LWN: Comments on "The Grumpy Editor's guide to SSH servers" https://lwn.net/Articles/186985/ This is a special feed containing comments posted to the individual LWN article titled "The Grumpy Editor's guide to SSH servers". en-us Tue, 21 Oct 2025 18:00:03 +0000 Tue, 21 Oct 2025 18:00:03 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net The Grumpy Editor's guide to SSH servers https://lwn.net/Articles/189584/ https://lwn.net/Articles/189584/ fgrosshans Yes, it allows them :<br> <p> <font class="QuotedText">&gt;To qualify for a Non-Commercial Version License, You must: (1) use the</font><br> <font class="QuotedText">&gt;Software solely on a system under the Linux, FreeBSD, NetBSD, or OpenBSD</font><br> <font class="QuotedText">&gt;operating system (whether for commercial or non-commercial use), or (2)...</font><br> <p> <p> It doesn't allow lwn to use ssh on windows or solaris, but they can do so "under the Linux, FreeBSD, NetBSD, or OpenBSD operating system". I guess it would be possible for them to install linux ;-)<br> Thu, 29 Jun 2006 09:29:48 +0000 The Grumpy Editor's guide to SSH servers https://lwn.net/Articles/189571/ https://lwn.net/Articles/189571/ Wol Just because a GPL library was included doesn't make SSH GPL too ... it just means the SSH licence must be GPL-compatible (which is true of BSD).<br> <p> So It's quite likely the SSH code was BSD, the library was GPL, and hence the combination was GPL.<br> <p> In which case, there was no need to "rewrite all the GPL'd SSH code" because there wasn't any GPL'd SSH code to rewrite! :-)<br> <p> Cheers,<br> Wol<br> Thu, 29 Jun 2006 07:48:42 +0000 The Grumpy Editor's guide to SSH servers https://lwn.net/Articles/189557/ https://lwn.net/Articles/189557/ djm To be fair to Niels Moller (the lsh developer), he actually started working on lsh before we started on OpenSSH, so it isn't a "me too" product.<br> Thu, 29 Jun 2006 05:40:36 +0000 Large scale SSH server survey, and top network security tool survey https://lwn.net/Articles/189406/ https://lwn.net/Articles/189406/ roelofs <FONT COLOR="#440088"><I>Speaking of security tools (and pardon me for plugging my own site), I released a new site this morning at <A HREF="http://sectools.org/">SecTools.Org</A>. This covers the top 100 network security tools, as voted on by more than 3,000 Nmap users. ... I do these security tool surveys every 3 years, and find them quite valuable for learning about the new and interesting tools out there. Sometimes we get stuck in a rut of using just the tools we know well, without exploring other options.</I></FONT> <P> I came across that article via LinuxSecurity.com's newsletter, and I fully agree with the author--the tools survey is extremely useful, even if it does include many that aren't relevant to me due to my choice of OS. I only wish there was a single-page version of the survey (or, if there is one, that it was more prominently linked). ;-) <P> Greg Wed, 28 Jun 2006 01:37:30 +0000 Getting away from C https://lwn.net/Articles/189103/ https://lwn.net/Articles/189103/ kevinbsmith At least in theory, wouldn't it be easier to write a highly secure tool (like an SSH server) in a higher-level language such as python? I realize there might (or might not) be performance issues, but for most of us (who have at most a handful of users) that's not even a consideration.<br> <p> If someone built command-line wrappers around twisted conch and paramiko, we would immediately have 40% more SSH servers available for evaluation. An added benefit would be that they would be less featureful than openssh. Lots of configuration options can lead to confusion, and in the worst case, bad security.<br> <p> Sat, 24 Jun 2006 14:13:00 +0000 The Grumpy Editor's guide to SSH servers https://lwn.net/Articles/189077/ https://lwn.net/Articles/189077/ rickmoen If I may be so immodest, I maintain a bestiary of all known SSH implementations categorised by OS at <a href="http://linuxmafia.com/ssh/">http://linuxmafia.com/ssh/</a>. The Unix category is <a href="http://linuxmafia.com/ssh/unix.html">http://linuxmafia.com/ssh/unix.html</a>. It's not a review piece and cannot compare with Jon's excellent work in that area, but does at least aim to be complete. <p>Rick Moen<br> rick@linuxmafia.com Sat, 24 Jun 2006 02:37:43 +0000 The Grumpy Editor's guide to SSH servers https://lwn.net/Articles/189030/ https://lwn.net/Articles/189030/ piman That license doesn't allow LWN (which is commercial, not a personal user, and not a university) to download and review the product, even if they wanted to.