[Bug 54180] Re: [rfe] sshd ought to support 'none' cipher
fusiondog
fusiondog at gmail.com
Wed Sep 30 03:20:58 BST 2009
I find it frustrating when those that don't understand the value of
something patently reject it without research. FTP and other protocols
make use of kerberos to authenticated securely then transmit the data in
plaintext. This should be trivial to do in ssh, especially if using
RSA/DSA key methods. I work in linux production datacenters and I know
the value of this FEATURE for transferring bulk data over trusted
networks or data that need not be secured. OpenSSh is flexible and easy
way to perform network streams over my trusted network, but the
encryption slows transfer and forces me to find other less secure, more
difficult and redundant services to install and maintain. I don't think
this should be default behavior but telling me that you reject out of
hand that I am competent enough to make my own decisions about how I run
services on my network is rather myopic. As far as you know is not far
enough.
--
[rfe] sshd ought to support 'none' cipher
https://bugs.launchpad.net/bugs/54180
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openssh in ubuntu.
More information about the Ubuntu-server-bugs
mailing list