From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mimir.eigenstate.org ([206.124.132.107]) by ewsd; Tue Apr 21 21:04:39 EDT 2020 Received: from abbatoir.fios-router.home (pool-162-83-132-245.nycmny.fios.verizon.net [162.83.132.245]) by mimir.eigenstate.org (OpenSMTPD) with ESMTPSA id 6474e0af (TLSv1.2:ECDHE-RSA-AES256-SHA:256:NO); Tue, 21 Apr 2020 18:04:25 -0700 (PDT) Message-ID: <505B4879A9DF1DAE3FC56FD8BD7FB5A9@eigenstate.org> To: cinap_lenrek@felloff.net, 9front@9front.org Subject: Re: [9front] [patch] /sys/src/cmd/ssh.c notify user of unavailable cipher Date: Tue, 21 Apr 2020 18:04:23 -0700 From: ori@eigenstate.org In-Reply-To: <40289B1E19DD4906838B30C398B0A16D@felloff.net> MIME-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: 7bit List-ID: <9front.9front.org> List-Help: X-Glyph: ➈ X-Bullshit: reduce/map reduce/map hypervisor content-driven content-driven-scale full-stack optimizer > maybe consider if it really is required for our ssh client to > support old versions of sshd with flawed algorithms. the best > way might be to just wait it out until ther servers get hacked > or they update. Yeah -- that was what prompted this patch; right now the connection drops and the server reports that it got an unexpected packet. We could at least say that we don't support the server's ciphers.