Re: Bug#192416: ITP: rsh-redone -- Reimplementation of remote shell tools.
On Fri, May 09, 2003 at 09:01:04AM +0200, Matthias Urlichs wrote:
> On Fri, 09 May 2003 01:37:53 +0000, Colin Watson wrote:
> > On Thu, May 08, 2003 at 11:00:43PM +0200, Matthias Urlichs wrote:
> >> This already exists. It's the "none" encryption.
> >
> > It's not even available in OpenSSH as far as I know.
>
> [ Checking the source code ]
>
> Actually it's enabled, but it seems that it's only available with
> version 1 of the ssh protocol. *Sigh*.
You sure about that?
$ ssh -v -1 -c none localhost
OpenSSH_3.6.1p2 Debian 1:3.6.1p2-1, SSH protocols 1.5/2.0, OpenSSL 0x0090702f
debug1: Reading configuration data /home/cjwatson/.ssh/config
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Rhosts Authentication disabled, originating port will not be trusted.
debug1: Connecting to localhost [127.0.0.1] port 22.
debug1: Connection established.
debug1: identity file /home/cjwatson/.ssh/identity type 0
debug1: Remote protocol version 1.99, remote software version OpenSSH_3.6.1p2 Debian 1:3.6.1p2-1
debug1: match: OpenSSH_3.6.1p2 Debian 1:3.6.1p2-1 pat OpenSSH*
debug1: Local version string SSH-1.5-OpenSSH_3.6.1p2 Debian 1:3.6.1p2-1
debug1: Waiting for server public key.
debug1: Received server public key (768 bits) and host key (1024 bits).
debug1: Host 'localhost' is known and matches the RSA1 host key.
debug1: Found key in /home/cjwatson/.ssh/known_hosts:112
No valid SSH1 cipher, using 3des instead.
[...]
Sure, some code is there which understands SSH_CIPHER_NONE, but it's not
actually a selectable cipher. My understanding is that this is
deliberate (whether we agree with it or not).
--
Colin Watson [cjwatson@flatline.org.uk]
Reply to: