Re: OpenSSH HPN

2015-11-30 Thread Julian Elischer
On 1/12/2015 3:23 AM, Brooks Davis wrote: On Tue, Nov 24, 2015 at 09:29:44PM +0100, Aaron Zauner wrote: Hi, Please forgive my ignorance but what's the reason FreeBSD ships OpenSSH patched with HPN by default? Besides my passion for security, I've been working in the HPC sector for a while and b

Re: OpenSSH HPN

2015-11-30 Thread Brooks Davis
On Tue, Nov 24, 2015 at 09:29:44PM +0100, Aaron Zauner wrote: > Hi, > > Please forgive my ignorance but what's the reason FreeBSD ships > OpenSSH patched with HPN by default? Besides my passion for > security, I've been working in the HPC sector for a while and > benchmarked the patch for a custom

Re: OpenSSH HPN

2015-11-24 Thread Aaron Zauner
Hi, Please forgive my ignorance but what's the reason FreeBSD ships OpenSSH patched with HPN by default? Besides my passion for security, I've been working in the HPC sector for a while and benchmarked the patch for a customer about 1.5 years ago. The CTR-multi threading patch is actually *slower*

Re: OpenSSH HPN

2015-11-12 Thread Dag-Erling Smørgrav
Benjamin Kaduk writes: > Things seem to have slowed down a lot since the lead Heimdal developer > got hired for Apple. [...] MIT employs developers whose job > descriptions include being the krb5 release manager [...] Heimdal has > changed plans to a 1.7 release [...] and since the developers i

Re: OpenSSH HPN

2015-11-12 Thread Julian Elischer
On 11/12/15 5:32 AM, Bryan Drewery wrote: On 11/10/2015 1:42 AM, Dag-Erling Smørgrav wrote: I would also like to remove the NONE cipher patch, which is also available in the port (off by default, just like in base). Fun fact, it's been broken in the port for several months with no complaints.

Re: OpenSSH HPN

2015-11-12 Thread Julian Elischer
On 11/12/15 3:28 AM, Brooks Davis wrote: On Tue, Nov 10, 2015 at 04:40:42PM -0800, Bryan Drewery wrote: On 11/10/15 1:42 AM, Dag-Erling Sm??rgrav wrote: Some of you may have noticed that OpenSSH in base is lagging far behind the upstream code. The main reason for this is the burden of maintain

Re: OpenSSH HPN

2015-11-12 Thread Benjamin Kaduk
On Thu, 12 Nov 2015, Dewayne Geraghty wrote: > Heimdal is (and has been for some time) undergoing constant development. > For reasons unknown, they do not perform releases. I am aware of updates > from heimdal that are being applied to the samba project (in fact some of > the samba developers are

Re: OpenSSH HPN

2015-11-12 Thread Dewayne Geraghty
Slawa, Heimdal is (and has been for some time) undergoing constant development. For reasons unknown, they do not perform releases. I am aware of updates from heimdal that are being applied to the samba project (in fact some of the samba developers are also feeding into heimdal). The latest discus

Re: OpenSSH HPN

2015-11-12 Thread Dag-Erling Smørgrav
Bryan Drewery writes: > It's harder to maintain the port version due to how the patches are > applied and generated. I have the diametrically opposite experience. The workflow for ports is significantly simpler than for base. Perhaps I should set up a paralell workflow for OpenSSH and apply the

Re: OpenSSH HPN

2015-11-11 Thread Roger Marquis
Trustworthy networks do exist. They just aren't the same networks as 20 years ago. They do of course but is that really relevant considering how rare verifyably trustworthy networks are, particularly in light of what we know about NONE cipher usage? The same logic applies to SCTP. It is little

Re: OpenSSH HPN

2015-11-11 Thread Robert Simmons
Oh just the opposite of what you're claiming. Did you even read the article about the Beyond Corp project? It is 100% about thinking very hard about trust and making sure that the trust model used doesn't depend on the concept of internal/external network. Also, the type of thinking where two or m

