Skip site navigation (1)Skip section navigation (2)
Date:      25 Jul 2003 08:39:31 +0000
From:      Mike Bristow <mike@urgle.com>
To:        Leo Bicknell <bicknell@ufp.org>
Cc:        freebsd-hackers@freebsd.org
Subject:   Re: Network pipes
Message-ID:  <1059122370.5661.114.camel@singsing.eng.demon.net>
In-Reply-To: <20030724215127.GA2027@ussenterprise.ufp.org>
References:  <20030724194228.P65000-100000@foem> <3F203807.6010805@acm.org> <20030724215127.GA2027@ussenterprise.ufp.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, 2003-07-24 at 21:51, Leo Bicknell wrote:
> In a message written on Thu, Jul 24, 2003 at 12:48:23PM -0700, Tim Kientzle wrote:
> > Another approach would be to add a new option to SSH
> > so that it could encrypt only the initial authentication,
> > then pass data unencrypted after that.  This would
> > go a long way to addressing the performance concerns.
> 
> ssh -c none?

mike@guylian:~$ uname -srm
FreeBSD 5.1-RELEASE i386
mike@guylian:~$ ssh -c none localhost
No valid ciphers for protocol version 2 given, using defaults.


Nice idea.  OpenSSH has deliberately broken this, and last time I looked
will not entertain unbreaking it.  The patch is trivial, though.

> Note, you don't want to use password authentication in this case, but
> public key should still be ok.




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1059122370.5661.114.camel>