Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 21 Aug 2001 14:02:30 -0700
From:      "Crist J. Clark" <cristjc@earthlink.net>
To:        Rob Simmons <rsimmons@wlcg.com>
Cc:        Matt Piechota <piechota@argolis.org>, Wes Peters <wes@softweyr.com>, "Carroll, D. (Danny)" <Danny.Carroll@mail.ing.nl>, freebsd-security@FreeBSD.ORG
Subject:   Re: Silly crackers... NT is for kids...
Message-ID:  <20010821140230.X313@blossom.cjclark.org>
In-Reply-To: <20010821150657.G21383-100000@mail.wlcg.com>; from rsimmons@wlcg.com on Tue, Aug 21, 2001 at 03:14:36PM -0400
References:  <20010821143517.L23909-100000@cithaeron.argolis.org> <20010821150657.G21383-100000@mail.wlcg.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, Aug 21, 2001 at 03:14:36PM -0400, Rob Simmons wrote:
> On Tue, 21 Aug 2001, Matt Piechota wrote:
> 
> > No No, on the realtime machine controllers (QNX), or OCR nodes that need
> > all the cpu cycles they can get.  I'm talking about the [de|en]crypt on
> > the remote side, not the PC side.  Every bit or performance matters, and
> > could be the difference between us and someone else getting a contract.
> 
> There should be a way to configure sshd so that only the username/password
> exchange is encrypted.  The rest of the connection would be unencrypted.
> You would get some of the benefits of ssh without a constant performance
> hit.

Use one-time passwords with telnet.

But I have yet to find a situation where the "constant performance
hit" of SSH is noticable.
-- 
Crist J. Clark                           cjclark@alum.mit.edu

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010821140230.X313>