From owner-freebsd-stable@FreeBSD.ORG Mon Oct 9 16:14:49 2006 Return-Path: X-Original-To: freebsd-stable@FreeBSD.ORG Delivered-To: freebsd-stable@FreeBSD.ORG Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 28BA216A407 for ; Mon, 9 Oct 2006 16:14:49 +0000 (UTC) (envelope-from vivek@khera.org) Received: from yertle.kcilink.com (yertle.kcilink.com [65.205.34.180]) by mx1.FreeBSD.org (Postfix) with ESMTP id 88DA743D68 for ; Mon, 9 Oct 2006 16:14:45 +0000 (GMT) (envelope-from vivek@khera.org) Received: from [192.168.7.103] (host-103.int.kcilink.com [192.168.7.103]) by yertle.kcilink.com (Postfix) with ESMTP id 697B4B80F for ; Mon, 9 Oct 2006 12:14:44 -0400 (EDT) Mime-Version: 1.0 (Apple Message framework v752.2) In-Reply-To: <200610081454.k98Eseas063823@lurza.secnetix.de> References: <200610081454.k98Eseas063823@lurza.secnetix.de> Content-Type: multipart/signed; micalg=sha1; boundary=Apple-Mail-12--432826429; protocol="application/pkcs7-signature" Message-Id: <060EC169-6293-4021-9AA5-E93044751723@khera.org> From: Vivek Khera Date: Mon, 9 Oct 2006 12:14:43 -0400 To: freebsd-stable X-Mailer: Apple Mail (2.752.2) X-Content-Filtered-By: Mailman/MimeDel 2.1.5 Cc: Subject: Re: scp -c none (was Re: NFS client slow on amd64 6.2-PRERELEASE #2) X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 09 Oct 2006 16:14:49 -0000 --Apple-Mail-12--432826429 Content-Transfer-Encoding: 7bit Content-Type: text/plain; charset=US-ASCII; delsp=yes; format=flowed On Oct 8, 2006, at 10:54 AM, Oliver Fromme wrote: > I considered submitting the patch for official inclusion, > but the OpenSSH people would reject it because they call > it "insecure", and the FreeBSD people would reject it > because they say the patch should be submitted to the > OpenSSH people. *sigh* :-( Double sigh from me. We used to use the "none" encryption often within our network (LAN + VPN connections using IPsec) where it was more or less pointless. With recent ssh releases that feature was removed and now we are forced to pay the extra encryption penalty. I for one would love to see it back. --Apple-Mail-12--432826429--