diff options
author | Damien Miller <djm@mindrot.org> | 2008-06-26 15:59:32 +1000 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2008-06-26 15:59:32 +1000 |
commit | 60dcc625356a5f8e7842f299c5845343ed39ac9a (patch) | |
tree | 05ac05f19acddb2675f15c503cdf7ed6613632e2 | |
parent | 1a48aecfbca9459ff5bfe07952d0914fda754bcb (diff) |
- (djm) [Makefile.in moduli.5] Include moduli(5) manpage from OpenBSD.
(bz#1372)
-rw-r--r-- | ChangeLog | 6 | ||||
-rw-r--r-- | Makefile.in | 8 | ||||
-rw-r--r-- | moduli.5 | 124 |
3 files changed, 134 insertions, 4 deletions
@@ -1,3 +1,7 @@ | |||
1 | 20080626 | ||
2 | - (djm) [Makefile.in moduli.5] Include moduli(5) manpage from OpenBSD. | ||
3 | (bz#1372) | ||
4 | |||
1 | 20080616 | 5 | 20080616 |
2 | - (dtucker) OpenBSD CVS Sync | 6 | - (dtucker) OpenBSD CVS Sync |
3 | - dtucker@cvs.openbsd.org 2008/06/16 13:22:53 | 7 | - dtucker@cvs.openbsd.org 2008/06/16 13:22:53 |
@@ -4407,4 +4411,4 @@ | |||
4407 | OpenServer 6 and add osr5bigcrypt support so when someone migrates | 4411 | OpenServer 6 and add osr5bigcrypt support so when someone migrates |
4408 | passwords between UnixWare and OpenServer they will still work. OK dtucker@ | 4412 | passwords between UnixWare and OpenServer they will still work. OK dtucker@ |
4409 | 4413 | ||
4410 | $Id: ChangeLog,v 1.5021 2008/06/16 13:35:56 dtucker Exp $ | 4414 | $Id: ChangeLog,v 1.5022 2008/06/26 05:59:32 djm Exp $ |
diff --git a/Makefile.in b/Makefile.in index 1a43f01b1..dd26ae0e7 100644 --- a/Makefile.in +++ b/Makefile.in | |||
@@ -1,4 +1,4 @@ | |||
1 | # $Id: Makefile.in,v 1.294 2008/06/10 23:47:59 dtucker Exp $ | 1 | # $Id: Makefile.in,v 1.295 2008/06/26 05:59:32 djm Exp $ |
2 | 2 | ||
3 | # uncomment if you run a non bourne compatable shell. Ie. csh | 3 | # uncomment if you run a non bourne compatable shell. Ie. csh |
4 | #SHELL = @SH@ | 4 | #SHELL = @SH@ |
@@ -88,8 +88,8 @@ SSHDOBJS=sshd.o auth-rhosts.o auth-passwd.o auth-rsa.o auth-rh-rsa.o \ | |||
88 | loginrec.o auth-pam.o auth-shadow.o auth-sia.o md5crypt.o \ | 88 | loginrec.o auth-pam.o auth-shadow.o auth-sia.o md5crypt.o \ |
89 | audit.o audit-bsm.o platform.o sftp-server.o sftp-common.o | 89 | audit.o audit-bsm.o platform.o sftp-server.o sftp-common.o |
90 | 90 | ||
91 | MANPAGES = scp.1.out ssh-add.1.out ssh-agent.1.out ssh-keygen.1.out ssh-keyscan.1.out ssh.1.out sshd.8.out sftp-server.8.out sftp.1.out ssh-rand-helper.8.out ssh-keysign.8.out sshd_config.5.out ssh_config.5.out | 91 | MANPAGES = moduli.5.out scp.1.out ssh-add.1.out ssh-agent.1.out ssh-keygen.1.out ssh-keyscan.1.out ssh.1.out sshd.8.out sftp-server.8.out sftp.1.out ssh-rand-helper.8.out ssh-keysign.8.out sshd_config.5.out ssh_config.5.out |
92 | MANPAGES_IN = scp.1 ssh-add.1 ssh-agent.1 ssh-keygen.1 ssh-keyscan.1 ssh.1 sshd.8 sftp-server.8 sftp.1 ssh-rand-helper.8 ssh-keysign.8 sshd_config.5 ssh_config.5 | 92 | MANPAGES_IN = moduli.5 scp.1 ssh-add.1 ssh-agent.1 ssh-keygen.1 ssh-keyscan.1 ssh.1 sshd.8 sftp-server.8 sftp.1 ssh-rand-helper.8 ssh-keysign.8 sshd_config.5 ssh_config.5 |
93 | MANTYPE = @MANTYPE@ | 93 | MANTYPE = @MANTYPE@ |
94 | 94 | ||
95 | CONFIGFILES=sshd_config.out ssh_config.out moduli.out | 95 | CONFIGFILES=sshd_config.out ssh_config.out moduli.out |
@@ -106,6 +106,7 @@ PATHSUBS = \ | |||
106 | -e 's|/etc/ssh/ssh_host_dsa_key|$(sysconfdir)/ssh_host_dsa_key|g' \ | 106 | -e 's|/etc/ssh/ssh_host_dsa_key|$(sysconfdir)/ssh_host_dsa_key|g' \ |
