Network pipes
Mike Bristow
mike at urgle.com
Fri Jul 25 01:39:33 PDT 2003
On Thu, 2003-07-24 at 21:51, Leo Bicknell wrote:
> In a message written on Thu, Jul 24, 2003 at 12:48:23PM -0700, Tim Kientzle wrote:
> > Another approach would be to add a new option to SSH
> > so that it could encrypt only the initial authentication,
> > then pass data unencrypted after that. This would
> > go a long way to addressing the performance concerns.
>
> ssh -c none?
mike at guylian:~$ uname -srm
FreeBSD 5.1-RELEASE i386
mike at guylian:~$ ssh -c none localhost
No valid ciphers for protocol version 2 given, using defaults.
Nice idea. OpenSSH has deliberately broken this, and last time I looked
will not entertain unbreaking it. The patch is trivial, though.
> Note, you don't want to use password authentication in this case, but
> public key should still be ok.
More information about the freebsd-hackers
mailing list