I find it frustrating when those that don't understand the value of
something patently reject it without research.  FTP and other protocols
make use of kerberos to authenticated securely then transmit the data in
plaintext.  This should be trivial to do in ssh, especially if using
RSA/DSA key methods.  I work in linux production datacenters and I know
the value of this FEATURE for transferring bulk data over trusted
networks or data that need not be secured.  OpenSSh is flexible and easy
way to perform network streams over my trusted network, but the
encryption slows transfer and forces me to find other less secure, more
difficult and redundant services to install and maintain.  I don't think
this should be default behavior but telling me that you reject out of
hand that I am competent enough to make my own decisions about how I run
services on my network is rather myopic.  As far as you know is not far
enough.

-- 
[rfe] sshd ought to support 'none' cipher
https://bugs.launchpad.net/bugs/54180
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to