Message Area
Casually read the BBS message area using an easy to use interface. Messages are categorized exactly like they are on the BBS. You may post new messages or reply to existing messages! You are not logged in. Login here for full access privileges. |
Previous Message | Next Message | Back to Public-Key Discussion Echo <-- <--- | Return to Home Page |
|
||||||
From | To | Subject | Date/Time | |||
Wilfred van Velzen | Paul Hayton | Re: Key expiry |
October 27, 2017 11:55 AM * |
|||
Hi Paul, On 2017-10-27 12:57:46, you wrote to me: Wv>> This explains it very well: PH> It does, thanks PH> I think I will set mine 3 years in to the future and then extend thereafter PH> as needed. Seems like good practice... PH> I also need to consider if this current key is technically strong PH> enough now or if I should shutter it and create a new one using a PH> stronger process and set that one to expire 3 years from now? That's what I'm doing. I set my 1024bit DSA from 1998 to expire in 2 years, and intend to use my newly created 4096bit (the maximum) RSA key from now on. Bye, Wilfred. --- FMail-lnx64 2.1.0.18-B20170815 * Origin: FMail development HQ (2:280/464) |
||||||
|
Previous Message | Next Message | Back to Public-Key Discussion Echo <-- <--- | Return to Home Page |
Execution Time: 0.1005 seconds If you experience any problems with this website or need help, contact the webmaster. VADV-PHP Copyright © 2002-2024 Steve Winn, Aspect Technologies. All Rights Reserved. Virtual Advanced Copyright © 1995-1997 Roland De Graaf. |