Re: OpenSSH HPN

2015-11-11 Thread Bryan Drewery
On 11/11/2015 3:56 PM, Slawa Olhovchenkov wrote: > On Wed, Nov 11, 2015 at 10:18:08AM -0800, Bryan Drewery wrote: > >> On 11/11/2015 10:13 AM, Slawa Olhovchenkov wrote: >>> On Wed, Nov 11, 2015 at 05:51:25PM +0100, Dag-Erling Smørgrav wrote: >>> Bryan Drewery writes: > Another thing that

Re: OpenSSH HPN

2015-11-11 Thread Bryan Drewery
On 11/11/15 4:05 PM, Slawa Olhovchenkov wrote: > On Wed, Nov 11, 2015 at 03:58:35PM -0800, Bryan Drewery wrote: > >>> Some for as ports version? >>> Or ports version different? >>> Or port mantainer have more time (this is not to blame for DES)? >>> I am just don't know what is different between p

Re: OpenSSH HPN

2015-11-11 Thread Slawa Olhovchenkov
On Wed, Nov 11, 2015 at 01:32:27PM -0800, Bryan Drewery wrote: > On 11/10/2015 1:42 AM, Dag-Erling Smørgrav wrote: > > I would also like to remove the NONE cipher > > patch, which is also available in the port (off by default, just like in > > base). > > Fun fact, it's been broken in the port fo

Re: OpenSSH HPN

2015-11-11 Thread Slawa Olhovchenkov
On Wed, Nov 11, 2015 at 03:58:35PM -0800, Bryan Drewery wrote: > > Some for as ports version? > > Or ports version different? > > Or port mantainer have more time (this is not to blame for DES)? > > I am just don't know what is different between port ssh and base ssh. > > We need ssh 6.x in base,

Re: OpenSSH HPN

2015-11-11 Thread Slawa Olhovchenkov
On Wed, Nov 11, 2015 at 10:18:08AM -0800, Bryan Drewery wrote: > On 11/11/2015 10:13 AM, Slawa Olhovchenkov wrote: > > On Wed, Nov 11, 2015 at 05:51:25PM +0100, Dag-Erling Smørgrav wrote: > > > >> Bryan Drewery writes: > >>> Another thing that I did with the port was restore the tcpwrapper > >>>

Re: OpenSSH HPN

2015-11-11 Thread Leif Pedersen
On Wed, Nov 11, 2015 at 4:29 PM, Robert Simmons wrote: > I don't think there is such a thing as a trusted network. That is a unicorn > these days. > > No networks should be considered trusted. > oh baloney. That's just a clever way to say you want to stop thinking about trust. If I've connected

kereros telnet/rlogin/etc. (was Re: OpenSSH HPN)

2015-11-11 Thread Benjamin Kaduk
On Wed, 11 Nov 2015, Daniel Kalchev wrote: > > Perhaps similar level of security could be achieved by “the old tools” > if they were by default compiled with Kerberos. Although, this still > requires building additional infrastructure. The kerberized versions of the old tools are basically unsupp

Re: OpenSSH HPN

2015-11-11 Thread Robert Simmons
I don't think there is such a thing as a trusted network. That is a unicorn these days. If you are using ssh to connect to the VPN server itself over the VPN connection, I can see why that would be useless double encryption. However, if you are connecting to a server on the network on the other si

Re: OpenSSH HPN

2015-11-11 Thread Bryan Drewery
On 11/10/2015 1:42 AM, Dag-Erling Smørgrav wrote: > I would also like to remove the NONE cipher > patch, which is also available in the port (off by default, just like in > base). Fun fact, it's been broken in the port for several months with no complaints. It was just reported and fixed upstream

