Mercurial > repo
view paste/paste.18986 @ 9954:fb3529990ed4
<oerjan> ` echo \'121:122 194:196 770:771 1000:1001 1493 1497 2113:2114 3341:3343 4530:4531 5136:5137 5642:5643 5895 5897 8669:8678 9070:9071 9074:9075\' | xargs -n 1 >share/scowrevs
author | HackBot |
---|---|
date | Mon, 12 Dec 2016 03:24:20 +0000 |
parents | a0fae3865040 |
children |
line wrap: on
line source
2009-08-03.txt:20:25:28: <fizzie> AnMaster: I'm using a private SSH key; it's the decrypting of that which takes the 30 seconds, I think, since it hangs up immediately after giving it a passphrase, and then unhangs at the moment it starts sending packets out (sez tcpdump) to the SSH server. 2012-04-10.txt:16:33:01: <kmc> "Unlike SSH, mosh's UDP-based protocol handles packet loss gracefully, and sets the frame rate based on network conditions. Mosh doesn't fill up network buffers, so Control-C always works to halt a runaway process." 2012-09-01.txt:22:51:50: <shachaf> kmc: "For example, an attacker can abort an SSH connection or an HTTPS connection by forging a single TCP Reset packet." 2012-11-09.txt:23:51:50: <kmc> which is that, an attacker can terminate a SSH connection by sending a single RST packet 2012-11-09.txt:23:54:20: <shachaf> `pastelogs SSH.*packet 2012-11-09.txt:23:54:32: <shachaf> `pastelog SSH.*packet