<br> Fri, 23 Jun 2006 20:57:34 +0000 annoying third-person references https://lwn.net/Articles/188983/ https://lwn.net/Articles/188983/ sbergman27 Our editor's delightfully dry humor would not come off quite so well if said editor did not set such a formal tone in this site's journalistic offerings.<br> Fri, 23 Jun 2006 17:11:01 +0000 annoying third-person references https://lwn.net/Articles/188979/ https://lwn.net/Articles/188979/ alvherre Style. Myself, I don't like it when authors of an article use the first person. It's a matter of taste, of course.<br> Fri, 23 Jun 2006 16:11:25 +0000 The Grumpy Editor's guide to SSH servers https://lwn.net/Articles/188944/ https://lwn.net/Articles/188944/ dd9jn ssh 1.2.12 is the version OpenSSH was based on. It included for big integer arithmetics a copy of the GMP 1.3.2 - that version of the GMP (from 1993) is under the GPL. The FSF later relicensed the GMP under the LGPL but this is not the version included and used by that and all earlier ssh versions. Thus the rules of the GPL apply to these versions of ssh. <br> <p> Fri, 23 Jun 2006 07:15:53 +0000 The Grumpy Editor's guide to SSH servers https://lwn.net/Articles/188932/ https://lwn.net/Articles/188932/ scruffie Another Python one is <a href="http://www.lag.net/paramiko/">Paramiko</a>. Fri, 23 Jun 2006 02:09:46 +0000 The Grumpy Editor's guide to SSH servers https://lwn.net/Articles/188919/ https://lwn.net/Articles/188919/ smoogen Uhm.. actually I dont think ssh.com was ever GPL'd. They took the last version that had a BSD like licesne and worked from there.<br> Thu, 22 Jun 2006 23:22:39 +0000 The Grumpy Editor's guide to SSH servers https://lwn.net/Articles/188881/ https://lwn.net/Articles/188881/ horen Excerpted from the LICENSE file of ssh-3.2.9.1 (from SSH.COM):<br> <p> "NON-COMMERCIAL VERSION LICENSE<br> <p> To qualify for a Non-Commercial Version License, You must: (1) use the<br> Software solely on a system under the Linux, FreeBSD, NetBSD, or OpenBSD<br> operating system (whether for commercial or non-commercial use), or (2)<br> use the Software for non-commercial purposes as defined herein and be a<br> Non-Commercial Entity as defined herein, or (3) be an University User as<br> defined herein, or (4) be an Excluded Contractor as defined herein.<br> <p> The term "Non-Commercial Entity" is limited to the following: university<br> or other educational institutions (such as pre-schools, elementary<br> schools, middle or junior high schools, high schools, and community or<br> junior colleges), non-profit organizations (such as public libraries,<br> charities, and other organizations created for the promotion of social<br> welfare), "University Users", and other individual users who use the<br> Software for personal use (such as connecting to an Internet Service<br> Provider for personal use, hobby, recreational, or educational<br> purposes). The term "University Users" is limited to students, faculty<br> members, researchers, administrators, support staff, and employees of a<br> university when acting in this capacity. The term "Excluded Contractor"<br> is limited to independent, solo contractors while performing work for a<br> Non-Commercial Entity, such as a university or other educational<br> institution in an individual capacity. If You qualify for a<br> Non-Commercial Version License, You may use the Software free of<br> charge. SSH reserves the right to further clarify the terms<br> Non-Commercial Entity, University Users and Excluded Contractor at its<br> sole determination."<br> <p> I apologize for the length, but the SSH.COM server and client remain major players throughout the formal academic and no-less-formal personal-user communities. I have used it since it became available (while a Unix sysadmin at Tel-Aviv University), and continue doing so, on my personal home computers, to this very day.<br> <p> Thank you for this provocative and eye-opening article. Perhaps someone will as Apple Computers, who chose to base their MacOSX on FreeBSD (and then castrate it by their non-Unix commands and horrible GUIs, but that's grist for a different mill).<br> Thu, 22 Jun 2006 18:08:01 +0000 The Grumpy Editor's guide to SSH servers https://lwn.net/Articles/188810/ https://lwn.net/Articles/188810/ job I think you are being a bit unfair to the non-OpenSSH implementations. I've had some servers on lshd since before OpenSSH came about, and I've had much less trouble with them compared to the latter. It's a very nice piece of software.<br> Thu, 22 Jun 2006 13:03:14 +0000 The Grumpy Editor's guide to SSH servers https://lwn.net/Articles/188809/ https://lwn.net/Articles/188809/ job There's also one in Python called Twisted Conch.<br> Thu, 22 Jun 2006 12:59:53 +0000 The Grumpy Editor's guide to SSH servers https://lwn.net/Articles/188774/ https://lwn.net/Articles/188774/ Segora There are also special purpose ssh servers like the one in Erlang/OTP.