Re: OpenSSH HPN

2015-11-11 Thread Bryan Drewery
On 11/11/2015 10:13 AM, Slawa Olhovchenkov wrote: > On Wed, Nov 11, 2015 at 05:51:25PM +0100, Dag-Erling Smørgrav wrote: > >> Bryan Drewery writes: >>> Another thing that I did with the port was restore the tcpwrapper >>> support that upstream removed. Again, if we decide it is not worth >>> keep

Re: OpenSSH HPN

2015-11-11 Thread Brooks Davis
On Tue, Nov 10, 2015 at 04:40:42PM -0800, Bryan Drewery wrote: > On 11/10/15 1:42 AM, Dag-Erling Sm??rgrav wrote: > > Some of you may have noticed that OpenSSH in base is lagging far behind > > the upstream code. > > > > The main reason for this is the burden of maintaining the HPN patches. > > Th

Re: OpenSSH HPN

2015-11-11 Thread John-Mark Gurney
Ben Woods wrote this message on Wed, Nov 11, 2015 at 16:27 +0800: > On Wednesday, 11 November 2015, John-Mark Gurney wrote: > > > Ben Woods wrote this message on Wed, Nov 11, 2015 at 15:40 +0800: > > > I have to agree that there are cases when the NONE cipher makes sense, > > and > > > it is up t

Re: OpenSSH HPN

2015-11-11 Thread John-Mark Gurney
Daniel Kalchev wrote this message on Wed, Nov 11, 2015 at 17:49 +0200: > It is my understanding, that using the NONE cypher is not identical to using > ???the old tools??? (rsh/rlogin/rcp). > > When ssh uses the NONE cypher, credentials and authorization are still > encrypted and verified. Only

Re: OpenSSH HPN

2015-11-11 Thread Slawa Olhovchenkov
On Wed, Nov 11, 2015 at 07:18:31PM +0100, Dag-Erling Smørgrav wrote: > Slawa Olhovchenkov writes: > > Can you explain what is problem? > > Radical suggestion: read the first email in the thread. I am read and don't understund (you talk about trouble of maintaining the HPN patches). I see patche

Re: OpenSSH HPN

2015-11-11 Thread Dag-Erling Smørgrav
Slawa Olhovchenkov writes: > Can you explain what is problem? Radical suggestion: read the first email in the thread. > PS: As I today know, kerberos heimdal is practicaly dead as opensource > project. Have FreeBSD planed switch to MIT Kerberos? I am know about > security/krb5. We switched fro

Re: OpenSSH HPN

2015-11-11 Thread Slawa Olhovchenkov
On Wed, Nov 11, 2015 at 05:51:25PM +0100, Dag-Erling Smørgrav wrote: > Bryan Drewery writes: > > Another thing that I did with the port was restore the tcpwrapper > > support that upstream removed. Again, if we decide it is not worth > > keeping in base I will remove it as default in the port. >

Re: OpenSSH HPN

2015-11-11 Thread Roger Marquis
On Wed, 11 Nov 2015, Dag-Erling Sm?rgrav wrote: I want to keep tcpwrapper support - it is another reason why I still haven't upgraded OpenSSH, but to the best of my knowledge, it is far less intrusive than HPN. There's also inetd's tcpwrapper support if you call sshd from inetd for D/DOS protec

Re: OpenSSH HPN

2015-11-11 Thread Bryan Drewery
On 11/11/2015 7:49 AM, Daniel Kalchev wrote: > It is my understanding, that using the NONE cypher is not identical to using > “the old tools” (rsh/rlogin/rcp). > > When ssh uses the NONE cypher, credentials and authorization are still > encrypted and verified. Only the actual data payload is not

Re: OpenSSH HPN

2015-11-11 Thread Daniel Kalchev
It is my understanding, that using the NONE cypher is not identical to using “the old tools” (rsh/rlogin/rcp). When ssh uses the NONE cypher, credentials and authorization are still encrypted and verified. Only the actual data payload is not encrypted. Perhaps similar level of security could be

