Network pipes

Leo Bicknell bicknell at ufp.org
Thu Jul 24 14:51:29 PDT 2003


In a message written on Thu, Jul 24, 2003 at 12:48:23PM -0700, Tim Kientzle wrote:
> Another approach would be to add a new option to SSH
> so that it could encrypt only the initial authentication,
> then pass data unencrypted after that.  This would
> go a long way to addressing the performance concerns.

ssh -c none?

Note, you don't want to use password authentication in this case, but
public key should still be ok.

You could also set up something like kerberos and use krsh or similar...

-- 
       Leo Bicknell - bicknell at ufp.org - CCIE 3440
        PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - tmbg-list-request at tmbg.org, www.tmbg.org
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 187 bytes
Desc: not available
Url : http://lists.freebsd.org/pipermail/freebsd-hackers/attachments/20030724/270b104c/attachment.bin


More information about the freebsd-hackers mailing list