "ssh-rsa" but use the safe SHA-2 hash algorithms (now used by default if the client and server support them).
2. The ssh-ed25519 signature algorithm.
3. ECDSA algorithms: ecdsa-sha2-nistp256/384/521.
In this release, support for FIDO/U2F hardware tokens. Also noteworthy, a future release of OpenSSH will enable UpdateHostKeys by default to allow the client to automatically migrate to better algorithms.
random
openssh
update
security