When one generates keys using ssh-keygen one gets prompted for a passphrase to encrypt the generated key with.
How strong should such a passphrase be, entropywise, to withstand a full-blown brute-force dictionary attack?
Also, are there any ssh configuration settings that increase or reduce the advisable strength for the passphrase? (My understanding is that the slower the encryption algorithm used, the less entropy is required to put a passphrase encrypted with this algorithm beyond the reach of any feasible brute-force dictionary attack.)
-o. RSA, DSA, ECDSA default to OpenSSL's 'legacy' formats which are quite bad (tweaked PBKDF1 with !!ONE!! iteration), but you can use OpenSSL to convert to PKCS8 format using PBKDF2 with 2048 iterations (optionally more in trunk, planned for 1.1.0) and OpenSSH can read that even though it won't write it; that's still not as good as bcrypt. – dave_thompson_085 Dec 02 '15 at 02:00