https://bugzilla.mindrot.org/show_bug.cgi?id=3820
--- Comment #7 from Darren Tucker <[email protected]> --- (In reply to Damien Miller from comment #5) > Created attachment 3880 [details] > Disable timing obfuscation more aggressively when X11 channels active > > This is what I mean. It would benefit from some testing. This patch doesn't seem to make a noticeable difference for me. Without patch: $. /ssh -Y -p 2022 -i ~/.ssh/id_ed25519 -o identitiesonly=yes localhost -tt time xterm -e true real 0m4.818s user 0m0.023s sys 0m0.035s Connection to localhost closed. With patch: $ ./ssh -Y -p 2022 -i ~/.ssh/id_ed25519 -o identitiesonly=yes localhost -tt time xterm -e true real 0m4.783s user 0m0.021s sys 0m0.046s Connection to localhost closed. -- You are receiving this mail because: You are watching someone on the CC list of the bug. You are watching the assignee of the bug. _______________________________________________ openssh-bugs mailing list [email protected] https://lists.mindrot.org/mailman/listinfo/openssh-bugs