107 | -e 's|/etc/ssh/ssh_host_rsa_key|$(sysconfdir)/ssh_host_rsa_key|g' \ | 107 | -e 's|/etc/ssh/ssh_host_rsa_key|$(sysconfdir)/ssh_host_rsa_key|g' \ |
108 | -e 's|/var/run/sshd.pid|$(piddir)/sshd.pid|g' \ | 108 | -e 's|/var/run/sshd.pid|$(piddir)/sshd.pid|g' \ |
109 | -e 's|/etc/moduli|$(sysconfdir)/moduli|g' \ | ||
109 | -e 's|/etc/ssh/moduli|$(sysconfdir)/moduli|g' \ | 110 | -e 's|/etc/ssh/moduli|$(sysconfdir)/moduli|g' \ |
110 | -e 's|/etc/ssh/sshrc|$(sysconfdir)/sshrc|g' \ | 111 | -e 's|/etc/ssh/sshrc|$(sysconfdir)/sshrc|g' \ |
111 | -e 's|/usr/X11R6/bin/xauth|$(XAUTH_PATH)|g' \ | 112 | -e 's|/usr/X11R6/bin/xauth|$(XAUTH_PATH)|g' \ |
@@ -270,6 +271,7 @@ install-files: scard-install | |||
270 | $(INSTALL) -m 644 ssh-agent.1.out $(DESTDIR)$(mandir)/$(mansubdir)1/ssh-agent.1 | 271 | $(INSTALL) -m 644 ssh-agent.1.out $(DESTDIR)$(mandir)/$(mansubdir)1/ssh-agent.1 |
271 | $(INSTALL) -m 644 ssh-keygen.1.out $(DESTDIR)$(mandir)/$(mansubdir)1/ssh-keygen.1 | 272 | $(INSTALL) -m 644 ssh-keygen.1.out $(DESTDIR)$(mandir)/$(mansubdir)1/ssh-keygen.1 |
272 | $(INSTALL) -m 644 ssh-keyscan.1.out $(DESTDIR)$(mandir)/$(mansubdir)1/ssh-keyscan.1 | 273 | $(INSTALL) -m 644 ssh-keyscan.1.out $(DESTDIR)$(mandir)/$(mansubdir)1/ssh-keyscan.1 |
274 | $(INSTALL) -m 644 moduli.5.out $(DESTDIR)$(mandir)/$(mansubdir)5/moduli.5 | ||
273 | $(INSTALL) -m 644 sshd_config.5.out $(DESTDIR)$(mandir)/$(mansubdir)5/sshd_config.5 | 275 | $(INSTALL) -m 644 sshd_config.5.out $(DESTDIR)$(mandir)/$(mansubdir)5/sshd_config.5 |
274 | $(INSTALL) -m 644 ssh_config.5.out $(DESTDIR)$(mandir)/$(mansubdir)5/ssh_config.5 | 276 | $(INSTALL) -m 644 ssh_config.5.out $(DESTDIR)$(mandir)/$(mansubdir)5/ssh_config.5 |
275 | $(INSTALL) -m 644 sshd.8.out $(DESTDIR)$(mandir)/$(mansubdir)8/sshd.8 | 277 | $(INSTALL) -m 644 sshd.8.out $(DESTDIR)$(mandir)/$(mansubdir)8/sshd.8 |
diff --git a/moduli.5 b/moduli.5 new file mode 100644 index 000000000..4a99439cc --- /dev/null +++ b/moduli.5 | |||
@@ -0,0 +1,124 @@ | |||
1 | .\" $OpenBSD: moduli.5,v 1.12 2008/06/26 05:57:54 djm Exp $ | ||
2 | .\" | ||
3 | .\" Copyright (c) 2008 Damien Miller <djm@mindrot.org> | ||
4 | .\" | ||
5 | .\" Permission to use, copy, modify, and distribute this software for any | ||
6 | .\" purpose with or without fee is hereby granted, provided that the above | ||
7 | .\" copyright notice and this permission notice appear in all copies. | ||
8 | .\" | ||
9 | .\" THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES | ||
10 | .\" WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF | ||
11 | .\" MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR | ||
12 | .\" ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES | ||
13 | .\" WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN | ||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | ||
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | ||
16 | .Dd $Mdocdate: June 26 2008 $ | ||
17 | .Dt MODULI 5 | ||
18 | .Os | ||
19 | .Sh NAME | ||
20 | .Nm moduli | ||
21 | .Nd Diffie Hellman moduli | ||
22 | .Sh DESCRIPTION | ||
23 | The | ||
24 | .Pa /etc/moduli | ||
25 | file contains prime numbers and generators for use by | ||
26 | .Xr sshd 8 | ||
27 | in the Diffie-Hellman Group Exchange key exchange method. | ||
28 | .Pp | ||
29 | New moduli may be generated with | ||
30 | .Xr ssh-keygen 1 | ||
31 | using a two-step process. | ||