Re: OpenSSH HPN

2015-11-11 Thread Bryan Drewery
On 11/10/2015 3:48 AM, Dag-Erling Smørgrav wrote: > Willem Jan Withagen writes: >> "Dag-Erling Smørgrav" writes: >>> Willem Jan Withagen writes: Are they still willing to accept changes to the old version that is currently in base? >>> No, why would they do that? >> Exactly my question

Re: OpenSSH HPN

2015-11-11 Thread Bryan Drewery
On 11/11/2015 8:51 AM, Dag-Erling Smørgrav wrote: > Bryan Drewery writes: >> Another thing that I did with the port was restore the tcpwrapper >> support that upstream removed. Again, if we decide it is not worth >> keeping in base I will remove it as default in the port. > > I want to keep tcpwr

Re: OpenSSH HPN

2015-11-11 Thread Bryan Drewery
On 11/11/2015 1:23 AM, Dag-Erling Smørgrav wrote: > Bryan Drewery writes: >> Actually I am missing the client-side VersionAddendum support (ssh.c). I >> only have server-side (sshd.c). This is just due to lack of motivation >> to import the changes. > > Pretty sure I sent Damien the patch a few

Re: OpenSSH HPN

2015-11-11 Thread Bryan Drewery
On 11/11/2015 1:04 AM, Dag-Erling Smørgrav wrote: > Ben Woods writes: >> Personally I have used it at home to backup my old FreeBSD server >> (which does not have AESNI) over a dedicated network connection to a >> backup server using rsync/ssh. Since it was not possible for anyone >> else to be on

Re: OpenSSH HPN

2015-11-11 Thread Bjoern A. Zeeb
> On 11 Nov 2015, at 16:53 , Bryan Drewery wrote: > > On 11/11/2015 8:51 AM, Dag-Erling Smørgrav wrote: >> Bryan Drewery writes: >>> Another thing that I did with the port was restore the tcpwrapper >>> support that upstream removed. Again, if we decide it is not worth >>> keeping in base I wil

Re: OpenSSH HPN

2015-11-11 Thread Dag-Erling Smørgrav
Bryan Drewery writes: > Another thing that I did with the port was restore the tcpwrapper > support that upstream removed. Again, if we decide it is not worth > keeping in base I will remove it as default in the port. I want to keep tcpwrapper support - it is another reason why I still haven't up

Re: OpenSSH HPN

2015-11-11 Thread Dag-Erling Smørgrav
Daniel Kalchev writes: > I must have missed the explanation. But why having a NONE cypher > compiled in, but disabled in the configuration is a bad idea? It increases the cost of maintaining OpenSSH in base noticeably without providing real value unless you are one of the few people who need HPN

Re: OpenSSH HPN

2015-11-11 Thread Dag-Erling Smørgrav
Julian Elischer writes: > Now we'll have to resurrect all that framework and pain. I guess pain is fine as long as it's not yours... > have you mentioned this plan to Brooks? Didn't he add it? These are public lists, but by all means, mention it to him if he hasn't noticed this thread. DES --

Re: OpenSSH HPN

2015-11-11 Thread Julian Elischer
On 11/11/15 7:56 PM, Dag-Erling Smørgrav wrote: Julian Elischer writes: The inclusion of the HPN patches meant that we could drop a custom unsupported HPN enabled ssh from our build process. It makes ssh actually usable. Define "usable". Does it actually make a measurable difference with the

Re: OpenSSH HPN

2015-11-11 Thread Dag-Erling Smørgrav
Julian Elischer writes: > Bob Bishop writes: > > Is removing HPN going to impact the performance of tunnelled X > > connexions? > yes if your rtt is greater than about 85 mSec With an RTT of 85 ms, X is unusable with or without HPN. DES -- Dag-Erling Smørgrav - d...@des.no

Re: OpenSSH HPN

2015-11-11 Thread Slawa Olhovchenkov
On Tue, Nov 10, 2015 at 11:59:30PM -0800, John-Mark Gurney wrote: > Ben Woods wrote this message on Wed, Nov 11, 2015 at 15:40 +0800: > > On Wednesday, 11 November 2015, Bryan Drewery wrote: > > > > > On 11/10/15 9:52 AM, John-Mark Gurney wrote: > > > > My vote is to remove the HPN patches. Fir

