Why does SSH send 100 packets per keystroke?

LLM language tics and style drift

  • Several comments fixate on LLM “catchphrases” like “smoking gun,” “you’re absolutely right,” “lines up perfectly,” and overuse of em dashes.
  • Some find this corporate / HR-style tone grating; others argue tolerance is reasonable given how useful LLMs are.
  • There’s discussion that these tics reflect recent internet training data and visible system prompts, not “new” language.
  • A side thread notes that LLM language is now influencing humans’ own writing habits, for better or worse.

SSH keystroke timing obfuscation: purpose and risk

  • Many were surprised to learn that modern SSH sends chaff packets to hide inter-keystroke timing, based on old timing-attack research.
  • One camp says “never disable this in production”: it’s a real side-channel defense against network observers, not just a cosmetic feature.
  • Others argue it’s overstated to call this “broken encryption”; it’s a side-channel on user typing, mainly useful for narrowing password guesses or inferring behavior, not decrypting ciphertext directly.
  • Some point out it’s only enabled for PTY/interactive sessions, not typical machine-to-machine SSH.
  • Suggestions for alternatives (buffering keystrokes, fixed-interval sending, jitter) are critiqued as either latency-hurting or still information-leaking; chaff is seen as simpler and more robust.

Performance, games over SSH, and protocol choice

  • Several commenters are skeptical of building a “high-performance game” over SSH at all, citing SSH’s chattiness, TCP head-of-line blocking, and SFTP-style overheads.
  • Alternatives proposed: UDP with custom reliability/crypto, QUIC, SCTP, mosh, Valve’s GameNetworkingSockets, or even telnet / netcat where security is irrelevant.
  • A counterargument: “ssh mygame” is a powerful zero-install UX; the novelty and constraints are part of the fun.
  • There’s concern about server-side disabling of a client security feature without explicit client consent.

Bandwidth, latency, and constrained links

  • Some see the extra packets as negligible amid modern bandwidth (especially vs video); others working over ADSL, mobile, or long-distance radio links say SSH is already painful and every bit of overhead matters.
  • Examples include SSH over 900 MHz telemetry, hobbyist 915 MHz radios, and similar lossy, high-latency environments.

Debugging, Wireshark, and LLMs

  • One group argues the mystery could have been solved faster with Wireshark or protocol analysis rather than asking an LLM.
  • Others say LLMs are genuinely useful as “rubber ducks,” task generators, or quick doc/search helpers, even if they hallucinate details.
  • There is some frustration that pervasive encryption makes deep, multi-layer debugging harder without better tooling.