LWN: Comments on "OpenSSH 5.4 released" https://lwn.net/Articles/377703/ This is a special feed containing comments posted to the individual LWN article titled "OpenSSH 5.4 released". en-us Sat, 27 Sep 2025 04:38:33 +0000 Sat, 27 Sep 2025 04:38:33 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net OpenSSH 5.4 released https://lwn.net/Articles/378378/ https://lwn.net/Articles/378378/ BSchuller <div class="FormattedComment"> Hi,<br> <p> X.509 may be complex, it is widely used, and many <br> X.509 based infrastructures exist. Therefore, introducing a <br> home-grown version of X.509 requiring admins to effectively <br> run their own CA is hard to understand. <br> I think it would be a very good move if X.509 could be <br> supported in OpenSSH. Admins who think the security risk is <br> too high can always opt-out.<br> <p> Best regards,<br> Bernd.<br> </div> Fri, 12 Mar 2010 13:53:39 +0000 Dang! No HPN-SSH! https://lwn.net/Articles/378158/ https://lwn.net/Articles/378158/ dlang <div class="FormattedComment"> even on modern hardware the encryption overhead can limit transfer speeds.<br> <p> on very modern system I can transfer data twice as fast over local gigE networks with HTTP or FTP than I can via SSH<br> </div> Thu, 11 Mar 2010 05:26:22 +0000 Dang! No HPN-SSH! https://lwn.net/Articles/378144/ https://lwn.net/Articles/378144/ martinfick <div class="FormattedComment"> While I wouldn't want to tell you how to write secure software, I wouldn't dismiss the need for speed so quickly. Have you payed attention to CPU speed increases lately? A 3 year old desktop is far from a slow machine, especially for a single threaded app (since most CPU advances are simply adding cores). I run much older machines than that, 10+ years old, (as I suspect many using free operating systems do) and they do suffer greatly from encryption performance in local gigabit ssh file transfers. They also chew up over 50% of my CPU and all I care about is authentication and integrity from one machine in my basement to the other. Other non encrypted transfers are much faster on these machines and do not chew up my CPU.<br> </div> Thu, 11 Mar 2010 02:48:39 +0000 OpenSSH 5.4 released https://lwn.net/Articles/377955/ https://lwn.net/Articles/377955/ djm <div class="FormattedComment"> I chose to avoid X.509 mostly because it is complex in encoding (ASN.1) and <br> semantics. Consider the number of ASN.1 related bugs that OpenSSL and other <br> implementations have suffered from - the fact that nobody gets this right is <br> a good signal that it is overly complex. Unfortunately, key/cert parsing and <br> validation is by necessity in the critical pre-authentication attack surface <br> of sshd, so bugs there are particularly nasty and could be used to write <br> worms.<br> <p> The OpenSSH certificate format uses existing SSH signature formats and wire <br> encoding primitives, so all of that code is reused. Also, because these <br> certificates are not tied into such a heavyweight and hierarchical model of <br> identity, the the semantics of certificates and the workflow of creating <br> them is much simpler.<br> </div> Tue, 09 Mar 2010 23:56:21 +0000 OpenSSH 5.4 released https://lwn.net/Articles/377951/ https://lwn.net/Articles/377951/ herodiade <div class="FormattedComment"> <font class="QuotedText">&gt; the chances of sshd flipping out and using all your ram is much much less</font><br> <p> Also note protection is on the _listening_ sshd (that's not a whole lot a code ; not the user's child processes for instance).<br> <p> With regard to the new certificate format, does anyone here knows why X.509 doesn't fit well for SSH?<br> <p> Someone maintains a patchset to include support for X.509 certificate here <a href="http://roumenpetrov.info/openssh/">http://roumenpetrov.info/openssh/</a> ; I can see some benefit with that from an end-user perspective (mostly, reusing existing tools for pki management, certificates revocations lists, etc).<br> </div> Tue, 09 Mar 2010 23:26:45 +0000 Dang! No HPN-SSH! https://lwn.net/Articles/377945/ https://lwn.net/Articles/377945/ djm err, s/prefer/<b>prefer not</b>/ Tue, 09 Mar 2010 22:25:57 +0000 Dang! No HPN-SSH! https://lwn.net/Articles/377934/ https://lwn.net/Articles/377934/ djm <div class="FormattedComment"> Yes, we are dinosaurs who would prefer to have to deal with thread race <br> conditions in security software. AES on my 3 year old desktop is &gt;800Mbit/s <br> on a single core and RC4 is 2x faster again, so I don't think crypto <br> performance is a massive problem.<br> </div> Tue, 09 Mar 2010 21:12:57 +0000 Dang! No HPN-SSH! https://lwn.net/Articles/377846/ https://lwn.net/Articles/377846/ andikleen <div class="FormattedComment"> One of the main reasons for HPN is multi threaded MACing/encryption,<br> which is needed for fast enough links because a single core cannot do full performance otherwise.<br> <p> <p> And yes multi threading your application is typically intrusive, but <br> it's also very needed if it is CPU time intensive and <br> you want to keep up with modern systems.<br> </div> Tue, 09 Mar 2010 14:45:22 +0000 Tab completion in ssh https://lwn.net/Articles/377842/ https://lwn.net/Articles/377842/ andikleen <div class="FormattedComment"> The coolest new feature not mentioned is finally tab completion in ssh<br> <p> But then see other comment for a serious misfeature.<br> <p> </div> Tue, 09 Mar 2010 13:50:19 +0000 Dang! No HPN-SSH! https://lwn.net/Articles/377839/ https://lwn.net/Articles/377839/ andikleen <div class="FormattedComment"> Fully agreed, it's really bizarre that OpenSSH is still single threaded even though cryptography takes so much CPU time. Basically you can't really use it on a serious network connection because of this problem. And in addition the small buffers also make it hard to use over a WAN.<br> <p> I wonder if it's related to being developed on OpenBSD which is not exactly known for SMP scalability?<br> <p> Perhaps the distros will use it some day at least, even if the maintainers can't get out of the 70ies.<br> </div> Tue, 09 Mar 2010 13:49:16 +0000 Dang! No HPN-SSH! https://lwn.net/Articles/377830/ https://lwn.net/Articles/377830/ tialaramex <div class="FormattedComment"> Can you explain why it's a bad idea to be able to turn off secrecy? Sometimes I need to move a large file over the network, and the contents of that file are public (e.g. several TB of data published by the government). I don't care if someone sees this data, or even if they see me moving it, but I don't want anyone messing with it, thus I still need integrity. Of course I can move it with 'netcat' and then verify using sha1sum, but it'd sure be convenient if the default OS tools (ie OpenSSH) let me do this with a suitable incantation.<br> <p> No-one is asking for this to be the default of course, but why can't we have it as an option without hacking the code?<br> </div> Tue, 09 Mar 2010 11:51:22 +0000 Dang! No HPN-SSH! https://lwn.net/Articles/377828/ https://lwn.net/Articles/377828/ djm <div class="FormattedComment"> The default session window in OpenSSH is 2MB already.<br> <p> This limit is enough for a path with 5 seconds latency at your DSL speed. <br> Put differently, if your one-way path latency is 100ms then unmodified <br> OpenSSH's window size should only start restricting performance if your <br> transfer rate is ~160Mbit/s.<br> <p> If you are on Internet2 and want to move files between continental USA and <br> Europe at gigabit speeds, then you might still want the HPN patches.<br> </div> Tue, 09 Mar 2010 11:04:16 +0000 Dang! No HPN-SSH! https://lwn.net/Articles/377817/ https://lwn.net/Articles/377817/ BrucePerens <div class="FormattedComment"> Yes, I know there are no 2MB static buffers. If you set the size of the communication buffers to 2MB, you would achieve the same speed increase as with the dynamic buffers used by the patch. That is, given a high-speed network connection. I don't know if this makes any difference for us folks with 3megabit/300kilobit DSL connections.