changeset 848:a0fae3865040

<shachaf> pastelog SSH.*packet
author HackBot
date Fri, 09 Nov 2012 23:55:00 +0000
parents 5bd9ba832d0c
children c78d0e077db4
files paste/paste.18986
diffstat 1 files changed, 6 insertions(+), 0 deletions(-) [+]
line wrap: on
line diff
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/paste/paste.18986	Fri Nov 09 23:55:00 2012 +0000
@@ -0,0 +1,6 @@
+2009-08-03.txt:20:25:28: <fizzie> AnMaster: I'm using a private SSH key; it's the decrypting of that which takes the 30 seconds, I think, since it hangs up immediately after giving it a passphrase, and then unhangs at the moment it starts sending packets out (sez tcpdump) to the SSH server.
+2012-04-10.txt:16:33:01: <kmc> "Unlike SSH, mosh's UDP-based protocol handles packet loss gracefully, and sets the frame rate based on network conditions. Mosh doesn't fill up network buffers, so Control-C always works to halt a runaway process."
+2012-09-01.txt:22:51:50: <shachaf> kmc: "For example, an attacker can abort an SSH connection or an HTTPS connection by forging a single TCP Reset packet."
+2012-11-09.txt:23:51:50: <kmc> which is that, an attacker can terminate a SSH connection by sending a single RST packet
+2012-11-09.txt:23:54:20: <shachaf> `pastelogs SSH.*packet
+2012-11-09.txt:23:54:32: <shachaf> `pastelog SSH.*packet