"cipher none" alternatives ?
    Christopher Linn 
    celinn at mtu.edu
       
    Sun Mar 18 04:53:01 EST 2001
    
    
  
On Sat, Mar 17, 2001 at 06:24:38AM -0800, Dan Kaminsky wrote:
> > > You've not done Arcfour with OpenSSH; it's not supported.  I'm not
> > > sure if I like that or not.
> > 
> > It is supported for ssh2. ssh -2 -oCiphers=arcfour ...
> 
> dankamin at CISCO-CD5ZTDFXI ~
> $ ssh -h
> ...
> -c cipher  Select encryption algorithm:  ``3des'', ``blowfish''
> 
> Self-Documentation trumps--can be a blessing or a curse.
perhaps the manpage is more current than the embedded help msg?
from ssh(1):
[...]
     -c cipher_spec
             Additionally, for protocol version 2 a comma-separated list of
             ciphers can be specified in order of preference.  See Ciphers for
             more information.
[...]
     Ciphers
             Specifies the ciphers allowed for protocol version 2 in order of
             preference.  Multiple ciphers must be comma-separated.  The de-
             fault is
               ``3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes128-cbc,
                 aes192-cbc,aes256-cbc,rijndael128-cbc,rijndael192-cbc,
                 rijndael256-cbc,rijndael-cbc at lysator.liu.se''
[...]
> --Dan
chris
-- 
Christopher Linn, <celinn at mtu.edu>    | By no means shall either the CEC
Staff System Administrator            | or MTU be held in any way liable
  Center for Experimental Computation | for any opinions or conjecture I
    Michigan Technological University | hold to or imply to hold herein.
    
    
More information about the openssh-unix-dev
mailing list