<br> <p> Thu, 22 Jun 2006 09:24:29 +0000 The Grumpy Editor's guide to SSH servers https://lwn.net/Articles/188775/ https://lwn.net/Articles/188775/ pointwood At least we know that the OpenBSD/OpenSSH developers take security very seriously and have a very good track record.<br> Thu, 22 Jun 2006 09:07:03 +0000 The Grumpy Editor's guide to SSH servers https://lwn.net/Articles/188771/ https://lwn.net/Articles/188771/ kirkengaard Thanks; I wasn't aware of that. So it was a common itch, and poof! OpenSSH came along. That makes way more sense. Sorry for any false implications or statements on my part!<br> Thu, 22 Jun 2006 08:44:14 +0000 The Grumpy Editor's guide to SSH servers https://lwn.net/Articles/188766/ https://lwn.net/Articles/188766/ dd9jn To be fair the lsh developers: The lsh project came to life at a time when there was no free SSH implementation available and the GNU task list had a free ssh protocol implementation as an item. Then OpenSSH appeared out of the nowhere. Thus speaking of a GNU re-implementation is in this case not correct. Actually the OpenSSH development was the other way around: They took the last GPL implementation of ssh.com and replaced all GPL code by new code under the BSD license.<br> <p> IIRC, the reason for the unusual architecture of lsh (i.e. very lispy) is due to several rewrites and that Nisse started reading the Wizard book while working on lsh.<br> Thu, 22 Jun 2006 07:58:50 +0000 The Grumpy Editor's guide to SSH servers https://lwn.net/Articles/188767/ https://lwn.net/Articles/188767/ kleptog <i>The handling of the 2002 integer and buffer overflow vulnerability raised some eyebrows; the developers refused to disclose specifics on the vulnerability, insisting, instead, that all users perform a significant upgrade to the current release. </i> <p> Ah yes, I remember that day, when a simple security update broke SSH throughout our network and I had to spend a good part of the day logging into every machine and fixing it. Thu, 22 Jun 2006 07:53:57 +0000 The Grumpy Editor's guide to SSH servers https://lwn.net/Articles/188757/ https://lwn.net/Articles/188757/ eru <font class="QuotedText">&gt;&gt;play with the three SSH server implementations he found which are free</font><br> <p> Nevertheless, it might be interesting to know how OpenSSH would<br> fare in comparison to the commercial SSH. Of course I realize that<br> benchmarking expensive proprietary software would be<br> outside lwn.net:s scope, and maybe resources as well. Wonder<br> if such comparison exists elsewhere?<br> <p> Thu, 22 Jun 2006 06:08:12 +0000 Large scale SSH server survey, and top network security tool survey https://lwn.net/Articles/188755/ https://lwn.net/Articles/188755/ fyodor <i>All available evidence indicates that almost every publicly reachable SSH server is running OpenSSH</i> <p>Funny you should mention this, as Nmap developer Doug Hoyte just last week posted the <a href="http://seclists.org/lists/nmap-dev/2006/Apr-Jun/0393.html">results</a> of an large scale Internet survey of SSH daemons. He did find that the vast majority of servers run OpenSSH, though he found that a bit more than 1% of the servers (98 of them out of about 8,000) ran Dropbear. LSH was truly obscure -- he found only 2 instances. <p>Speaking of security tools (and pardon me for plugging my own site), I released a new site this morning at <a href="http://sectools.org">SecTools.Org</a>. This covers the top 100 network security tools, as voted on by more than 3,000 <a href="http://www.insecure.org/nmap">Nmap</a> users. SSH made the list, with users specifying a certain implementation generally suggesting either OpenSSH or PuTTy. I think the latter is mostly used by Windows and embedded device users. I do these security tool surveys every 3 years, and find them quite valuable for learning about the new and interesting tools out there. Sometimes we get stuck in a rut of using just the tools we know well, without exploring other options. <p>-Fyodor<BR> <a href="http://www.insecure.org">Insecure.Org</a> Thu, 22 Jun 2006 06:00:13 +0000 annoying third-person references https://lwn.net/Articles/188754/ https://lwn.net/Articles/188754/ kmself Your editor prefers "your editor". ;-)<br> Thu, 22 Jun 2006 05:43:24 +0000 annoying third-person references https://lwn.net/Articles/188752/ https://lwn.net/Articles/188752/ b7j0c why does the author refer to himself as "your editor", just say "I".