| Summary: | please let the server enable/disable delayed compression on a per user basis | ||||||
|---|---|---|---|---|---|---|---|
| Product: | Portable OpenSSH | Reporter: | philcerf | ||||
| Component: | sshd | Assignee: | Damien Miller <djm> | ||||
| Status: | CLOSED WONTFIX | ||||||
| Severity: | enhancement | CC: | djm | ||||
| Priority: | P5 | ||||||
| Version: | 3.7p1 | ||||||
| Hardware: | All | ||||||
| OS: | All | ||||||
| Attachments: |
|
||||||
|
Description
philcerf
2014-12-01 14:23:52 AEDT
Created attachment 2515 [details]
Require multiple publickey entries in AuthenticationMethods use different keys
Thanks for reminding me to do this - I've been planning it for a while. Here's a patch that implements it for -current.
Comment on attachment 2515 [details]
Require multiple publickey entries in AuthenticationMethods use different keys
oops, wrong bug - please disregard
Unfortunately this isn't trivially possible - in the SSH protocol, compression is negotiated before the authentication, and it is only at the authentication stage that the server learns the name of the user who is connecting. It is theoretically possible to force a rekeying operation after authentication to renegotiate the encryption/compression options but this is expensive and IMO not worth the complexity needed to implement it. closing resolved bugs as of 8.6p1 release |