Re: SSH as discard server?

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

 



Understood. That's why I was looking at doing in cipher_crypt. All the other mechanism should JustWork(tm). Maybe.

That said, that's sort of what I do in the none cipher switch in hpnssh. Instead of running through a decrypt process it just does a memcpy from src to dst and returns.

Thanks
Chris

On 8/6/21 11:27 AM, Brian Candler wrote:
After authentication, the ssh client is almost certainly going to request a channel.  If you don't acknowledge that, it will hang. It can then request further channels at any point during the connection. Handling this requires decrypting the traffic.  Any "sink" server that doesn't bother to decrypt packets will need to be written in a way which is very specific to the way the client uses SSH.

 From the intro to rfc4254:

    This document describes the SSH Connection Protocol.  It provides
    interactive login sessions, remote execution of commands, forwarded
    TCP/IP connections, and forwarded X11 connections.  **All of these channels are multiplexed into a single encrypted tunnel**.

(my emphasis)

_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@xxxxxxxxxxx
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev




[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux