Date: Tue, 21 Aug 2001 15:14:36 -0400 (EDT) From: Rob Simmons <rsimmons@wlcg.com> To: Matt Piechota <piechota@argolis.org> Cc: Wes Peters <wes@softweyr.com>, "Carroll, D. (Danny)" <Danny.Carroll@mail.ing.nl>, <freebsd-security@freebsd.org> Subject: Re: Silly crackers... NT is for kids... Message-ID: <20010821150657.G21383-100000@mail.wlcg.com> In-Reply-To: <20010821143517.L23909-100000@cithaeron.argolis.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, 21 Aug 2001, Matt Piechota wrote: > No No, on the realtime machine controllers (QNX), or OCR nodes that need > all the cpu cycles they can get. I'm talking about the [de|en]crypt on > the remote side, not the PC side. Every bit or performance matters, and > could be the difference between us and someone else getting a contract. There should be a way to configure sshd so that only the username/password exchange is encrypted. The rest of the connection would be unencrypted. You would get some of the benefits of ssh without a constant performance hit. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010821150657.G21383-100000>