Re: OpenSSH HPN

2015-11-11 Thread Slawa Olhovchenkov
On Tue, Nov 10, 2015 at 09:52:16AM -0800, John-Mark Gurney wrote: > Dag-Erling Smrgrav wrote this message on Tue, Nov 10, 2015 at 10:42 +0100: > > Therefore, I would like to remove the HPN patches from base and refer > > anyone who really needs them to the openssh-portable port, which has > > them

Re: OpenSSH HPN

2015-11-11 Thread Ben Woods
On Wednesday, 11 November 2015, Bryan Drewery wrote: > On 11/10/15 9:52 AM, John-Mark Gurney wrote: > > My vote is to remove the HPN patches. First, the NONE cipher made more > > sense back when we didn't have AES-NI widely available, and you were > > seriously limited by it's performance. Now

Re: OpenSSH HPN

2015-11-11 Thread Ben Woods
On Wednesday, 11 November 2015, John-Mark Gurney wrote: > Ben Woods wrote this message on Wed, Nov 11, 2015 at 15:40 +0800: > > I have to agree that there are cases when the NONE cipher makes sense, > and > > it is up to the end user to make sure they know what they are doing. > > > > Personally

Re: OpenSSH HPN

2015-11-11 Thread Jason Birch
On Wed, Nov 11, 2015 at 6:59 PM, John-Mark Gurney wrote: > If you have a trusted network, why not just use nc? Perhaps more generally relevant is that ssh/scp are *waves hands* vaguely analogous to secure versions of rsh/rlogin/rcp. I'd think that most cases of "I wanted to send files and invoke

Re: OpenSSH HPN

2015-11-11 Thread Dag-Erling Smørgrav
Julian Elischer writes: > The inclusion of the HPN patches meant that we could drop a custom > unsupported HPN enabled ssh from our build process. It makes ssh > actually usable. Define "usable". Does it actually make a measurable difference with the latest OpenSSH? And if HPN is so important

Re: OpenSSH HPN

2015-11-11 Thread Julian Elischer
On 11/10/15 7:16 PM, Dag-Erling Smørgrav wrote: Bob Bishop writes: Is removing HPN going to impact the performance of tunnelled X connexions? yes if your rtt is greater than about 85 mSec I don't know he details but I noticed a big difference. I had thought X wouldn't show much difference but

Re: OpenSSH HPN

2015-11-11 Thread Julian Elischer
On 11/10/15 5:42 PM, Dag-Erling Smørgrav wrote: Some of you may have noticed that OpenSSH in base is lagging far behind the upstream code. The main reason for this is the burden of maintaining the HPN patches. They are extensive, very intrusive, and touch parts of the OpenSSH code that change si

Re: OpenSSH HPN

2015-11-11 Thread Dag-Erling Smørgrav
Bryan Drewery writes: > Actually I am missing the client-side VersionAddendum support (ssh.c). I > only have server-side (sshd.c). This is just due to lack of motivation > to import the changes. Pretty sure I sent Damien the patch a few years ago... There was also a bug in the server-side code

Re: OpenSSH HPN

2015-11-11 Thread Dag-Erling Smørgrav
Ben Woods writes: > Personally I have used it at home to backup my old FreeBSD server > (which does not have AESNI) over a dedicated network connection to a > backup server using rsync/ssh. Since it was not possible for anyone > else to be on that local network, and the server was so old it didn't

Re: OpenSSH HPN

2015-11-11 Thread Micheas Herman
On Tue, Nov 10, 2015 at 11:59 PM, John-Mark Gurney wrote: > > > > If you have a trusted network, why not just use nc? Defense in depth for starters. The ipfw how to guide I learned from years ago, started with the statement that a firewall should be a shield in front of machines that don't nee

