similar to: Available: Multi-threaded AES-CTR Cipher

Displaying 20 results from an estimated 900 matches similar to: "Available: Multi-threaded AES-CTR Cipher"

2007 Nov 15
0
Extended Server Logging Patch
On the request of a coworker looking for more information about our SSH users I developed a patch that provides extended logging capability for SSHD. Its been written with an eye towards machine parsing. This patch will write the following information to the standard system log: remote ip, remote port, & remote user name protocol number and client version information Encryption method, MAC
2023 Dec 20
1
Discussion: new terrapin resisting ciphers and macs (alternative to strict-kex) and -ctr mode question.
Hi there, > So there could be a Chacha20-Poly1305v2 at openssh.com which uses AD data to chain the > messages together, so it will be resistant against terrapin even without the strict-kex. > > Consequently the hmac-etmv2 at openssh.com mode could be deviced in a similar manner, to > also include the transcript hash or similar things. This would still require both, client and
2007 Nov 09
1
HPN SSH
Hello, I know that this has been asked before, just wanted to mention that I, too, would like to see the HPN SSH functionality incorporated in the standard OpenSSH. Would there be technical disadvantages integrating the changes? I know we are all pretty busy, but I would certainly spend time to help, e.g. with testing, documentation, etc. Cheers --pwo -- Peter W. Osel - http://pwo.de/ - pwo
2005 Jun 17
3
New Set of High Performance Networking Patches Available
http://www.psc.edu/networking/projects/hpn-ssh/ Mike Stevens and I just released a new set of high performance networking patches for OpenSSH 3.9p1, 4.0p1, and 4.1p1. These patches will provide the same set of functionality across all 3 revisions. New functionality includes 1) HPN performance even without both sides of the connection being HPN enabled. As long as the bulk data flow is in the
2006 Mar 16
0
New Version of HPN-SSH Patch
[NB: General information regarding HPN-SSH can be found at http://www.psc.edu/networking/projects/hpn-ssh ] This is a beta release of HPN12 but I'd like to get some user experiences with it if anyone is so inclined. This version of the HPN patch more closely conforms to the openssh nomenclature and coding style, it eliminates the use of command line switches in favor of -o options, it
2013 Feb 28
1
how to use before_filter to decrypt post data
hello, everybody. in ror, we can add a after_filter to a controller. def aes_encrypt response.body = AesHelper.aes_encrypt(response.body) end after_filter :aes_encrypt and all action''s repsonse int the controller can be encrypt. and my question is , how to decrypt data use before_filter, or anything else. ex: i want to post json data to /usr/register, the json data is
2011 Feb 06
3
OpenSSH could be faster...then why don't they path it??
https://www.psc.edu/networking/projects/hpn-ssh/hpn-v-ssh-tput.jpg "SCP and the underlying SSH2 protocol implementation in OpenSSH is network performance limited by statically defined internal flow control buffers. These buffers often end up acting as a bottleneck for network throughput of SCP, especially on long and high bandwith network links. Modifying the ssh code to allow the buffers
2007 Mar 12
0
HPN patch now available for OpenSSH 4.6
The HPN patch set has been updated to work with OpenSSH4.6. This patch can help improve performance of bulk data transfers when using SSH, SCP, or SFTP. Please see http://www.psc.edu/networking/projects/hpn-ssh for more information. The patch is available from the above address or directly with http://www.psc.edu/networking/projects/hpn-ssh/openssh-4.6p1-hpn12v16.diff.gz If you have any
2006 May 19
1
New HPN Patch Released
The HPN12 patch available from http://www.psc.edu/networking/projects/hpn-ssh addresses performance issues with bulk data transfer over high bandwidth delay paths. By adjusting internal flow control buffers to better fit the outstanding data capacity of the path significant improvements in bulk data throughput performance are achieved. In other words, transfers over the internet are a lot
2006 Feb 01
0
HPN patch for OpenSSH 4.3 released
http://www.psc.edu/networking/projects/hpn-ssh There have been some changes to the command line switches which are detailed on the website. This is more of a stop gap release than anything else. This is still in the HPN-11 cycle of patches. We hope to have an update to HPN-12 out sometime in March (when I can get some freetime). This will conform more closely to the OpenSSH nomenclature and
2009 Feb 17
1
Support for merging LPK and hpn-ssh into mainline openssh?
