Network pipes

Mike Bristow mike at urgle.com
Fri Jul 25 01:39:33 PDT 2003


On Thu, 2003-07-24 at 21:51, Leo Bicknell wrote:
> In a message written on Thu, Jul 24, 2003 at 12:48:23PM -0700, Tim Kientzle wrote:
> > Another approach would be to add a new option to SSH
> > so that it could encrypt only the initial authentication,
> > then pass data unencrypted after that.  This would
> > go a long way to addressing the performance concerns.
> 
> ssh -c none?

mike at guylian:~$ uname -srm
FreeBSD 5.1-RELEASE i386
mike at guylian:~$ ssh -c none localhost
No valid ciphers for protocol version 2 given, using defaults.


Nice idea.  OpenSSH has deliberately broken this, and last time I looked
will not entertain unbreaking it.  The patch is trivial, though.

> Note, you don't want to use password authentication in this case, but
> public key should still be ok.




More information about the freebsd-hackers mailing list