On Fri, Dec 2, 2011 at 3:39 PM, Jeremy Chadwick <free...@jdc.parodius.com>wrote:

> You also need to read README.hpn to understand fully how to get None
> cipher to work from the server AND client side, *AND* what the limits
> and caveats are.  There are changes you need to make to
> /etc/ssh/sshd_config, and there are *multiple* -o switches you will need
> to use with the client (e.g. ssh -oCipher=none -oNoneEnabled=yes
> -oNoneSwitch=yes).  If the WARNING message that is output to stderr
> bothers you, use -T.
>

Yeah, I've gone over all that.  We've been using the HPN patches and None
cipher via openssh-portable from ports for a couple years now.  Noticed the
HPN patches were added to the base OpenSSH, though, and thought I could use
that instead of the ports version, and ran into the "no None cipher" issue.

Thanks to the gentle prodding of Bjoern, I see that I missed the mention of
CFLAGS in the commit message, which is why it wasn't working for me.  :)
 I'm going to go with over-excitement due to too much coffee for this one.
 :)

I'm testing out the make.conf snippet you posted now.

-- 
Freddie Cash
fjwc...@gmail.com
_______________________________________________
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"

Reply via email to