<br> </div> Tue, 09 Mar 2010 04:51:10 +0000 Dang! No HPN-SSH! https://lwn.net/Articles/377815/ https://lwn.net/Articles/377815/ djm <div class="FormattedComment"> We made some performance changes for high BDP links a few releases back, <br> which should have obviated the need for the HPN patches for all but the <br> highest BDP links. You should benchmark your connection to see if it <br> actually benefits from the HPN patches, which are quite intrusive.<br> <p> The other component of the HPN patches that people sometimes ask for is the <br> ability to select a null cipher/MAC. We are not planning on implementing <br> that ever.<br> </div> Tue, 09 Mar 2010 04:24:21 +0000 Dang! No HPN-SSH! https://lwn.net/Articles/377814/ https://lwn.net/Articles/377814/ djm <div class="FormattedComment"> You are misinformed. There are no 2MB static buffers in OpenSSH.<br> </div> Tue, 09 Mar 2010 04:20:23 +0000 Dang! No HPN-SSH! https://lwn.net/Articles/377803/ https://lwn.net/Articles/377803/ BrucePerens So, is the alternative to set the static buffers to 2MB? Tue, 09 Mar 2010 01:51:19 +0000 OpenSSH 5.4 released https://lwn.net/Articles/377801/ https://lwn.net/Articles/377801/ BrucePerens <div class="FormattedComment"> Remote servers without dedicated remote consoles are a lot cheaper than the other kind. Only $30 to $70 per month for a pretty good server. Of course I have them set to reboot if sshd dies, or if they can't reach their router.<br> </div> Tue, 09 Mar 2010 01:43:15 +0000 OpenSSH 5.4 released https://lwn.net/Articles/377773/ https://lwn.net/Articles/377773/ drag <div class="FormattedComment"> As far as OpenSSH is concerned, specifically, the chances of sshd flipping out and using all your <br> ram is much much less then having other applications flip out and use all your RAM and having <br> OOM kill off sshd. <br> <p> For most uses of Linux killing off sshd would have a similar effect of killing up 'getty' on a local <br> console. OOM Killer operating in this manner is effectively like having the Linux kernel perform <br> it's own denial service attack on userland. <br> <p> <p> </div> Mon, 08 Mar 2010 20:30:27 +0000 OpenSSH 5.4 released https://lwn.net/Articles/377745/ https://lwn.net/Articles/377745/ ewan Oftentimes it <i>is</i> that stupid, and can make a bad situation considerably worse by cutting off any hope you might have had of SSHing in and fixing the actual problem. Mon, 08 Mar 2010 17:36:30 +0000 OpenSSH 5.4 released https://lwn.net/Articles/377742/ https://lwn.net/Articles/377742/ lkundrak <blockquote>* Disable OOM-killing of the listening sshd on Linux. bz#1470</blockquote> I'm wondering what sense does this make. Turning off a feature that would kill sshd once it goes mad and eats up all the memory and kill everything else instead? Or do they assume the oomkiller to be that stupid? Mon, 08 Mar 2010 17:27:38 +0000 Dang! No HPN-SSH! https://lwn.net/Articles/377729/ https://lwn.net/Articles/377729/ alex <div class="FormattedComment"> Is it by any chance because the OpenSSH team are worried about security <br> auditing code that goes from statically allocated to dynamically allocated <br> buffers?<br> </div> Mon, 08 Mar 2010 17:04:02 +0000 Dang! No HPN-SSH! https://lwn.net/Articles/377723/ https://lwn.net/Articles/377723/ aaron <div class="FormattedComment"> I guess this happens every OpenSSH release, but I keep hoping they'll merge some of the patches from the Pittsburg Supercomputing Center.<br> (See <a href="http://www.psc.edu/networking/projects/hpn-ssh">http://www.psc.edu/networking/projects/hpn-ssh</a> )<br> It's truly amazing how they help transfers over higher-latency links (i.e. any distance over a mile.) They also help local transfers a fair bit.<br> Unfortunately, for now, if you can't patch your own SSHd, you have to use commercial file-transfer software, a Riverbed, or RSA-SSHd.<br> <p> Please, O pufferfish, strap on a jetpack!<br> </div> Mon, 08 Mar 2010 16:57:33 +0000 OpenSSH 5.4 released https://lwn.net/Articles/377712/ https://lwn.net/Articles/377712/ nix <div class="FormattedComment"> Your headline is wrong. The release notes say it 'removes support for SSH <br> protocol 1 by default'; i.e., you can still turn it back on.<br> </div> Mon, 08 Mar 2010 15:10:47 +0000