Re: OpenSSH HPN

2015-11-11 Thread John-Mark Gurney
Ben Woods wrote this message on Wed, Nov 11, 2015 at 15:40 +0800: > On Wednesday, 11 November 2015, Bryan Drewery wrote: > > > On 11/10/15 9:52 AM, John-Mark Gurney wrote: > > > My vote is to remove the HPN patches. First, the NONE cipher made more > > > sense back when we didn't have AES-NI wid

Re: OpenSSH HPN

2015-11-10 Thread Bryan Drewery
On 11/10/15 4:40 PM, Bryan Drewery wrote: > Anyway, reverting the base SSH to stock, and then importing all patches > from the ports default version should result in the same base patches > applied and a working HPN. Actually I am missing the client-side VersionAddendum support (ssh.c). I only hav

Re: OpenSSH HPN

2015-11-10 Thread Bryan Drewery
On 11/10/15 1:42 AM, Dag-Erling Smørgrav wrote: > Some of you may have noticed that OpenSSH in base is lagging far behind > the upstream code. > > The main reason for this is the burden of maintaining the HPN patches. > They are extensive, very intrusive, and touch parts of the OpenSSH code > that

Re: OpenSSH HPN

2015-11-10 Thread Bryan Drewery
On 11/10/15 9:52 AM, John-Mark Gurney wrote: > My vote is to remove the HPN patches. First, the NONE cipher made more > sense back when we didn't have AES-NI widely available, and you were > seriously limited by it's performance. Now we have both aes-gcm and > chacha-poly which it's performance s

Re: OpenSSH HPN

2015-11-10 Thread Bryan Drewery
On 11/10/15 3:07 AM, Willem Jan Withagen wrote: > Which when I found out that upstreaming patches from base will be hard, > because the whole logging in the ports version is totally different. No it's not. The HPN patch in the ports version had *extra logging* for a while but that is not the case

Re: OpenSSH HPN

2015-11-10 Thread John-Mark Gurney
Bryan Drewery wrote this message on Tue, Nov 10, 2015 at 16:32 -0800: > On 11/10/15 9:52 AM, John-Mark Gurney wrote: > > My vote is to remove the HPN patches. First, the NONE cipher made more > > sense back when we didn't have AES-NI widely available, and you were > > seriously limited by it's per

Re: OpenSSH HPN

2015-11-10 Thread Michael Sinatra
On 11/10/15 1:42 AM, Dag-Erling Smørgrav wrote: Some of you may have noticed that OpenSSH in base is lagging far behind the upstream code. The main reason for this is the burden of maintaining the HPN patches. They are extensive, very intrusive, and touch parts of the OpenSSH code that change si

Re: OpenSSH HPN

2015-11-10 Thread John-Mark Gurney
Dag-Erling Smrgrav wrote this message on Tue, Nov 10, 2015 at 10:42 +0100: > Therefore, I would like to remove the HPN patches from base and refer > anyone who really needs them to the openssh-portable port, which has > them as a default option. I would also like to remove the NONE cipher > patch,

Re: OpenSSH HPN

2015-11-10 Thread Miroslav Lachman
Mark Felder wrote on 11/10/2015 17:02: [...] But like I said: The code I found at openssh was so totally different that I did not continued this track, but chose to start running openssh from ports. Which does not generate warnings I have questions about the originating ip-nr. Are they still

Re: OpenSSH HPN

2015-11-10 Thread Mark Felder
On Tue, Nov 10, 2015, at 05:25, Willem Jan Withagen wrote: > On 10-11-2015 12:11, Dag-Erling Smørgrav wrote: > > Willem Jan Withagen writes: > >> Digging in my logfiles , and its things like: > >> sshd[84942]: Disconnecting: Too many authentication failures [preauth] > >> > >> So errors/w