Hello Are there plans to merge the hpn-ssh (http://www.psc.edu/networking/projects/hpn-ssh/) and the LPK (http://code.google.com/p/openssh-lpk/) into the mainline openssh. Adding lpk has been logged as a bug in bugzilla as They are two patches that I always apply as the performance boost from hpn-ssh is substantial to say the least, and centralisation of the authorized_keys into a LDAP server
2009 Oct 16
0
AES CTR mode
I'm looking at replacing some algorithms with different implementations, and I'm having some problems with the AES CTR mode algorithms. I can see where encryption is done, but I can't figure out where decryption occurs. I'm looking at cipher-ctr.c ---- Scott Neugroschl XYPRO Technology Corporation scott_n at xypro.com 805-583-2874
2015 Aug 11
2
rsync stuck at +- 50 MB/s, cp and scp are +- 200 MB/s
Hi, I tried different encryptions like arc four, but always with the same result. BTW: googling shows some similar questions and they are stuck on set same speed +-. But non of that solutions helped me. /G?tz > Am 11.08.2015 um 12:14 schrieb Eero Volotinen <eero.volotinen at iki.fi>: > > Usually problem in encryption. > > try cipher arcfour or apply hpn patches to
2005 Sep 08
1
HPN Patch for OpenSSH 4.2p1 Available
Howdy, As a note, we now have HPN patch for OpenSSH 4.2 at http://www.psc.edu/networking/projects/hpn-ssh/ Its still part of the last set of patches (HPN11) so there aren't any additional changes in the code. It patches, configures, compiles, and passes make tests without a problem. I've not done extensive testing for this version of openssh but I don't foresee any problems. I
2006 Mar 16
1
sql functions in cru ( not d )
Hi, I''m looking at ways to encrypt email addresses rather than storing them directly in the database. There are several ways that it could be done. I could make an Encrypter class and use before_update, etc. Or I could set up an updatable VIEW in mySql. (I guess triggers might be another possibility.) However, what I would really LIKE to do is use the handy AES_ENCRYPT and
2006 Sep 29
0
HPN-SSH for OpenSSH 4.4p1 Available
This is a preliminary release and as such should be used at your own risk. In my testing the application builds under OS X and Linux, passes the regression tests, and file transfer tests on our test connections exhibited a 1600% increase in performance (1.4MB/s versus 20.9MB/s 46ms RTT). This patch (hpn12v10) is available from
2007 May 05
1
[Bug 1311] Performance on high BDP networks
http://bugzilla.mindrot.org/show_bug.cgi?id=1311 Summary: Performance on high BDP networks Product: Portable OpenSSH Version: 4.6p1 Platform: All OS/Version: All Status: NEW Severity: normal Priority: P2 Component: Build system AssignedTo: bitbucket at mindrot.org ReportedBy: imorgan at
2006 Mar 25
1
High Performance SSH/SCP - HPN-SSH when?
Hi, http://www.psc.edu/networking/projects/hpn-ssh/ Clearly, the HPN patches significantly boost throughput performance. This enhancement is entirely from tuning the SSH buffer sizes. Alex Tavcar
2014 Mar 06
1
Is cipher "3des-ctr" supported by openssh?
Hi, Is cipher "3des-ctr" supported by openssh? It is not mentioned in the list of supported ciphers in the man page of ssh_config: Thanks, Sunil Ciphers Specifies the ciphers allowed for protocol version 2 in order of preference. Multiple ciphers must be comma-separated. The supported ciphers are ''3des-cbc'', ''aes128-cbc'',
2005 Mar 25
1
New HPN patch released for 3.9
We've released a new HPN (High Performance Network) patch for OpenSSH 3.9p1. We've made two major changes - first off we backed out of all the modifications we made to buffer.c. Turns out that it just wasn't necessary once we fixed a nagging bug in channels.c. I also made a minor change to the buffer sizes in the source and sink functions in scp.c Increasing the size of both