From owner-freebsd-stable@FreeBSD.ORG Fri Dec 2 23:43:00 2011 Return-Path: Delivered-To: stable@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 9AEED106564A for ; Fri, 2 Dec 2011 23:43:00 +0000 (UTC) (envelope-from fjwcash@gmail.com) Received: from mail-vw0-f54.google.com (mail-vw0-f54.google.com [209.85.212.54]) by mx1.freebsd.org (Postfix) with ESMTP id 4E9528FC17 for ; Fri, 2 Dec 2011 23:43:00 +0000 (UTC) Received: by vbbfr13 with SMTP id fr13so4331744vbb.13 for ; Fri, 02 Dec 2011 15:42:59 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=01Ld2x/uRbBhX0w+5/1D0cGeOfxe9rA0rSEfXhoAw1I=; b=sBkdKXeFCGfHQMqtLjPEaUaOhi24qdt2koaoGsOsqKv+4D6Wqo6hz8afGj3DuBPAUf BGtT1jwHdRwkulBxZ/fuZxTVNWIH7ANkiQ2xh+UfiOj9W0NyZm8fEUIRPweHrlHSUqnU F3QGjIg/lZ8AmASx2qNDdO9gBhtNgdkEgl2aE= MIME-Version: 1.0 Received: by 10.52.30.130 with SMTP id s2mr225895vdh.55.1322869379523; Fri, 02 Dec 2011 15:42:59 -0800 (PST) Received: by 10.220.231.10 with HTTP; Fri, 2 Dec 2011 15:42:59 -0800 (PST) In-Reply-To: <20111202233930.GA43590@icarus.home.lan> References: <20111202233220.GA43495@icarus.home.lan> <20111202233930.GA43590@icarus.home.lan> Date: Fri, 2 Dec 2011 15:42:59 -0800 Message-ID: From: Freddie Cash To: Jeremy Chadwick Content-Type: text/plain; charset=UTF-8 X-Content-Filtered-By: Mailman/MimeDel 2.1.5 Cc: stable@freebsd.org Subject: Re: r228152: anyone got the None cipher working with base OpenSSH? X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 02 Dec 2011 23:43:00 -0000 On Fri, Dec 2, 2011 at 3:39 PM, Jeremy Chadwick wrote: > You also need to read README.hpn to understand fully how to get None > cipher to work from the server AND client side, *AND* what the limits > and caveats are. There are changes you need to make to > /etc/ssh/sshd_config, and there are *multiple* -o switches you will need > to use with the client (e.g. ssh -oCipher=none -oNoneEnabled=yes > -oNoneSwitch=yes). If the WARNING message that is output to stderr > bothers you, use -T. > Yeah, I've gone over all that. We've been using the HPN patches and None cipher via openssh-portable from ports for a couple years now. Noticed the HPN patches were added to the base OpenSSH, though, and thought I could use that instead of the ports version, and ran into the "no None cipher" issue. Thanks to the gentle prodding of Bjoern, I see that I missed the mention of CFLAGS in the commit message, which is why it wasn't working for me. :) I'm going to go with over-excitement due to too much coffee for this one. :) I'm testing out the make.conf snippet you posted now. -- Freddie Cash fjwcash@gmail.com