Hello Folks,
I hate to beat an already "terribly beaten horse" but I'd like to say
that I would like the null cipher option to be available. The reason
being is that working for a WAN optimization company, the need to "see"
the unencrypted traffic is paramount in order to reduce SSH's network
foot
I just want to say that I need this too... Please. It's not that
terribly hard.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/54180
Title:
[rfe] sshd ought to support 'none' cipher
No. My statements in comment #16 stand; this needs to go upstream
*first*.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/54180
Title:
[rfe] sshd ought to support 'none' cipher
To
Is there any chance this might hit 11.10?
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/54180
Title:
[rfe] sshd ought to support 'none' cipher
To manage notifications about this b
I want to see this in ubuntu 10.04, i need none cipher in my enterprise
env. please add "none" patch
--
[rfe] sshd ought to support 'none' cipher
https://bugs.launchpad.net/bugs/54180
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openssh
fusiondog: Could I recommend that you consider doing something positive?
If you are willing to work with upstream (that is, with the developers
of openssh) to get this option included by default in their released
source code, that would make getting it included into future releases of
Ubuntu *much*
I find it frustrating when those that don't understand the value of
something patently reject it without research. FTP and other protocols
make use of kerberos to authenticated securely then transmit the data in
plaintext. This should be trivial to do in ssh, especially if using
RSA/DSA key metho
This is the 'none' cipher patch:
http://www.psc.edu/networking/projects/hpn-ssh/openssh5.1-dynwindow_noneswitch.diff.gz
(from http://www.psc.edu/networking/projects/hpn-ssh/)
Since security is so critical, perhaps we should defer judgement to the
OpenSSH mailing lists?
--
[rfe] sshd ought to su
Problem is that SSH performance is still 10-30x slower with encryption.
On a 3.6GHz Intel Penryn with plenty of memory bandwidth [1], we see
around 67MB/s - 109MB/s [2]. Moving from 'secret' aes-128-cbc (the
default) to 'top-secret' aes-256-cbc (the most secure) is almost free.
Moving from MD5 has