Date: 25 Jul 2003 08:39:31 +0000 From: Mike Bristow <mike@urgle.com> To: Leo Bicknell <bicknell@ufp.org> Cc: freebsd-hackers@freebsd.org Subject: Re: Network pipes Message-ID: <1059122370.5661.114.camel@singsing.eng.demon.net> In-Reply-To: <20030724215127.GA2027@ussenterprise.ufp.org> References: <20030724194228.P65000-100000@foem> <3F203807.6010805@acm.org> <20030724215127.GA2027@ussenterprise.ufp.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, 2003-07-24 at 21:51, Leo Bicknell wrote: > In a message written on Thu, Jul 24, 2003 at 12:48:23PM -0700, Tim Kientzle wrote: > > Another approach would be to add a new option to SSH > > so that it could encrypt only the initial authentication, > > then pass data unencrypted after that. This would > > go a long way to addressing the performance concerns. > > ssh -c none? mike@guylian:~$ uname -srm FreeBSD 5.1-RELEASE i386 mike@guylian:~$ ssh -c none localhost No valid ciphers for protocol version 2 given, using defaults. Nice idea. OpenSSH has deliberately broken this, and last time I looked will not entertain unbreaking it. The patch is trivial, though. > Note, you don't want to use password authentication in this case, but > public key should still be ok.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1059122370.5661.114.camel>