"cipher none" alternatives ?
Christopher Linn
celinn at mtu.edu
Sun Mar 18 04:53:01 EST 2001
On Sat, Mar 17, 2001 at 06:24:38AM -0800, Dan Kaminsky wrote:
> > > You've not done Arcfour with OpenSSH; it's not supported. I'm not
> > > sure if I like that or not.
> >
> > It is supported for ssh2. ssh -2 -oCiphers=arcfour ...
>
> dankamin at CISCO-CD5ZTDFXI ~
> $ ssh -h
> ...
> -c cipher Select encryption algorithm: ``3des'', ``blowfish''
>
> Self-Documentation trumps--can be a blessing or a curse.
perhaps the manpage is more current than the embedded help msg?
from ssh(1):
[...]
-c cipher_spec
Additionally, for protocol version 2 a comma-separated list of
ciphers can be specified in order of preference. See Ciphers for
more information.
[...]
Ciphers
Specifies the ciphers allowed for protocol version 2 in order of
preference. Multiple ciphers must be comma-separated. The de-
fault is
``3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes128-cbc,
aes192-cbc,aes256-cbc,rijndael128-cbc,rijndael192-cbc,
rijndael256-cbc,rijndael-cbc at lysator.liu.se''
[...]
> --Dan
chris
--
Christopher Linn, <celinn at mtu.edu> | By no means shall either the CEC
Staff System Administrator | or MTU be held in any way liable
Center for Experimental Computation | for any opinions or conjecture I
Michigan Technological University | hold to or imply to hold herein.
More information about the openssh-unix-dev
mailing list