Re: OpenSSH HPN

2015-11-10 Thread Slawa Olhovchenkov
On Tue, Nov 10, 2015 at 10:42:49AM +0100, Dag-Erling Smørgrav wrote: > Some of you may have noticed that OpenSSH in base is lagging far behind > the upstream code. > > The main reason for this is the burden of maintaining the HPN patches. > They are extensive, very intrusive, and touch parts of t

Re: OpenSSH HPN

2015-11-10 Thread Dag-Erling Smørgrav
Willem Jan Withagen writes: > "Dag-Erling Smørgrav" writes: > > Willem Jan Withagen writes: > > > Are they still willing to accept changes to the old version that > > > is currently in base? > > No, why would they do that? > Exactly my question I guess I misinterpreted your suggestion on >

Re: OpenSSH HPN

2015-11-10 Thread Willem Jan Withagen
On 10-11-2015 12:11, Dag-Erling Smørgrav wrote: Willem Jan Withagen writes: Digging in my logfiles , and its things like: sshd[84942]: Disconnecting: Too many authentication failures [preauth] So errors/warnings without IP-nr. And I think I fixed it on one server to also write: error:

Re: OpenSSH HPN

2015-11-10 Thread Dag-Erling Smørgrav
Bob Bishop writes: > Is removing HPN going to impact the performance of tunnelled X > connexions? I don't think so. It mostly affects the performance of long unidirectional streams (file transfers) whereas the X protocol, as far as I know, is a bidirectional exchange of relatively short messages

Re: OpenSSH HPN

2015-11-10 Thread Dag-Erling Smørgrav
Willem Jan Withagen writes: > Digging in my logfiles , and its things like: > sshd[84942]: Disconnecting: Too many authentication failures [preauth] > > So errors/warnings without IP-nr. > > And I think I fixed it on one server to also write: > error: maximum authentication attempts exceeded

Re: OpenSSH HPN

2015-11-10 Thread Willem Jan Withagen
On 10-11-2015 11:55, Dag-Erling Smørgrav wrote: > Willem Jan Withagen writes: >> I know I've installed the ports once to see if, and how I would be >> able to add more IP-address infor to some of the warnings and >> errors. And then to get thos errors recognised by tools like sshguard >> and fail

Re: OpenSSH HPN

2015-11-10 Thread Bob Bishop
Hi, > On 10 Nov 2015, at 09:42, Dag-Erling Smørgrav wrote: > > […] > > Therefore, I would like to remove the HPN patches from base and refer > anyone who really needs them to the openssh-portable port, which has > them as a default option. I would also like to remove the NONE cipher > patch, w

Re: OpenSSH HPN

2015-11-10 Thread Dag-Erling Smørgrav
Willem Jan Withagen writes: > I know I've installed the ports once to see if, and how I would be > able to add more IP-address infor to some of the warnings and > errors. And then to get thos errors recognised by tools like sshguard > and fail2ban. Do you mean logging IP addresses instead of host

Re: OpenSSH HPN

2015-11-10 Thread Willem Jan Withagen
On 10-11-2015 10:42, Dag-Erling Smørgrav wrote: Some of you may have noticed that OpenSSH in base is lagging far behind the upstream code. The main reason for this is the burden of maintaining the HPN patches. They are extensive, very intrusive, and touch parts of the OpenSSH code that change si

Re: OpenSSH HPN

2015-11-10 Thread Kubilay Kocak
On 10/11/2015 8:42 PM, Dag-Erling Smørgrav wrote: > Some of you may have noticed that OpenSSH in base is lagging far behind > the upstream code. > > The main reason for this is the burden of maintaining the HPN patches. > They are extensive, very intrusive, and touch parts of the OpenSSH code > th

OpenSSH HPN

2015-11-10 Thread Dag-Erling Smørgrav
Some of you may have noticed that OpenSSH in base is lagging far behind the upstream code. The main reason for this is the burden of maintaining the HPN patches. They are extensive, very intrusive, and touch parts of the OpenSSH code that change significantly in every release. Since they are not