>> If they have buffer overflow-style holes, those should be fixed. >> Other than that I can't see how they can be less secure than the "none" >> cipher. > I guess since the "none" cipher isn't supported in debian's ssh
Good point. > you will just drop this questionable line of argument? It just moves it to first arguing in favor of supporting `none`. Stefan