# HG changeset patch # User HackBot # Date 1352505300 0 # Node ID a0fae386504062917cc91bc683040627f7cdc546 # Parent 5bd9ba832d0c5ea1473666afe75001360d5e1079 pastelog SSH.*packet diff -r 5bd9ba832d0c -r a0fae3865040 paste/paste.18986 --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/paste/paste.18986 Fri Nov 09 23:55:00 2012 +0000 @@ -0,0 +1,6 @@ +2009-08-03.txt:20:25:28: AnMaster: I'm using a private SSH key; it's the decrypting of that which takes the 30 seconds, I think, since it hangs up immediately after giving it a passphrase, and then unhangs at the moment it starts sending packets out (sez tcpdump) to the SSH server. +2012-04-10.txt:16:33:01: "Unlike SSH, mosh's UDP-based protocol handles packet loss gracefully, and sets the frame rate based on network conditions. Mosh doesn't fill up network buffers, so Control-C always works to halt a runaway process." +2012-09-01.txt:22:51:50: kmc: "For example, an attacker can abort an SSH connection or an HTTPS connection by forging a single TCP Reset packet." +2012-11-09.txt:23:51:50: which is that, an attacker can terminate a SSH connection by sending a single RST packet +2012-11-09.txt:23:54:20: `pastelogs SSH.*packet +2012-11-09.txt:23:54:32: `pastelog SSH.*packet