[EXT] Re: enabling "none" cipher

Chris Rapier rapier at psc.edu
Thu Jan 15 04:49:20 AEDT 2026



On 1/12/26 16:48, Darren Tucker wrote:
> On Tue, 13 Jan 2026 at 08:08, Blumenthal, Uri - 0553 - MITLL <uri at ll.mit.edu>
> wrote:
>> Isn't “none” cipher still authenticated, for both login and traffic?
> 
> The cipher itself is not, but there is a separate Message Authentication
> Code (MAC) on each SSH packet.  The spec also allows the MAC to be "none"
> but OpenSSH doesn't and offhand I don't know of an implementation that does.

HPN-SSH does that for people who really like to live on the edge. In 
some cases we see a 30-40% improvement in throughput. We don't suggest 
it in most cases though but when we were migrating file systems in our 
data center (18+PB) it made a difference in our parallel rsyncs. There 
are other options we've been exploring to improve MAC performance but 
those gains are much more incremental. We have found that for some MACs 
using OpenSSL calls are more efficient but it doesn't have the same 
coverage in terms of available MACs.

>> Don’t some organization care for authenticity, though not (that much) for
> confidentiality
> 
> Without SSH encryption, the passwords in password based logins (including
> keyboard-interactive) are also in plain text.  This is probably why even
> the HPN folks don't start with none, but instead start with a cipher then
> later rekey to "none".

Absolutely true. We're playing a bit loose with the SSH RFC but we're 
not interested in breaking it entirely. It's also why we don't allow it 
if a TTY is assigned - I don't want people typing in a password during 
an interactive session.

Chris


More information about the openssh-unix-dev mailing list