Name | Modified | Size | Downloads / Week |
---|---|---|---|
Parent folder | |||
openssh6.2-CTR-threading.diff | 2019-11-13 | 20.8 kB | |
openssh6.2-dynwindow_noneswitch.diff.gz | 2019-11-13 | 14.5 kB | |
openssh6.2-dynwindows.diff.gz | 2019-11-13 | 11.8 kB | |
openssh6.2-none_switch.diff | 2019-11-13 | 13.4 kB | |
openssh6.2-peaktput.diff | 2019-11-13 | 2.2 kB | |
openssh6.2-server-logging.diff | 2019-11-13 | 11.7 kB | |
openssh-6.2p2-hpn14v1.diff.gz | 2019-11-13 | 24.0 kB | |
README.patches | 2019-11-13 | 2.8 kB | |
Totals: 8 Items | 101.1 kB | 0 |
openssh-6.2p2-hpn14v1.diff.gz: This is the 'kitchen sink' patch set and incorporates all of the following patches into a single easy to apply patch. openssh6.2-dynwindows.diff.gz: This patch provides the dynamically sized receive buffers to OpenSSH 6.2p2. This is the core of HPN-SSH. Please note that this patch will not necessarily improve all connections but only those that were being hampered by undersized buffers. While optimal improvement requires this patch on both sides of the connection many users see enhancement as long as the patch is applied on the side of the connection receiving bulk data. openssh6.2-none_switch.diff: This patch provides the post authentication switch to the NONE cipher. This is useful for the transfer of bulk data via SCP. The NONE switch is not allowed during interactive sessions. Both sides of the connection *must* support the NONE switch. openssh6.2-dynwindow_noneswitch.diff.gz: This patch incorporates both of the preceeding patches. Previously this was the most commonly used patch set due to problems with the MT-AES-CTR cipher. These problems have since been resolved and, as such, this patch is deprecated. Support will continue to at least OpenSSH 6.4p2. openssh6.2-CTR-threading.diff: This patch provides the multi-threaded AES-CTR cipher. Essentially, several buffers are created that are filled with pre-computed keystreads generates by worker threads. These buffers are drained in order so as to provide a keystream 100% compatible with non-threaded AES-CTR implementations. Prior to this release there was a significant flaw in the way in which this cipher was used in SSH (the security of this cipher was nto impacted) where forking the process to the background would cause the threads to become divorced from the parent process. This would lead to a failure in port forwarding applications and, starting with 6.1p1, incompatibility with the sandbox used by the privsep process. Both problems were resoloved by using the non-threaded AES-CTR cipher during authentication and then switching to the MT-AES-CTR cipher immediately after. openssh6.2-server-logging.diff: This patch provides enhanced logging capabilities to the server process. Information provided includes ciphers used, throughput, bytes transferred, and the like. In order to use this patch you *must* direct syslogd to use an additional logging socket. This socket will be located in the sshd chroot, typically /var/empty. As such you will need to create a /var/empty/dev directory and add '-a /var/empty/dev/log' to your syslogd configuration. openssh6.2-peaktput.diff: This patch modifes the progress bar to display the 1 second throughput average. On completion of the transfer it will display the peak throughput through the life of the connection.