Download Latest Version openssh-9_4_P1-hpn-18.1.0.diff (748.8 kB)
Email in envelope

Get an email when there's a new version of HPN-SSH

Home / Patches / HPN-SSH 14v1 6.2p2
Name Modified Size InfoDownloads / Week
Parent folder
openssh6.2-CTR-threading.diff 2019-11-13 20.8 kB
openssh6.2-dynwindow_noneswitch.diff.gz 2019-11-13 14.5 kB
openssh6.2-dynwindows.diff.gz 2019-11-13 11.8 kB
openssh6.2-none_switch.diff 2019-11-13 13.4 kB
openssh6.2-peaktput.diff 2019-11-13 2.2 kB
openssh6.2-server-logging.diff 2019-11-13 11.7 kB
openssh-6.2p2-hpn14v1.diff.gz 2019-11-13 24.0 kB
README.patches 2019-11-13 2.8 kB
Totals: 8 Items   101.1 kB 0
openssh-6.2p2-hpn14v1.diff.gz:
This is the 'kitchen sink' patch set and incorporates all of the following patches
into a single easy to apply patch. 

openssh6.2-dynwindows.diff.gz:
This patch provides the dynamically sized receive buffers to OpenSSH 6.2p2. This is
the core of HPN-SSH. Please note that this patch will not necessarily improve all
connections but only those that were being hampered by undersized buffers. While 
optimal improvement requires this patch on both sides of the connection many users see
enhancement as long as the patch is applied on the side of the connection receiving bulk
data.

openssh6.2-none_switch.diff:
This patch provides the post authentication switch to the NONE cipher. This is
useful for the transfer of bulk data via SCP. The NONE switch is not allowed during
interactive sessions. Both sides of the connection *must* support the NONE switch. 

openssh6.2-dynwindow_noneswitch.diff.gz:
This patch incorporates both of the preceeding patches. Previously this was the most commonly used 
patch set due to problems with the MT-AES-CTR cipher. These problems have since been resolved and, 
as such, this patch is deprecated. Support will continue to at least OpenSSH 6.4p2.

openssh6.2-CTR-threading.diff:
This patch provides the multi-threaded AES-CTR cipher. Essentially, several buffers are created
that are filled with pre-computed keystreads generates by worker threads. These buffers are drained
in order so as to provide a keystream 100% compatible with non-threaded AES-CTR implementations. Prior 
to this release there was a significant flaw in the way in which this cipher was used in SSH (the 
security of this cipher was nto impacted) where forking the process to the background would cause the
threads to become divorced from the parent process. This would lead to a failure in port forwarding 
applications and, starting with 6.1p1, incompatibility with the sandbox used by the privsep process. Both
problems were resoloved by using the non-threaded AES-CTR cipher during authentication and then switching
to the MT-AES-CTR cipher immediately after. 

openssh6.2-server-logging.diff: 
This patch provides enhanced logging capabilities to the server process. Information provided includes
ciphers used, throughput, bytes transferred, and the like. In order to use this patch you *must* 
direct syslogd to use an additional logging socket. This socket will be located in the sshd chroot, 
typically /var/empty. As such you will need to create a /var/empty/dev directory and 
add '-a /var/empty/dev/log' to your syslogd configuration.

openssh6.2-peaktput.diff:
This patch modifes the progress bar to display the 1 second throughput average. On completion of 
the transfer it will display the peak throughput through the life of the connection. 
Source: README.patches, updated 2019-11-13