From owner-freebsd-security@freebsd.org Wed Nov 11 08:27:11 2015 Return-Path: Delivered-To: freebsd-security@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 76C66A1F9BE; Wed, 11 Nov 2015 08:27:11 +0000 (UTC) (envelope-from woodsb02@gmail.com) Received: from mail-lb0-x230.google.com (mail-lb0-x230.google.com [IPv6:2a00:1450:4010:c04::230]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id F0EFF1D32; Wed, 11 Nov 2015 08:27:10 +0000 (UTC) (envelope-from woodsb02@gmail.com) Received: by lbbcs9 with SMTP id cs9so12758784lbb.1; Wed, 11 Nov 2015 00:27:08 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=2C22Uo5AO4RX3g4AS5Q6XwewFxHplvlCR9aQtSHQBxs=; b=fKHuQWXs1+8TBRiz/lojlt+NPTfxnYUtBZVqN6FyEPMM+nil0qVVpml/yubl574RkV cvuwHEPCG8sNv4a3anzaFe9ZJFcQl1ZWQiRjQKDdmEMCvk5WKm1XPZDHzQQqVFBo9l8C 8XdL86l8VDZ2Kx92mhVl6HYtam7URZS3Z5hbZZGCCugEJV6WmMi8l+7PyKZC3HaIXj4n porfDDZUMzHcThRDc8ITu6c+158Gggg2wc9mzPPVbAaJ6b/6D72KI5QgiKZK85mE+VmO 2FBv3oXzJy7kWoLKdDd8LpZe9GCYX8k2PytkXyv6S7/OZT/jlhxT58phJRjUDcFDx8Sf v53g== MIME-Version: 1.0 X-Received: by 10.112.140.197 with SMTP id ri5mr3904385lbb.65.1447230428669; Wed, 11 Nov 2015 00:27:08 -0800 (PST) Received: by 10.25.141.129 with HTTP; Wed, 11 Nov 2015 00:27:08 -0800 (PST) In-Reply-To: <20151111075930.GR65715@funkthat.com> References: <86io5a9ome.fsf@desk.des.no> <20151110175216.GN65715@funkthat.com> <56428C84.8050600@FreeBSD.org> <20151111075930.GR65715@funkthat.com> Date: Wed, 11 Nov 2015 16:27:08 +0800 Message-ID: Subject: Re: OpenSSH HPN From: Ben Woods To: John-Mark Gurney Cc: Bryan Drewery , =?UTF-8?Q?Dag=2DErling_Sm=C3=B8rgrav?= , "freebsd-current@freebsd.org" , "freebsd-security@freebsd.org" X-Mailman-Approved-At: Wed, 11 Nov 2015 12:21:29 +0000 Content-Type: text/plain; charset=UTF-8 X-Content-Filtered-By: Mailman/MimeDel 2.1.20 X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 11 Nov 2015 08:27:11 -0000 On Wednesday, 11 November 2015, John-Mark Gurney wrote: > Ben Woods wrote this message on Wed, Nov 11, 2015 at 15:40 +0800: > > I have to agree that there are cases when the NONE cipher makes sense, > and > > it is up to the end user to make sure they know what they are doing. > > > > Personally I have used it at home to backup my old FreeBSD server (which > > does not have AESNI) over a dedicated network connection to a backup > server > > using rsync/ssh. Since it was not possible for anyone else to be on that > > local network, and the server was so old it didn't have AESNI and would > > soon be retired, using the NONE cipher sped up the transfer > significantly. > > If you have a trusted network, why not just use nc? > Honest answer: ignorance of how I can use netcat together with rsync. -- -- From: Benjamin Woods woodsb02@gmail.com