Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 21 Aug 2001 15:14:36 -0400 (EDT)
From:      Rob Simmons <rsimmons@wlcg.com>
To:        Matt Piechota <piechota@argolis.org>
Cc:        Wes Peters <wes@softweyr.com>, "Carroll, D. (Danny)" <Danny.Carroll@mail.ing.nl>, <freebsd-security@freebsd.org>
Subject:   Re: Silly crackers... NT is for kids...
Message-ID:  <20010821150657.G21383-100000@mail.wlcg.com>
In-Reply-To: <20010821143517.L23909-100000@cithaeron.argolis.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, 21 Aug 2001, Matt Piechota wrote:

> No No, on the realtime machine controllers (QNX), or OCR nodes that need
> all the cpu cycles they can get.  I'm talking about the [de|en]crypt on
> the remote side, not the PC side.  Every bit or performance matters, and
> could be the difference between us and someone else getting a contract.

There should be a way to configure sshd so that only the username/password
exchange is encrypted.  The rest of the connection would be unencrypted.
You would get some of the benefits of ssh without a constant performance
hit.


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010821150657.G21383-100000>