Date: Tue, 21 Aug 2001 14:02:30 -0700 From: "Crist J. Clark" <cristjc@earthlink.net> To: Rob Simmons <rsimmons@wlcg.com> Cc: Matt Piechota <piechota@argolis.org>, Wes Peters <wes@softweyr.com>, "Carroll, D. (Danny)" <Danny.Carroll@mail.ing.nl>, freebsd-security@FreeBSD.ORG Subject: Re: Silly crackers... NT is for kids... Message-ID: <20010821140230.X313@blossom.cjclark.org> In-Reply-To: <20010821150657.G21383-100000@mail.wlcg.com>; from rsimmons@wlcg.com on Tue, Aug 21, 2001 at 03:14:36PM -0400 References: <20010821143517.L23909-100000@cithaeron.argolis.org> <20010821150657.G21383-100000@mail.wlcg.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, Aug 21, 2001 at 03:14:36PM -0400, Rob Simmons wrote: > On Tue, 21 Aug 2001, Matt Piechota wrote: > > > No No, on the realtime machine controllers (QNX), or OCR nodes that need > > all the cpu cycles they can get. I'm talking about the [de|en]crypt on > > the remote side, not the PC side. Every bit or performance matters, and > > could be the difference between us and someone else getting a contract. > > There should be a way to configure sshd so that only the username/password > exchange is encrypted. The rest of the connection would be unencrypted. > You would get some of the benefits of ssh without a constant performance > hit. Use one-time passwords with telnet. But I have yet to find a situation where the "constant performance hit" of SSH is noticable. -- Crist J. Clark cjclark@alum.mit.edu To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010821140230.X313>