Hello Folks,
I hate to beat an already "terribly beaten horse" but I'd like to say
that I would like the null cipher option to be available. The reason
being is that working for a WAN optimization company, the need to "see"
the unencrypted traffic is paramount in order to reduce SSH's network
foot
I just want to say that I need this too... Please. It's not that
terribly hard.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/54180
Title:
[rfe] sshd ought to support 'none' cipher
To manage notifi
No. My statements in comment #16 stand; this needs to go upstream
*first*.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/54180
Title:
[rfe] sshd ought to support 'none' cipher
To manage notificati
Is there any chance this might hit 11.10?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/54180
Title:
[rfe] sshd ought to support 'none' cipher
To manage notifications about this bug go to:
https://
I want to see this in ubuntu 10.04, i need none cipher in my enterprise
env. please add "none" patch
--
[rfe] sshd ought to support 'none' cipher
https://bugs.launchpad.net/bugs/54180
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
u
fusiondog: Could I recommend that you consider doing something positive?
If you are willing to work with upstream (that is, with the developers
of openssh) to get this option included by default in their released
source code, that would make getting it included into future releases of
Ubuntu *much*
I find it frustrating when those that don't understand the value of
something patently reject it without research. FTP and other protocols
make use of kerberos to authenticated securely then transmit the data in
plaintext. This should be trivial to do in ssh, especially if using
RSA/DSA key metho
This is the 'none' cipher patch:
http://www.psc.edu/networking/projects/hpn-ssh/openssh5.1-dynwindow_noneswitch.diff.gz
(from http://www.psc.edu/networking/projects/hpn-ssh/)
Since security is so critical, perhaps we should defer judgement to the
OpenSSH mailing lists?
--
[rfe] sshd ought to su
Problem is that SSH performance is still 10-30x slower with encryption.
On a 3.6GHz Intel Penryn with plenty of memory bandwidth [1], we see
around 67MB/s - 109MB/s [2]. Moving from 'secret' aes-128-cbc (the
default) to 'top-secret' aes-256-cbc (the most secure) is almost free.
Moving from MD5 has
** Changed in: openssh (Debian)
Status: Confirmed => Won't Fix
--
[rfe] sshd ought to support 'none' cipher
https://bugs.launchpad.net/bugs/54180
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.
--
ubuntu-bugs mailing list
u
(Claims that this is a configure option date from SSH1; this option was
removed by upstream a long time ago.)
** Changed in: openssh (Ubuntu)
Importance: Undecided => Wishlist
Status: Unconfirmed => Confirmed
--
[rfe] sshd ought to support 'none' cipher
https://launchpad.net/bugs/54180
For what it's worth, despite claims I've heard to the contrary, this is
not something that has been intentionally disabled versus upstream by
the Debian/Ubuntu packaging, it's not a configure option, and it's not a
trivial one-line change. At minimum, I'd want to disable password
authentication whe
Rejecting bogus task.
** Changed in: debian-installer (upstream)
Status: Unconfirmed => Rejected
--
[rfe] sshd ought to support 'none' cipher
https://launchpad.net/bugs/54180
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
** Also affects: debian-installer (upstream)
Importance: Untriaged
Status: Unconfirmed
--
[rfe] sshd ought to support 'none' cipher
https://launchpad.net/bugs/54180
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
** Changed in: openssh (Debian)
Status: Unknown => Confirmed
--
[rfe] sshd ought to support 'none' cipher
https://launchpad.net/bugs/54180
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
Doing password authentication over 'none' cipher is indeed quite bad
(unless you're on a trusted local network) but RSA/DSA authentication
over an unencrypted transport is totally secure in that no key
information is leaked and it's not possible to authenticate without a
proper key.
Of course, you
I am very unconvinced about this (none implies that *authentication*
happens in plaintext, as far as I know!). I recommend that people
wanting performance use the blowfish-cbc cipher.
--
[rfe] sshd ought to support 'none' cipher
https://launchpad.net/bugs/54180
--
ubuntu-bugs mailing list
ubuntu
** Bug watch added: Debian Bug tracker #13389
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=13389
** Also affects: openssh (Debian) via
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=13389
Importance: Unknown
Status: Unknown
--
[rfe] sshd ought to support 'none' cipher
https
18 matches
Mail list logo