Previous threads have discussed the now deprecated NONE cipher and the
rationale for its removal. Recent posts on FCC compliance indicate
the usefulness of authentication without privacy for packet radio.

I also find this useful for transfers between IPsec protected
endpoints. Authentication is then useful for user
administration/privileges but encryption is not necessary given the
IPsec transport.

Is there a compromise that would be acceptable to the ssh maintainers
which provides an authenticated ssh mode without privacy? IPsec has
long been able to support such a mode (AH without ESP) and there is a
legitimate need as mentioned before.

Concern for accidental disclosure due to user error or
misconfiguration is legitimate. Would the following changes be
acceptable?

- Require an ssh[d]_config option which explicitly allows
authentication without privacy. This would be defaulted to off /
commented in the example config files.

- Require an ssh/scp/* flag on command line to enable authentication
without privacy (in addition to config file approval). HPN uses the
'-z' option.

- When used in this mode a message would be printed to stderr
indicating the lack of privacy. HPN prints a 'WARNING: ENABLED NULL
CIPHER' for scp but not ssh. Perhaps 'WARNING: privacy is disabled,
plaintext mode selected' would be more explanatory.

I would be willing to work on such a patch if this would address
maintainer concerns about unintended disclosure while providing the
useful feature of authentication without privacy.

Best regards,

_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@mindrot.org
http://www.mindrot.org/mailman/listi...enssh-unix-dev