<br> Thu, 22 Jun 2006 05:23:46 +0000 acacia nilotica https://lwn.net/Articles/188744/ https://lwn.net/Articles/188744/ xoddam Hmmm, a prickly kind of large shade tree. Try Acacia Nilotica. <br> <br> <a href="http://eriss.erin.gov.au/biodiversity/invasive/publications/pubs/a-nilotica.pdf">http://eriss.erin.gov.au/biodiversity/invasive/publicatio...</a> <br> <br> It's an African species, but in Australia it's a 'weed of national <br> significance'. <br> Thu, 22 Jun 2006 04:19:02 +0000 The Grumpy Editor's guide to SSH servers https://lwn.net/Articles/188736/ https://lwn.net/Articles/188736/ smitty_one_each <font class="QuotedText">&gt;play with the three SSH server implementations he found which are free</font><br> <p> Thu, 22 Jun 2006 01:43:00 +0000 The Grumpy Editor's guide to SSH servers https://lwn.net/Articles/188734/ https://lwn.net/Articles/188734/ miah I'm kind of curious why ssh.com's ssh server wasn't reviewed. Considering its what OpenSSH was based on and is available for most UNIX's and even Windows. Though I use OpenSSH and Dropbear the most, I feel that you missed something with this review.<br> Thu, 22 Jun 2006 01:26:36 +0000 The Grumpy Editor's guide to SSH servers https://lwn.net/Articles/188716/ https://lwn.net/Articles/188716/ ehovland <font class="QuotedText">&gt; I've been using dropbear for years now, it's actually pretty nice.</font><br> <p> Just to say, me too!<br> <p> Dropbear is the default client and server for the familiar distribution for handhelds running linux.<br> <p> There have been a few issues that the familiar group has had to patch over and over again. For example, 2048-bit keys can cause a core dump on the dropbear ssh client, and only because dropbear does not allocate enough space for a key that size. But that issue is minor when one wants ssh on a small device (and let me tell you, ssh on a small device is handy).<br> Wed, 21 Jun 2006 22:05:08 +0000 The Grumpy Editor's guide to SSH servers https://lwn.net/Articles/188713/ https://lwn.net/Articles/188713/ kirkengaard (Wow, I need to be consistent with analogies, or leave them alone. Sorry!)<br> Wed, 21 Jun 2006 20:38:08 +0000 The Grumpy Editor's guide to SSH servers https://lwn.net/Articles/188706/ https://lwn.net/Articles/188706/ kirkengaard This seems to be the case with many de facto standard codebases. Like monolithic shade trees, it is hard for anything to grow in their shadow; most things that try to fill the same niche wind up compared to the 'big tree', just as dropbear and lsh do here. This is, to some extent, a self-reinforcing issue, and it can have good results, as you pointed out. A monoculture built around fanatic security-consciousness is perhaps more stable than some others. Big trees of this sort eat up a large share of their noosphere 'ground', and take up a very large share of the developer attention 'light'. Consider that dropbear lives by filling an available niche in the SSH market. There is ground and light for their particular choices. Lsh seems to be suffering the "Me, too!" that the GNU reimplementation tendencies can drive people to. The developer's itch is not common enough; OpenSSH is not enough of a pain to drive quality and masses to a GNU reimplementation.<br> <p> I don't mean to sound like I'm complaining about the quality of the competition like it's OpenSSH's fault. This is a group choice in large part. It could be worse; at least this dominant player is nominally on the Open side of the fence, even if prickly at times. I've always thought of the logo as a caveat. ;)<br> Wed, 21 Jun 2006 20:26:22 +0000 The Grumpy Editor's guide to SSH servers https://lwn.net/Articles/188691/ https://lwn.net/Articles/188691/ landley I've been using dropbear for years now, it's actually pretty nice. It's <br> been the default ssh server/client in the embedded space since about 2004, <br> and I'm unaware of anything interesting openssh does that dropbear <br> doesn't. <br> <br> Setup's fairly easy too: extract the tarball and run the standard <br> "./configure; make; make install", then set up a host key. <br> <br> Right after running ./configure I edit options.h to comment out <br> the #defines for DROPBEAR_SMALL_CODE, DO_HOST_LOOKUP and DO_MOTD, and I <br> set DROPBEAR_RANDOM_DEV to "/dev/urandom", but all of that's just tweaks I <br> could live without. <br> <br> After install you need to create a host key, ala: <br> <br> mkdir /etc/dropbear <br> ./dropbearkey -t dss -f /etc/dropbear/dropbear_dss_host_key -s 2048 <br> <br> Then just run dropbear and you should be able to ssh to your machine. <br> (Try the loopback port.) <br> Wed, 21 Jun 2006 20:02:10 +0000 The Grumpy Editor's guide to SSH servers https://lwn.net/Articles/188690/ https://lwn.net/Articles/188690/ sbishop This article doesn't appear to be "subscribers only"...<br> Wed, 21 Jun 2006 19:30:12 +0000