Tags: warquel/openssh-hpn-isshd
Tags
add peak throughput to the progress bar This patch modifes the progress bar to display the 1 second throughput average. On completion of the transfer it will display the peak throughput through the life of the connection.
add support for the NONE cipher This patch provides the post authentication switch to the NONE cipher. This is useful for the transfer of bulk data via SCP. The NONE switch is not allowed during interactive sessions. Both sides of the connection *must* support the NONE switch.
support dynamically sized receive buffers This is the core of HPN-SSH. Please note that this patch will not necessarily improve all connections but only those that were being hampered by undersized buffers. While optimal improvement requires this patch on both sides of the connection many users see enhancement as long as the patch is applied on the side of the connection receiving bulk data.
support dynamically sized receive buffers This is the core of HPN-SSH. Please note that this patch will not necessarily improve all connections but only those that were being hampered by undersized buffers. While optimal improvement requires this patch on both sides of the connection many users see enhancement as long as the patch is applied on the side of the connection receiving bulk data.
support dynamically sized receive buffers This is the core of HPN-SSH. Please note that this patch will not necessarily improve all connections but only those that were being hampered by undersized buffers. While optimal improvement requires this patch on both sides of the connection many users see enhancement as long as the patch is applied on the side of the connection receiving bulk data.
Add support for the multi-threaded AES-CTR cipher This patch provides the multi-threaded AES-CTR cipher. Essentially, several buffers are created that are filled with pre-computed keystreads generates by worker threads. These buffers are drained in order so as to provide a keystream 100% compatible with non-threaded AES-CTR implementations. Prior to this release there was a significant flaw in the way in which this cipher was used in SSH (the security of this cipher was not impacted) where forking the process to the background would cause the threads to become divorced from the parent process. This would lead to a failure in port forwarding applications and, starting with 6.1p1, incompatibility with the sandbox used by the privsep process. Both problems were resoloved by using the non-threaded AES-CTR cipher during authentication and then switching to the MT-AES-CTR cipher immediately after.
PreviousNext