32 | An initial | ||
33 | .Em candidate generation | ||
34 | pass, using | ||
35 | .Ic ssh-keygen -G , | ||
36 | calculates numbers that are likely to be useful. | ||
37 | A second | ||
38 | .Em primality testing | ||
39 | pass, using | ||
40 | .Ic ssh-keygen -T | ||
41 | provides a high degree of assurance that the numbers are prime and are | ||
42 | safe for use in Diffie Hellman operations by | ||
43 | .Xr sshd 8 . | ||
44 | This | ||
45 | .Nm | ||
46 | format is used as the output from each pass. | ||
47 | .Pp | ||
48 | The file consists of newline-separated records, one per modulus, | ||
49 | containing seven space separated fields. | ||
50 | These fields are as follows: | ||
51 | .Pp | ||
52 | .Bl -tag -width Description -offset indent | ||
53 | .It timestamp | ||
54 | The time that the modulus was last processed as YYYYMMDDHHMMSS. | ||
55 | .It type | ||
56 | Decimal number specifying the internal structure of the prime modulus. | ||
57 | Supported types are: | ||
58 | .Pp | ||
59 | .Bl -tag -width 0x00 -compact | ||
60 | .It 0 | ||
61 | Unknown, not tested | ||
62 | .It 2 | ||
63 | "Safe" prime; (p-1)/2 is also prime. | ||
64 | .It 4 | ||
65 | Sophie Germain; (p+1)*2 is also prime. | ||
66 | .El | ||
67 | .Pp | ||
68 | Moduli candidates initially produced by | ||
69 | .Xr ssh-keygen 1 | ||
70 | are Sophie Germain primes (type 4). | ||
71 | Futher primality testing with | ||
72 | .Xr ssh-keygen 1 | ||
73 | produces safe prime moduli (type 2) that are ready for use in | ||
74 | .Xr sshd 8 . | ||
75 | Other types are not used by OpenSSH. | ||
76 | .It tests | ||
77 | Decimal number indicating the type of primality tests that the number | ||
78 | has been subjected to represented as a bitmask of the following values: | ||
79 | .Pp | ||
80 | .Bl -tag -width 0x00 -compact | ||
81 | .It 0x00 | ||
82 | Not tested | ||
83 | .It 0x01 | ||
84 | Composite number - not prime. | ||
85 | .It 0x02 | ||
86 | Sieve of Eratosthenes | ||
87 | .It 0x04 | ||
88 | Probabalistic Miller-Rabin primality tests. | ||
89 | .El | ||
90 | .Pp | ||
91 | The | ||
92 | .Xr ssh-keygen 1 | ||
93 | moduli candidate generation uses the Sieve of Eratosthenes (flag 0x02). | ||
94 | Subsequent | ||
95 | .Xr ssh-keygen 1 | ||
96 | primality tests are Miller-Rabin tests (flag 0x04). | ||
97 | .It trials | ||
98 | Decimal number indicating of primaility trials that have been performed | ||
99 | on the modulus. | ||
100 | .It size | ||
101 | Decimal number indicating the size of the prime in bits. | ||
102 | .It generator | ||
103 | The recommended generator for use with this modulus (hexadecimal). | ||
104 | .It modulus | ||
105 | The modulus itself in hexadecimal. | ||
106 | .El | ||
107 | .Pp | ||
108 | When performing Diffie Hellman Group Exchange, | ||
109 | .Xr sshd 8 | ||
110 | first estimates the size of the modulus required to produce enough | ||
111 | Diffie Hellman output to sufficiently key the selected symmetric cipher. | ||
112 | .Xr sshd 8 | ||
113 | then randomly selects a modulus from | ||
114 | .Fa /etc/moduli | ||
115 | that best meets the size requirement. | ||
116 | .Pp | ||
117 | .Sh SEE ALSO | ||
118 | .Xr ssh-keygen 1 , | ||
119 | .Xr sshd 8 , | ||
120 | .Rs | ||
121 | .%R RFC 4419 | ||
122 | .%T "Diffie-Hellman Group Exchange for the Secure Shell (SSH) Transport Layer Protocol" | ||
123 | .%D 2006 | ||
124 | .Re | ||