>> If they have buffer overflow-style holes, those should be fixed.
>> Other than that I can't see how they can be less secure than the "none" 
>> cipher.
> I guess since the "none" cipher isn't supported in debian's ssh

Good point.

> you will just drop this questionable line of argument?

It just moves it to first arguing in favor of supporting `none`.


        Stefan

Reply via email to